WorldWideScience

Sample records for exploiting flow-based approaches

  1. Recent developments in automatic solid-phase extraction with renewable surfaces exploiting flow-based approaches

    DEFF Research Database (Denmark)

    Miró, Manuel; Hartwell, Supaporn Kradtap; Jakmunee, Jaroon

    2008-01-01

    Solid-phase extraction (SPE) is the most versatile sample-processing method for removal of interfering species and/or analyte enrichment. Although significant advances have been made over the past two decades in automating the entire analytical protocol involving SPE via flow-injection approaches...... chemical-derivatization reactions, and it pinpoints the most common instrumental detection techniques utilized. We present and discuss in detail relevant environmental and bioanalytical applications reported in the past few years....

  2. An improved approach for flow-based cloud point extraction.

    Science.gov (United States)

    Frizzarin, Rejane M; Rocha, Fábio R P

    2014-04-11

    Novel strategies are proposed to circumvent the main drawbacks of flow-based cloud point extraction (CPE). The surfactant-rich phase (SRP) was directly retained into the optical path of the spectrophotometric cell, thus avoiding its dilution previously to the measurement and yielding higher sensitivity. Solenoid micro-pumps were exploited to improve mixing by the pulsed flow and also to modulate the flow-rate for retention and removal of the SRP, thus avoiding the elution step, often carried out with organic solvents. The heat released and the increase of the salt concentration provided by an on-line neutralization reaction were exploited to induce the cloud point without an external heating device. These innovations were demonstrated by the spectrophotometric determination of iron, yielding a linear response from 10 to 200 μg L(-1) with a coefficient of variation of 2.3% (n=7). Detection limit and sampling rate were estimated at 5 μg L(-1) (95% confidence level) and 26 samples per hour, respectively. The enrichment factor was 8.9 and the procedure consumed only 6 μg of TAN and 390 μg of Triton X-114 per determination. At the 95% confidence level, the results obtained for freshwater samples agreed with the reference procedure and those obtained for digests of bovine muscle, rice flour, brown bread and tort lobster agreed with the certified reference values. The proposed procedure thus shows advantages in relation to previously proposed approaches for flow-based CPE, being a fast and environmental friendly alternative for on-line separation and pre-concentration. Copyright © 2014 Elsevier B.V. All rights reserved.

  3. Exploiting zone trapping to avoid liberation of air bubbles in flow-based analytical procedures requiring heating.

    Science.gov (United States)

    Vida, Ana C F; Zagatto, Elias A G

    2014-01-01

    In flow-based analytical procedures requiring heating, liberation of air bubbles is avoided by trapping a sample selected portion into a heated hermetic environment. The flow-through cuvette is maintained into a temperature-controlled aluminium block, thus acting as the trapping element and allowing real-time monitoring. The feasibility of the innovation was demonstrated in the spectrophotometric catalytic determination of vanadium in mineral waters. Air bubbles were not released even for temperatures as high as 95°C. The proposed system handles about 25 samples per hour, requires only 3 mg p-anisidine per determination and yields precise results (r.s.d. = 2.1%), in agreement with ICP-MS. Detection limit was evaluated (3.3 σ criterion) as 0.1 μg L(-1) V.

  4. Real-Time and Resilient Intrusion Detection: A Flow-Based Approach

    NARCIS (Netherlands)

    Hofstede, R.J.; Pras, Aiko

    Flow-based intrusion detection will play an important role in high-speed networks, due to the stringent performance requirements of packet-based solutions. Flow monitoring technologies, such as NetFlow or IPFIX, aggregate individual packets into flows, requiring new intrusion detection algorithms to

  5. Real-Time and Resilient Intrusion Detection: A Flow-Based Approach

    NARCIS (Netherlands)

    Hofstede, R.J.; Pras, Aiko

    Due to the demanding performance requirements of packet-based monitoring solutions on network equipment, flow-based intrusion detection systems will play an increasingly important role in current high-speed networks. The required technologies are already available and widely deployed: NetFlow and

  6. White Sharks Exploit the Sun during Predatory Approaches.

    Science.gov (United States)

    Huveneers, Charlie; Holman, Dirk; Robbins, Rachel; Fox, Andrew; Endler, John A; Taylor, Alex H

    2015-04-01

    There is no conclusive evidence of any nonhuman animal using the sun as part of its predation strategy. Here, we show that the world's largest predatory fish-the white shark (Carcharodon carcharias)-exploits the sun when approaching baits by positioning the sun directly behind them. On sunny days, sharks reversed their direction of approach along an east-west axis from morning to afternoon but had uniformly distributed approach directions during overcast conditions. These results show that white sharks have sufficient behavioral flexibility to exploit fluctuating environmental features when predating. This sun-tracking predation strategy has a number of potential functional roles, including improvement of prey detection, avoidance of retinal overstimulation, and predator concealment.

  7. Simultaneously Exploiting Two Formulations: an Exact Benders Decomposition Approach

    DEFF Research Database (Denmark)

    Lusby, Richard Martin; Gamst, Mette; Spoorendonk, Simon

    . Furthermore, it proves the correctness of the procedure and considers how to include interesting extensions such as cutting planes and advanced branching strategies. Finally, we test and compare the performance of the proposed approach on publicly available instances of the Bin Packing problem. Compared......When modelling a given problem using linear programming techniques several possibilities often exist, and each results in a different mathematical formulation of the problem. Usually, advantages and disadvantages can be identified in any single formulation. In this paper we consider mixed integer...... linear programs and propose an approach based on Benders decomposition to exploit the advantages of two different formulations when solving a problem. We propose to apply Benders decomposition to a combined formulation,comprised of two separate formulations, augmented with linking constraints to ensure...

  8. Exploiting the Errors: A Simple Approach for Improved Volatility Forecasting

    DEFF Research Database (Denmark)

    Bollerslev, Tim; Patton, Andrew J.; Quaedvlieg, Rogier

    We propose a new family of easy-to-implement realized volatility based forecasting models. The models exploit the asymptotic theory for high-frequency realized volatility estimation to improve the accuracy of the forecasts. By allowing the parameters of the models to vary explicitly with the (est......We propose a new family of easy-to-implement realized volatility based forecasting models. The models exploit the asymptotic theory for high-frequency realized volatility estimation to improve the accuracy of the forecasts. By allowing the parameters of the models to vary explicitly...... with the (estimated) degree of measurement error, the models exhibit stronger persistence, and in turn generate more responsive forecasts, when the measurement error is relatively low. Implementing the new class of models for the S&P500 equity index and the individual constituents of the Dow Jones Industrial Average...

  9. An ontological approach for the exploitation of clinical data.

    Science.gov (United States)

    Assélé Kama, Ariane; Choquet, Rémy; Mels, Giovanni; Daniel, Christel; Charlet, Jean; Jaulent, Marie-Christine

    2013-01-01

    Clinical data captured in hospital information systems may be unusable in their original format due to missing information or knowledge. The use of external resources (e.g. domain ontology) could be a way of dealing with this lack of knowledge. Our study thus aimed to develop a framework allowing a user to perform medical queries in the context of infectious diseases. By creating an interaction between a knowledge source and clinical data, using semantic and semantic web tools and methods, the users are able to perform queries on a database to obtain results about antibiotic resistance. This work has been performed in the context of the DebugIT European project that aims to control and monitor the antibioresistance growth via a semantic interoperability platform. The results obtained by the use of different semantic web tools were quantitatively evaluated by comparison of the number of results and the query execution time. We have compared our approach with classic business intelligence approaches in terms of usability and functionality.

  10. Stochastic control approaches for sensor management in search and exploitation

    Science.gov (United States)

    Hitchings, Darin Chester

    Recent improvements in the capabilities of autonomous vehicles have motivated their increased use in such applications as defense, homeland security, environmental monitoring, and surveillance. To enhance performance in these applications, new algorithms are required to control teams of robots autonomously and through limited interactions with human operators. In this dissertation we develop new algorithms for control of robots performing information-seeking missions in unknown environments. These missions require robots to control their sensors in order to discover the presence of objects, keep track of the objects, and learn what these objects are, given a fixed sensing budget. Initially, we investigate control of multiple sensors, with a finite set of sensing options and finite-valued measurements, to locate and classify objects given a limited resource budget. The control problem is formulated as a Partially Observed Markov Decision Problem (POMDP), but its exact solution requires excessive computation. Under the assumption that sensor error statistics are independent and time-invariant, we develop a class of algorithms using Lagrangian Relaxation techniques to obtain optimal mixed strategies using performance bounds developed in previous research. We investigate alternative Receding Horizon (RH) controllers to convert the mixed strategies to feasible adaptive-sensing strategies and evaluate the relative performance of these controllers in simulation. The resulting controllers provide superior performance to alternative algorithms proposed in the literature and obtain solutions to large-scale POMDP problems several orders of magnitude faster than optimal Dynamic Programming (DP) approaches with comparable performance quality. We extend our results for finite action, finite measurement sensor control to scenarios with moving objects. We use Hidden Markov Models (HMMs) for the evolution of objects, according to the dynamics of a birth-death process. We develop a

  11. Investigating performance variability of processing, exploitation, and dissemination using a socio-technical systems analysis approach

    Science.gov (United States)

    Danczyk, Jennifer; Wollocko, Arthur; Farry, Michael; Voshell, Martin

    2016-05-01

    Data collection processes supporting Intelligence, Surveillance, and Reconnaissance (ISR) missions have recently undergone a technological transition accomplished by investment in sensor platforms. Various agencies have made these investments to increase the resolution, duration, and quality of data collection, to provide more relevant and recent data to warfighters. However, while sensor improvements have increased the volume of high-resolution data, they often fail to improve situational awareness and actionable intelligence for the warfighter because it lacks efficient Processing, Exploitation, and Dissemination and filtering methods for mission-relevant information needs. The volume of collected ISR data often overwhelms manual and automated processes in modern analysis enterprises, resulting in underexploited data, insufficient, or lack of answers to information requests. The outcome is a significant breakdown in the analytical workflow. To cope with this data overload, many intelligence organizations have sought to re-organize their general staffing requirements and workflows to enhance team communication and coordination, with hopes of exploiting as much high-value data as possible and understanding the value of actionable intelligence well before its relevance has passed. Through this effort we have taken a scholarly approach to this problem by studying the evolution of Processing, Exploitation, and Dissemination, with a specific focus on the Army's most recent evolutions using the Functional Resonance Analysis Method. This method investigates socio-technical processes by analyzing their intended functions and aspects to determine performance variabilities. Gaps are identified and recommendations about force structure and future R and D priorities to increase the throughput of the intelligence enterprise are discussed.

  12. Geographically distributed Batch System as a Service: the INDIGO-DataCloud approach exploiting HTCondor

    Science.gov (United States)

    Aiftimiei, D. C.; Antonacci, M.; Bagnasco, S.; Boccali, T.; Bucchi, R.; Caballer, M.; Costantini, A.; Donvito, G.; Gaido, L.; Italiano, A.; Michelotto, D.; Panella, M.; Salomoni, D.; Vallero, S.

    2017-10-01

    One of the challenges a scientific computing center has to face is to keep delivering well consolidated computational frameworks (i.e. the batch computing farm), while conforming to modern computing paradigms. The aim is to ease system administration at all levels (from hardware to applications) and to provide a smooth end-user experience. Within the INDIGO- DataCloud project, we adopt two different approaches to implement a PaaS-level, on-demand Batch Farm Service based on HTCondor and Mesos. In the first approach, described in this paper, the various HTCondor daemons are packaged inside pre-configured Docker images and deployed as Long Running Services through Marathon, profiting from its health checks and failover capabilities. In the second approach, we are going to implement an ad-hoc HTCondor framework for Mesos. Container-to-container communication and isolation have been addressed exploring a solution based on overlay networks (based on the Calico Project). Finally, we have studied the possibility to deploy an HTCondor cluster that spans over different sites, exploiting the Condor Connection Broker component, that allows communication across a private network boundary or firewall as in case of multi-site deployments. In this paper, we are going to describe and motivate our implementation choices and to show the results of the first tests performed.

  13. Towards a multi-scale approach for an Earth observation-based assessment of natural resource exploitation in conflict regions

    OpenAIRE

    SCHOEPFER Elisabeth; Spröhnle, Kristin; Kranz, Olaf; Blaes, Xavier; KOLOMAZNIK Jan; Hilgert, Filip; BARTALOS Tomas; Kemper, Thomas

    2016-01-01

    The exploitation of resources, if not properly managed, can lead to spoiling natural habitats as well as to threatening people’s health, livelihoods and security. The paper discusses a multi-scale Earth observation-based approach to provide independent information related to exploitation activities of natural resources for countries which are experiencing armed conflict. The analyses are based on medium to very high spatial resolution optical satellite data. Object-based image analysis is use...

  14. Exploiting impedance shaping approaches to overcome force overshoots in delicate interaction tasks

    Directory of Open Access Journals (Sweden)

    Loris Roveda

    2016-09-01

    Full Text Available The aim of the presented article is to overcome the force overshoot issue in impedance based force tracking applications. Nowadays, light-weight manipulators are involved in high-accurate force control applications (such as polishing tasks, where the force overshoot issue is critical (i.e. damaging the component causing a production waste, exploiting the impedance control. Two main force tracking impedance control approaches are described in literature: (a set-point deformation and (b variable stiffness approaches. However, no contributions are directly related to the force overshoot issue. The presented article extends both such methodologies to analytically achieve the force overshoots avoidance in interaction tasks based on the on-line estimation of the interacting environment stiffness (available through an EKF. Both the proposed control algorithms allow to achieve a linear closed-loop dynamics for the coupled robot-environment system. Therefore, control gains can be analytically on-line calculated to achieve an over-damped closed-loop dynamics of the controlled coupled system. Control strategies have been validated in experiments, involving a KUKA LWR 4+. A probing task has been performed, representative of many industrial tasks (e.g. assembly tasks, in which a main force task direction is defined.

  15. Flow-Based Provenance

    Directory of Open Access Journals (Sweden)

    Sabah Al-Fedaghi

    2017-02-01

    Full Text Available Aim/Purpose: With information almost effortlessly created and spontaneously available, current progress in Information and Communication Technology (ICT has led to the complication that information must be scrutinized for trustworthiness and provenance. Information systems must become provenance-aware to be satisfactory in accountability, reproducibility, and trustworthiness of data. Background:\tMultiple models for abstract representation of provenance have been proposed to describe entities, people, and activities involved in producing a piece of data, including the Open Provenance Model (OPM and the World Wide Web Consortium. These models lack certain concepts necessary for specifying workflows and encoding the provenance of data products used and generated. Methodology: Without loss of generality, the focus of this paper is on OPM depiction of provenance in terms of a directed graph. We have redrawn several case studies in the framework of our proposed model in order to compare and evaluate it against OPM for representing these cases. Contribution: This paper offers an alternative flow-based diagrammatic language that can form a foundation for modeling of provenance. The model described here provides an (abstract machine-like representation of provenance. Findings: The results suggest a viable alternative in the area of diagrammatic representation for provenance applications. Future Research: Future work will seek to achieve more accurate comparisons with current models in the field.

  16. Parallel exploitation of a spatial-spectral classification approach for hyperspectral images on RVC-CAL

    Science.gov (United States)

    Lazcano, R.; Madroñal, D.; Fabelo, H.; Ortega, S.; Salvador, R.; Callicó, G. M.; Juárez, E.; Sanz, C.

    2017-10-01

    Hyperspectral Imaging (HI) assembles high resolution spectral information from hundreds of narrow bands across the electromagnetic spectrum, thus generating 3D data cubes in which each pixel gathers the spectral information of the reflectance of every spatial pixel. As a result, each image is composed of large volumes of data, which turns its processing into a challenge, as performance requirements have been continuously tightened. For instance, new HI applications demand real-time responses. Hence, parallel processing becomes a necessity to achieve this requirement, so the intrinsic parallelism of the algorithms must be exploited. In this paper, a spatial-spectral classification approach has been implemented using a dataflow language known as RVCCAL. This language represents a system as a set of functional units, and its main advantage is that it simplifies the parallelization process by mapping the different blocks over different processing units. The spatial-spectral classification approach aims at refining the classification results previously obtained by using a K-Nearest Neighbors (KNN) filtering process, in which both the pixel spectral value and the spatial coordinates are considered. To do so, KNN needs two inputs: a one-band representation of the hyperspectral image and the classification results provided by a pixel-wise classifier. Thus, spatial-spectral classification algorithm is divided into three different stages: a Principal Component Analysis (PCA) algorithm for computing the one-band representation of the image, a Support Vector Machine (SVM) classifier, and the KNN-based filtering algorithm. The parallelization of these algorithms shows promising results in terms of computational time, as the mapping of them over different cores presents a speedup of 2.69x when using 3 cores. Consequently, experimental results demonstrate that real-time processing of hyperspectral images is achievable.

  17. Exploration of Exploitation Approaches of European Projects on ICT and Foreign Language Learning: the CEFcult project case

    NARCIS (Netherlands)

    Rusman, Ellen; Rajagopal, Kamakshi; Stoyanov, Slavi; Van Maele, Jan

    2011-01-01

    Rusman, E., Rajagopal, K., Stoyanov, S., & Van Maele, J. (2011, 20 October). Exploration of Exploitation Approaches of European Projects on ICT and Foreign Language Learning: the CEFcult project case. Presentation at the 4th International Conference ICT for Language Learning, Florence, Italy.

  18. Exploration of Exploitation Approaches of European Projects on ICT and Foreign Language Learning: the CEFcult project case

    NARCIS (Netherlands)

    Rusman, Ellen; Rajagopal, Kamakshi; Stoyanov, Slavi; Van Maele, Jan

    2011-01-01

    Rusman, E., Rajagopal, K., Stoyanov, S., & Van Maele, J. (2011, 20-21 October). Exploration of Exploitation Approaches of European Projects on ICT and Foreign Language Learning: the CEFcult project case. Paper presented at the 4th International Conference ICT for Language Learning, Florence, Italy.

  19. Exploiting the potential of marine natural products: structure elucidation and metagenomic approaches to biotechnological production

    OpenAIRE

    Della Sala, Gerardo

    2013-01-01

    Sponges represent the most prolific producers of novel marine bioactive secondary metabolites. In the last years, several drugs derived from marine natural products have appeared in the market, and others are in clinical trials. The aim of my research project was to exploit the unusual and often surprising chemistry of marine sponges, in the frame of the more general purpose of discovering and developing new drugs from natural products. The research work presented in this PhD Thesis was di...

  20. Helix Nebula and CERN: A Symbiotic approach to exploiting commercial clouds

    CERN Document Server

    Barreiro Megino, Fernando Harald; Kucharczyk, Katarzyna; Medrano Llamas, Ramón; van der Ster, Daniel

    2014-01-01

    The recent paradigm shift toward cloud computing in IT, and general interest in "Big Data" in particular, have demonstrated that the computing requirements of HEP are no longer globally unique. Indeed, the CERN IT department and LHC experiments have already made significant R&D investments in delivering and exploiting cloud computing resources. While a number of technical evaluations of interesting commercial offerings from global IT enterprises have been performed by various physics labs, further technical, security, sociological, and legal issues need to be address before their large-scale adoption by the research community can be envisaged. Helix Nebula - the Science Cloud is an initiative that explores these questions by joining the forces of three European research institutes (CERN, ESA and EMBL) with leading European commercial IT enterprises. The goals of Helix Nebula are to establish a cloud platform federating multiple commercial cloud providers, along with new business models, which can sustain ...

  1. Conjugation of squalene to gemcitabine as unique approach exploiting endogenous lipoproteins for drug delivery

    Science.gov (United States)

    Sobot, Dunja; Mura, Simona; Yesylevskyy, Semen O.; Dalbin, Laura; Cayre, Fanny; Bort, Guillaume; Mougin, Julie; Desmaële, Didier; Lepetre-Mouelhi, Sinda; Pieters, Grégory; Andreiuk, Bohdan; Klymchenko, Andrey S.; Paul, Jean-Louis; Ramseyer, Christophe; Couvreur, Patrick

    2017-05-01

    Once introduced in the organism, the interaction of nanoparticles with various biomolecules strongly impacts their fate. Here we show that nanoparticles made of the squalene derivative of gemcitabine (SQGem) interact with lipoproteins (LPs), indirectly enabling the targeting of cancer cells with high LP receptors expression. In vitro and in vivo experiments reveal preeminent affinity of the squalene-gemcitabine bioconjugates towards LP particles with the highest cholesterol content and in silico simulations further display their incorporation into the hydrophobic core of LPs. To the best of our knowledge, the use of squalene to induce drug insertion into LPs for indirect cancer cell targeting is a novel concept in drug delivery. Interestingly, not only SQGem but also other squalene derivatives interact similarly with lipoproteins while such interaction is not observed with liposomes. The conjugation to squalene represents a versatile platform that would enable efficient drug delivery by simply exploiting endogenous lipoproteins.

  2. Helix Nebula and CERN: A Symbiotic approach to exploiting commercial clouds

    CERN Multimedia

    Barreiro Megino, Fernando Harald; Kucharczyk, Katarzyna; Medrano Llamas, Ramón; van der Ster, Daniel

    2013-01-01

    The recent paradigm shift toward cloud computing in IT, and general interest in "Big Data" in particular, have demonstrated that the computing requirements of HEP are no longer globally unique. Indeed, the CERN IT department and LHC experiments have already made significant R&D; investments in delivering and exploiting cloud computing resources. While a number of technical evaluations of interesting commercial offerings from global IT enterprises have been performed by various physics labs, further technical, security, sociological, and legal issues need to be address before their large-scale adoption by the research community can be envisaged. Helix Nebula - the Science Cloud is an initiative that explores these questions by joining the forces of three European research institutes (CERN, ESA and EMBL) with leading European commercial IT enterprises. The goals of Helix Nebula are to establish a cloud platform federating multiple commercial cloud providers, along with new business models, which can sustain...

  3. Modeling a hierarchical structure of factors influencing exploitation policy for water distribution systems using ISM approach

    Science.gov (United States)

    Jasiulewicz-Kaczmarek, Małgorzata; Wyczółkowski, Ryszard; Gładysiak, Violetta

    2017-12-01

    Water distribution systems are one of the basic elements of contemporary technical infrastructure of urban and rural areas. It is a complex engineering system composed of transmission networks and auxiliary equipment (e.g. controllers, checkouts etc.), scattered territorially over a large area. From the water distribution system operation point of view, its basic features are: functional variability, resulting from the need to adjust the system to temporary fluctuations in demand for water and territorial dispersion. The main research questions are: What external factors should be taken into account when developing an effective water distribution policy? Does the size and nature of the water distribution system significantly affect the exploitation policy implemented? These questions have shaped the objectives of research and the method of research implementation.

  4. Conjugation of squalene to gemcitabine as unique approach exploiting endogenous lipoproteins for drug delivery.

    Science.gov (United States)

    Sobot, Dunja; Mura, Simona; Yesylevskyy, Semen O; Dalbin, Laura; Cayre, Fanny; Bort, Guillaume; Mougin, Julie; Desmaële, Didier; Lepetre-Mouelhi, Sinda; Pieters, Grégory; Andreiuk, Bohdan; Klymchenko, Andrey S; Paul, Jean-Louis; Ramseyer, Christophe; Couvreur, Patrick

    2017-05-30

    Once introduced in the organism, the interaction of nanoparticles with various biomolecules strongly impacts their fate. Here we show that nanoparticles made of the squalene derivative of gemcitabine (SQGem) interact with lipoproteins (LPs), indirectly enabling the targeting of cancer cells with high LP receptors expression. In vitro and in vivo experiments reveal preeminent affinity of the squalene-gemcitabine bioconjugates towards LP particles with the highest cholesterol content and in silico simulations further display their incorporation into the hydrophobic core of LPs. To the best of our knowledge, the use of squalene to induce drug insertion into LPs for indirect cancer cell targeting is a novel concept in drug delivery. Interestingly, not only SQGem but also other squalene derivatives interact similarly with lipoproteins while such interaction is not observed with liposomes. The conjugation to squalene represents a versatile platform that would enable efficient drug delivery by simply exploiting endogenous lipoproteins.

  5. New approaches for studying and exploiting an old protuberance, the plant trichome.

    Science.gov (United States)

    Wagner, G J; Wang, E; Shepherd, R W

    2004-01-01

    Much recent study of plant trichomes has focused on various aspects of glandular secreting trichomes (GSTs) and differentiation of simple trichomes. This Botanical Briefing will highlight: research on various aspects of, and manipulation of glandular secreting trichomes; molecular aspects of the differentiation and development of simple trichomes of arabidopsis and cotton; how methods for manipulation of model systems used in the above work can be applied to expand our understanding of less studied surface structures of plants. The Briefing will cover: established and suggested roles of simple and glandular secreting trichomes; recent results regarding solute and ion movement in trichomes; methods for isolating trichomes; recent studies of trichome differentiation and development; attempts to modify metabolism in secreting trichomes; efforts to exploit trichomes for commercial and agronomic purposes.

  6. Stone Tool Manufacture Strategies and Lithic Raw Material Exploitation in Coastal Patagonia, Argentina: A Multivariate Approach

    Directory of Open Access Journals (Sweden)

    Marcelo Cardillo

    2013-01-01

    Full Text Available This paper seeks to characterize strategies of artifact manufacture and lithic raw material exploitation along San Matías Gulf coast, Argentina, using multifactorial and cluster analysis. Multifactorial analysis is a relatively new method that has yet to be used for archaeological analysis; it has the advantage that it allows us to describe data using different groups of qualitative or quantitative variables at the same time. Additionally, cluster analysis was conducted on multifactorial axis in a bid to identify grouping patterns. The results obtained from the combination of these two methods suggest that they may be useful in characterizing technological strategies in the study area. Furthermore, they may also be a powerful exploratory and characterization tool able to generate explanations at low spatial scales. The application of these methods on San Matías Gulf study case suggests that along the western and northern coasts of this Gulf the most important variables in determining differences in resource use were the fragmentation ratio and lithic raw materials used in artifact manufacture.

  7. Helix Nebula and CERN: A Symbiotic approach to exploiting commercial clouds

    Science.gov (United States)

    Barreiro Megino, Fernando H.; Jones, Robert; Kucharczyk, Katarzyna; Medrano Llamas, Ramón; van der Ster, Daniel

    2014-06-01

    The recent paradigm shift toward cloud computing in IT, and general interest in "Big Data" in particular, have demonstrated that the computing requirements of HEP are no longer globally unique. Indeed, the CERN IT department and LHC experiments have already made significant R&D investments in delivering and exploiting cloud computing resources. While a number of technical evaluations of interesting commercial offerings from global IT enterprises have been performed by various physics labs, further technical, security, sociological, and legal issues need to be address before their large-scale adoption by the research community can be envisaged. Helix Nebula - the Science Cloud is an initiative that explores these questions by joining the forces of three European research institutes (CERN, ESA and EMBL) with leading European commercial IT enterprises. The goals of Helix Nebula are to establish a cloud platform federating multiple commercial cloud providers, along with new business models, which can sustain the cloud marketplace for years to come. This contribution will summarize the participation of CERN in Helix Nebula. We will explain CERN's flagship use-case and the model used to integrate several cloud providers with an LHC experiment's workload management system. During the first proof of concept, this project contributed over 40.000 CPU-days of Monte Carlo production throughput to the ATLAS experiment with marginal manpower required. CERN's experience, together with that of ESA and EMBL, is providing a great insight into the cloud computing industry and highlighted several challenges that are being tackled in order to ease the export of the scientific workloads to the cloud environments.

  8. New Approaches To Off-Shore Wind Energy Management Exploiting Satellite EO Data

    Science.gov (United States)

    Morelli, Marco; Masini, Andrea; Venafra, Sara; Potenza, Marco Alberto Carlo

    2013-12-01

    Wind as an energy resource has been increasingly in focus over the past decades, starting with the global oil crisis in the 1970s. The possibility of expanding wind power production to off-shore locations is attractive, especially in sites where wind levels tend to be higher and more constant. Off-shore high-potential sites for wind energy plants are currently being looked up by means of wind atlases, which are essentially based on NWP (Numerical Weather Prediction) archive data and that supply information with low spatial resolution and very low accuracy. Moreover, real-time monitoring of active off- shore wind plants is being carried out using in-situ installed anemometers, that are not very reliable (especially on long time periods) and that should be periodically substituted when malfunctions or damages occur. These activities could be greatly supported exploiting archived and near real-time satellite imagery, that could provide accurate, global coverage and high spatial resolution information about both averaged and near real-time off-shore windiness. In this work we present new methodologies aimed to support both planning and near-real-time monitoring of off-shore wind energy plants using satellite SAR(Synthetic Aperture Radar) imagery. Such methodologies are currently being developed in the scope of SATENERG, a research project funded by ASI (Italian Space Agency). SAR wind data are derived from radar backscattering using empirical geophysical model functions, thus achieving greater accuracy and greater resolution with respect to other wind measurement methods. In detail, we calculate wind speed from X-band and C- band satellite SAR data, such as Cosmo-SkyMed (XMOD2) and ERS and ENVISAT (CMOD4) respectively. Then, using also detailed models of each part of the wind plant, we are able to calculate the AC power yield expected behavior, which can be used to support either the design of potential plants (using historical series of satellite images) or the

  9. Novel approach to the exploitation of the tidal energy. Volume 1: Summary and discussion

    Science.gov (United States)

    Gorlov, A. M.

    1981-12-01

    The hydropneumatic concept in the approach to harnessing low tidal hydropower is discussed. The energy of water flow is converted into the energy of an air jet by a specialized air chamber which is placed on the ocean floor across a flowing watercourse. Water passes through the chamber where it works as a natural piston compressing air in the upper part of the closure. Compressed air is used as a new working plenum to drive air turbines. The kinetic energy of an air jet provided by the air chamber is sufficient for stable operation of industrial air turbines. It is possible to use light plastic barriers instead of conventional rigid dams (the water sail concept). It is confirmed that the concept can result in a less expensive and more effective tidal power plant project than the conventional hydroturbine approach.

  10. Waves and Wine: Advanced approaches for characterizing and exploiting micro-terroir

    Science.gov (United States)

    Hubbard, S. S.; Grote, K. R.; Freese, P.; Peterson, J. E.; Rubin, Y.

    2012-12-01

    Development of viticultural strategies that are focused on promoting uniformly high quality wine grapes requires an understanding of the properties that influence wine grape development. Our objective is to explore the spatial and temporal variability of above and below ground factors that can influence grape variability at the block scale (or micro-terroir) using a combination of conventional point measurements and non-invasive geophysical approaches, and to use that information to guide the development of new vineyards or the management of existing vineyards. Climate clearly plays a dominant role in determining the success of certain viticultural regions or vintages. However, wine grapes of the same variety, which are grown in the same microclimate region and cultivated and made into wine using identical practices, can lead to remarkably different wines when the grapes are grown on different types of soils. The soil texture controls soil water availability, which greatly influences grapevine physiological status, vegetative and reproductive growth, and ultimately red wine grape quality. One aspect of our research has focused on developing surface geophysical methods, particularly ground penetrating radar (GPR), to characterize soil texture variability and to monitor vineyard water content. Through testing the approaches in three California wineries, we find that analysis of GPR groundwave and reflected waves enable mapping of shallow soil water content in high resolution, with acceptable accuracy, and in a non-invasive manner, and that use of multiple GPR methods and frequencies offer the potential to characterize the soil in 3-D space. We use the dense data to explore spatial and temporal correlations in soil water content, soil texture, and vegetation vigor and the associated implications for vineyard management. We also describe a new zonal-based vineyard development strategy that honors the natural variability of the site, or the micro-terrior. The approach

  11. Current and upcoming approaches to exploit the reversibility of epigenetic mutations in breast cancer.

    Science.gov (United States)

    Falahi, Fahimeh; van Kruchten, Michel; Martinet, Nadine; Hospers, Geke A P; Rots, Marianne G

    2014-07-29

    DNA methylation and histone modifications are important epigenetic modifications associated with gene (dys)regulation. The epigenetic modifications are balanced by epigenetic enzymes, so-called writers and erasers, such as DNA (de)methylases and histone (de)acetylases. Aberrant epigenetic alterations have been associated with various diseases, including breast cancer. Since aberrant epigenetic modifications are potentially reversible, they might represent targets for breast cancer therapy. Indeed, several drugs have been designed to inhibit epigenetic enzymes (epi-drugs), thereby reversing epigenetic modifications. US Food and Drug Administration approval has been obtained for some epi-drugs for hematological malignancies. However, these drugs have had very modest anti-tumor efficacy in phase I and II clinical trials in breast cancer patients as monotherapy. Therefore, current clinical trials focus on the combination of epi-drugs with other therapies to enhance or restore the sensitivity to such therapies. This approach has yielded some promising results in early phase II trials. The disadvantage of epi-drugs, however, is genome-wide effects, which may cause unwanted upregulation of, for example, pro-metastatic genes. Development of gene-targeted epigenetic modifications (epigenetic editing) in breast cancer can provide a novel approach to prevent such unwanted events. In this context, identification of crucial epigenetic modifications regulating key genes in breast cancer is of critical importance. In this review, we first describe aberrant DNA methylation and histone modifications as two important classes of epigenetic mutations in breast cancer. Then we focus on the preclinical and clinical epigenetic-based therapies currently being explored for breast cancer. Finally, we describe epigenetic editing as a promising new approach for possible applications towards more targeted breast cancer treatment.

  12. Exploiting Flexibility in Coupled Electricity and Natural Gas Markets: A Price-Based Approach

    DEFF Research Database (Denmark)

    Ordoudis, Christos; Delikaraoglou, Stefanos; Pinson, Pierre

    2017-01-01

    Natural gas-fired power plants (NGFPPs) are considered a highly flexible component of the energy system and can facilitate the large-scale integration of intermittent renewable generation. Therefore, it is necessary to improve the coordination between electric power and natural gas systems....... Considering a market-based coupling of these systems, we introduce a decision support tool that increases market efficiency in the current setup where day-ahead and balancing markets are cleared sequentially. The proposed approach relies on the optimal adjustment of natural gas price to modify the scheduling...

  13. Interdisciplinary approach to exploit the tectonic memory in the continental crust of collisional belts.

    Science.gov (United States)

    Gosso, G.; Marotta, A. M.; Rebay, G.; Regorda, A.; Roda, M.; Spalla, M. I.; Zanoni, D.; Zucali, M.

    2015-12-01

    Collisional belts result by thoroughly competing thermo-mechanical disaggregation and coupling within both continental and oceanic lithospheric slices, during construction of tectono-metamorphic architectures. In multiply reworked metamorphics, tectonic units may be contoured nowadays on the base of coherent thermo-baric and structural time-sequences rather than simply relying on lithologic affinities. Sequences of equilibrium assemblages and related fabric imprints are an approach that appears as a more reliable procedure, that enables to define tectonic units as the volume of crustal slices that underwent corresponding variations during the dynamics of an active margin and takes into account a history of physical imprints. The dimensions of these tectonic units may have varied over time and must be reconstructed combining the tracers of structural and metamorphic changes of basement rocks, since such kind of tectono-metamorphic units (TMUs) is a realistic configuration of the discrete portions of orogenic crust that experienced a coherent sequence of metamorphic and textural variations. Their translational trajectories, and bulk shape changes during deformation, cannot simply be derived from the analysis of the geometries and kinematics of tectonic units, but are to be obtained by adding the reconstruction of quantitative P-T-d-t paths making full use of fossil mineral equilibria. The joint TMU field-and-laboratory definition is an investigation procedure that bears a distinct thermo-tectonic connotation, that, through modelling, offers the opportunity to test the physical compatibilities of plate-scale interconnected variables, such as density, viscosity, and heat transfer, with respect to what current interpretative geologic histories may imply. Comparison between predictions from numerical modelling and natural data obtained by this analytical approach can help to solve ambiguities on geodynamic significance of structural and thermal signatures, also as a

  14. Investigation of drag and heat reduction induced by a novel combinational lateral jet and spike concept in supersonic flows based on conjugate heat transfer approach

    Science.gov (United States)

    Zhu, Liang; Chen, Xiong; Li, Yingkun; Musa, Omer; Zhou, Changsheng

    2018-01-01

    When flying at supersonic or hypersonic speeds through the air, the drag and severe heating have a great impact on the vehicles, thus the drag reduction and thermal protection studies have attracted worldwide attention. In the current study, the Reynolds-averaged Navier-Stokes (RANS) equations coupled with the shear stress transport (SST) k - ω turbulence model have been employed to investigate the flow behavior induced by a novel combinational lateral jet and spike concept in supersonic flows. A coupling conjugate heat transfer (CHT) approach has been applied to investigate the thermal protection, which takes the heat transfer of structure into consideration. After the code was validated by the available experimental results and the gird independency analysis was carried out, the influences of the spike length ratio, lateral jet pressure ratio and lateral jet location on the drag and heat reduction performance are analyzed comprehensively. The obtained results show that a remarkable reduction in the drag and heat flux is achieved when a lateral jet is added to the spike. This implies that the combinational lateral jet and spike concept in supersonic flows have a great benefit to the drag and heat reduction. Both the drag and heat reduction decrease with the increase of the lateral jet pressure ratio, and the heat flux is more sensitive to the lateral jet pressure ratio. The lateral jet should not be located in the bottom of the spike in order to realize better drag and heat reduction performance. The drag and heat flux could be reduced by about 45% by reasonable lateral jet location. The drag decreases with the increase of the spike length ratio whereas the heat flux is affected by the spike length ratio just in a certain range.

  15. A multitemporal probabilistic error correction approach to SVM classification of alpine glacier exploiting sentinel-1 images (Conference Presentation)

    Science.gov (United States)

    Callegari, Mattia; Marin, Carlo; Notarnicola, Claudia; Carturan, Luca; Covi, Federico; Galos, Stephan; Seppi, Roberto

    2016-10-01

    In mountain regions and their forelands, glaciers are key source of melt water during the middle and late ablation season, when most of the winter snow has already melted. Furthermore, alpine glaciers are recognized as sensitive indicators of climatic fluctuations. Monitoring glacier extent changes and glacier surface characteristics (i.e. snow, firn and bare ice coverage) is therefore important for both hydrological applications and climate change studies. Satellite remote sensing data have been widely employed for glacier surface classification. Many approaches exploit optical data, such as from Landsat. Despite the intuitive visual interpretation of optical images and the demonstrated capability to discriminate glacial surface thanks to the combination of different bands, one of the main disadvantages of available high-resolution optical sensors is their dependence on cloud conditions and low revisit time frequency. Therefore, operational monitoring strategies relying only on optical data have serious limitations. Since SAR data are insensitive to clouds, they are potentially a valid alternative to optical data for glacier monitoring. Compared to past SAR missions, the new Sentinel-1 mission provides much higher revisit time frequency (two acquisitions each 12 days) over the entire European Alps, and this number will be doubled once the Sentinel1-b will be in orbit (April 2016). In this work we present a method for glacier surface classification by exploiting dual polarimetric Sentinel-1 data. The method consists of a supervised approach based on Support Vector Machine (SVM). In addition to the VV and VH signals, we tested the contribution of local incidence angle, extracted from a digital elevation model and orbital information, as auxiliary input feature in order to account for the topographic effects. By exploiting impossible temporal transition between different classes (e.g. if at a given date one pixel is classified as rock it cannot be classified as

  16. Exploiting in situ antigen generation and immune modulation to enhance chemotherapy response in advanced melanoma: A combination nanomedicine approach.

    Science.gov (United States)

    Lu, Yao; Wang, Yuhua; Miao, Lei; Haynes, Matthew; Xiang, Guangya; Huang, Leaf

    2016-08-28

    Therapeutic anticancer vaccine development must address a number of barriers to achieve successful tumor specific killing, including effective antigen presentation and antigen-specific T-cell activation to mediate cytotoxic cellular effects, inhibition of an immune-suppressive tumor microenvironment in order to facilitate and enhance CTL activity, and induction of memory T-cells to prolong tumor rejection. While traditional as well as modern vaccines rely upon delivery of both antigen and adjuvant, a variety of clinically relevant cancers lack ideal immunogenic antigens. Building upon recent efforts, we instead chose to exploit chemotherapy-induced apoptosis to allow for in situ antigen generation in a combination, nanomedicine-based approach. Specifically, lipid-coated cisplatin nanoparticles (LPC) and CpG-encapsulated liposomes (CpG-Lipo) were prepared for the temporally-controlled and multifaceted treatment of an advanced in vivo model of melanoma. Such combination therapy established strong synergistic effects, both in apoptotic extent and subsequent abrogation of tumor growth, which were due largely to both an enhanced cytotoxic T-cell recruitment and a reduction of immune-suppressive mediators in the microenvironments of both spleens and tumor. These results underlie a prolonged host lifespan in the combination approach (45 days) as compared with control (25 days, p nanomedicine by establishing effect synergy in host-specific immunotherapy following chemotherapy. Copyright © 2016. Published by Elsevier Ireland Ltd.

  17. Exploiting neurovascular coupling: a Bayesian sequential Monte Carlo approach applied to simulated EEG fNIRS data

    Science.gov (United States)

    Croce, Pierpaolo; Zappasodi, Filippo; Merla, Arcangelo; Chiarelli, Antonio Maria

    2017-08-01

    Objective. Electrical and hemodynamic brain activity are linked through the neurovascular coupling process and they can be simultaneously measured through integration of electroencephalography (EEG) and functional near-infrared spectroscopy (fNIRS). Thanks to the lack of electro-optical interference, the two procedures can be easily combined and, whereas EEG provides electrophysiological information, fNIRS can provide measurements of two hemodynamic variables, such as oxygenated and deoxygenated hemoglobin. A Bayesian sequential Monte Carlo approach (particle filter, PF) was applied to simulated recordings of electrical and neurovascular mediated hemodynamic activity, and the advantages of a unified framework were shown. Approach. Multiple neural activities and hemodynamic responses were simulated in the primary motor cortex of a subject brain. EEG and fNIRS recordings were obtained by means of forward models of volume conduction and light propagation through the head. A state space model of combined EEG and fNIRS data was built and its dynamic evolution was estimated through a Bayesian sequential Monte Carlo approach (PF). Main results. We showed the feasibility of the procedure and the improvements in both electrical and hemodynamic brain activity reconstruction when using the PF on combined EEG and fNIRS measurements. Significance. The investigated procedure allows one to combine the information provided by the two methodologies, and, by taking advantage of a physical model of the coupling between electrical and hemodynamic response, to obtain a better estimate of brain activity evolution. Despite the high computational demand, application of such an approach to in vivo recordings could fully exploit the advantages of this combined brain imaging technology.

  18. An ethnomethodological approach to examine exploitation in the context of capacity, trust and experience of commercial surrogacy in India

    National Research Council Canada - National Science Library

    Saravanan, Sheela

    2013-01-01

    The socio-ethical concerns regarding exploitation in commercial surrogacy are premised on asymmetric vulnerability and the commercialization of women's reproductive capacity to suit individualistic motives...

  19. Redefining Exploitation

    DEFF Research Database (Denmark)

    Agarwala, Rina

    2016-01-01

    -employed workers are organizing as workers. They are fighting labor exploitation by redefining the concept to include additional exploitation axes (from the state and middle class) and forms (including sexual). In doing so, they are redefining potential solutions, including identities and material benefits, to fit...... their unique needs. By expanding the category of “workers” beyond those defined by a narrow focus on a standard employer-employee relationship, these movements are also fighting exclusion from earlier labor protections by increasing the number of entitled beneficiaries. These struggles provide an important...

  20. An ethnomethodological approach to examine exploitation in the context of capacity, trust and experience of commercial surrogacy in India.

    Science.gov (United States)

    Saravanan, Sheela

    2013-08-20

    The socio-ethical concerns regarding exploitation in commercial surrogacy are premised on asymmetric vulnerability and the commercialization of women's reproductive capacity to suit individualistic motives. In examining the exploitation argument, this article reviews the social contract theory that describes an individual as an 'economic man' with moral and/or political motivations to satisfy individual desires. This study considers the critique by feminists, who argue that patriarchal and medical control prevails in the surrogacy contracts. It also explores the exploitative dynamics amongst actors in the light of Baier's conceptualization of trust and human relationship, within which both justice and exploitation thrive, and Foucault's concept of bio-power. Drawing on these concepts, this paper aims to investigate the manifestations of exploitation in commercial surrogacy in the context of trust, power and experiences of actors, using a case study of one clinic in India. The actors' experiences are evaluated at different stages of the surrogacy process: recruitment, medical procedures, living in the surrogate home, bonding with the child and amongst actors, financial dealings, relinquishment and post-relinquishment.This study applies ethnomethodology to identify phenomena as perceived by the actors in a situation, giving importance to their interpretations of the rules that make collective activity possible. The methods include semi-structured interviews, discussions, participant observation and explanation of the phenomena from the actors' perspectives. Between August 2009 and April 2010, 13 surrogate mothers (SMs), 4 intended parents (IPs) and 2 medical practitioners (MPs) from one clinic in Western India were interviewed.This study reveals that asymmetries of capacity amongst the MPs, SMs, IPs and surrogate agents (SAs) lead to a network of trust and designation of powers through rules, bringing out the relevance of Baier's conceptualization of asymmetric

  1. Is Kissamos Bay in NW Crete, Greece worth to be exploited as a marine aggregates deposit? An integrated approach

    Science.gov (United States)

    Anastasatou, Marianthi; Tsoutsia, Antonia; Petrakis, Stelios; Rousakis, Grigoris; Karditsa, Aikaterini; Hasiotis, Thomas; Kapsimalis, Vasilios; Poulos, Serafim; Stamatakis, Michael

    2017-04-01

    This study uses an integrated approach to investigate the offshore area of Kissamos Bay, NW Crete Island, Greece, as a prospective marine aggregate (MA) deposit. Non-fuel marine minerals and especially marine aggregates (sand and gravel) are reviewed from the perspective of resources during the last decades. The possible MA deposit of Kissamos Bay was explored during the implementation of the research project THALES-MARE, considering existing information of previous extraction activities in the wider area. Kissamos Bay is located at the inner continental shelf off NW Crete. The onshore basement rocks are composed of Mesozoic to Eocene limestones, shale and sandstone units, along with Neogene sediments such as marls, sandstones and claystones, which locally host Messinian gypsum layers. Sixteen sea-bottom sediment samples were collected with a Smith-McIntyretype grab along four transects, vertical to the shoreline, at water depths of 11 to 44m. A sub-bottom acoustic profiler survey was conducted in order to quantitatively determine the deposit (dimensions and structure). Mineralogical, geochemical, sedimentological and benthic analyses of the samples were carried out, in order to determine the quality of the reservoir and the environmental impact of a potential exploitation. Mineralogical results indicated that the bulk samples consist predominantly of quartz, while calcite occurs as a second significant phase. Chemical analysis of major and trace elements revealed that the average SiO2 content is around 55% with samples closer to the beach (depths applications. Acknowledgments: This work was supported by the research program THALES-MARE (MIS: 375655), funded by the Operational Programme "Education and lifelong learning, 2007-2013" of the Ministry of Education and Religious Affairs, Culture and Sports.

  2. Learning Metasploit exploitation and development

    CERN Document Server

    Balapure, Aditya

    2013-01-01

    A practical, hands-on tutorial with step-by-step instructions. The book will follow a smooth and easy-to-follow tutorial approach, covering the essentials and then showing the readers how to write more sophisticated exploits.This book targets exploit developers, vulnerability analysts and researchers, network administrators, and ethical hackers looking to gain advanced knowledge in exploitation development and identifying vulnerabilities. The primary goal is to take readers wishing to get into more advanced exploitation discovery and reaching the next level.Prior experience exploiting basic st

  3. Capacity-Approaching Modulation Formats for Optical Transmission Systems: Signal shaping and advanced de/muxing for efficient resource exploitation

    DEFF Research Database (Denmark)

    Estaran Tolosa, Jose Manuel

    Aiming for efficient fiber-optic data transport, this thesis addresses three scenario-specific modulation and/or multiplexing techniques which, leveraging digital signal processing, can further exploit the available resources.The considered environments are: (i) (ultra) long-haul networks, where we...... essentials, signal attributes, and digital processing structures are discussed in detail; whereby we give grounds for their adoption into the respective contexts of the three proposed systems. Eventually, we conduct the corresponding experimental validations; overall proving their potential. The reported...

  4. Modeling and Simulation Framework for Flow-Based Microfluidic Biochips

    DEFF Research Database (Denmark)

    Schmidt, Morten Foged; Minhass, Wajid Hassan; Pop, Paul

    2013-01-01

    Microfluidic biochips are replacing the conventional biochemical analyzers and are able to integrate the necessary functions for biochemical analysis on-chip. In this paper we are interested in flow-based biochips, in which the fluidic flow is manipulated using integrated microvalves. By combinin...... developed for the top-down design of flow-based biochips. We show how the IDE can be used to design biochips for several applications....... several microvalves, more complex units, such as micropumps, switches, mixers, and multiplexers, can be built. Such biochips are becoming increasingly complex, with thousands of components, but are still designed manually using a bottom-up full-custom design approach, which is extremely labor intensive...

  5. When death approaches: reverting or exploiting emergent inequity in a complex land-use table-board game

    Directory of Open Access Journals (Sweden)

    Luís García-Barrios

    2015-06-01

    Full Text Available The lives of poor landowners in tropical mountains depend upon their collective capacity to create and coordinate social preferences derived from their interacting communalistic, hierarchical, and reciprocal exchanges. External actors currently contend for these territories under market rules that are modifying such preferences. We present the design, experimental implementation, and analysis of results of a four-player, land-use board game with stark resource and livelihood limits and coordination/cooperation challenges, as played (separately by 116 farmers and 108 academics, mainly in the tropical mountains of Chiapas, Mexico. In game session one, we trained and framed players in moral economy, a human core feeling and communalistic norm of solidarity and mutual obligation, which translates into "all players must survive." In session two, we explored to what extent moral economy resisted as a social preference under a hypothetical external monetary incentive scheme unfavorable to it. Using an approach that combines spot game analysis and experimental work, we studied the social preferences that emerged during session two among advantaged and disadvantaged players to deal with inequity in land appropriation and use when imminent "death" approaches. We make comparisons between farmers and academics. Players evolved moral economy, competitive domination, i.e., let competition decide, and coalition, i.e., advantaged players ask the dying to surrender land and die prematurely in exchange for a share of the dismal profits. Farmers basically stuck to the first two preferences in similar proportions whereas academics clearly shifted to coalition, a last-resort choice, which allowed disadvantaged players some final leverage and advantaged players use of liberated resources to improve efficiency. Coalition as strategic cooperation among the unequal is part of the culture in which academics are being educated as sustainability professionals and toward

  6. Review on dry reforming of methane, a potentially more environmentally-friendly approach to the increasing natural gas exploitation.

    Science.gov (United States)

    Lavoie, Jean-Michel

    2014-01-01

    With the actual growth of the natural gas industry in the US as well as the potential and availability of this non-renewable carbon source worldwide, reforming of methane gas is getting increasing attention. Methane can be used for the production of heat or electricity, as well, it can be converted to syngas, a building block that could lead to the production of liquid fuels and chemicals, a very promising pathway in light of the increasing price of oil. Amongst the different reforming techniques, dry reforming could represent a very interesting approach both to valorize a cheap source or carbon (CO2) as well as to reduce the overall carbon footprint of the increasing worldwide fossil-based methane consumption. In this short review, attention will be given to the thermodynamics of dry reforming followed by an investigation on dry reforming using heterogeneous catalyst by focusing on the most popular elements used in literature for dry reforming. Attention will as well be given to other emerging techniques that may allow countering at one point the high thermodynamic penalties that accompanies conversion of methane using carbon dioxide.

  7. Identification of putative vaccine candidates against Helicobacter pylori exploiting exoproteome and secretome: a reverse vaccinology based approach.

    Science.gov (United States)

    Naz, Anam; Awan, Faryal Mehwish; Obaid, Ayesha; Muhammad, Syed Aun; Paracha, Rehan Zafar; Ahmad, Jamil; Ali, Amjad

    2015-06-01

    Helicobacter pylori (H. pylori) is an important pathogen associated with diverse gastric disorders ranging from peptic ulcer to malignancy. It has also been recognized by the World Health Organization (WHO) as class I carcinogen. Conventional treatment regimens for H. pylori seem to be ineffective, possibly due to antibiotic resistance mechanisms acquired by the pathogen. In this study we have successfully employed a reverse vaccinology approach to predict the potential vaccine candidates against H. pylori. The predicted potential vaccine candidates include vacA, babA, sabA, fecA and omp16. Host-pathogen interactions analysis elaborated their direct or indirect role in the specific signaling pathways including epithelial cell polarity, metabolism, secretion system and transport. Furthermore, surface-exposed antigenic epitopes were predicted and analyzed for conservation among 39 complete genomes of H. pylori (Genbank) for all the candidate proteins. These epitopes may serve as a base for the development of broad spectrum peptide or multi-component vaccines against H. pylori. We also believe that the proposed pipeline can be extended to other pathogens and for the identification of novel candidates for the development of effective vaccines. Copyright © 2015 Elsevier B.V. All rights reserved.

  8. Review on dry reforming of methane, a potentially more environmentally-friendly approach to the increasing natural gas exploitation

    Science.gov (United States)

    Lavoie, Jean-Michel

    2014-01-01

    With the actual growth of the natural gas industry in the US as well as the potential and availability of this non-renewable carbon source worldwide, reforming of methane gas is getting increasing attention. Methane can be used for the production of heat or electricity, as well, it can be converted to syngas, a building block that could lead to the production of liquid fuels and chemicals, a very promising pathway in light of the increasing price of oil. Amongst the different reforming techniques, dry reforming could represent a very interesting approach both to valorize a cheap source or carbon (CO2) as well as to reduce the overall carbon footprint of the increasing worldwide fossil-based methane consumption. In this short review, attention will be given to the thermodynamics of dry reforming followed by an investigation on dry reforming using heterogeneous catalyst by focusing on the most popular elements used in literature for dry reforming. Attention will as well be given to other emerging techniques that may allow countering at one point the high thermodynamic penalties that accompanies conversion of methane using carbon dioxide. PMID:25426488

  9. Influence of Urbanization on Body Size, Condition, and Physiology in an Urban Exploiter: A Multi-Component Approach.

    Science.gov (United States)

    Meillère, Alizée; Brischoux, François; Parenteau, Charline; Angelier, Frédéric

    2015-01-01

    Consistent expanding urbanization dramatically transforms natural habitats and exposes organisms to novel environmental challenges, often leading to reduced species richness and diversity in cities. However, it remains unclear how individuals are affected by the urban environment and how they can or cannot adjust to the specific characteristics of urban life (e.g. food availability). In this study, we used an integrative multi-component approach to investigate the effects of urbanization on the nutritional status of house sparrows (Passer domesticus). We assessed several morphological and physiological indices of body condition in both juveniles (early post-fledging) and breeding adults from four sites with different levels of urbanization in France, Western Europe. We found that sparrows in more urbanized habitats have reduced body size and body mass compared to their rural conspecifics. However, we did not find any consistent differences in a number of complementary indices of condition (scaled mass index, muscle score, hematocrit, baseline and stress-induced corticosterone levels) between urban and rural birds, indicating that urban sparrows may not be suffering nutritional stress. Our results suggest that the urban environment is unlikely to energetically constrain adult sparrows, although other urban-related variables may constrain them. On the other hand, we found significant difference in juvenile fat scores, suggesting that food types provided to young sparrows differed highly between habitats. In addition to the observed smaller size of urban sparrows, these results suggest that the urban environment is inadequate to satisfy early-life sparrows' nutritional requirements, growth, and development. The urban environment may therefore have life-long consequences for developing birds.

  10. Influence of Urbanization on Body Size, Condition, and Physiology in an Urban Exploiter: A Multi-Component Approach

    Science.gov (United States)

    Meillère, Alizée; Brischoux, François; Parenteau, Charline; Angelier, Frédéric

    2015-01-01

    Consistent expanding urbanization dramatically transforms natural habitats and exposes organisms to novel environmental challenges, often leading to reduced species richness and diversity in cities. However, it remains unclear how individuals are affected by the urban environment and how they can or cannot adjust to the specific characteristics of urban life (e.g. food availability). In this study, we used an integrative multi-component approach to investigate the effects of urbanization on the nutritional status of house sparrows (Passer domesticus). We assessed several morphological and physiological indices of body condition in both juveniles (early post-fledging) and breeding adults from four sites with different levels of urbanization in France, Western Europe. We found that sparrows in more urbanized habitats have reduced body size and body mass compared to their rural conspecifics. However, we did not find any consistent differences in a number of complementary indices of condition (scaled mass index, muscle score, hematocrit, baseline and stress-induced corticosterone levels) between urban and rural birds, indicating that urban sparrows may not be suffering nutritional stress. Our results suggest that the urban environment is unlikely to energetically constrain adult sparrows, although other urban-related variables may constrain them. On the other hand, we found significant difference in juvenile fat scores, suggesting that food types provided to young sparrows differed highly between habitats. In addition to the observed smaller size of urban sparrows, these results suggest that the urban environment is inadequate to satisfy early-life sparrows’ nutritional requirements, growth, and development. The urban environment may therefore have life-long consequences for developing birds. PMID:26270531

  11. Influence of Urbanization on Body Size, Condition, and Physiology in an Urban Exploiter: A Multi-Component Approach.

    Directory of Open Access Journals (Sweden)

    Alizée Meillère

    Full Text Available Consistent expanding urbanization dramatically transforms natural habitats and exposes organisms to novel environmental challenges, often leading to reduced species richness and diversity in cities. However, it remains unclear how individuals are affected by the urban environment and how they can or cannot adjust to the specific characteristics of urban life (e.g. food availability. In this study, we used an integrative multi-component approach to investigate the effects of urbanization on the nutritional status of house sparrows (Passer domesticus. We assessed several morphological and physiological indices of body condition in both juveniles (early post-fledging and breeding adults from four sites with different levels of urbanization in France, Western Europe. We found that sparrows in more urbanized habitats have reduced body size and body mass compared to their rural conspecifics. However, we did not find any consistent differences in a number of complementary indices of condition (scaled mass index, muscle score, hematocrit, baseline and stress-induced corticosterone levels between urban and rural birds, indicating that urban sparrows may not be suffering nutritional stress. Our results suggest that the urban environment is unlikely to energetically constrain adult sparrows, although other urban-related variables may constrain them. On the other hand, we found significant difference in juvenile fat scores, suggesting that food types provided to young sparrows differed highly between habitats. In addition to the observed smaller size of urban sparrows, these results suggest that the urban environment is inadequate to satisfy early-life sparrows' nutritional requirements, growth, and development. The urban environment may therefore have life-long consequences for developing birds.

  12. Traditional and Modern Biomedical Prospecting: Part II-the Benefits: Approaches for a Sustainable Exploitation of Biodiversity (Secondary Metabolites and Biomaterials from Sponges).

    Science.gov (United States)

    Müller, Werner E G; Schröder, Heinz C; Wiens, Matthias; Perović-Ottstadt, Sanja; Batel, Renato; Müller, Isabel M

    2004-09-01

    The progress in molecular and cell biology has enabled a rational exploitation of the natural resources of the secondary metabolites and biomaterials from sponges (phylum Porifera). It could be established that these natural substances are superior for biomedical application to those obtained by the traditional combinatorial chemical approach. It is now established that the basic structural and functional elements are highly conserved from sponges to the crown taxa within the Protostomia (Drosophila melanogaster and Caenorhabditis elegans) and Deuterostomia (human); therefore, it is obvious that the molecular etiology of diseases within the metazoan animals have a common basis. Hence, the major challenge for scientists studying natural product chemistry is to elucidate the target(s) of a given secondary metabolite, which is per se highly active and selective. After this step, the potential clinical application can be approached. The potential value of some selected secondary metabolites, all obtained from sponges and their associated microorganisms, is highlighted. Examples of compounds that are already in medical use (inhibition of tumor/virus growth [arabinofuranosyl cytosine and arabinofuranosyl adenine]), or are being considered as lead structures (acting as cytostatic and anti-inflammatory secondary metabolites [avarol/avarone], causing induction of apoptosis [sorbicillactone]) or as prototypes for the interference with metabolic pathways common in organisms ranging from sponges to humans (modulation of pathways activated by fungal components [aeroplysinin], inhibition of angiogenesis [2-methylthio-1,4-napthoquinone], immune modulating activity [FK506]) are discussed in this study. In addition, bioactive proteins from sponges are listed (antibacterial activity [pore-forming protein and tachylectin]). Finally, it is outlined that the skeletal elements-the spicules-serve as blueprints for new biomaterials, especially those based on biosilica, which might be

  13. The Ethics of Exploitation

    Directory of Open Access Journals (Sweden)

    Paul McLaughlin

    2008-11-01

    Full Text Available Philosophical inquiry into exploitation has two major deficiencies to date: it assumes that exploitation is wrong by definition; and it pays too much attention to the Marxian account of exploitation. Two senses of exploitation should be distinguished: the ‘moral’ or pejorative sense and the ‘non-moral’ or ‘non-prejudicial’ sense. By demonstrating the conceptual inadequacy of exploitation as defined in the first sense, and by defining exploitation adequately in the latter sense, we seek to demonstrate the moral complexity of exploitation. We contend, moreover, that moral evaluation of exploitation is only possible once we abandon a strictly Marxian framework and attempt, in the long run, to develop an integral ethic along Godwinian lines.

  14. Exploiting diverse crowd-sourced data as part of a mixed-methods approach to validating modelled flood extents and dynamics

    Science.gov (United States)

    Rollason, Edward; Bracken, Louise; Hardy, Richard; Large, Andy

    2017-04-01

    The use of flood models for evaluating flood risk from rivers and the sea is now a standard practice across Europe since the introduction of the 2007 EU Floods Directive requiring the assessment and mapping of flood risk from all major rivers and the sea. The availability of high quality topographic data from LiDAR and other remotely sensed sources has led to the increasing adoption of 2 dimensional models for simulating the dynamics of flooding on the floodplain. However, the ability to effectively validate dynamic floodplain inundation has not kept pace with the increasing complexity and spatial resolution of flood models. Validation remains dependent upon in-channel validation using flood level gauges or post-event data collection of wrack-marks, sometimes supplemented by community-derived anecdotal data. This poster presents the findings of a 'mixed-methods approach' to flood model validation using the winter 2016 floods on the River Tyne, UK. Using flood inundation results from a simple LISFLOOD-FP model of the River Tyne at Corbridge, the research develops a novel mixed-methods approach to validating both the maximum flood depths and extents, and the dynamics of the flood through the event. A crowd-sourced dataset of anecdotal information on flood dynamics, supported by photographic and video evidence, as well as community-derived, high definition UAV footage captured 24 and 48 hours after the peak of the event, allows for the comprehensive reconstruction of the flood dynamics and a more complete validation of the effectiveness of the model in reconstructing not just the maximum flood extent but also the dynamics of the rising and falling stages of an event. The findings of the research indicate the potential for making use of a much greater variety of locally-sourced data, particularly exploiting new technologies which offer opportunities for the collection of high quality data in the immediate aftermath of flooding events when traditional agencies may still

  15. Rapid flow-based peptide synthesis.

    Science.gov (United States)

    Simon, Mark D; Heider, Patrick L; Adamo, Andrea; Vinogradov, Alexander A; Mong, Surin K; Li, Xiyuan; Berger, Tatiana; Policarpo, Rocco L; Zhang, Chi; Zou, Yekui; Liao, Xiaoli; Spokoyny, Alexander M; Jensen, Klavs F; Pentelute, Bradley L

    2014-03-21

    A flow-based solid-phase peptide synthesis methodology that enables the incorporation of an amino acid residue every 1.8 min under automatic control or every 3 min under manual control is described. This is accomplished by passing a stream of reagent through a heat exchanger into a low volume, low backpressure reaction vessel, and through a UV detector. These features enable continuous delivery of heated solvents and reagents to the solid support at high flow rate, thereby maintaining maximal concentration of reagents in the reaction vessel, quickly exchanging reagents, and eliminating the need to rapidly heat reagents after they have been added to the vessel. The UV detector enables continuous monitoring of the process. To demonstrate the broad applicability and reliability of this method, it was employed in the total synthesis of a small protein, as well as dozens of peptides. The quality of the material obtained with this method is comparable to that for traditional batch methods, and, in all cases, the desired material was readily purifiable by RP-HPLC. The application of this method to the synthesis of the 113-residue Bacillus amyloliquefaciens RNase and the 130-residue DARPin pE59 is described in the accompanying manuscript. © 2014 WILEY-VCH Verlag GmbH & Co. KGaA, Weinheim.

  16. Chips: How to build and implement fluidic devices in flow based systems.

    Science.gov (United States)

    Cerdà, Víctor; Avivar, Jessica; Moreno, Daniel

    2017-05-01

    The development of automatic analyzers based on flow techniques involves the use and continuous innovation of fluidic devices. New trends tend toward miniaturization of sophisticated fluidic platforms requiring continuous advances in this field. The availability of a mechanic and electronic workshop together with the know-how to build new fluidic devices provides the tools for the creation of innovative instrumentation and stimulates the creativity of analytical chemists. Thus, in this review we present how to build and use flow-based fluidic devices, together with the tools required, such as computerized controlled lathes, milling machines, laser engraver machines, low-temperature co-fired ceramics technology and 3D printers, highlighting their strong and weak points. In addition, some flow based methods exploiting innovative fluidic platforms are also presented as a way of example of the possible devices these tools can provide and their potential applications. Copyright © 2015 Elsevier B.V. All rights reserved.

  17. Image exploitation for MISAR

    Science.gov (United States)

    Heinze, N.; Edrich, M.; Saur, G.; Krüger, W.

    2007-04-01

    The miniature SAR-system MiSAR has been developed by EADS Germany for lightweight UAVs like the LUNASystem. MiSAR adds to these tactical UAV-systems the all-weather reconnaissance capability, which is missing until now. Unlike other SAR sensors, that produce large strip maps at update rates of several seconds, MiSAR generates sequences of SAR images with approximately 1 Hz frame rate. photo interpreters (PI) of tactical drones, now mainly experienced with visual interpretation, are not used to SARimages, especially not with SAR-image sequence characteristics. So they should be supported to improve their ability to carry out their task with a new, demanding sensor system. We have therefore analyzed and discussed with military PIs in which task MiSAR can be used and how the PIs can be supported by special algorithms. We developed image processing- and exploitation-algorithms for such SAR-image sequences. A main component is the generation of image sequence mosaics to get more oversight. This mosaicing has the advantage that also non straight /linear flight-paths and varying squint angles can be processed. Another component is a screening-component for manmade objects to mark regions of interest in the image sequences. We use a classification based approach, which can be easily adapted to new sensors and scenes. These algorithms are integrated into an image exploitation system to improve the image interpreters ability to get a better oversight, better orientation and helping them to detect relevant objects, especially considering long endurance reconnaissance missions.

  18. Exploitability Assessment with TEASER

    Science.gov (United States)

    2017-05-01

    exploits. We saw this as an advantage of our dataset because we had to confirm that either a bug was exploitable or not exploitable. For the 28 CHAPTER 5...corruption which demonstrates that there is very little activity within c-ares to take advantage of after the heap corruption. This idea is in line with the...remote code execution POCs. 42 Bibliography [1] Analyze crashes to find security vulnerabilities in your apps . https: //blogs.msdn.microsoft.com

  19. Anthropology of sexual exploitation

    Directory of Open Access Journals (Sweden)

    Lalić Velibor

    2009-01-01

    Full Text Available In this paper, the authors observe sexual exploitation from an anthropological perspective. They analyze the rational, ethical, emotional and mythological dimensions of human sexuality. Consequently, after setting the phenomenon in a social and historical context, sexual exploitation is closely observed in the contemporary age. Based on thoughts of relevant thinkers, they make the conclusion that the elimination of sexual exploitation is not an utterly legal issue, but political and economical issues as well. Namely, legal norms are not sufficient to overcome sexual exploitation, but, political and economical relationships in contemporary societies, which will be based on sincere equal opportunities must be established.

  20. Fusion of optical flow based motion pattern analysis and silhouette classification for person tracking and detection

    NARCIS (Netherlands)

    Tangelder, J.W.H.; Lebert, E.; Burghouts, G.J.; Zon, K. van; Den Uyl, M.J.

    2014-01-01

    This paper presents a novel approach to detect persons in video by combining optical flow based motion analysis and silhouette based recognition. A new fast optical flow computation method is described, and its application in a motion based analysis framework unifying human tracking and detection is

  1. EXPLOITATION OF GRANITE BOULDER

    Directory of Open Access Journals (Sweden)

    Ivan Cotman

    1994-12-01

    Full Text Available The processes of forming, petrography, features, properties and exploitation of granite boulders are described. The directional drilling and black powder blasting is the succesful method in exploitation of granite boulders (boulder technology (the paper is published in Croatian.

  2. Reciprocating flow-based centrifugal microfluidics mixer

    Science.gov (United States)

    Noroozi, Zahra; Kido, Horacio; Micic, Miodrag; Pan, Hansheng; Bartolome, Christian; Princevac, Marko; Zoval, Jim; Madou, Marc

    2009-07-01

    Proper mixing of reagents is of paramount importance for an efficient chemical reaction. While on a large scale there are many good solutions for quantitative mixing of reagents, as of today, efficient and inexpensive fluid mixing in the nanoliter and microliter volume range is still a challenge. Complete, i.e., quantitative mixing is of special importance in any small-scale analytical application because the scarcity of analytes and the low volume of the reagents demand efficient utilization of all available reaction components. In this paper we demonstrate the design and fabrication of a novel centrifugal force-based unit for fast mixing of fluids in the nanoliter to microliter volume range. The device consists of a number of chambers (including two loading chambers, one pressure chamber, and one mixing chamber) that are connected through a network of microchannels, and is made by bonding a slab of polydimethylsiloxane (PDMS) to a glass slide. The PDMS slab was cast using a SU-8 master mold fabricated by a two-level photolithography process. This microfluidic mixer exploits centrifugal force and pneumatic pressure to reciprocate the flow of fluid samples in order to minimize the amount of sample and the time of mixing. The process of mixing was monitored by utilizing the planar laser induced fluorescence (PLIF) technique. A time series of high resolution images of the mixing chamber were analyzed for the spatial distribution of light intensities as the two fluids (suspension of red fluorescent particles and water) mixed. Histograms of the fluorescent emissions within the mixing chamber during different stages of the mixing process were created to quantify the level of mixing of the mixing fluids. The results suggest that quantitative mixing was achieved in less than 3 min. This device can be employed as a stand alone mixing unit or may be integrated into a disk-based microfluidic system where, in addition to mixing, several other sample preparation steps may be

  3. Material flow-based economic assessment of landfill mining processes.

    Science.gov (United States)

    Kieckhäfer, Karsten; Breitenstein, Anna; Spengler, Thomas S

    2017-02-01

    This paper provides an economic assessment of alternative processes for landfill mining compared to landfill aftercare with the goal of assisting landfill operators with the decision to choose between the two alternatives. A material flow-based assessment approach is developed and applied to a landfill in Germany. In addition to landfill aftercare, six alternative landfill mining processes are considered. These range from simple approaches where most of the material is incinerated or landfilled again to sophisticated technology combinations that allow for recovering highly differentiated products such as metals, plastics, glass, recycling sand, and gravel. For the alternatives, the net present value of all relevant cash flows associated with plant installation and operation, supply, recycling, and disposal of material flows, recovery of land and landfill airspace, as well as landfill closure and aftercare is computed with an extensive sensitivity analyses. The economic performance of landfill mining processes is found to be significantly influenced by the prices of thermal treatment (waste incineration as well as refuse-derived fuels incineration plant) and recovered land or airspace. The results indicate that the simple process alternatives have the highest economic potential, which contradicts the aim of recovering most of the resources. Copyright © 2016 Elsevier Ltd. All rights reserved.

  4. Parallel Implementation of a Frozen Flow Based Wavefront Reconstructor

    Science.gov (United States)

    Nagy, J.; Kelly, K.

    2013-09-01

    Obtaining high resolution images of space objects from ground based telescopes is challenging, often requiring the use of a multi-frame blind deconvolution (MFBD) algorithm to remove blur caused by atmospheric turbulence. In order for an MFBD algorithm to be effective, it is necessary to obtain a good initial estimate of the wavefront phase. Although wavefront sensors work well in low turbulence situations, they are less effective in high turbulence, such as when imaging in daylight, or when imaging objects that are close to the Earth's horizon. One promising approach, which has been shown to work very well in high turbulence settings, uses a frozen flow assumption on the atmosphere to capture the inherent temporal correlations present in consecutive frames of wavefront data. Exploiting these correlations can lead to more accurate estimation of the wavefront phase, and the associated PSF, which leads to more effective MFBD algorithms. However, with the current serial implementation, the approach can be prohibitively expensive in situations when it is necessary to use a large number of frames. In this poster we describe a parallel implementation that overcomes this constraint. The parallel implementation exploits sparse matrix computations, and uses the Trilinos package developed at Sandia National Laboratories. Trilinos provides a variety of core mathematical software for parallel architectures that have been designed using high quality software engineering practices, The package is open source, and portable to a variety of high-performance computing architectures.

  5. Information-flow-based Access Control for Virtualized Systems

    Directory of Open Access Journals (Sweden)

    Dmitriy Aleksandrovich Postoev

    2014-12-01

    Full Text Available The article is devoted to the method of information-flow-based access control, adopted for virtualized systems. General structure of access control system for virtual infrastructure is proposed.

  6. A multi-pumping flow-based procedure with improved sensitivity for the spectrophotometric determination of acid-dissociable cyanide in natural waters.

    Science.gov (United States)

    Frizzarin, Rejane M; Rocha, Fábio R P

    2013-01-03

    An analytical procedure with improved sensitivity was developed for cyanide determination in natural waters, exploiting the reaction with the complex of Cu(I) with 2,2'-biquinoline 4,4'-dicarboxylic acid (BCA). The flow system was based on the multi-pumping approach and long pathlength spectrophotometry with a flow cell based on a Teflon AF 2400(®) liquid core waveguide was exploited to increase sensitivity. A linear response was achieved from 5 to 200μg L(-1), with coefficient of variation of 1.5% (n=10). The detection limit and the sampling rate were 2μg L(-1) (99.7% confidence level), and 22h(-1), respectively. Per determination, 48ng of Cu(II), 5μg of ascorbic acid and 0.9μg of BCA were consumed. As high as 100mg L(-1) thiocyanate, nitrite or sulfite did not affect cyanide determination. Sulfide did not interfere at concentrations lower than 40 and 200μg L(-1) before or after sample pretreatment with hydrogen peroxide. The results for natural waters samples agreed with those obtained by a fluorimetric flow-based procedure at the 95% confidence level. The proposed procedure is then a reliable, fast and environmentally friendly alternative for cyanide determination in natural waters. Copyright © 2012 Elsevier B.V. All rights reserved.

  7. Viruses exploiting peroxisomes.

    Science.gov (United States)

    Lazarow, Paul B

    2011-08-01

    Viruses that are of great importance for global public health, including HIV, influenza and rotavirus, appear to exploit a remarkable organelle, the peroxisome, during intracellular replication in human cells. Peroxisomes are sites of lipid biosynthesis and catabolism, reactive oxygen metabolism, and other metabolic pathways. Viral proteins are targeted to peroxisomes (the spike protein of rotavirus) or interact with peroxisomal proteins (HIV's Nef and influenza's NS1) or use the peroxisomal membrane for RNA replication. The Nef interaction correlates strongly with the crucial Nef function of CD4 downregulation. Viral exploitation of peroxisomal lipid metabolism appears likely. Mostly, functional significance and mechanisms remain to be elucidated. Recently, peroxisomes were discovered to play a crucial role in the innate immune response by signaling the presence of intracellular virus, leading to the first rapid antiviral response. This review unearths, interprets and connects old data, in the hopes of stimulating new and promising research. Copyright © 2011. Published by Elsevier Ltd.

  8. Dissemination and Exploitation Strategy

    DEFF Research Database (Denmark)

    Badger, Merete; Monaco, Lucio; Fransson, Torsten

    The research infrastructure project Virtual Campus Hub (VCH) runs from October 1, 2011 to September 30, 2013. Four technical universities in Europe, who are all active in the field of sustainable energy, form the project consortium: the Technical University of Denmark, The Royal Institute...... of Technology in Sweden, Politecnico di Torino in Italy, and Eindhoven University of Technology in the Netherlands. The project is partially funded by the European Commission under the 7th Framework Programme (project no. RI-283746). This report describes the final dissemination and exploitation strategy...... for project Virtual Campus Hub. A preliminary dissemination and exploitation plan was setup early in the project as described in the deliverable D6.1 Dissemination strategy paper - preliminary version. The plan has been revised on a monthly basis during the project’s lifecycle in connection with the virtual...

  9. Towards A New Approach For Arabic Root Extraction:Exploit Relations Between The Word Letters And Their Placement In The Word For Arabic Root Extraction

    Directory of Open Access Journals (Sweden)

    Fatma Abu Hawas

    2013-01-01

    Full Text Available In this paper we present a new root-extraction approach for Arabic words. The approach tries to assign for Arabic word a unique root without having a database of word roots, a list of words patterns or even a list of all the prefixes and the suffixes of the Arabic words. Unlike most of Arabic rule-based stemmers, it tries to predict the letters positions that may form the word root one by one using some rules based on the relations among the Arabic word letters and their placement in the word. This paper will focus on two parts of the approach. The first one deals with the rules that distinguish between the Arabic definite article “ال -AL” and the permanent component “ال -AL” that may found in any Arabic word. The second part of the approach adopts the segmentation of the word into three parts and classifies Arabic letters in to groups according to their positions in each segment. The proposed approach is a system composed of several modules that corporate together to extract the word root. The approach has been tested and evaluated using the Holy Quran words. The results of the evaluation show a promising root extraction algorithm.

  10. Synthesis of Biochemical Applications on Flow-Based Microfluidic Biochips using Constraint Programming

    DEFF Research Database (Denmark)

    Minhass, Wajid Hassan; Pop, Paul; Madsen, Jan

    2012-01-01

    Microfluidic biochips are replacing the conventional biochemical analyzers and are able to integrate the necessary functions for biochemical analysis on-chip. In this paper we are interested in flow-based biochips, in which the flow of liquid is manipulated using integrated microvalves....... By combining several microvalves, more complex units, such as micropumps, switches, mixers, and multiplexers, can be built. We propose a constraint programming (CP) based approach for the synthesis of biochemical applications on flow-based microfluidic biochips. We use a sequencing graph to model...... the biochemical application and consider that the biochip architecture is given. We model the architecture using a topology graph. We are interested in synthesizing an implementation, consisting of binding and scheduling of the biochemical operations onto the components of the architecture, such that the resource...

  11. A network-flow based valve-switching aware binding algorithm for flow-based microfluidic biochips

    DEFF Research Database (Denmark)

    Tseng, Kai-Han; You, Sheng-Chi; Minhass, Wajid Hassan

    2013-01-01

    biochip needs more chip-integrated micro-valves, i.e., the basic unit of fluid-handling functionality, to manipulate the fluid flow for biochemical applications. Moreover, frequent switching of micro-valves results in decreased reliability. To minimize the valve-switching activities, we develop a network......Designs of flow-based microfluidic biochips are receiving much attention recently because they replace conventional biological automation paradigm and are able to integrate different biochemical analysis functions on a chip. However, as the design complexity increases, a flow-based microfluidic...

  12. Hacking the art of exploitation

    CERN Document Server

    Erickson, Jon

    2003-01-01

    A comprehensive introduction to the techniques of exploitation and creative problem-solving methods commonly referred to as "hacking," Hacking: The Art of Exploitation is for both technical and non-technical people who are interested in computer security. It shows how hackers exploit programs and write exploits, instead of just how to run other people's exploits. Unlike many so-called hacking books, this book explains the technical aspects of hacking, including stack based overflows, heap based overflows, string exploits, return-into-libc, shellcode, and cryptographic attacks on 802.11b.

  13. Competing Discourses about Youth Sexual Exploitation in Canadian News Media.

    Science.gov (United States)

    Saewyc, Elizabeth M; Miller, Bonnie B; Rivers, Robert; Matthews, Jennifer; Hilario, Carla; Hirakata, Pam

    2013-10-01

    Media holds the power to create, maintain, or break down stigmatizing attitudes, which affect policies, funding, and services. To understand how Canadian news media depicts the commercial sexual exploitation of children and youth, we examined 835 Canadian newspaper articles from 1989-2008 using a mixed methods critical discourse analysis approach, comparing representations to existing research about sexually exploited youth. Despite research evidence that equal rates of boys and girls experience exploitation, Canadian news media depicted exploited youth predominantly as heterosexual girls, and described them alternately as victims or workers in a trade, often both in the same story. News media mentioned exploiters far less often than victims, and portrayed them almost exclusively as male, most often called 'customers' or 'consumers,' and occasionally 'predators'; in contrast, research has documented the majority of sexually exploited boys report female exploiters. Few news stories over the past two decades portrayed the diversity of victims, perpetrators, and venues of exploitation reported in research. The focus on victims but not exploiters helps perpetuate stereotypes of sexual exploitation as business or a 'victimless crime,' maintains the status quo, and blurs responsibility for protecting youth under the UN Convention on the Rights of the Child. Health care providers and researchers can be advocates for accuracy in media coverage about sexual exploitation; news reporters and editors should focus on exploiters more than victims, draw on existing research evidence to avoid perpetuating stereotypes, and use accurate terms, such as commercial sexual exploitation, rather than terms related to business or trade.

  14. Targeting druggable enzymome by exploiting natural medicines: An in silico-in vitro integrated approach to combating multidrug resistance in bacterial infection.

    Science.gov (United States)

    Zang, Ping; Gong, Aijie; Zhang, Peirong; Yu, Jinling

    2016-01-01

    Antibiotic resistance is a major clinical and public health problem. Development of new therapeutic approaches to prevent bacterial multidrug resistance during antimicrobial chemotherapy has thus been becoming a primary consideration in the medicinal chemistry community. We described a new strategy that combats multidrug resistance by using natural medicines to target the druggable enzymome (i.e., enzymatic proteome) of Staphylococcus aureus. A pipeline of integrating in silico analysis and in vitro assay was purposed to identify antibacterial agents from a large library of natural products with diverse structures, high drug-likeness, and relatively low flexibility, with which a systematic interactome of 826 natural product candidates with 125 functionally essential S. aureus enzymes was constructed via a high-throughput cross-docking approach. The obtained docking score matrix was then converted into an array of synthetic scores; each corresponds to a natural product candidate. By systematically examining the docking results, a number of highly promising candidates with potent antibacterial activity were suggested. Three natural products, i.e., radicicol, jorumycin, and amygdalin, have been determined to possess strong broad-spectrum potency combating both the drug-resistant and drug-sensitive strains (MIC value products such as tetrandrine, bilobalide, and arbutin exhibited selective inhibition on different strains. Combined quantum mechanics/molecular mechanics analysis revealed diverse non-bonded interactions across the complex interfaces of newly identified antibacterial agents with their putative targets GyrB ATPase and tyrosyl-tRNA synthetase.

  15. Towards Domain-specific Flow-based Languages

    DEFF Research Database (Denmark)

    Zarrin, Bahram; Baumeister, Hubert; Sarjoughian, Hessam S.

    2018-01-01

    the concurrency within a component or across different independent components. In this paper, we introduce the concept of domain-specific flowbased languages which allows domain experts to use flow-based languages adapted to a particular problem domain. Flow-based programming is used to support concurrency, while......Due to the significant growth of the demand for data-intensive computing, in addition to the emergence of new parallel and distributed computing technologies, scientists and domain experts are leveraging languages specialized for their problem domain, i.e., domain-specific languages, to help them...... describe their problems and solutions, instead of using general purpose programming languages. The goal of these languages is to improve the productivity and efficiency of the development and simulation of concurrent scientific models and systems. Moreover, they help to expose parallelism and to specify...

  16. The Geohazards Exploitation Platform

    Science.gov (United States)

    Laur, Henri; Casu, Francesco; Bally, Philippe; Caumont, Hervé; Pinto, Salvatore

    2016-04-01

    The Geohazards Exploitation Platform, or Geohazards TEP (GEP), is an ESA originated R&D activity of the EO ground segment to demonstrate the benefit of new technologies for large scale processing of EO data. This encompasses on-demand processing for specific user needs, systematic processing to address common information needs of the geohazards community, and integration of newly developed processors for scientists and other expert users. The platform supports the geohazards community's objectives as defined in the context of the International Forum on Satellite EO and Geohazards organised by ESA and GEO in Santorini in 2012. The GEP is a follow on to the Supersites Exploitation Platform (SSEP) an ESA initiative to support the Geohazards Supersites & Natural Laboratories initiative (GSNL). Today the GEP allows to exploit 70+ Terabyte of ERS and ENVISAT archive and the Copernicus Sentinel-1 data available on line. The platform has already engaged 22 European early adopters in a validation activity initiated in March 2015. Since September, this validation has reached 29 single user projects. Each project is concerned with either integrating an application, running on demand processing or systematically generating a product collection using an application available in the platform. The users primarily include 15 geoscience centres and universities based in Europe: British Geological Survey (UK), University of Leeds (UK), University College London (UK), ETH University of Zurich (CH), INGV (IT), CNR-IREA and CNR-IRPI (IT), University of L'Aquila (IT), NOA (GR), Univ. Blaise Pascal & CNRS (FR), Ecole Normale Supérieure (FR), ISTERRE / University of Grenoble-Alpes (FR). In addition, there are users from Africa and North America with the University of Rabat (MA) and the University of Miami (US). Furthermore two space agencies and four private companies are involved: the German Space Research Centre DLR (DE), the European Space Agency (ESA), Altamira Information (ES

  17. Exploitative Learning by Exporting

    DEFF Research Database (Denmark)

    Golovko, Elena; Lopes Bento, Cindy; Sofka, Wolfgang

    Decisions on entering foreign markets are among the most challenging but also potentially rewarding strategy choices managers can make. In this study, we examine the effect of export entry on the firm investment decisions in two activities associated with learning about new technologies...... and learning about new markets ? R&D investments and marketing investments, in search of novel insights into the content and process underlying learning by exporting. We draw from organizational learning theory for predicting changes in both R&D and marketing investment patterns that accompany firm entry......, it is predominantly the marketing-related investment decisions associated with starting to export that lead to increases in firm productivity. We conclude that learning-by-exporting might be more properly characterized as ?learning about and exploiting new markets? rather than ?learning about new technologies...

  18. Information-Flow-Based Access Control for Web Browsers

    Science.gov (United States)

    Yoshihama, Sachiko; Tateishi, Takaaki; Tabuchi, Naoshi; Matsumoto, Tsutomu

    The emergence of Web 2.0 technologies such as Ajax and Mashup has revealed the weakness of the same-origin policy[1], the current de facto standard for the Web browser security model. We propose a new browser security model to allow fine-grained access control in the client-side Web applications for secure mashup and user-generated contents. We propose a browser security model that is based on information-flow-based access control (IBAC) to overcome the dynamic nature of the client-side Web applications and to accurately determine the privilege of scripts in the event-driven programming model.

  19. A two-stage flow-based intrusion detection model for next-generation networks.

    Science.gov (United States)

    Umer, Muhammad Fahad; Sher, Muhammad; Bi, Yaxin

    2018-01-01

    The next-generation network provides state-of-the-art access-independent services over converged mobile and fixed networks. Security in the converged network environment is a major challenge. Traditional packet and protocol-based intrusion detection techniques cannot be used in next-generation networks due to slow throughput, low accuracy and their inability to inspect encrypted payload. An alternative solution for protection of next-generation networks is to use network flow records for detection of malicious activity in the network traffic. The network flow records are independent of access networks and user applications. In this paper, we propose a two-stage flow-based intrusion detection system for next-generation networks. The first stage uses an enhanced unsupervised one-class support vector machine which separates malicious flows from normal network traffic. The second stage uses a self-organizing map which automatically groups malicious flows into different alert clusters. We validated the proposed approach on two flow-based datasets and obtained promising results.

  20. Commercial sexual exploitation of children

    National Research Council Canada - National Science Library

    Mauricio Rojas Betancur; Raquel Mendez Villamizar; Diana Lucía Moreno

    2012-01-01

      We study the sexual exploitation of children contributing to the understanding of risk and situations favouring the entry and permanence of children and adolescents from the reconstruction of the...

  1. Sustainable exploitation and management of aquatic resources

    DEFF Research Database (Denmark)

    Neuenfeldt, Stefan; Köster, Fritz

    2014-01-01

    DTU Aqua conducts research, provides advice,educates at university level and contributes toinnovation in sustainable exploitation andmanagement of aquatic resources. The vision of DTUAqua is to enable ecologically and economicallysustainable exploitation of aquatic resourcesapplying an integrated...... ecosystem approach whichutilizes synergies in natural and technical sciencedisciplines. DTU Aqua advises the Danish Ministry ofFood, Agriculture and Fisheries and other publicauthorities, the commercial fisheries, theaquaculture industry and international commissions.DTU Aqua deals with all types ofaquatic...... in the ocean and how these factors impact the living conditions formarine organisms. Population genetics aims at gaining knowledge on how to preserve and managebiodiversity sustainably. Individual biology deals with the biology of aquatic organisms and theirinteraction with other organisms...

  2. Lateral flow-based antibody testing for Chlamydia trachomatis.

    Science.gov (United States)

    Gwyn, Sarah; Mitchell, Alexandria; Dean, Deborah; Mkocha, Harran; Handali, Sukwan; Martin, Diana L

    2016-08-01

    We describe here a lateral flow-based assay (LFA) for the detection of antibodies against immunodominant antigen Pgp3 from Chlamydia trachomatis, the causative agent of urogenital chlamydia infection and ocular trachoma. Optimal signal detection was achieved when the gold-conjugate and test line contained Pgp3, creating a dual sandwich capture assay. The LFA yielded positive signals with serum and whole blood but not with eluted dried blood spots. For serum, the agreement of the LFA with the non-reference multiplex assay was 96%, the specificity using nonendemic pediatric sera was 100%, and the inter-rater agreement was κ=0.961. For whole blood, the agreement of LFA with multiplex was 81.5%, the specificity was 100%, and the inter-rater agreement was κ=0.940. The LFA was tested in a field environment and yielded similar results to those from laboratory-based testing. These data show the successful development of a lateral flow assay for detection of antibodies against Pgp3 with reliable use in field settings, which would make antibody-based testing for trachoma surveillance highly practical, especially after cessation of trachoma elimination programs. Published by Elsevier B.V.

  3. Maximum flow-based resilience analysis: From component to system

    Science.gov (United States)

    Jin, Chong; Li, Ruiying; Kang, Rui

    2017-01-01

    Resilience, the ability to withstand disruptions and recover quickly, must be considered during system design because any disruption of the system may cause considerable loss, including economic and societal. This work develops analytic maximum flow-based resilience models for series and parallel systems using Zobel’s resilience measure. The two analytic models can be used to evaluate quantitatively and compare the resilience of the systems with the corresponding performance structures. For systems with identical components, the resilience of the parallel system increases with increasing number of components, while the resilience remains constant in the series system. A Monte Carlo-based simulation method is also provided to verify the correctness of our analytic resilience models and to analyze the resilience of networked systems based on that of components. A road network example is used to illustrate the analysis process, and the resilience comparison among networks with different topologies but the same components indicates that a system with redundant performance is usually more resilient than one without redundant performance. However, not all redundant capacities of components can improve the system resilience, the effectiveness of the capacity redundancy depends on where the redundant capacity is located. PMID:28545135

  4. Flow-based model of computer hackers' motivation.

    Science.gov (United States)

    Voiskounsky, Alexander E; Smyslova, Olga V

    2003-04-01

    Hackers' psychology, widely discussed in the media, is almost entirely unexplored by psychologists. In this study, hackers' motivation is investigated, using the flow paradigm. Flow is likely to motivate hackers, according to views expressed by researchers and by hackers themselves. Taken as granted that hackers experience flow, it was hypothesized that flow increases with the increase of hackers' competence in IT use. Self-selected subjects were recruited on specialized web sources; 457 hackers filled out a web questionnaire. Competence in IT use, specific flow experience, and demographic data were questioned. An on-line research was administered within the Russian-speaking community (though one third of Ss are non-residents of Russian Federation); since hacking seems to be international, the belief is expressed that the results are universal. The hypothesis is not confirmed: flow motivation characterizes the least and the most competent hackers, and the members of an intermediate group, that is, averagely competent Ss report the "flow crisis"-no (or less) flow experience. Two differing strategies of task choice were self-reported by Ss: a step-by-step increase of the difficulty of choices leads to a match of challenges and skills (and to preserving the flow experience); putting choices irrespective of the likelihood of solution leads to a "flow crisis." The findings give productive hints on processes of hackers' motivational development. The flow-based model of computer hackers' motivation was developed. It combines both empirically confirmed and theoretically possible ways of hackers' "professional" growth.

  5. Exploitation et obligation de travailler

    Directory of Open Access Journals (Sweden)

    Pierre-Étienne Vandamme

    2014-06-01

    Full Text Available Cet article défend une définition de l’exploitation, restreinte aux relations de travail, en tentant d’une part d’expliciter une certaine compréhension de sens commun du concept (rémunération inéquitable en fonction du travail presté, et d’autre part d’échapper aux difficultés qui ont affecté la définition marxiste traditionnelle de l’exploitation comme extorsion de la plus-value (dans ses diverses variantes. Il explore ainsi le lien entre l’exploitation et l’obligation matérielle de travailler pour subvenir à ses besoins fondamentaux. Après avoir mis en garde contre les politiques d’activation des chômeurs, il conclut que l’exploitation est un phénomène contre lequel on peut lutter à l’aide de mécanismes relativement simples, même dans les sociétés capitalistes. Il rappelle toutefois que cela ne suffit pas à réaliser la justice sociale, resituant l’exploitation parmi d’autres enjeux fondamentaux pour une philosophie politique égalitariste

  6. Exploit and ignore the consequences: A mother of planetary issues.

    Science.gov (United States)

    Moustafa, Khaled

    2016-07-01

    Many environmental and planetary issues are due to an exploitation strategy based on exploit, consume and ignore the consequences. As many natural and environmental resources are limited in time and space, such exploitation approach causes important damages on earth, in the sea and maybe soon in the space. To sustain conditions under which humans and other living species can coexist in productive and dynamic harmony with their environments, terrestrial and space exploration programs may need to be based on 'scrutinize the consequences, prepare adequate solutions and then, only then, exploit'. Otherwise, the exploitation of planetary resources may put the environmental stability and sustainability at a higher risk than it is currently predicted. Copyright © 2016 Elsevier B.V. All rights reserved.

  7. Simulated population responses of common carp to commercial exploitation

    Energy Technology Data Exchange (ETDEWEB)

    Weber, Michael J.; Hennen, Matthew J.; Brown, Michael L.

    2011-12-01

    Common carp Cyprinus carpio is a widespread invasive species that can become highly abundant and impose deleterious ecosystem effects. Thus, aquatic resource managers are interested in controlling common carp populations. Control of invasive common carp populations is difficult, due in part to the inherent uncertainty of how populations respond to exploitation. To understand how common carp populations respond to exploitation, we evaluated common carp population dynamics (recruitment, growth, and mortality) in three natural lakes in eastern South Dakota. Common carp exhibited similar population dynamics across these three systems that were characterized by consistent recruitment (ages 3 to 15 years present), fast growth (K = 0.37 to 0.59), and low mortality (A = 1 to 7%). We then modeled the effects of commercial exploitation on size structure, abundance, and egg production to determine its utility as a management tool to control populations. All three populations responded similarly to exploitation simulations with a 575-mm length restriction, representing commercial gear selectivity. Simulated common carp size structure modestly declined (9 to 37%) in all simulations. Abundance of common carp declined dramatically (28 to 56%) at low levels of exploitation (0 to 20%) but exploitation >40% had little additive effect and populations were only reduced by 49 to 79% despite high exploitation (>90%). Maximum lifetime egg production was reduced from 77 to 89% at a moderate level of exploitation (40%), indicating the potential for recruitment overfishing. Exploitation further reduced common carp size structure, abundance, and egg production when simulations were not size selective. Our results provide insights to how common carp populations may respond to exploitation. Although commercial exploitation may be able to partially control populations, an integrated removal approach that removes all sizes of common carp has a greater chance of controlling population abundance

  8. Experimental validation and performance evaluation of OpenFlow-based wavelength path control in transparent optical networks.

    Science.gov (United States)

    Liu, Lei; Tsuritani, Takehiro; Morita, Itsuro; Guo, Hongxiang; Wu, Jian

    2011-12-19

    OpenFlow, as an open-source protocol for network virtualization, is also widely regarded as a promising control plane technique for heterogeneous networks. But the utilization of the OpenFlow protocol to control a wavelength switched optical network has not been investigated. In this paper, for the first time, we experimentally present a proof-of-concept demonstration of OpenFlow-based wavelength path control for lightpath provisioning in transparent optical networks. We propose two different approaches (sequential and delayed approaches) for lightpath setup and two different approaches (active and passive approaches) for lightpath release by using the OpenFlow protocol. The overall feasibility of these approaches is experimentally validated and the network performances are quantitatively evaluated. More importantly, all the proposed methodologies are demonstrated and evaluated on a real transparent optical network testbed with both OpenFlow-based control plane and data plane, which allows their feasibility and effectiveness to be verified, and valuable insights of the proposed solutions to be obtained for deploying into real OpenFlow controlled optical networks.

  9. An Overview of IP Flow-Based Intrusion Detection

    NARCIS (Netherlands)

    Sperotto, Anna; Schaffrath, Gregor; Sadre, R.; Morariu, Cristian; Pras, Aiko; Stiller, Burkhard

    2010-01-01

    Intrusion detection is an important area of research. Traditionally, the approach taken to find attacks is to inspect the contents of every packet. However, packet inspection cannot easily be performed at high-speeds. Therefore, researchers and operators started investigating alternative approaches,

  10. Teotihuacan, tepeapulco, and obsidian exploitation.

    Science.gov (United States)

    Charlton, T H

    1978-06-16

    Current cultural ecological models of the development of civilization in central Mexico emphasize the role of subsistence production techniques and organization. The recent use of established and productive archeological surface survey techniques along natural corridors of communication between favorable niches for cultural development within the Central Mexican symbiotic region resulted in the location of sites that indicate an early development of a decentralized resource exploitation, manufacturing, and exchange network. The association of the development of this system with Teotihuacán indicates the importance such nonsubsistence production and exchange had in the evolution of this first central Mexican civilization. The later expansion of Teotihuacán into more distant areas of Mesoamerica was based on this resource exploitation model. Later civilizations centered at Tula and Tenochtitlán also used such a model in their expansion.

  11. Dark matters: exploitation as cooperation.

    Science.gov (United States)

    Dasgupta, Partha

    2012-04-21

    The empirical literature on human cooperation contains studies of communitarian institutions that govern the provision of public goods and management of common property resources in poor countries. Scholars studying those institutions have frequently used the Prisoners' Dilemma game as their theoretical tool-kit. But neither the provision of local public goods nor the management of local common property resources involves the Prisoners' Dilemma. That has implications for our reading of communitarian institutions. By applying a fundamental result in the theory of repeated games to a model of local common property resources, it is shown that communitarian institutions can harbour exploitation of fellow members, something that would not be possible in societies where cooperation amounts to overcoming the Prisoners' Dilemma. The conclusion we should draw is that exploitation can masquerade as cooperation. Copyright © 2011 Elsevier Ltd. All rights reserved.

  12. Network exploitation using WAMI tracks

    Science.gov (United States)

    Rimey, Ray; Record, Jim; Keefe, Dan; Kennedy, Levi; Cramer, Chris

    2011-06-01

    Creating and exploiting network models from wide area motion imagery (WAMI) is an important task for intelligence analysis. Tracks of entities observed moving in the WAMI sensor data are extracted, then large numbers of tracks are studied over long time intervals to determine specific locations that are visited (e.g., buildings in an urban environment), what locations are related to other locations, and the function of each location. This paper describes several parts of the network detection/exploitation problem, and summarizes a solution technique for each: (a) Detecting nodes; (b) Detecting links between known nodes; (c) Node attributes to characterize a node; (d) Link attributes to characterize each link; (e) Link structure inferred from node attributes and vice versa; and (f) Decomposing a detected network into smaller networks. Experimental results are presented for each solution technique, and those are used to discuss issues for each problem part and its solution technique.

  13. Ultrasonic Flaw Imaging via Multipath Exploitation

    Directory of Open Access Journals (Sweden)

    Yimin D. Zhang

    2012-01-01

    Full Text Available We consider ultrasonic imaging for the visualization of flaws in a material. Ultrasonic imaging is a powerful nondestructive testing (NDT tool which assesses material conditions via the detection, localization, and classification of flaws inside a structure. We utilize reflections of ultrasonic signals which occur when encountering different media and interior boundaries. These reflections can be cast as direct paths to the target corresponding to the virtual sensors appearing on the top and bottom side of the target. Some of these virtual sensors constitute a virtual aperture, whereas in others, the aperture changes with the transmitter position. Exploitations of multipath extended virtual array apertures provide enhanced imaging capability beyond the limitation of traditional multisensor approaches. The waveforms observed at the physical as well as the virtual sensors yield additional measurements corresponding to different aspect angles, thus allowing proper multiview imaging of flaws. We derive the wideband point spread functions for dominant multipaths and show that fusion of physical and virtual sensor data improves the flaw perimeter detection and localization performance. The effectiveness of the proposed multipath exploitation approach is demonstrated using real data.

  14. Exploitation of subsea gas hydrate reservoirs

    Science.gov (United States)

    Janicki, Georg; Schlüter, Stefan; Hennig, Torsten; Deerberg, Görge

    2016-04-01

    Natural gas hydrates are considered to be a potential energy resource in the future. They occur in permafrost areas as well as in subsea sediments and are stable at high pressure and low temperature conditions. According to estimations the amount of carbon bonded in natural gas hydrates worldwide is two times larger than in all known conventional fossil fuels. Besides technical challenges that have to be overcome climate and safety issues have to be considered before a commercial exploitation of such unconventional reservoirs. The potential of producing natural gas from subsea gas hydrate deposits by various means (e.g. depressurization and/or injection of carbon dioxide) is numerically studied in the frame of the German research project »SUGAR«. The basic mechanisms of gas hydrate formation/dissociation and heat and mass transport in porous media are considered and implemented into a numerical model. The physics of the process leads to strong non-linear couplings between hydraulic fluid flow, hydrate dissociation and formation, hydraulic properties of the sediment, partial pressures and seawater solution of components and the thermal budget of the system described by the heat equation. This paper is intended to provide an overview of the recent development regarding the production of natural gas from subsea gas hydrate reservoirs. It aims at giving a broad insight into natural gas hydrates and covering relevant aspects of the exploitation process. It is focused on the thermodynamic principles and technological approaches for the exploitation. The effects occurring during natural gas production within hydrate filled sediment layers are identified and discussed by means of numerical simulation results. The behaviour of relevant process parameters such as pressure, temperature and phase saturations is described and compared for different strategies. The simulations are complemented by calculations for different safety relevant problems.

  15. Final Report, “Exploiting Global View for Resilience”

    Energy Technology Data Exchange (ETDEWEB)

    Chien, Andrew [Univ. of Chicago, IL (United States)

    2017-03-29

    Final technical report for the "Exploiting Global View for Resilience" project. The GVR project aims to create a new approach to portable, resilient applications. The GVR approach builds on a global view data model,, adding versioning (multi-version), user control of timing and rate (multi-stream), and flexible cross layer error signalling and recovery. With a versioned array as a portable abstraction, GVR enables application programmers to exploit deep scientific and application code insights to manage resilience (and its overhead) in a flexible, portable fashion.

  16. Flow based vs. demand based energy-water modelling

    Science.gov (United States)

    Rozos, Evangelos; Nikolopoulos, Dionysis; Efstratiadis, Andreas; Koukouvinos, Antonios; Makropoulos, Christos

    2015-04-01

    The water flow in hydro-power generation systems is often used downstream to cover other type of demands like irrigation and water supply. However, the typical case is that the energy demand (operation of hydro-power plant) and the water demand do not coincide. Furthermore, the water inflow into a reservoir is a stochastic process. Things become more complicated if renewable resources (wind-turbines or photovoltaic panels) are included into the system. For this reason, the assessment and optimization of the operation of hydro-power systems are challenging tasks that require computer modelling. This modelling should not only simulate the water budget of the reservoirs and the energy production/consumption (pumped-storage), but should also take into account the constraints imposed by the natural or artificial water network using a flow routing algorithm. HYDRONOMEAS, for example, uses an elegant mathematical approach (digraph) to calculate the flow in a water network based on: the demands (input timeseries), the water availability (simulated) and the capacity of the transmission components (properties of channels, rivers, pipes, etc.). The input timeseries of demand should be estimated by another model and linked to the corresponding network nodes. A model that could be used to estimate these timeseries is UWOT. UWOT is a bottom up urban water cycle model that simulates the generation, aggregation and routing of water demand signals. In this study, we explore the potentials of UWOT in simulating the operation of complex hydrosystems that include energy generation. The evident advantage of this approach is the use of a single model instead of one for estimation of demands and another for the system simulation. An application of UWOT in a large scale system is attempted in mainland Greece in an area extending over 130×170 km². The challenges, the peculiarities and the advantages of this approach are examined and critically discussed.

  17. A turbulence model for buoyant flows based on vorticity generation.

    Energy Technology Data Exchange (ETDEWEB)

    Domino, Stefan Paul; Nicolette, Vernon F.; O' Hern, Timothy John; Tieszen, Sheldon R.; Black, Amalia Rebecca

    2005-10-01

    A turbulence model for buoyant flows has been developed in the context of a k-{var_epsilon} turbulence modeling approach. A production term is added to the turbulent kinetic energy equation based on dimensional reasoning using an appropriate time scale for buoyancy-induced turbulence taken from the vorticity conservation equation. The resulting turbulence model is calibrated against far field helium-air spread rate data, and validated with near source, strongly buoyant helium plume data sets. This model is more numerically stable and gives better predictions over a much broader range of mesh densities than the standard k-{var_epsilon} model for these strongly buoyant flows.

  18. Architecture Synthesis for Cost-Constrained Fault-Tolerant Flow-based Biochips

    DEFF Research Database (Denmark)

    Eskesen, Morten Chabert; Pop, Paul; Potluri, Seetal

    2016-01-01

    In this paper, we are interested in the synthesis of fault-tolerant architectures for flow-based microfluidic biochips, which use microvalves and channels to run biochemical applications. The growth rate of device integration in flow-based microfluidic biochips is scaling faster than Moore's law........ The proposed algorithm has been evaluated using several benchmarks and compared to the results of a Simulated Annealing metaheuristic....

  19. SEXUAL EXPLOITATION AND ABUSE BY UN PEACEKEEPERS ...

    African Journals Online (AJOL)

    Allaiac

    The sexual exploitation of children by peacekeepers is particularly insidious. Educational interventions and training initiatives to bring about behaviour change to address sexual exploitation and abuse .... its own peacekeeping personnel are engaging in acts of sexual exploitation and abuse, including such crimes as rape.

  20. The exploitation argument against commercial surrogacy.

    Science.gov (United States)

    Wilkinson, Stephen

    2003-04-01

    This paper discusses the exploitation argument against commercial surrogacy: the claim that commercial surrogacy is morally objectionable because it is exploitative. The following questions are addressed. First, what exactly does the exploitation argument amount to? Second, is commercial surrogacy in fact exploitative? Third, if it were exploitative, would this provide a sufficient reason to prohibit (or otherwise legislatively discourage) it? The focus throughout is on the exploitation of paid surrogates, although it is noted that other parties (e.g. 'commissioning parents') may also be the victims of exploitation. It is argued that there are good reasons for believing that commercial surrogacy is often exploitative. However, even if we accept this, the exploitation argument for prohibiting (or otherwise legislatively discouraging) commercial surrogacy remains quite weak. One reason for this is that prohibition may well 'backfire' and lead to potential surrogates having to do other things that are more exploitative and/or more harmful than paid surrogacy. It is concluded therefore that those who oppose exploitation should (rather than attempting to stop particular practices like commercial surrogacy) concentrate on: (a) improving the conditions under which paid surrogates 'work'; and (b) changing the background conditions (in particular, the unequal distribution of power and wealth) which generate exploitative relationships.

  1. Intertemporal Choice of Marine Ecosystem Exploitation

    DEFF Research Database (Denmark)

    Ravn-Jonsen, Lars

    Management, however, requires models that can link the ecosystem level to the operation level, so this paper examines an ecosystem production model and shows that it is suitable for applying ground rent theory. This model is the simplest possible that incorporates the principles of size as the main...... at the ecosystem level in the present management. Therefore, economic predictions for an ecosystem managed as a common pool resource must be that  the exploitation probably are conducted at lower sized than optimum. In addition, given its population stock approach, the present management probably overlooks...... the ability of an ecosystem to sustain total volume of harvest. Given the two aspects of intertemporal choice revealed by the model, the conclusion must be that the Fishing Down Marine Food Webs is probably driven by the current management's inability to conduct adequate intertemporal balancing; therefore...

  2. Modal Decomposition of Synthetic Jet Flow Based on CFD Computation

    Directory of Open Access Journals (Sweden)

    Hyhlík Tomáš

    2015-01-01

    Full Text Available The article analyzes results of numerical simulation of synthetic jet flow using modal decomposition. The analyzes are based on the numerical simulation of axisymmetric unsteady laminar flow obtained using ANSYS Fluent CFD code. Three typical laminar regimes are compared from the point of view of modal decomposition. The first regime is without synthetic jet creation with Reynolds number Re = 76 and Stokes number S = 19.7. The second studied regime is defined by Re = 145 and S = 19.7. The third regime of synthetic jet work is regime with Re = 329 and S = 19.7. Modal decomposition of obtained flow fields is done using proper orthogonal decomposition (POD where energetically most important modes are identified. The structure of POD modes is discussed together with classical approach based on phase averaged velocities.

  3. The Exploitation of Evolving Resources

    CERN Document Server

    McGlade, Jacqueline; Law, Richard

    1993-01-01

    The impact of man on the biosphere is profound. Quite apart from our capacity to destroy natural ecosystems and to drive species to extinction, we mould the evolution of the survivors by the selection pressures we apply to them. This has implications for the continued health of our natural biological resources and for the way in which we seek to optimise yield from those resources. Of these biological resources, fish stocks are particularly important to mankind as a source of protein. On a global basis, fish stocks provide the major source of protein for human consumption from natural ecosystems, amounting to some seventy million tonnes in 1970. Although fisheries management has been extensively developed over the last century, it has not hitherto considered the evolutionary consequences of fishing activity. While this omission may not have been serious in the past, the ever increasing intensity of exploitation and the deteriorating health of fish stocks has generated an urgent need for a better understanding...

  4. Assisting children born of sexual exploitation and abuse

    Directory of Open Access Journals (Sweden)

    Lauren Rumble

    2007-01-01

    Full Text Available The UN Secretary-General has issued a strategy tosupport victims of sexual exploitation and abuse by UNstaff. It includes a controversial proposal to introduceDNA sampling for all UN staff. Unless this suggestionis adopted, an important opportunity to implementa truly survivor-centred approach may be lost.

  5. Exploiting network redundancy for low-cost neural network realizations.

    NARCIS (Netherlands)

    Keegstra, H; Jansen, WJ; Nijhuis, JAG; Spaanenburg, L; Stevens, H; Udding, JT

    1996-01-01

    A method is presented to optimize a trained neural network for physical realization styles. Target architectures are embedded microcontrollers or standard cell based ASIC designs. The approach exploits the redundancy in the network, required for successful training, to replace the synaptic weighting

  6. Trends in Flow-based Biosensing Systems for Pesticide Assessment

    Directory of Open Access Journals (Sweden)

    Jean-Louis Marty

    2006-10-01

    Full Text Available This review gives a survey on the state of the art of pesticide detection usingflow-based biosensing systems for sample screening. Although immunosensor systems havebeen proposed as powerful pesticide monitoring tools, this review is mainly focused onenzyme-based biosensors, as they are the most commonly employed when using a flowsystem. Among the different detection methods able to be integrated into flow-injectionanalysis (FIA systems, the electrochemical ones will be treated in more detail, due to theirhigh sensitivity, simple sample pretreatment, easy operational procedures and real-timedetection. During the last decade, new trends have been emerging in order to increase theenzyme stability, the sensitivity and selectivity of the measurements, and to lower thedetection limits. These approaches are based on (i the design of novel matrices for enzymeimmobilisation, (ii new manifold configurations of the FIA system, sometimes includingminiaturisation or lab-on-chip protocols thanks to micromachining technology, (iii the useof cholinesterase enzymes either from various commercial sources or genetically modifiedwith the aim of being more sensitive, (iv the incorporation of other highly specificenzymes, such as organophosphate hydrolase (OPH or parathion hydrolase (PH and (v thecombination of different electrochemical methods of detection. This article discusses thesenovel strategies and their advantages and limitations.

  7. Towards agile large-scale predictive modelling in drug discovery with flow-based programming design principles.

    Science.gov (United States)

    Lampa, Samuel; Alvarsson, Jonathan; Spjuth, Ola

    2016-01-01

    Predictive modelling in drug discovery is challenging to automate as it often contains multiple analysis steps and might involve cross-validation and parameter tuning that create complex dependencies between tasks. With large-scale data or when using computationally demanding modelling methods, e-infrastructures such as high-performance or cloud computing are required, adding to the existing challenges of fault-tolerant automation. Workflow management systems can aid in many of these challenges, but the currently available systems are lacking in the functionality needed to enable agile and flexible predictive modelling. We here present an approach inspired by elements of the flow-based programming paradigm, implemented as an extension of the Luigi system which we name SciLuigi. We also discuss the experiences from using the approach when modelling a large set of biochemical interactions using a shared computer cluster.Graphical abstract.

  8. Flow-based dissimilarity measures for reservoir models : a spatial-temporal tensor approach

    NARCIS (Netherlands)

    Insuasty, Edwin; van den Hof, P.M.J.; Weiland, Siep; Jansen, J.D.

    2017-01-01

    In reservoir engineering, it is attractive to characterize the difference between reservoir models in metrics that relate to the economic performance of the reservoir as well as to the underlying geological structure. In this paper, we develop a dissimilarity measure that is based on reservoir

  9. A Data-Flow Based Coordination Approach to Concurrent Software Engineering

    NARCIS (Netherlands)

    Penczek, F.; Cheng, W.; Grelck, C.; Kirner, R.; Scheuermann, B.; Shafarenko, A.

    2013-01-01

    In this paper we present S-Net, a coordination language based on dataflow principles, intended for design of concurrent software. The language is introduced and then used for programming a concurrent solver for a combinatorial optimisation problem. We present the analysis and tracing facilities of

  10. Exploiting Thread Parallelism for Ocean Modeling on Cray XC Supercomputers

    Energy Technology Data Exchange (ETDEWEB)

    Sarje, Abhinav [Lawrence Berkeley National Lab. (LBNL), Berkeley, CA (United States); Jacobsen, Douglas W. [Los Alamos National Lab. (LANL), Los Alamos, NM (United States); Williams, Samuel W. [Lawrence Berkeley National Lab. (LBNL), Berkeley, CA (United States); Ringler, Todd [Los Alamos National Lab. (LANL), Los Alamos, NM (United States); Oliker, Leonid [Lawrence Berkeley National Lab. (LBNL), Berkeley, CA (United States)

    2016-05-01

    The incorporation of increasing core counts in modern processors used to build state-of-the-art supercomputers is driving application development towards exploitation of thread parallelism, in addition to distributed memory parallelism, with the goal of delivering efficient high-performance codes. In this work we describe the exploitation of threading and our experiences with it with respect to a real-world ocean modeling application code, MPAS-Ocean. We present detailed performance analysis and comparisons of various approaches and configurations for threading on the Cray XC series supercomputers.

  11. The Gaia scientific exploitation networks

    Science.gov (United States)

    Figueras, F.; Jordi, C.

    2015-05-01

    On July 2014 the Gaia satellite, placed at L2 since January 2014, finished their commissioning phase and started collecting high accurate scientific data. New and more realistic estimations of the astrometric, photometric and spectroscopic accuracy expected after five years mission operation (2014-2019) have been recently published in the Gaia Science Performance Web page. Here we present the coordination efforts and the activities being conducted through the two GREAT (Gaia Research for European Astronomy Training) European Networks, the GREAT-ESF, a programme supported by the European Science Foundation (2010-2015), and the GREAT-ITN network, from the European Union's Seventh Framework Programme (2011-2015). The main research theme of these networks is to unravel the origin and history of our home galaxy. Emphasis is placed on the research projects being conducted by the Spanish Researchers through these networks, well coordinated by the Red Española de Explotación Científica de Gaia (REG network, with more than 140 participants). Members of the REG play an important role on the collection of complementary spectroscopic data from ground based telescopes, on the development of new tools for an optimal scientific exploitation of Gaia data and on the preparation task to create the Gaia archive.

  12. Flow-Based Systems for Rapid and High-Precision Enzyme Kinetics Studies

    Directory of Open Access Journals (Sweden)

    Supaporn Kradtap Hartwell

    2012-01-01

    Full Text Available Enzyme kinetics studies normally focus on the initial rate of enzymatic reaction. However, the manual operation of steps of the conventional enzyme kinetics method has some drawbacks. Errors can result from the imprecise time control and time necessary for manual changing the reaction cuvettes into and out of the detector. By using the automatic flow-based analytical systems, enzyme kinetics studies can be carried out at real-time initial rate avoiding the potential errors inherent in manual operation. Flow-based systems have been developed to provide rapid, low-volume, and high-precision analyses that effectively replace the many tedious and high volume requirements of conventional wet chemistry analyses. This article presents various arrangements of flow-based techniques and their potential use in future enzyme kinetics applications.

  13. Target Localization with a Single Antenna via Directional Multipath Exploitation

    Directory of Open Access Journals (Sweden)

    Ali H. Muqaibel

    2015-01-01

    Full Text Available Target localization in urban sensing can benefit from angle dependency of the pulse shape at a radar receiver antenna. We propose a localization approach that utilizes the embedded directivity in ultra-wideband (UWB antennas to estimate target positions. A single radar unit sensing operation of indoor targets surrounded by interior walls is considered, where interior wall multipaths are exploited to provide target cross-range. This exploitation assumes resolvability of the multipath components, which is made possible by the virtue of using UWB radar signals. The proposed approach is most attractive when only few multipaths are detectable due to propagation obstructions or owing to low signal-to-noise ratios. Both simulated and experimental data are used to demonstrate the effectiveness of the proposed approach.

  14. Packaging of Sin Goods - Commitment or Exploitation?

    DEFF Research Database (Denmark)

    Nafziger, Julia

    to such self-control problems, and possibly exploit them, by offering different package sizes. In a competitive market, either one or three (small, medium and large) packages are offered. In contrast to common intuition, the large, and not the small package is a commitment device. The latter serves to exploit...

  15. The exploitation of Gestalt principles by magicians.

    Science.gov (United States)

    Barnhart, Anthony S

    2010-01-01

    Magicians exploit a host of psychological principles in deceiving their audiences. Psychologists have recently attempted to pinpoint the most common psychological tendencies exploited by magicians. This paper highlights two co-occurring principles that appear to be the basis for many popular magic tricks: accidental alignment and good continuation.

  16. Exploration, Exploitation, and Organizational Coordination Mechanisms

    Directory of Open Access Journals (Sweden)

    Silvio Popadiuk

    2016-03-01

    Full Text Available This paper presents an empirical relationship among exploration, exploitation, and organizational coordination mechanisms, classified as the centralization of decision-making, formalization, and connectedness. In order to analyze the findings of this survey, we used two techniques: Principal Component Analysis (PCA and Partial Least Squares Path Modeling (PLS-PM. Our analysis was supported by 249 answers from managers of companies located in Brazil (convenience sampling. Contrary to expectations, centralization and exploitation were negatively associated. Our data supports the research hypothesis that formalization is positively associated with exploitation. Although the relationship between formalization and exploration were significant, the result is contrary to the research hypothesis that we made. The relationships among connectedness and exploitation, and connectedness and exploration were both positive and significant. This relationship means that the more connectedness increases, the higher the likelihood of exploitation and exploration.

  17. OPERATION COBRA. Deliberate Attack, Exploitation

    Science.gov (United States)

    1984-05-25

    Climate and weather - The summer of 1944 bad not been particularly hot, but it had been and was to be unusually and frustratingly wet. Approaching...spring of 1944 near Bordeaux . The division is reported to have contained Alsatians, Walloons and Roumanians and was believed to be up to full strength at...was extremely bad. They had been in France for 2 or 3 years, and were completely spoiled. France is a dangerous country, with its wine , women and its

  18. Control Synthesis for the Flow-Based Microfluidic Large-Scale Integration Biochips

    DEFF Research Database (Denmark)

    Minhass, Wajid Hassan; Pop, Paul; Madsen, Jan

    2013-01-01

    , such asmicropumps, mixers, and multiplexers, can be built. In this paper we propose, for the first time to our knowledge, a top-down control synthesis framework for the flow-based biochips. Starting from a given biochemical application and a biochip architecture, we synthesize the control logic that is used...

  19. Architectural Synthesis of Flow-Based Microfluidic Large-Scale Integration Biochips

    DEFF Research Database (Denmark)

    Minhass, Wajid Hassan; Pop, Paul; Madsen, Jan

    2012-01-01

    . By combining several microvalves, more complex units, such as micropumps, switches, mixers, and multiplexers, can be built. The manufacturing technology, soft lithography, used for the flow-based biochips is advancing faster than Moore's law, resulting in increased architectural complexity. However...

  20. A Pin-Count Reduction Algorithm for Flow-Based Microfluidic Biochips

    DEFF Research Database (Denmark)

    Schneider, Alexander Rüdiger; Pop, Paul; Madsen, Jan

    2016-01-01

    Microfluidic biochips are replacing the conventional biochemical analyzers integrating the necessary functions on-chip. We are interested in flow-based biochips, where a continuous flow of liquid is manipulated using integrated microvalves, controlled from external pressure sources via off-chip c...

  1. Flow-Based Network Management: A Report from the IRTF NMRG Workshop

    NARCIS (Netherlands)

    de Oliveira Schmidt, R.; Sadre, R.; Hendriks, Luuk

    This is the report on the Workshop on Flow-Based Network Management, held within the 37th IRTF NMRG meeting, during IETF 93, on 24th July 2015, in Prague, Czech Republic. Following the tradition of the IRTF NMRG, the workshop focused on technologies, developments, and challenges of using flow-level

  2. Exploiting Genome Structure in Association Analysis

    Science.gov (United States)

    Kim, Seyoung

    2014-01-01

    Abstract A genome-wide association study involves examining a large number of single-nucleotide polymorphisms (SNPs) to identify SNPs that are significantly associated with the given phenotype, while trying to reduce the false positive rate. Although haplotype-based association methods have been proposed to accommodate correlation information across nearby SNPs that are in linkage disequilibrium, none of these methods directly incorporated the structural information such as recombination events along chromosome. In this paper, we propose a new approach called stochastic block lasso for association mapping that exploits prior knowledge on linkage disequilibrium structure in the genome such as recombination rates and distances between adjacent SNPs in order to increase the power of detecting true associations while reducing false positives. Following a typical linear regression framework with the genotypes as inputs and the phenotype as output, our proposed method employs a sparsity-enforcing Laplacian prior for the regression coefficients, augmented by a first-order Markov process along the sequence of SNPs that incorporates the prior information on the linkage disequilibrium structure. The Markov-chain prior models the structural dependencies between a pair of adjacent SNPs, and allows us to look for association SNPs in a coupled manner, combining strength from multiple nearby SNPs. Our results on HapMap-simulated datasets and mouse datasets show that there is a significant advantage in incorporating the prior knowledge on linkage disequilibrium structure for marker identification under whole-genome association. PMID:21548809

  3. Global Climate Responses to Anthropogenic Groundwater Exploitation

    Science.gov (United States)

    Zeng, Y.; Xie, Z.

    2015-12-01

    In this study, a groundwater exploitation scheme is incorporated into the earth system model, Community Earth System Model 1.2.0 (CESM1.2.0), which is called CESM1.2_GW, and the climatic responses to anthropogenic groundwater withdrawal are then investigated on global scale. The scheme models anthropogenic groundwater exploitation and consumption, which are then divided into agricultural irrigation, industrial use and domestic use. A group of 41-year ensemble groundwater exploitation simulations with six different initial conditions, and a group of ensemble control simulations without exploitation are conducted using the developed model CESM1.2_GW with water supplies and demands estimated. The results reveal that the groundwater exploitation and water consumption cause drying effects on soil moisture in deep layers and wetting effects in upper layers, along with a rapidly declining groundwater table in Central US, Haihe River Basin in China and Northern India and Pakistan where groundwater extraction are most severe in the world. The atmosphere also responds to anthropogenic groundwater exploitation. Cooling effects on lower troposphere appear in large areas of North China Plain and of Northern India and Pakistan. Increased precipitation occurs in Haihe River Basin due to increased evapotranspiration from irrigation. Decreased precipitation occurs in Northern India because water vapor here is taken away by monsoon anomalies induced by anthropogenic alteration of groundwater. The local reducing effects of anthropogenic groundwater exploitation on total terrestrial water storage evinces that water resource is unsustainable with the current high exploitation rate. Therefore, a balance between slow groundwater withdrawal and rapid human economic development must be achieved to maintain a sustainable water resource, especially in over-exploitation regions such as Central US, Northern China, India and Pakistan.

  4. Reasoning About Programs by Exploiting the Environment

    Science.gov (United States)

    1994-02-02

    1i TITLE ( lude Security Ca .fcation) Reasoning about Programs by Exploiting the Environment rt 12. PERSONAL AUTHOR(S) w]ba1oa Ui.tm A Limor Fix axd...editions are obsolete. Reasoning About Programs by Exploiting the Environment * Limor Fix Fred B. Schneider TR 94-1409 February 1994 Department of Computer...agencies. Limor Fix is also supported, in part, by a Fullbright post-doctoral award. Reasoning about Programs by Exploiting the Environment ---- NITIS GRA&I

  5. Risk assessment by dynamic representation of vulnerability, exploitation, and impact

    Science.gov (United States)

    Cam, Hasan

    2015-05-01

    Assessing and quantifying cyber risk accurately in real-time is essential to providing security and mission assurance in any system and network. This paper presents a modeling and dynamic analysis approach to assessing cyber risk of a network in real-time by representing dynamically its vulnerabilities, exploitations, and impact using integrated Bayesian network and Markov models. Given the set of vulnerabilities detected by a vulnerability scanner in a network, this paper addresses how its risk can be assessed by estimating in real-time the exploit likelihood and impact of vulnerability exploitation on the network, based on real-time observations and measurements over the network. The dynamic representation of the network in terms of its vulnerabilities, sensor measurements, and observations is constructed dynamically using the integrated Bayesian network and Markov models. The transition rates of outgoing and incoming links of states in hidden Markov models are used in determining exploit likelihood and impact of attacks, whereas emission rates help quantify the attack states of vulnerabilities. Simulation results show the quantification and evolving risk scores over time for individual and aggregated vulnerabilities of a network.

  6. Exploitative and Deceptive Resource Acquisition Strategies

    Directory of Open Access Journals (Sweden)

    Joshua J. Reynolds

    2015-07-01

    Full Text Available Life history strategy (LHS and life history contingencies (LHCs should theoretically influence the use of exploitative and deceptive resource acquisition strategies. However, little research has been done in this area. The purpose of the present work was to create measures of exploitative strategies and test the predictions of life history theory. Pilot studies developed and validated a behavioral measure of cheating called the Dot Game. The role of individual LHS and LHCs (manipulated via validated story primes on cheating was investigated in Study 1. Studies 2a through 2c were conducted to develop and validate a self-report measure called the Exploitative and Deceptive Resource Acquisition Strategy Scale (EDRASS. Finally, Study 3 investigated life history and EDRASS. Results indicated that while LHS influences exploitative strategies, life history contingences had little effect. Implications of these findings are discussed.

  7. Life History Theory and Exploitative Strategies

    Directory of Open Access Journals (Sweden)

    Joshua J. Reynolds

    2016-07-01

    Full Text Available Exploitative strategies involve depriving others of resources while enhancing one’s own. Life history theory suggests that there are individual differences (life history strategy and environmental characteristics (life history contingencies [LHCs] that influence the use of exploitative strategies. However, past work manipulating LHCs has found mixed evidence for the influence of this information on exploitative behavior. We present three studies that help clarify the effects of this type of information. Results indicated that younger individuals are most sensitive to LHC information. We also found, contrary to predictions, that communicating slow LHC information (i.e., high population density, intraspecific competition, and resource scarcity increased rather than decreased the temptation to engage in exploitative behavior. Limitations and future directions are discussed.

  8. Liposomal cancer therapy: exploiting tumor characteristics

    DEFF Research Database (Denmark)

    Kaasgaard, Thomas; Andresen, Thomas Lars

    2010-01-01

    the reader will gain: The review focuses on strategies that exploit characteristic features of solid tumors, such as abnormal vasculature, overexpression of receptors and enzymes, as well as acidic and thiolytic characteristics of the tumor microenvironment. Take home message: It is concluded that the design...... of new liposomal drug delivery systems that better exploit tumor characteristic features is likely to result in more efficacious cancer treatments....

  9. System-Level Modeling and Synthesis of Flow-Based Microfluidic Biochips

    DEFF Research Database (Denmark)

    Minhass, Wajid Hassan; Pop, Paul; Madsen, Jan

    2011-01-01

    Microfluidic biochips are replacing the conventional biochemical analyzers and are able to integrate the necessary functions for biochemical analysis on-chip. There are several types of microfluidic biochips, each having its advantages and limitations. In this paper we are interested in flow......-based biochips, in which the flow of liquid is manipulated using integrated microvalves. By combining several microvalves, more complex units, such as micropumps, switches, mixers, and multiplexers, can be built. Although researchers have proposed significant work on the system-level synthesis of droplet......-based biochips, which manipulate droplets on a two-dimensional array of electrodes, no research on system-level synthesis of flow-based biochips has been reported so far. The focus has been on application modeling and component-level simulation. Therefore, for the first time to our knowledge, we propose a system-level...

  10. An efficient flow-based botnet detection using supervised machine learning

    DEFF Research Database (Denmark)

    Stevanovic, Matija; Pedersen, Jens Myrup

    2014-01-01

    Botnet detection represents one of the most crucial prerequisites of successful botnet neutralization. This paper explores how accurate and timely detection can be achieved by using supervised machine learning as the tool of inferring about malicious botnet traffic. In order to do so, the paper...... to accurately and timely detect botnet traffic using purely flow-based traffic analysis and supervised machine learning. Additionally, the results show that in order to achieve accurate detection traffic flows need to be monitored for only a limited time period and number of packets per flow. This indicates...... introduces a novel flow-based detection system that relies on supervised machine learning for identifying botnet network traffic. For use in the system we consider eight highly regarded machine learning algorithms, indicating the best performing one. Furthermore, the paper evaluates how much traffic needs...

  11. Waste-aware fluid volume assignment for flow-based microfluidic biochips

    DEFF Research Database (Denmark)

    Schneider, Alexander Rüdiger; Pop, Paul; Madsen, Jan

    2017-01-01

    Microfluidic biochips are replacing the conventional biochemical analysers integrating the necessary functions onchip. We are interested in Flow-Based Microfluidic Biochips (FBMB), where a continuous flow of liquid is manipulated using integrated microvalves. Using microvalves and channels, more ...... is able to minimize the fluid consumption through optimal fluid assignment and reuse of fluid waste. Due to the algorithm's low complexity, fluid requirements can also be calculated during runtime for error recovery or statically unknown cases....

  12. Fast architecture-level synthesis of fault-tolerant flow-based microfluidic biochips

    DEFF Research Database (Denmark)

    Huang, Wei Lun; Gupta, Ankur; Roy, Sudip

    2017-01-01

    -simplified model that usually derive sub-optimal results. Thus, we propose a progressive optimization procedure for the synthesis of fault-tolerant flow-based microfluidic biochips. Simulation results demonstrate that proposed method is efficient compared to the state-of-the-art techniques and can provide...... effective solutions in 88% (on average) less CPU time compared to state-of-the-art technique over three benchmark bioprotocols....

  13. Multipath protection for data center services in OpenFlow-based software defined elastic optical networks

    Science.gov (United States)

    Yang, Hui; Cheng, Lei; Yuan, Jian; Zhang, Jie; Zhao, Yongli; Lee, Young

    2015-06-01

    With the rapid growth of data center services, the elastic optical network is a very promising networking architecture to interconnect data centers because it can elastically allocate spectrum tailored for various bandwidth requirements. In case of a link failure, to ensure a high-level quality of service (QoS) for user request after the failure becomes a research focus. In light of it, in this paper, we propose and experimentally demonstrate multipath protection for data center services in OpenFlow-based software defined elastic optical network testbed aiming at improving network reliability. We first propose an OpenFlow-based software defined elastic optical network architecture for data center service protection. Then, based on the proposed architecture, multipath protection scheme is figured based on the importance level of the service. To implement the proposed scheme in the architecture, OpenFlow protocol is extended to support multipath protection in elastic optical network. The performance of our proposed multipath protection scheme is evaluated by means of experiment on our OpenFlow-based testbed. The feasibility of our proposed scheme is also demonstrated in software defined elastic optical networks.

  14. Exploitation of the Virtual Worlds in Tourism and Tourism Education

    Directory of Open Access Journals (Sweden)

    Zejda Pavel

    2016-12-01

    Full Text Available Academics perceive a great potential of virtual worlds in various areas, including tourism and education. Efforts adapting the virtual worlds in practice are, however, still marginal. There is no clear definition of the virtual world. Therefore the author of this article attempts to provide one. The paper also focuses on the barriers of a wider exploitation of the virtual worlds and discusses the principles that might help to increase their potential in tourism area. One of the principles – gamification – favours a wider adaptation of the virtual worlds in tourism. Applying gamification principles provides visitors with some unique experiences while serving as a powerful marketing tool for institutions. The benefits of implementing tourism education activities based on cooperative principles set in an immersive environment of the virtual worlds are depicted afterwards. Finally, this paper includes successful case studies, which show advantages and drawbacks of some approaches in exploiting the virtual worlds in tourism and tourism education.

  15. Exploitation in International Paid Surrogacy Arrangements.

    Science.gov (United States)

    Wilkinson, Stephen

    2016-05-01

    Many critics have suggested that international paid surrogacy is exploitative. Taking such concerns as its starting point, this article asks: (1) how defensible is the claim that international paid surrogacy is exploitative and what could be done to make it less exploitative? (2) In the light of the answer to (1), how strong is the case for prohibiting it? Exploitation could in principle be dealt with by improving surrogates' pay and conditions. However, doing so may exacerbate problems with consent. Foremost amongst these is the argument that surrogates from economically disadvantaged countries cannot validly consent because their background circumstances are coercive. Several versions of this argument are examined and I conclude that at least one has some merit. The article's overall conclusion is that while ethically there is something to be concerned about, paid surrogacy is in no worse a position than many other exploitative commercial transactions which take place against a backdrop of global inequality and constrained options, such as poorly-paid and dangerous construction work. Hence, there is little reason to single surrogacy out for special condemnation. On a policy level, the case for prohibiting international commercial surrogacy is weak, despite legitimate concerns about consent and background poverty.

  16. Rethinking exploitation: a process-centered account.

    Science.gov (United States)

    Jansen, Lynn A; Wall, Steven

    2013-12-01

    Exploitation has become an important topic in recent discussions of biomedical and research ethics. This is due in no small measure to the influence of Alan Wertheimer's path-breaking work on the subject. This paper presents some objections to Wertheimer's account of the concept. The objections attempt to show that his account places too much emphasis on outcome-based considerations and too little on process-based considerations. Building on these objections, the paper develops an alternative process-centered account of the concept. This alternative account of exploitation takes as its point of departure the broadly Kantian notion that it is wrong to use another as an instrument for the advancement of one's own ends. It sharpens this slippery notion and adds a number of refinements to it. The paper concludes by arguing that process-centered accounts of exploitation better illuminate the ethical challenges posed by research on human subjects than outcome-centered accounts.

  17. Exploiting Weaknesses: An Approach to Counter Cartel Strategy

    Science.gov (United States)

    2011-12-01

    company), FEMSA ( Coca - Cola ), Alfa (petrochemicals, food, telecommunications and auto parts), Axtel (telecommunications), Vitro (glass), Selther... China , and Global Terrorism.7 de Blij’s work provides the basic geospatial concepts that help describe the effects of the operational environment...Naval Postgraduate School, 2009). 7 Harm J. de Blij, Why Geography Matters; Three Challenges Facing America; Climate Change, the Rise if China

  18. Distinct Urban Mines: Exploiting secondary resources in unique anthropogenic spaces.

    Science.gov (United States)

    Ongondo, F O; Williams, I D; Whitlock, G

    2015-11-01

    Fear of scarcity of resources highlight the need to exploit secondary materials from urban mines in the anthroposphere. Analogous to primary mines rich in one type of material (e.g. copper, gold, etc.), some urban mines are unique/distinct. We introduce, illustrate and discuss the concept of Distinct Urban Mines (DUM). Using the example of a university DUM in the UK, analogous to a primary mine, we illustrate potential product/material yields in respect of size, concentration and spatial location of the mine. Product ownership and replacement cycles for 17 high-value electrical and electronic equipment (EEE) among students showed that 20 tonnes of valuable e-waste were in stockpile in this DUM and a further 87 tonnes would 'soon' be available for exploitation. We address the opportunities and challenges of exploiting DUMs and conclude that they are readily available reservoirs for resource recovery. Two original contributions arise from this work: (i) a novel approach to urban mining with a potential for maximising resource recovery within the anthroposphere is conceptualised; and (ii) previously unavailable data for high-value products for a typical university DUM are presented and analysed. Copyright © 2015 Elsevier Ltd. All rights reserved.

  19. Development of substance flow based Life Cycle Assessment tool for sewage sludge treatment and disposal

    DEFF Research Database (Denmark)

    Yoshida, Hiroko; Clavreul, Julie; Scheutz, Charlotte

    Life Cycle Assessment (LCA) is a method to quantify environmental impacts of products or systems. It is often done by correlating material and energy demands with certain input characteristics. An attempt was made to evaluate the robustness of the substance flow based LCA for wastewater and sludge...... treatment processes. Operational data of a conventional wastewater treatment plant over 12 years was collected. A cluster analysis was conducted to determine the relatedness of each input and output characteristic at the whole plant level. The results indicate that the output from the wastewater and sludge...

  20. Sexual exploitation in children: Nature, prevalence and distinguishing characteristics reported in young adulthood

    OpenAIRE

    Ireland, Carol Ann; Alderson, Kirsty; Ireland, Jane Louise

    2015-01-01

    The aim of this study was to explore the nature and extent of sexual exploitation in a university student sample, whilst being clear that sexual exploitation is sexual abuse. Overall, 47% of participants (96 out of 204) reported having been approached by an adult in a sexual manner when they were under the age of 16. The study predicted that a number of individual characteristics would increase a young person’s vulnerability for sexual exploitation. These included low self-esteem, external lo...

  1. Growth, Mortality and Exploitation Rates of Sarotherodon ...

    African Journals Online (AJOL)

    Evans

    ABSTRACT. Sarotherodon melanotheron population of Dominli Lagoon in the Western Region of Ghana was studied for its growth and mortality parameters as well as exploitation rate. The study generally aimed at providing basic information necessary for the assessment and management of the fish stock in the lagoon.

  2. Biodegradation of hydrocarbons exploiting spent substrate from ...

    African Journals Online (AJOL)

    SAM

    2014-08-13

    Aug 13, 2014 ... Biodegradation of hydrocarbons exploiting spent substrate from Pleurotus ostreatus in agricultural soils. A. Mauricio-Gutiérrez1, T. Jiménez-Salgado2, A. Tapia-Hernández2, J. Cavazos-Arroyo1 and. B. Pérez-Armendáriz1*. 1Interdisciplinary Research and Consulting, Autonomus Popular University of State ...

  3. Exploiting a natural auxotrophy for genetic selection.

    Science.gov (United States)

    Ramage, Elizabeth; Gallagher, Larry; Manoil, Colin

    2012-08-01

    We exploited the natural histidine auxotrophy of Francisella species to develop hisD (encodes histidinol dehydrogenase) as a positive selection marker. A shuttle plasmid (pBR103) carrying Escherichia coli hisD and designed for cloning of PCR fragments replicated in both attenuated and highly virulent Francisella strains. During this work, we formulated a simplified defined growth medium for Francisella novicida.

  4. Courseware Design: Exploiting the Colour Micro.

    Science.gov (United States)

    Kidd, Marilyn E.; Holmes, Glyn

    1982-01-01

    Discusses the impact of the presentation of data on the educational effectiveness of computer assisted learning systems, describes some of the existing systems for controlling the display of instructional data on CRTs, and outlines a project undertaken at the University of Western Ontario to exploit the capabilities of microcomputer color…

  5. Child Exploitation: Some Pieces of the Puzzle.

    Science.gov (United States)

    Rohlader, Dorothy

    The report addresses the status in North Carolina and in the nation of child exploitation. Legislative and judicial backgrounds of child pornography and child prostitution are reviewed, and difficulties in obtaining statistical data are noted. Law enforcement issues in pornography are cited, and suggestions for further legislation regarding child…

  6. On the dynamics of exploited fish populations

    National Research Council Canada - National Science Library

    Beverton, R. J. H; Holt, Sidney J

    1993-01-01

    ...-brooding cichlids, and viviparity in many sharks and toothcarps. Moreover, fish are of considerable importance to the survival of the human species in the form of nutritious, delicious and diverse food. Rational exploitation and management of our global stocks of fishes must rely upon a detailed and precise insight of their biology. The...

  7. Exploiting indigenous knowledge in the environmental conservation ...

    African Journals Online (AJOL)

    ... of agriculture and reared livestock (especially goats). Over several years, they developed sustainable and effective exploitation mechanisms of the existing biodiversity resources to satisfy their individual needs and those of their societies in general. Journal of Language, Technology and Entrepreneurship in Africa Vol.

  8. Groundwater exploitation in the Abakaliki metropolis (southeastern ...

    African Journals Online (AJOL)

    aghomotsegin

    Full Length Research Paper. Groundwater exploitation in the Abakaliki metropolis. (southeastern Nigeria): Issues and challenges. O. P. Aghamelu*, H. N. Ezeh and A. I. Obasi. Department of Geology and Exploration Geophysics, Ebonyi State University, P.M.B., 053,. Abakaliki, Ebonyi State, Nigeria. Accepted 24 September ...

  9. The Illegal Exploitation of Natural Resources

    NARCIS (Netherlands)

    Boekhout van Solinge, T.|info:eu-repo/dai/nl/156696207

    2014-01-01

    This essay discusses the involvement of organized crime in natural resource exploitation and trade. This is accomplished by examining case studies from different tropical regions in the world: Africa (Liberia, Sierra Leone, and DR Congo), Southeast Asia (Indonesia), and Latin America (Brazilian

  10. National Center for Missing and Exploited Children

    Science.gov (United States)

    ... Have you experienced the tragedy of a missing child? We're here to help. Learn More >> × KidSmartz New Parent Tips to Help Kids Set Physical Boundaries! Download Resources >> × Subscribe EN SP Blog Media About Us Contact Us Legal T&C Careers Copyright © National Center for Missing & Exploited Children. All ...

  11. Finding All Elementary Circuits Exploiting Transconductance

    NARCIS (Netherlands)

    Klumperink, Eric A.M.; Bruccoleri, F.; Nauta, Bram

    Commonly used elementary circuits like single transistor amplifier stages, the differential pair and current mirror basically exploit the transconductance of transistors. This paper aims at finding ALL elementary transconductance based circuits. For this purpose, all graphs of two-port circuits with

  12. Finding all elementary circuits exploiting transconductance

    NARCIS (Netherlands)

    Klumperink, Eric A.M.; Bruccoleri, F.; Nauta, Bram

    2001-01-01

    Commonly used elementary circuits like single-transistor amplifier stages, the differential pair, and current mirrors basically exploit the transconductance property of transistors. This paper aims at finding all elementary transconductance-based circuits. For this purpose, all graphs of two-port

  13. Exploitation of marine gas hydrates: Benefits and risks (Invited)

    Science.gov (United States)

    Wallmann, K. J.

    2013-12-01

    Vast amounts of natural gas are stored in marine gas hydrates deposited at continental margins. The global inventory of carbon bound as methane in gas hydrates is currently estimated as 1000 × 500 Gt. Large-scale national research projects located mostly in South-East Asia but also in North America and Europe are aiming to exploit these ice-like solids as new unconventional resource of natural gas. Japan, South Korea and other Asian countries are taking the lead because their national waters harbor exploitable gas hydrate deposits which could be developed to reduce the dependency of these nations on costly LGN imports. In 2013, the first successful production test was performed off Japan at water depths of ca. 1000 m demonstrating that natural gas can be released and produced from marine hydrates by lowering the pressure in the sub-seabed hydrate reservoirs. In an alternative approach, CO2 from coal power plans and other industrial sources is used to release natural gas (methane) from hydrates while CO2 is bound and stored in the sub-surface as solid hydrate. These new approaches and technologies are still in an early pre-commercial phase; the costs of field development and gas production exceed the value of natural gas being produced from the slowly dissociating hydrates. However, new technologies are currently under development in the German SUGAR project and elsewhere to reduce costs and enhance gas production rates such that gas hydrates may become commercially exploitable over the coming decade(s). The exploitation of marine gas hydrates may help to reduce CO2 emissions from the fossil fuel sector if the produced natural gas is used to replace coal and/or LNG. Hydrate development could also provide important incentives for carbon capture technologies since CO2 can be used to produce natural gas from hydrates. However, leakage of gas may occur during the production process while slope failure may be induced by the accompanying dissociation/conversion of gas

  14. Exploiting sparsity in free energy basin-hopping

    Science.gov (United States)

    Sutherland-Cash, Kyle H.; Mantell, Rosemary G.; Wales, David J.

    2017-10-01

    We present acceleration of the vibrational frequency calculations required in free energy basin-hopping (FEBH) global optimisation using sparse Cholesky factorisation. We describe an interface with the SuiteSparse software package that facilitates these calculations, and present results detailing the accuracy and speedups obtained for atomic clusters and biomolecules. For the larger systems, exploiting sparsity reduces the computational cost by factors of ten to thirty, with no significant loss in accuracy. This approach will therefore provide access to the vibrational density of states, and hence to local harmonic free energies, for structure prediction and thermodynamic properties of more complex systems.

  15. Space Mapping Optimization of Microwave Circuits Exploiting Surrogate Models

    DEFF Research Database (Denmark)

    Bakr, M. H.; Bandler, J. W.; Madsen, Kaj

    2000-01-01

    is a convex combination of a mapped coarse model and a linearized fine model. It exploits, in a novel way, a linear frequency-sensitive mapping. During the optimization iterates, the coarse and fine models are simulated at different sets of frequencies. This approach is shown to be especially powerful......A powerful new space-mapping (SM) optimization algorithm is presented in this paper. It draws upon recent developments in both surrogate model-based optimization and modeling of microwave devices, SM optimization is formulated as a general optimization problem of a surrogate model. This model...

  16. Dissemination and Exploitation: Project Goals beyond Science

    Science.gov (United States)

    Hamann, Kristin; Reitz, Anja

    2017-04-01

    Dissemination and Exploitation are essential parts of public funded projects. In Horizon 2020 a plan for the exploitation and dissemination of results (PEDR) is a requirement. The plan should contain a clear vision on the objectives of the project in relation to actions for dissemination and potential exploitation of the project results. The actions follow the basic idea to spread the knowledge and results gathered within the project and face the challenge of how to bring the results into potentially relevant policy circle and how they impact the market. The plan follows the purpose to assess the impact of the project and to address various target groups who are interested in the project results. Simply put, dissemination concentrates on the transfer of knowledge and exploitation on the commercialization of the project. Beyond the question of the measurability of project`s impact, strategies within science marketing can serve purposes beyond internal and external communication. Accordingly, project managers are facing the challenge to implement a dissemination and exploitation strategy that ideally supports the identification of all partners with the project and matches the current discourse of the project`s content within the society, politics and economy. A consolidated plan might unite all projects partners under a central idea and supports the identification with the project beyond the individual research questions. Which applications, strategies and methods can be used to bring forward a PEDR that accompanies a project successfully and allows a comprehensive assessment of the project afterwards? Which hurdles might project managers experience in the dissemination process and which tasks should be fulfilled by the project manager?

  17. Trolling may intensify exploitation in crappie fisheries

    Science.gov (United States)

    Meals, K. O.; Dunn, A. W.; Miranda, Leandro E.

    2012-01-01

    In some parts of the USA, anglers targeting crappies Pomoxis spp. are transitioning from mostly stationary angling with a single pole around submerged structures to using multiple poles while drifting with the wind or under power. This shift in fishing methods could result in a change in catch efficiency, possibly increasing exploitation rates to levels that would be of concern to managers. We studied the catch statistics of anglers fishing while trolling with multiple poles (trollers) and those fishing with single poles (polers) in Mississippi reservoirs. Specifically, we tested whether (1) various catch statistics differed between trollers and polers, (2) catch rates of trollers were related to the number of poles fished, and (3) trollers could raise exploitation rates to potentially unsustainable levels. Results showed that participation in the crappie fisheries was about equally split between polers and trollers. In spring, 90% of crappie anglers were polers; in summer, 85% of crappie anglers were trollers. The size of harvested crappies was similar for the two angler groups, but the catch per hour was almost three times higher for trollers than for polers. Catch rates by trollers were directly correlated to the number of poles fished, although the relationship flattened as the number of poles increased. The average harvest rate for one troller fishing with three poles was similar to the harvest rate obtained by one poler. Simulations predicted that at the existing mix of about 50% polers and 50% trollers and with no restrictions on the number of poles used by trollers, exploitation of crappies is about 1.3 times higher than that in a polers-only fishery; under a scenario in which 100% of crappie anglers were trollers, exploitation was forecasted to increase to about 1.7 times the polers-only rate. The efficiency of trolling for crappies should be of concern to fishery managers because crappie fisheries are mostly consumptive and may increase exploitation

  18. Exploiting for medical and biological applications

    Science.gov (United States)

    Giano, Michael C.

    Biotherapeutics are an emerging class of drug composed of molecules ranging in sizes from peptides to large proteins. Due to their poor stability and mucosal membrane permeability, biotherapeutics are administered by a parenteral method (i.e., syringe, intravenous or intramuscular). Therapeutics delivered systemically often experience short half-lives. While, local administration may involve invasive surgical procedures and suffer from poor retention at the site of application. To compensate, the patient receives frequent doses of highly concentrated therapeutic. Unfortunately, the off-target side effects and discomfort associated with multiple injections results in poor patient compliance. Therefore, new delivery methods which can improve therapeutic retention, reduce the frequency of administration and may aid in decreasing the off-target side effects is a necessity. Hydrogels are a class of biomaterials that are gaining interests for tissue engineering and drug delivery applications. Hydrogel materials are defined as porous, 3-dimensional networks that are primarily composed of water. Generally, they are mechanically rigid, cytocompatible and easily chemically functionalized. Collectively, these properties make hydrogels fantastic candidates to perform as drug delivery depots. Current hydrogel delivery systems physically entrap the target therapeutic which is then subsequently released over time at the site of administration. The swelling and degradation of the material effect the diffusion of the therapy from the hydrogel, and therefore should be controlled. Although these strategies provide some regulation over therapeutic release, full control of the delivery is not achieved. Newer approaches are focused on designing hydrogels that exploit known interactions, covalently attach the therapy or respond to an external stimulus in an effort to gain improved control over the therapy's release. Unfortunately, the biotherapeutic is typically required to be chemically

  19. Fully Exploiting The Potential Of The Periodic Table Through Pattern Recognition.

    Science.gov (United States)

    Schultz, Emeric

    2005-01-01

    An approach to learning chemical facts that starts with the periodic table and depends primarily on recognizing and completing patterns and following a few simple rules is described. This approach exploits the exceptions that arise and uses them as opportunities for further concept development.

  20. Exploiting host immunity: the Salmonella paradigm

    Science.gov (United States)

    Behnsen, Judith; Perez-Lopez, Araceli; Nuccio, Sean-Paul; Raffatellu, Manuela

    2014-01-01

    Pathogens have evolved clever strategies to evade and in some cases exploit the attacks of an activated immune system. Salmonella enterica is one such pathogen, exploiting multiple aspects of host defense to promote its replication in the host. Here we review recent findings on the mechanisms by which Salmonella establishes systemic and chronic infection, including strategies involving manipulation of innate immune signaling and inflammatory forms of cell death, as well as immune evasion by establishing residency in M2 macrophages. We also examine recent evidence showing that the oxidative environment and the high levels of antimicrobial proteins produced in response to localized Salmonella gastrointestinal infection enable the pathogen to successfully outcompete the resident gut microbiota. PMID:25582038

  1. Organizational Factors for Exploration and Exploitation

    Directory of Open Access Journals (Sweden)

    Sharadindu Pandey

    2009-05-01

    Full Text Available The Purpose of the paper is to develop a conceptual framework which suggests a relationship between organisational factors and exploratory and exploitative innovation types. We searched major databases like ABI/INFORM global, EBSCO, Elsevier’s science direct, Springer link and Emerald full text. Most of studies were included from published sources. We explored the literature of organisational culture, motivational bases of the rewards system and leadership values which are responsible for increasing creative and productive output. Our study has attempted to identify common patterns and themes in the literature regarding the drivers that increase both sides of the organisational creativity. The paper discusses the role of culture, system and styles in the initiation and implementation phases of the innovation called herein exploitative and exploratory innovation.

  2. Tribal children are most exploited - UNICEF.

    Science.gov (United States)

    A workshop sponsored by the UN Children's Fund in the Philippines examined the status of the children of indigenous people and found that exploitation of the assets of indigenous people in the name of development has resulted in social inequalities that have damaged the indigenous children. As examples of the disregard for the human rights of the children, participants cited projects in Davao, Boracay, and Benguet that have displaced native children. These include mining schemes that have "raped" ancestral lands, large-scale agricultural enterprises, promotion of tourism, and creation of hydroelectric dams. The children rarely benefit at all from any of these projects as their families are moved from a position of isolated independence to one of exploited dependence. Social changes accompanying development ruin traditional culture without providing a better or even similar basis of existence.

  3. Automatic exploitation system for photographic dosemeters; Systeme d`exploitation automatique des dosimetres photographiques

    Energy Technology Data Exchange (ETDEWEB)

    Magri, Y.; Devillard, D.; Godefroit, J.L.; Barillet, C.

    1997-01-01

    The Laboratory of Dosimetry Exploitation (LED) has realized an equipment allowing to exploit automatically photographic film dosemeters. This system uses an identification of the films by code-bars and gives the doses measurement with a completely automatic reader. The principle consists in putting in ribbon the emulsions to be exploited and to develop them in a circulation machine. The measurement of the blackening film is realized on a reading plate having fourteen points of reading, in which are circulating the emulsions in ribbon. The exploitation is made with the usual dose calculation method, with special computers codes. A comparison on 2000 dosemeters has shown that the results are the same in manual and automatical methods. This system has been operating since July 1995 by the LED. (N.C.).

  4. Macropinocytosis Exploitation by Cancers and Cancer Therapeutics

    Directory of Open Access Journals (Sweden)

    Kevin D Ha

    2016-09-01

    Full Text Available Macropinocytosis has long been known as a primary method for cellular intake of fluid-phase and membrane-bound bulk cargo. This review seeks to re-examine the latest studies to emphasize how cancers exploit macropinocytosis to further their tumorigenesis, including details in how macropinocytosis can be adapted to serve diverse functions. Furthermore, this review will also cover the latest endeavors in targeting macropinocytosis as an avenue for novel therapeutics.

  5. Macropinocytosis Exploitation by Cancers and Cancer Therapeutics.

    Science.gov (United States)

    Ha, Kevin D; Bidlingmaier, Scott M; Liu, Bin

    2016-01-01

    Macropinocytosis has long been known as a primary method for cellular intake of fluid-phase and membrane-bound bulk cargo. This review seeks to re-examine the latest studies to emphasize how cancers exploit macropinocytosis to further their tumorigenesis, including details in how macropinocytosis can be adapted to serve diverse functions. Furthermore, this review will also cover the latest endeavors in targeting macropinocytosis as an avenue for novel therapeutics.

  6. Macropinocytosis Exploitation by Cancers and Cancer Therapeutics

    OpenAIRE

    Ha, Kevin D.; Bidlingmaier, Scott M.; Liu, Bin

    2016-01-01

    Macropinocytosis has long been known as a primary method for cellular intake of fluid-phase and membrane-bound bulk cargo. This review seeks to re-examine the latest studies to emphasize how cancers exploit macropinocytosis to further their tumorigenesis, including details in how macropinocytosis can be adapted to serve diverse functions. Furthermore, this review will also cover the latest endeavors in targeting macropinocytosis as an avenue for novel therapeutics.

  7. Flare Systems Exploitation and Impact on Permafrost

    Science.gov (United States)

    Filimonov, M. Yu; Vaganova, N. A.

    2017-09-01

    Mathematical models and numerical algorithms of horizontal and vertical flare systems exploitation in northern oil and gas fields located in permafrost zone are developed. Computations of long-term forecasts of permafrost degradation around such constructions have been carried out for various types of operation, including emergency situations, which cause a short-term increase in the heat flow near the ground surface, which leads to an additional soil temperature increasing.

  8. Apparatus and method for interaction phenomena with world modules in data-flow-based simulation

    Science.gov (United States)

    Xavier, Patrick G [Albuquerque, NM; Gottlieb, Eric J [Corrales, NM; McDonald, Michael J [Albuquerque, NM; Oppel, III, Fred J.

    2006-08-01

    A method and apparatus accommodate interaction phenomenon in a data-flow-based simulation of a system of elements, by establishing meta-modules to simulate system elements and by establishing world modules associated with interaction phenomena. World modules are associated with proxy modules from a group of meta-modules associated with one of the interaction phenomenon. The world modules include a communication world, a sensor world, a mobility world, and a contact world. World modules can be further associated with other world modules if necessary. Interaction phenomenon are simulated in corresponding world modules by accessing member functions in the associated group of proxy modules. Proxy modules can be dynamically allocated at a desired point in the simulation to accommodate the addition of elements in the system of elements such as a system of robots, a system of communication terminals, or a system of vehicles, being simulated.

  9. Synthesis of Riboflavines, Quinoxalinones and Benzodiazepines through Chemoselective Flow Based Hydrogenations

    Directory of Open Access Journals (Sweden)

    Marcus Baumann

    2014-07-01

    Full Text Available Robust chemical routes towards valuable bioactive entities such as riboflavines, quinoxalinones and benzodiazepines are described. These make use of modern flow hydrogenation protocols enabling the chemoselective reduction of nitro group containing building blocks in order to rapidly generate the desired amine intermediates in situ. In order to exploit the benefits of continuous processing the individual steps were transformed into a telescoped flow process delivering selected benzodiazepine products on scales of 50 mmol and 120 mmol respectively.

  10. Exploiting Redundancy in an OFDM SDR Receiver

    Directory of Open Access Journals (Sweden)

    Tomas Palenik

    2009-01-01

    Full Text Available Common OFDM system contains redundancy necessary to mitigate interblock interference and allows computationally effective single-tap frequency domain equalization in receiver. Assuming the system implements an outer error correcting code and channel state information is available in the receiver, we show that it is possible to understand the cyclic prefix insertion as a weak inner ECC encoding and exploit the introduced redundancy to slightly improve error performance of such a system. In this paper, an easy way to implement modification to an existing SDR OFDM receiver is presented. This modification enables the utilization of prefix redundancy, while preserving full compatibility with existing OFDM-based communication standards.

  11. Art Therapy Exhibitions: Exploitation or Advocacy?

    Science.gov (United States)

    Davis, Terri

    2017-01-01

    Promoting awareness of human trafficking by sharing trauma survivors' art and summaries of their life stories suggests ethical complexities that have been typically neglected by bioethicists. Although these survivors voluntarily share the objects they created during art therapy sessions, they are still at risk of harm, including further exploitation, due to their vulnerability, high rates of victim sensitivity, and the mental health consequences of their traumatic experiences. While some argue that the benefits of sublimation and art therapy for human trafficking survivors make sharing their art worth the risk, anti-trafficking organizations and supporters of such art exhibitions have responsibilities to be trauma informed. © 2017 American Medical Association. All Rights Reserved.

  12. Aphid Heritable Symbiont Exploits Defensive Mutualism.

    Science.gov (United States)

    Doremus, Matthew R; Oliver, Kerry M

    2017-04-15

    Insects and other animals commonly form symbioses with heritable bacteria, which can exert large influences on host biology and ecology. The pea aphid, Acyrthosiphon pisum , is a model for studying effects of infection with heritable facultative symbionts (HFS), and each of its seven common HFS species has been reported to provide resistance to biotic or abiotic stresses. However, one common HFS, called X-type, rarely occurs as a single infection in field populations and instead typically superinfects individual aphids with Hamiltonella defensa , another HFS that protects aphids against attack by parasitic wasps. Using experimental aphid lines comprised of all possible infection combinations in a uniform aphid genotype, we investigated whether the most common strain of X-type provides any of the established benefits associated with aphid HFS as a single infection or superinfection with H. defensa We found that X-type does not confer protection to any tested threats, including parasitoid wasps, fungal pathogens, or thermal stress. Instead, component fitness assays identified large costs associated with X-type infection, costs which were ameliorated in superinfected aphids. Together these findings suggest that X-type exploits the aphid/ H. defensa mutualism and is maintained primarily as a superinfection by "hitchhiking" via the mutualistic benefits provided by another HFS. Exploitative symbionts potentially restrict the functions and distributions of mutualistic symbioses with effects that extend to other community members. IMPORTANCE Maternally transmitted bacterial symbionts are widespread and can have major impacts on the biology of arthropods, including insects of medical and agricultural importance. Given that host fitness and symbiont fitness are tightly linked, inherited symbionts can spread within host populations by providing beneficial services. Many insects, however, are frequently infected with multiple heritable symbiont species, providing potential

  13. Geothermal resources: exploration and exploitation. A bibliography

    Energy Technology Data Exchange (ETDEWEB)

    1976-07-01

    This comprehensive bibliography contains 5476 citations of foreign and domestic research reports, journal articles, patents, conference proceedings, and books concerned with the exploration and exploitation of geothermal resources. The coverage dates back as far as useful references could be obtained and extends through June 1976. References are arranged in broad subject categories and are made up of complete bibliographic citations. These are followed by a listing of subject descriptors used to describe the subject content of each reference. Four indexes are included: Corporate, Personal Author, Subject, and Report Number. Also included is a list of journals from which articles were selected. (LBS)

  14. Oscillators and crank turning: exploiting natural dynamics with a humanoid robot arm.

    Science.gov (United States)

    Williamson, Matthew M

    2003-10-15

    This paper presents an approach to robot-arm control that exploits the natural dynamics of the arm. This is in contrast to traditional approaches, which either ignore or cancel out arm dynamics. While the traditional approaches are more general, they often result in systems and robot designs that are not robust. The alternative approach gives systems that are computationally simple, robust to variation in system parameters, robust to changes in the dynamics themselves, and versatile. The approach is examined using the example of a compliant robot arm, controlled by independent neural oscillators, in a crank-turning task. A model is constructed, and the robot behaviour compared with the model. These data show that the arm-oscillator system is exploiting the natural dynamics by finding and exciting the resonant mode of the underlying mechanical system. Since this is a natural behaviour of the system, the robot behaviour is robust. The paper concludes by discussing the opportunities and limitations of this approach.

  15. Exploiting olfactory learning in alien rats to protect birds' eggs.

    Science.gov (United States)

    Price, Catherine J; Banks, Peter B

    2012-11-20

    Predators must ignore unhelpful background "noise" within information-rich environments and focus on useful cues of prey activity to forage efficiently. Learning to disregard unrewarding cues should happen quickly, weakening future interest in the cue. Prey odor, which is rapidly investigated by predators, may be particularly appropriate for testing whether consistently unrewarded cues are ignored, and whether such behavior can be exploited to benefit prey. Using wild free-ranging populations of black rats, Rattus rattus, an alien predator of global concern, we tested whether the application of bird-nesting odors before the introduction of artificial nests (odor preexposure), enhanced the survival of birds eggs (prey) compared with areas where prey and nesting odors were introduced concurrently. In areas where predators had encountered prey odor before prey being available, the subsequently introduced eggs showed 62% greater survival than in areas where prey and odor were introduced together. We suggest that black rats preexposed to prey odor learned to ignore the unrewarding cue, leading to a significant improvement in prey survival that held for the 7-d monitoring period. Exploiting rapid learning that underpins foraging decisions by manipulating sensory contexts offers a nonlethal, but effective approach to reducing undesirable predatory impacts. Techniques based on olfactory preexposure may provide prey with protection during critical periods of vulnerability, such as immediately following a prey reintroduction. These results also highlight the potential benefits to species conservation to be gained from a greater understanding of the cognitive mechanisms driving alien predator behavior within ecological contexts.

  16. Exploiting olfactory learning in alien rats to protect birds’ eggs

    Science.gov (United States)

    Price, Catherine J.; Banks, Peter B.

    2012-01-01

    Predators must ignore unhelpful background “noise” within information-rich environments and focus on useful cues of prey activity to forage efficiently. Learning to disregard unrewarding cues should happen quickly, weakening future interest in the cue. Prey odor, which is rapidly investigated by predators, may be particularly appropriate for testing whether consistently unrewarded cues are ignored, and whether such behavior can be exploited to benefit prey. Using wild free-ranging populations of black rats, Rattus rattus, an alien predator of global concern, we tested whether the application of bird-nesting odors before the introduction of artificial nests (odor preexposure), enhanced the survival of birds eggs (prey) compared with areas where prey and nesting odors were introduced concurrently. In areas where predators had encountered prey odor before prey being available, the subsequently introduced eggs showed 62% greater survival than in areas where prey and odor were introduced together. We suggest that black rats preexposed to prey odor learned to ignore the unrewarding cue, leading to a significant improvement in prey survival that held for the 7-d monitoring period. Exploiting rapid learning that underpins foraging decisions by manipulating sensory contexts offers a nonlethal, but effective approach to reducing undesirable predatory impacts. Techniques based on olfactory preexposure may provide prey with protection during critical periods of vulnerability, such as immediately following a prey reintroduction. These results also highlight the potential benefits to species conservation to be gained from a greater understanding of the cognitive mechanisms driving alien predator behavior within ecological contexts. PMID:23071301

  17. Compressed sensing MRI exploiting complementary dual decomposition.

    Science.gov (United States)

    Park, Suhyung; Park, Jaeseok

    2014-04-01

    Compressed sensing (CS) MRI exploits the sparsity of an image in a transform domain to reconstruct the image from incoherently under-sampled k-space data. However, it has been shown that CS suffers particularly from loss of low-contrast image features with increasing reduction factors. To retain image details in such degraded experimental conditions, in this work we introduce a novel CS reconstruction method exploiting feature-based complementary dual decomposition with joint estimation of local scale mixture (LSM) model and images. Images are decomposed into dual block sparse components: total variation for piecewise smooth parts and wavelets for residuals. The LSM model parameters of residuals in the wavelet domain are estimated and then employed as a regional constraint in spatially adaptive reconstruction of high frequency subbands to restore image details missing in piecewise smooth parts. Alternating minimization of the dual image components subject to data consistency is performed to extract image details from residuals and add them back to their complementary counterparts while the LSM model parameters and images are jointly estimated in a sequential fashion. Simulations and experiments demonstrate the superior performance of the proposed method in preserving low-contrast image features even at high reduction factors. Copyright © 2014 Elsevier B.V. All rights reserved.

  18. ROUNDTABLE - SESSION 2 EXPLOITATION, CONSERVATION AND LEGISLATION

    Directory of Open Access Journals (Sweden)

    EDSMAN L.

    2004-01-01

    Full Text Available The link between socioeconomics and conservation and the role of legislation in conservation work was discussed in the group with participants from nine European countries. Interest and knowledge among the general public, stakeholders and managers is the key to successful conservation of native crayfish species. Exploitation and conservation do not necessarily exclude each other. A controlled fishery, where it can be sustained, may be an essential tool for conservation by increasing the general awareness and involving more people in the task of protecting the native crayfish species. This strategy is mainly possible for the noble crayfish in the northern part of its distribution, where strong traditions connected to crayfish also exist. A balance between utilisation and overexploitation has to be found and local guidelines for sustainable exploitation produced. Media, the Internet and educational material aimed at schools and stakeholders are excellent ways of reaching a wide audience with information. Universal objectives, rules and regulations at the European level are desirable and the noble crayfish and the stone crayfish should be included in Annex II of the Habitat Directive. Based on this framework detailed regulations are best worked out at the national level, considering the specific crayfish situation in the country. Information about the legislation, the purpose of the legislation and the consequences when not obeying it should be distributed. Stricter regulation of the trade with live alien crayfish is vital because of the associated risk of introducing new diseases and species.

  19. Exploiting time in electronic health record correlations.

    Science.gov (United States)

    Hripcsak, George; Albers, David J; Perotte, Adler

    2011-12-01

    To demonstrate that a large, heterogeneous clinical database can reveal fine temporal patterns in clinical associations; to illustrate several types of associations; and to ascertain the value of exploiting time. Lagged linear correlation was calculated between seven clinical laboratory values and 30 clinical concepts extracted from resident signout notes from a 22-year, 3-million-patient database of electronic health records. Time points were interpolated, and patients were normalized to reduce inter-patient effects. The method revealed several types of associations with detailed temporal patterns. Definitional associations included low blood potassium preceding 'hypokalemia.' Low potassium preceding the drug spironolactone with high potassium following spironolactone exemplified intentional and physiologic associations, respectively. Counterintuitive results such as the fact that diseases appeared to follow their effects may be due to the workflow of healthcare, in which clinical findings precede the clinician's diagnosis of a disease even though the disease actually preceded the findings. Fully exploiting time by interpolating time points produced less noisy results. Electronic health records are not direct reflections of the patient state, but rather reflections of the healthcare process and the recording process. With proper techniques and understanding, and with proper incorporation of time, interpretable associations can be derived from a large clinical database. A large, heterogeneous clinical database can reveal clinical associations, time is an important feature, and care must be taken to interpret the results.

  20. PROBA-V Mission Exploitation Platform

    Directory of Open Access Journals (Sweden)

    Erwin Goor

    2016-07-01

    Full Text Available As an extension of the PROBA-Vegetation (PROBA-V user segment, the European Space Agency (ESA, de Vlaamse Instelling voor Technologisch Onderzoek (VITO, and partners TRASYS and Spacebel developed an operational Mission Exploitation Platform (MEP to drastically improve the exploitation of the PROBA-V Earth Observation (EO data archive, the archive from the historical SPOT-VEGETATION mission, and derived products by researchers, service providers, and thematic users. The analysis of the time series of data (petabyte range is addressed, as well as the large scale on-demand processing of the complete archive, including near real-time data. The platform consists of a private cloud environment, a Hadoop-based processing environment and a data manager. Several applications are released to the users, e.g., a full resolution viewing service, a time series viewer, pre-defined on-demand processing chains, and virtual machines with powerful tools and access to the data. After an initial release in January 2016 a research platform was deployed gradually, allowing users to design, debug, and test applications on the platform. From the PROBA-V MEP, access to, e.g., Sentinel-2 and Sentinel-3 data will be addressed as well.

  1. Commercial Sexual Exploitation and Sex Trafficking of Children and Adolescents: A Narrative Review.

    Science.gov (United States)

    Barnert, Elizabeth; Iqbal, Zarah; Bruce, Janine; Anoshiravani, Arash; Kolhatkar, Gauri; Greenbaum, Jordan

    Commercial sexual exploitation and sex trafficking of children and adolescents represent a severe form of child abuse and an important pediatric health concern. Youth who are commercially sexually exploited have a constellation of clinical risk factors and high rates of unmet physical and mental health needs, including conditions that directly result from their victimization. Common physical health needs among commercially sexually exploited children and adolescents include violence-related injuries, pregnancy, sexually transmitted infections, and other acute infections. Common mental health conditions include substance use disorders, post-traumatic stress disorder, depression and suicidality, and anxiety. The existing literature indicates that trauma-informed approaches to the care of commercially sexually exploited youth are recommended in all aspects of their health care delivery. Additionally, medical education that attunes providers to identify and appropriately respond to the unique needs of this highly vulnerable group of children and adolescents is needed. The available research on commercial sexual exploitation and sex trafficking of children and adolescents remains fairly limited, yet is expanding rapidly. Especially relevant to the field of pediatrics, future research to guide health professionals in how best to identify and care for commercially sexually exploited children and adolescents in the clinical setting signifies a key gap in the extant literature and an important opportunity for future study. Copyright © 2017 Academic Pediatric Association. Published by Elsevier Inc. All rights reserved.

  2. Ethics position towards the exploitation of manganese material in Oenbit Village, East Nusa Tenggara, Indonesia

    Science.gov (United States)

    Fios, Frederikus

    2017-04-01

    Oenbit village is an area that is located in the district of Timor Tengah Utara (TTU), Timor Island, East Nusa Tenggara Province, Indonesia. In Oenbit ongoing a conflict between the economic interests of some parties namely the government, corporation and the local indigenous community. Government of Timor Tengah Utara give legal permission to the Elgari Resources Indonesia (ERI) Company to exploit the mining of Manganese in Oenbit Village which informally is the ancestral land of indigenous peoples Oenbit hereditary called pusuf kelef and Kot-tau niap-tau (king land). Oenbit society has an ethical belief that the ancestral land Oenbit should not be produced by outside parties besides the local community on the orders of the king. Manganese exploitation in Oenbit Village cause problems contradictorily interesting to reflect on the ethical-philosophical. This paper aims to reflect the ethical position against cases of exploitation of manganese in the Oenbit Village with focuses on the local government’s decision to issue a permit exploitation and ERI Company exploit Mangan assumed unethical traditional indigenous tribe Oenbit. The study found that the district government and ERI Company has violated the public ethics and society traditional law, especially the rights of local indigenous communities by exploiting manganese material. The method used is the reflection of philosophy with ethical approaches and relevant ethical theories.

  3. A Primer on Foraging and the Explore/Exploit Trade-Off for Psychiatry Research.

    Science.gov (United States)

    Addicott, M A; Pearson, J M; Sweitzer, M M; Barack, D L; Platt, M L

    2017-09-01

    Foraging is a fundamental behavior, and many types of animals appear to have solved foraging problems using a shared set of mechanisms. Perhaps the most common foraging problem is the choice between exploiting a familiar option for a known reward and exploring unfamiliar options for unknown rewards-the so-called explore/exploit trade-off. This trade-off has been studied extensively in behavioral ecology and computational neuroscience, but is relatively new to the field of psychiatry. Explore/exploit paradigms can offer psychiatry research a new approach to studying motivation, outcome valuation, and effort-related processes, which are disrupted in many mental and emotional disorders. In addition, the explore/exploit trade-off encompasses elements of risk-taking and impulsivity-common behaviors in psychiatric disorders-and provides a novel framework for understanding these behaviors within an ecological context. Here we explain relevant concepts and some common paradigms used to measure explore/exploit decisions in the laboratory, review clinically relevant research on the neurobiology and neuroanatomy of explore/exploit decision making, and discuss how computational psychiatry can benefit from foraging theory.

  4. Virtual Exploitation Environment Demonstration for Atmospheric Missions

    Science.gov (United States)

    Natali, Stefano; Mantovani, Simone; Hirtl, Marcus; Santillan, Daniel; Triebnig, Gerhard; Fehr, Thorsten; Lopes, Cristiano

    2017-04-01

    The scientific and industrial communities are being confronted with a strong increase of Earth Observation (EO) satellite missions and related data. This is in particular the case for the Atmospheric Sciences communities, with the upcoming Copernicus Sentinel-5 Precursor, Sentinel-4, -5 and -3, and ESA's Earth Explorers scientific satellites ADM-Aeolus and EarthCARE. The challenge is not only to manage the large volume of data generated by each mission / sensor, but to process and analyze the data streams. Creating synergies among the different datasets will be key to exploit the full potential of the available information. As a preparation activity supporting scientific data exploitation for Earth Explorer and Sentinel atmospheric missions, ESA funded the "Technology and Atmospheric Mission Platform" (TAMP) [1] [2] project; a scientific and technological forum (STF) has been set-up involving relevant European entities from different scientific and operational fields to define the platforḿs requirements. Data access, visualization, processing and download services have been developed to satisfy useŕs needs; use cases defined with the STF, such as study of the SO2 emissions for the Holuhraun eruption (2014) by means of two numerical models, two satellite platforms and ground measurements, global Aerosol analyses from long time series of satellite data, and local Aerosol analysis using satellite and LIDAR, have been implemented to ensure acceptance of TAMP by the atmospheric sciences community. The platform pursues the "virtual workspace" concept: all resources (data, processing, visualization, collaboration tools) are provided as "remote services", accessible through a standard web browser, to avoid the download of big data volumes and for allowing utilization of provided infrastructure for computation, analysis and sharing of results. Data access and processing are achieved through standardized protocols (WCS, WPS). As evolution toward a pre

  5. Total exploitation of an ornamental granite quarry

    Directory of Open Access Journals (Sweden)

    Taboada, J.

    2005-09-01

    Full Text Available In this paper we propose a methodology to estimate the recovery percentage for each of the products which can be obtained from the exploitation of an ornamental granite quarry: block, semiblock, masonry-transverse stone, and the smaller materials that can be used to obtain construction aggregates. This methodology ensures that quarry exploitation is exhaustive, thereby minimising the production of spoils and the consequent negative impact on the environment. The analysis is based on a detailed and exhaustive compilation of discontinuity data from the research fronts, which are then interpreted statistically and projected over the three weakness planes that are a particular feature of ornamental granite deposits. Using this information, and bearing in mind the minimum commercially viable sizes for each kind of granite, the corresponding recovery rates are calculated for each material in each plane. The results are then integrated using spatial techniques, and the result is an evaluation of quarry contents with a view to total exploitation. This methodology was applied to a quarry in the opening phase in order to carry out an a priori assessment of the economic feasibility of the quarry.

    En este trabajo se propone una metodología para estimar el porcentaje de recuperación de cada uno de los productos que se pueden obtener en la explotación de una cantera de granito ornamental: bloque, semibloque, manpostería y per piaños, y material restante destinado a la obtención de áridos. De esta manera se logra un aprovechamiento integral de la cantera, evitándose la generación de estériles y el subsiguiente impacto ambiental producido por éstos. La metodología de análisis se basa en la recopilación detallada y exhaustiva de datos de discontinuidades en los frentes de investigación, que se interpretan estadísticamente y se proyectan sobre los tres planos de debilidad propios del granito ornamental. Con esta información, y las

  6. A TV flow based local scale estimate and its application to texture discrimination

    OpenAIRE

    Brox, Thomas; Weickert, Joachim

    2005-01-01

    This paper presents a local region based scale measure, which exploits properties of a certain type of nonlinear diffusion, the so-called total variation (TV) flow. During the signal evolution by means of TV flow, pixels change their value with a speed that is inversely proportional to the size of the region they belong to. From this evolution speed one can derive a local scale estimate based on regions instead of derivative filters. Main motivation for such a scale measure is its application...

  7. Transformation of Commercial Flows into Physical Flows of Electricity – Flow Based Method

    Directory of Open Access Journals (Sweden)

    M. Adamec

    2009-01-01

    Full Text Available We are witnesses of large – scale electricity transport between European countries under the umbrella of the UCTE organization. This is due to the inabilyof generators to satisfy the growing consumption in some regions. In this content, we distinguish between two types of flow. The first type is physical flow, which causes costs in the transmission grid, whilst the second type is commercial flow, which provides revenues for the market participants. The old methods for allocating transfer capacity fail to take this duality into account. The old methods that allocate transmission border capacity to “virtual” commercial flows which, in fact, will not flow over this border, do not lead to optimal allocation. Some flows are uselessly rejected and conversely, some accepted flows can cause congestion on another border. The Flow Based Allocation method (FBA is a method which aims to solve this problem.Another goal of FBA is to ensure sustainable development of expansion of transmission capacity. Transmission capacity is important, because it represents a way to establish better transmission system stability, and it provides a distribution channel for electricity to customers abroad. For optimal development, it is necessary to ensure the right division of revenue allocation among the market participants.This paper contains a brief description of the FBA method. Problems of revenue maximization and optimal revenue distribution are mentioned. 

  8. A novel flow-based procedure for automation of respirometric assays in soils.

    Science.gov (United States)

    Silva, Claudineia R; Oliveira, Eliezer; Zagatto, Elias A G; Henriquez, Camelia

    2016-09-01

    A flow-based strategy involving a gas-diffusion sampling probe was proposed for evaluating the respiration rate in soils. The amount of CO2 collected after a pre-defined time interval was proportional to the free CO2 released by the soil ecosystem. The 500-mL incubation flasks typically used for soil respirometric assays were adapted and a special cover was designed for connecting a tubular gas diffusion membrane, a fan, and a septum for adding the CO2(g) standards required for calibration. The method relied on the pH-dependent absorbance variations resulting from the CO2 collection. A 1.3mmolL(-1) bromothymol blue solution (pH 7.0) acted as both acceptor and carrier streams. In order to widen the dynamical working range to 0.003-0.2mmol CO2, two analytical curves were obtained, each related to a different time interval for the CO2 collection. Kinetic curves related to CO2 release by the soil samples were straightforwardly attained. Repeatability and detection limit were estimated as 2.0% and 0.001mmol CO2 (n=10), and accuracy was assessed in relation to a recommended titrimetric procedure. Copyright © 2016 Elsevier B.V. All rights reserved.

  9. Flow-based impedimetric immunosensor for aflatoxin analysis in milk products.

    Science.gov (United States)

    Kanungo, Lizy; Bacher, Gautam; Bhand, Sunil

    2014-10-01

    Label-free detection technique based on impedance was investigated for aflatoxin M1 (AFM1) and aflatoxin M2 (AFM2) analysis in milk products. The impedance change resulting from antigen-antibody interaction was studied using a two-electrode setup made up of silver (Ag) wire. Processed milk such as drinking yogurt and flavored milk samples were analyzed in a flow-based setup. Two microflow pumps were used to construct the flow system where analytes (AFM1 and AFM2) were injected and impedance was measured using functionalized Ag wire electrodes. The flow system was optimized by adjusting both inlet and outlet flows to maintain the reaction volume optimum for impedance measurements. Using Bode plot, the matrix effect was investigated for detection of AFM1 and AFM2 in various matrices. Good recoveries were obtained even at low-AFM1 concentrations in the range of 1-100 pg/mL. The influence of AFM2 on the detection of AFM1 was also investigated. The proposed method provides good scope for online monitoring of such hazardous toxins in milk products.

  10. Exploiting CRISPR/Cas: Interference Mechanisms and Applications

    Directory of Open Access Journals (Sweden)

    André Plagens

    2013-07-01

    Full Text Available The discovery of biological concepts can often provide a framework for the development of novel molecular tools, which can help us to further understand and manipulate life. One recent example is the elucidation of the prokaryotic adaptive immune system, clustered regularly interspaced short palindromic repeats (CRISPR/CRISPR-associated (Cas that protects bacteria and archaea against viruses or conjugative plasmids. The immunity is based on small RNA molecules that are incorporated into versatile multi-domain proteins or protein complexes and specifically target viral nucleic acids via base complementarity. CRISPR/Cas interference machines are utilized to develop novel genome editing tools for different organisms. Here, we will review the latest progress in the elucidation and application of prokaryotic CRISPR/Cas systems and discuss possible future approaches to exploit the potential of these interference machineries.

  11. Television production, Funding Models and Exploitation of Content

    Directory of Open Access Journals (Sweden)

    Gillian Doyle

    2016-07-01

    Full Text Available The rise of digital platforms has transformative implications for strategies of financing media production and for exploitation of the economic value in creative content. In the television industry, changes in technologies for distribution and the emergence of SVOD services such as Netflix are gradually shifting audiences and financial power away from broadcasters while at the same time creating unprecedented opportunities for programme-makers.  Drawing on findings from recent RCUK-funded research, this article examines how these shifts are affecting production financing and the economics of supplying television content.  In particular, it focuses on how changes in the dynamics of rights markets and in strategic approaches towards the financing of television production might mean for markets, industries and for policies intended to support the economic sustainability of independent television content production businesses.

  12. Exploiting nonlinearities of micro-machined resonators for filtering applications

    KAUST Repository

    Ilyas, Saad

    2017-06-21

    We demonstrate the exploitation of the nonlinear behavior of two electrically coupled microbeam resonators to realize a band-pass filter. More specifically, we combine their nonlinear hardening and softening responses to realize a near flat pass band filter with sharp roll-off characteristics. The device is composed of two near identical doubly clamped and electrostatically actuated microbeams made of silicon. One of the resonators is buckled via thermal loading to produce a softening frequency response. It is then further tuned to create the desired overlap with the second resonator response of hardening behavior. This overlapping improves the pass band flatness. Also, the sudden jumps due to the softening and hardening behaviors create sharp roll-off characteristics. This approach can be promising for the future generation of filters with superior characteristics.

  13. Exploiting Motion Capture to Enhance Avoidance Behaviour in Games

    Science.gov (United States)

    van Basten, Ben J. H.; Jansen, Sander E. M.; Karamouzas, Ioannis

    Realistic simulation of interacting virtual characters is essential in computer games, training and simulation applications. The problem is very challenging since people are accustomed to real-world situations and thus, they can easily detect inconsistencies and artifacts in the simulations. Over the past twenty years several models have been proposed for simulating individuals, groups and crowds of characters. However, little effort has been made to actually understand how humans solve interactions and avoid inter-collisions in real-life. In this paper, we exploit motion capture data to gain more insights into human-human interactions. We propose four measures to describe the collision-avoidance behavior. Based on these measures, we extract simple rules that can be applied on top of existing agent and force based approaches, increasing the realism of the resulting simulations.

  14. Exploiting tumor shrinkage through temporal optimization of radiotherapy

    CERN Document Server

    Unkelbach, Jan; Hong, Theodore; Papp, David; Ramakrishnan, Jagdish; Salari, Ehsan; Wolfgang, John; Bortfeld, Thomas

    2013-01-01

    In multi-stage radiotherapy, a patient is treated in several stages separated by weeks or months. This regimen has been motivated mostly by radiobiological considerations, but also provides an approach to reduce normal tissue dose by exploiting tumor shrinkage. The paper considers the optimal design of multi-stage treatments, motivated by the clinical management of large liver tumors for which normal liver dose constraints prohibit the administration of an ablative radiation dose in a single treatment. We introduce a dynamic tumor model that incorporates three factors: radiation induced cell kill, tumor shrinkage, and tumor cell repopulation. The design of multi-stage radiotherapy is formulated as a mathematical optimization problem in which the total dose to the liver is minimized, subject to delivering the prescribed dose to the tumor. Based on the model, we gain insight into the optimal administration of radiation over time, i.e. the optimal treatment gaps and dose levels. We analyze treatments consisting ...

  15. Schistosoma mansoni cercariae exploit an elastohydrodynamic coupling to swim efficiently

    CERN Document Server

    Krishnamurthy, Deepak; Bhargava, Arjun; Prakash, Manu

    2016-01-01

    The motility of many parasites is critical for the infection process of their host, as exemplified by the transmission cycle of the blood fluke Schistosoma mansoni. In their human infectious stage, immature, submillimetre-scale forms of the parasite known as cercariae swim in freshwater and infect humans by penetrating through the skin. This infection causes Schistosomiasis, a parasitic disease that is comparable to malaria in its global socio-economic impact. Given that cercariae do not feed and hence have a finite lifetime of around 12 hours, efficient motility is crucial for the parasite's survival and transmission of Schistosomiasis. However, a first-principles understanding of how cercariae swim is lacking. Via a combined experimental, theoretical and robotics based approach, we demonstrate that cercariae propel themselves against gravity by exploiting a unique elastohydrodynamic coupling. We show that cercariae beat their tail in a periodic fashion while maintaining a fixed flexibility near their poster...

  16. Exploiting existing software in libraries : successes, failures, and reasons why.

    Energy Technology Data Exchange (ETDEWEB)

    Gropp, W.

    1999-01-13

    The PETSc (Portable Extensible Tools for Scientific computing) library arose from research into domain decomposition methods which require combining many different solutions in a single application. The initial efforts tried to use existing numerical software but had limited success. The problems include everything from faulty assumptions about the computing environment (e.g., how many processes there are) to implicit (yet deadly) global state. More recently, PETSC and PVODE have found a way to cooperate, and new techniques that exploit dynamically linked libraries offer a more general approach to interoperable components. The paper highlights some of the issues in building sharable component software and discussing mistakes still often made in designing, maintaining, documenting, and testing components.

  17. Exploiting CRISPR/Cas: Interference Mechanisms and Applications

    Science.gov (United States)

    Richter, Hagen; Randau, Lennart; Plagens, André

    2013-01-01

    The discovery of biological concepts can often provide a framework for the development of novel molecular tools, which can help us to further understand and manipulate life. One recent example is the elucidation of the prokaryotic adaptive immune system, clustered regularly interspaced short palindromic repeats (CRISPR)/CRISPR-associated (Cas) that protects bacteria and archaea against viruses or conjugative plasmids. The immunity is based on small RNA molecules that are incorporated into versatile multi-domain proteins or protein complexes and specifically target viral nucleic acids via base complementarity. CRISPR/Cas interference machines are utilized to develop novel genome editing tools for different organisms. Here, we will review the latest progress in the elucidation and application of prokaryotic CRISPR/Cas systems and discuss possible future approaches to exploit the potential of these interference machineries. PMID:23857052

  18. Exploiting CRISPR/Cas systems for biotechnology.

    Science.gov (United States)

    Sampson, Timothy R; Weiss, David S

    2014-01-01

    The Cas9 endonuclease is the central component of the Type II CRISPR/Cas system, a prokaryotic adaptive restriction system against invading nucleic acids, such as those originating from bacteriophages and plasmids. Recently, this RNA-directed DNA endonuclease has been harnessed to target DNA sequences of interest. Here, we review the development of Cas9 as an important tool to not only edit the genomes of a number of different prokaryotic and eukaryotic species, but also as an efficient system for site-specific transcriptional repression or activation. Additionally, a specific Cas9 protein has been observed to target an RNA substrate, suggesting that Cas9 may have the ability to be programmed to target RNA as well. Cas proteins from other CRISPR/Cas subtypes may also be exploited in this regard. Thus, CRISPR/Cas systems represent an effective and versatile biotechnological tool, which will have significant impact on future advancements in genome engineering. © 2014 WILEY Periodicals, Inc.

  19. Exploiting HRM in support of lean manufacturing

    DEFF Research Database (Denmark)

    Jørgensen, Frances; Matthiesen, Rikke

    The purpose of this paper is to investigate the ways in HRM practices are-and could potentially be-exploited to support lean manufacturing in practice. First, a review of the pertinent literature regarding HRM, SHRM, and lean manufacturing is presented to provide an understanding of the mechanisms...... by which HRM practices could, theoretically, be used to support a lean implementation. Data presented in the paper are derived from 1) a longitudinal case study on lean implementation and 2) from managers currently involved with lean manufacturing in a second company. The relevant literature and the data......'s contribution to the change process itself and through bundling particular HRM practices that are aligned with the lean strategy. The paper contributes to both theory and practice, by suggesting specific ways in which HRM can be strategically aligned with a major change implementation such as lean manufacturing....

  20. Automatic image exploitation system for small UAVs

    Science.gov (United States)

    Heinze, N.; Esswein, M.; Krüger, W.; Saur, G.

    2008-04-01

    For surveillance and reconnaissance tasks small UAVs are of growing importance. These UAVs have an endurance of several hours, but a small payload of about some kilograms. As a consequence lightweight sensors and cameras have to be used without having a mechanical stabilized high precision sensor-platform, which would exceed the payload and cost limitations. An example of such a system is the German UAV Luna with optical and IR sensors on board. For such platforms we developed image exploitation algorithms. The algorithms comprise mosaiking, stabilization, image enhancement, video based moving target indication, and stereo-image generation. Other products are large geo-coded image mosaics, stereo mosaics, and 3-D-model generation. For test and assessment of these algorithms the experimental system ABUL has been developed, in which the algorithms are integrated. The ABUL system is used for tests and assessment by military PIs.

  1. Protocol to Exploit Waiting Resources for UASNs

    Directory of Open Access Journals (Sweden)

    Li-Ling Hung

    2016-03-01

    Full Text Available The transmission speed of acoustic waves in water is much slower than that of radio waves in terrestrial wireless sensor networks. Thus, the propagation delay in underwater acoustic sensor networks (UASN is much greater. Longer propagation delay leads to complicated communication and collision problems. To solve collision problems, some studies have proposed waiting mechanisms; however, long waiting mechanisms result in low bandwidth utilization. To improve throughput, this study proposes a slotted medium access control protocol to enhance bandwidth utilization in UASNs. The proposed mechanism increases communication by exploiting temporal and spatial resources that are typically idle in order to protect communication against interference. By reducing wait time, network performance and energy consumption can be improved. A performance evaluation demonstrates that when the data packets are large or sensor deployment is dense, the energy consumption of proposed protocol is less than that of existing protocols as well as the throughput is higher than that of existing protocols.

  2. Exploitation of bioremediation in the environment protection

    Directory of Open Access Journals (Sweden)

    Alena Luptáková

    2005-11-01

    Full Text Available Soils and waters contaminated with toxic metals pose a major environmental problem that needs an effective and affordable technological solution. Many areas remain contaminated with no remediation in sight because it is too expensive to clean them up with available technologies. Bioremediation may provide an economically viable solution for remediation of some of these sites. The bioremediation is an application of the biological treatment to the cleanup of hazardous chemicals and is an example of the environmental biotechnology. The aim of this paper is to give a theoretical and practical view concerning the possibility of the bioremediation exploitation in the environment protection. This paper includes some results of the bioremediation of the acid mine drainage by sulphate-reducing bacteria.

  3. CHARACTERISTICS OF HYDROCARBON EXPLOITATION IN ARCTIC CIRCLE

    Directory of Open Access Journals (Sweden)

    Vanja Lež

    2013-12-01

    Full Text Available The existence of large quantities of hydrocarbons is supposed within the Arctic Circle. Assumed quantities are 25% of the total undiscovered hydrocarbon reserves on Earth, mostly natural gas. Over 500 major and minor gas accumulations within the Arctic Circle were discovered so far, but apart from Snøhvit gas field, there is no commercial exploitation of natural gas from these fields. Arctic gas projects are complicated, technically hard to accomplish, and pose a great threat to the return of investment, safety of people and equipment and for the ecosystem. Russia is a country that is closest to the realization of the Arctic gas projects that are based on the giant gas fields. The most extreme weather conditions in the seas around Greenland are the reason why this Arctic region is the least explored and furthest from the realization of any gas project (the paper is published in Croatian .

  4. Performance Evaluation of a SDN/OpenFlow-Based Distributed Mobility Management (DMM) Approach in Virtualized LTE Systems

    NARCIS (Netherlands)

    Valtulina, Luca; Karimzadeh Motallebi Azar, Morteza; Karagiannis, Georgios; Heijenk, Geert; Pras, Aiko

    2014-01-01

    Currently most of the mobility management solutions rely on a centralized mobility anchor entity, which is in charge of both mobility-related control plane and user data forwarding. This makes mobility management prone to several performance limitations such as suboptimal routing, low scalability,

  5. Exploiting biased reptation for continuous flow preparative DNA fractionation in a versatile microfluidic platform

    NARCIS (Netherlands)

    Gümüscü, B.; Bomer, Johan G.; de Boer, Hans L.; van den Berg, Albert; Eijkel, Jan C.T.

    2017-01-01

    A new approach is presented for preparative, continuous flow fractionation of sub-10-kbp DNA fragments, which exploits the variation in the field-dependent mobility of the DNA molecules based on their length. Orthogonally pulsed electric fields of significantly different magnitudes are applied to a

  6. Gaming the gamer? – The ethics of exploiting psychological research in video games

    NARCIS (Netherlands)

    Soraker, Johnny

    2016-01-01

    Purpose The purpose of this paper is to investigate the ethical implications of video game companies employing psychologists and using psychological research in game design. Design/methodology/approach The author first argues that exploiting psychology in video games may be more ethically

  7. Zero day exploits and national readiness for cyber-warfare | Ibor ...

    African Journals Online (AJOL)

    A zero day vulnerability is an unknown exploit that divulges security flaws in software before such a flaw is publicly reported or announced. But how should a nation react to a zero day? This question is a concern for most national governments, and one that requires a systematic approach for its resolution. The securities of ...

  8. Empirical Analysis of Exploiting Review Helpfulness for Extractive Summarization of Online Reviews

    Science.gov (United States)

    Xiong, Wenting; Litman, Diane

    2014-01-01

    We propose a novel unsupervised extractive approach for summarizing online reviews by exploiting review helpfulness ratings. In addition to using the helpfulness ratings for review-level filtering, we suggest using them as the supervision of a topic model for sentence-level content scoring. The proposed method is metadata-driven, requiring no…

  9. Optical flow based Kalman filter for body joint prediction and tracking using HOG-LBP matching

    Science.gov (United States)

    Nair, Binu M.; Kendricks, Kimberley D.; Asari, Vijayan K.; Tuttle, Ronald F.

    2014-03-01

    We propose a real-time novel framework for tracking specific joints in the human body on low resolution imagery using optical flow based Kalman tracker without the need of a depth sensor. Body joint tracking is necessary for a variety of surveillance based applications such as recognizing gait signatures of individuals, identifying the motion patterns associated with a particular action and the corresponding interactions with objects in the scene to classify a certain activity. The proposed framework consists of two stages; the initialization stage and the tracking stage. In the initialization stage, the joints to be tracked are either manually marked or automatically obtained from other joint detection algorithms in the first few frames within a window of interest and appropriate image descriptions of each joint are computed. We employ the use of a well-known image coding scheme known as the Local Binary Patterns (LBP) to represent the joint local region where this image coding removes the variance to non-uniform lighting conditions as well as enhances the underlying edges and corner. The image descriptions of the joint region would then include a histogram computed from the LBP-coded ROI and a HOG (Histogram of Oriented Gradients) descriptor to represent the edge information. Next the tracking stage can be divided into two phases: Optical flow based detection of joints in corresponding frames of the sequence and prediction /correction phases of Kalman tracker with respect to the joint coordinates. Lucas Kanade optical flow is used to locate the individual joints in consecutive frames of the video based on their location in the previous frame. But more often, mismatches can occur due to the rotation of the joint region and the rotation variance of the optical flow matching technique. The mismatch is then determined by comparing the joint region descriptors using Chi-squared metric between a pair of frames and depending on this statistic, either the prediction

  10. A lightweight, flow-based toolkit for parallel and distributed bioinformatics pipelines

    Science.gov (United States)

    2011-01-01

    Background Bioinformatic analyses typically proceed as chains of data-processing tasks. A pipeline, or 'workflow', is a well-defined protocol, with a specific structure defined by the topology of data-flow interdependencies, and a particular functionality arising from the data transformations applied at each step. In computer science, the dataflow programming (DFP) paradigm defines software systems constructed in this manner, as networks of message-passing components. Thus, bioinformatic workflows can be naturally mapped onto DFP concepts. Results To enable the flexible creation and execution of bioinformatics dataflows, we have written a modular framework for parallel pipelines in Python ('PaPy'). A PaPy workflow is created from re-usable components connected by data-pipes into a directed acyclic graph, which together define nested higher-order map functions. The successive functional transformations of input data are evaluated on flexibly pooled compute resources, either local or remote. Input items are processed in batches of adjustable size, all flowing one to tune the trade-off between parallelism and lazy-evaluation (memory consumption). An add-on module ('NuBio') facilitates the creation of bioinformatics workflows by providing domain specific data-containers (e.g., for biomolecular sequences, alignments, structures) and functionality (e.g., to parse/write standard file formats). Conclusions PaPy offers a modular framework for the creation and deployment of parallel and distributed data-processing workflows. Pipelines derive their functionality from user-written, data-coupled components, so PaPy also can be viewed as a lightweight toolkit for extensible, flow-based bioinformatics data-processing. The simplicity and flexibility of distributed PaPy pipelines may help users bridge the gap between traditional desktop/workstation and grid computing. PaPy is freely distributed as open-source Python code at http://muralab.org/PaPy, and includes extensive

  11. A lightweight, flow-based toolkit for parallel and distributed bioinformatics pipelines

    Directory of Open Access Journals (Sweden)

    Cieślik Marcin

    2011-02-01

    Full Text Available Abstract Background Bioinformatic analyses typically proceed as chains of data-processing tasks. A pipeline, or 'workflow', is a well-defined protocol, with a specific structure defined by the topology of data-flow interdependencies, and a particular functionality arising from the data transformations applied at each step. In computer science, the dataflow programming (DFP paradigm defines software systems constructed in this manner, as networks of message-passing components. Thus, bioinformatic workflows can be naturally mapped onto DFP concepts. Results To enable the flexible creation and execution of bioinformatics dataflows, we have written a modular framework for parallel pipelines in Python ('PaPy'. A PaPy workflow is created from re-usable components connected by data-pipes into a directed acyclic graph, which together define nested higher-order map functions. The successive functional transformations of input data are evaluated on flexibly pooled compute resources, either local or remote. Input items are processed in batches of adjustable size, all flowing one to tune the trade-off between parallelism and lazy-evaluation (memory consumption. An add-on module ('NuBio' facilitates the creation of bioinformatics workflows by providing domain specific data-containers (e.g., for biomolecular sequences, alignments, structures and functionality (e.g., to parse/write standard file formats. Conclusions PaPy offers a modular framework for the creation and deployment of parallel and distributed data-processing workflows. Pipelines derive their functionality from user-written, data-coupled components, so PaPy also can be viewed as a lightweight toolkit for extensible, flow-based bioinformatics data-processing. The simplicity and flexibility of distributed PaPy pipelines may help users bridge the gap between traditional desktop/workstation and grid computing. PaPy is freely distributed as open-source Python code at http://muralab.org/PaPy, and

  12. A lightweight, flow-based toolkit for parallel and distributed bioinformatics pipelines.

    Science.gov (United States)

    Cieślik, Marcin; Mura, Cameron

    2011-02-25

    Bioinformatic analyses typically proceed as chains of data-processing tasks. A pipeline, or 'workflow', is a well-defined protocol, with a specific structure defined by the topology of data-flow interdependencies, and a particular functionality arising from the data transformations applied at each step. In computer science, the dataflow programming (DFP) paradigm defines software systems constructed in this manner, as networks of message-passing components. Thus, bioinformatic workflows can be naturally mapped onto DFP concepts. To enable the flexible creation and execution of bioinformatics dataflows, we have written a modular framework for parallel pipelines in Python ('PaPy'). A PaPy workflow is created from re-usable components connected by data-pipes into a directed acyclic graph, which together define nested higher-order map functions. The successive functional transformations of input data are evaluated on flexibly pooled compute resources, either local or remote. Input items are processed in batches of adjustable size, all flowing one to tune the trade-off between parallelism and lazy-evaluation (memory consumption). An add-on module ('NuBio') facilitates the creation of bioinformatics workflows by providing domain specific data-containers (e.g., for biomolecular sequences, alignments, structures) and functionality (e.g., to parse/write standard file formats). PaPy offers a modular framework for the creation and deployment of parallel and distributed data-processing workflows. Pipelines derive their functionality from user-written, data-coupled components, so PaPy also can be viewed as a lightweight toolkit for extensible, flow-based bioinformatics data-processing. The simplicity and flexibility of distributed PaPy pipelines may help users bridge the gap between traditional desktop/workstation and grid computing. PaPy is freely distributed as open-source Python code at http://muralab.org/PaPy, and includes extensive documentation and annotated usage

  13. Exploiting quality and texture features to estimate age and gender from fingerprints

    Science.gov (United States)

    Marasco, Emanuela; Lugini, Luca; Cukic, Bojan

    2014-05-01

    Age and gender of an individual, when available, can contribute to identification decisions provided by primary biometrics and help improve matching performance. In this paper, we propose a system which automatically infers age and gender from the fingerprint image. Current approaches for predicting age and gender generally exploit features such as ridge count, and white lines count that are manually extracted. Existing automated approaches have significant limitations in accuracy especially when dealing with data pertaining to elderly females. The model proposed in this paper exploits image quality features synthesized from 40 different frequency bands, and image texture properties captured using the Local Binary Pattern (LBP) and the Local Phase Quantization (LPQ) operators. We evaluate the performance of the proposed approach using fingerprint images collected from 500 users with an optical sensor. The approach achieves prediction accuracy of 89.1% for age and 88.7% for gender.

  14. Mission Exploitation Platform PROBA-V

    Science.gov (United States)

    Goor, Erwin

    2016-04-01

    VITO and partners developed an end-to-end solution to drastically improve the exploitation of the PROBA-V EO-data archive (http://proba-v.vgt.vito.be/), the past mission SPOT-VEGETATION and derived vegetation parameters by researchers, service providers and end-users. The analysis of time series of data (+1PB) is addressed, as well as the large scale on-demand processing of near real-time data. From November 2015 an operational Mission Exploitation Platform (MEP) PROBA-V, as an ESA pathfinder project, will be gradually deployed at the VITO data center with direct access to the complete data archive. Several applications will be released to the users, e.g. - A time series viewer, showing the evolution of PROBA-V bands and derived vegetation parameters for any area of interest. - Full-resolution viewing services for the complete data archive. - On-demand processing chains e.g. for the calculation of N-daily composites. - A Virtual Machine will be provided with access to the data archive and tools to work with this data, e.g. various toolboxes and support for R and Python. After an initial release in January 2016, a research platform will gradually be deployed allowing users to design, debug and test applications on the platform. From the MEP PROBA-V, access to Sentinel-2 and landsat data will be addressed as well, e.g. to support the Cal/Val activities of the users. Users can make use of powerful Web based tools and can self-manage virtual machines to perform their work on the infrastructure at VITO with access to the complete data archive. To realise this, private cloud technology (openStack) is used and a distributed processing environment is built based on Hadoop. The Hadoop ecosystem offers a lot of technologies (Spark, Yarn, Accumulo, etc.) which we integrate with several open-source components. The impact of this MEP on the user community will be high and will completely change the way of working with the data and hence open the large time series to a larger

  15. EM-based optimization exploiting partial space mapping and exact sensitivities

    DEFF Research Database (Denmark)

    Bandler, John W.; Mohamed, Achmed S.; Bakr, Mohamed H.

    2002-01-01

    We present a family of robust techniques for exploiting sensitivities in electromagnetic (EM)-based circuit optimization through space mapping (SM) technology. We utilize derivative information for parameter extractions and mapping updates. We exploit a partial SM (PSM) concept, where a reduced set...... of parameters is sufficient for parameter extraction optimization. It reflects the idea of tuning and execution time is reduced. Upfront gradients of both EM (fine) model and coarse surrogates can initialize possible mapping approximations. We introduce several effective approaches for updating the mapping...

  16. Shale Gas Exploration and Exploitation Induced Risks - SHEER

    Science.gov (United States)

    Capuano, Paolo; Orlecka-Sikora, Beata; Lasocki, Stanislaw; Cesca, Simone; Gunning, Andrew; jaroslawsky, Janusz; Garcia-Aristizabal, Alexander; Westwood, Rachel; Gasparini, Paolo

    2017-04-01

    Shale gas operations may affect the quality of air, water and landscapes; furthermore, it can induce seismic activity, with the possible impacts on the surrounding infrastructure. The SHEER project aims at setting up a probabilistic methodology to assess and mitigate the short and the long term environmental risks connected to the exploration and exploitation of shale gas. In particular we are investigating risks associated with groundwater contamination, air pollution and induced seismicity. A shale gas test site located in Poland (Wysin) has been monitored before, during and after the fracking operations with the aim of assessing environmental risks connected with groundwater contamination, air pollution and earthquakes induced by fracking and injection of waste water. The severity of each of these hazards depends strongly on the unexpected enhanced permeability pattern, which may develop as an unwanted by-product of the fracking processes and may become pathway for gas and fluid migration towards underground water reservoirs or the surface. The project is devoted to monitor and understand how far this enhanced permeability pattern develops both in space and time. The considered hazards may be at least partially inter-related as they all depend on this enhanced permeability pattern. Therefore they are being approached from a multi-hazard, multi parameter perspective. We expect to develop methodologies and procedures to track and model fracture evolution around shale gas exploitation sites and a robust statistically based, multi-parameter methodology to assess environmental impacts and risks across the operational lifecycle of shale gas. The developed methodologies are going to be applied and tested on a comprehensive database consisting of seismicity, changes of the quality of ground-waters and air, ground deformations, and operational data collected from the ongoing monitoring episode (Wysin) and past episodes: Lubocino (Poland), Preese Hall (UK), Oklahoma (USA

  17. Tonic dopamine modulates exploitation of reward learning

    Directory of Open Access Journals (Sweden)

    Jeff A Beeler

    2010-11-01

    Full Text Available The impact of dopamine on adaptive behavior in a naturalistic environment is largely unexamined. Experimental work suggests that phasic dopamine is central to reinforcement learning whereas tonic dopamine may modulate performance without altering learning per se; however, this idea has not been developed formally or integrated with computational models of dopamine function. We quantitatively evaluate the role of tonic dopamine in these functions by studying the behavior of hyperdopaminergic DAT knockdown mice in an instrumental task in a semi-naturalistic homecage environment. In this closed economy paradigm, subjects earn all of their food by pressing either of two levers, but the relative cost for food on each lever shifts frequently. Compared to wild-type mice, hyperdopaminergic mice allocate more lever presses on high-cost levers, thus working harder to earn a given amount of food and maintain their body weight. However, both groups show a similarly quick reaction to shifts in lever cost, suggesting that the hyperdominergic mice are not slower at detecting changes, as with a learning deficit. We fit the lever choice data using reinforcement learning models to assess the distinction between acquisition and expression the models formalize. In these analyses, hyperdopaminergic mice displayed normal learning from recent reward history but diminished capacity to exploit this learning: a reduced coupling between choice and reward history. These data suggest that dopamine modulates the degree to which prior learning biases action selection and consequently alters the expression of learned, motivated behavior.

  18. Efficient Media Exploitation Towards Collective Intelligence

    Science.gov (United States)

    Mylonas, Phivos; Solachidis, Vassilios; Geyer-Schulz, Andreas; Hoser, Bettina; Chapman, Sam; Ciravegna, Fabio; Staab, Steffen; Smrz, Pavel; Kompatsiaris, Yiannis; Avrithis, Yannis

    In this work we propose intelligent, automated content analysis techniques for different media to extract knowledge from the multimedia content. Information derived from different sources/modalities will be analyzed and fused, in terms of spatiotemporal, personal and even social contextual information. In order to achieve this goal, semantic analysis will be applied to the content items, taking into account the content itself (e.g., text, images and video), as well as existing personal, social and contextual information (e.g., semantic and machine-processable metadata and tags). The above process exploits the so-called “Media Intelligence” towards the ultimate goal of identifying “Collective Intelligence”, emerging from the collaboration and competition among people, empowering innovative services and user interactions. The utilization of “Media Intelligence” constitutes a departure from traditional methods for information sharing, since semantic multimedia analysis has to fuse information from both the content itself and the social context, while at the same time the social dynamics have to be taken into account. Such intelligence provides added-value to the available multimedia content and renders existing procedures and research efforts more efficient.

  19. Exploitation of parallelism in climate models

    Energy Technology Data Exchange (ETDEWEB)

    Baer, F.; Tribbia, J.J.; Williamson, D.L.

    1992-01-01

    The US Department of Energy (DOE) through its CHAMMP initiative, hopes to develop the capability to make meaningful regional climate forecasts on time scales exceeding a decade, such capability to be based on numerical prediction type models. We propose research to contribute to each of the specific items enumerated in the CHAMMP announcement (Notice 9103); i.e., to consider theoretical limits to prediction of climate and climate change on appropriate time scales, to develop new mathematical techniques to utilize massively parallel processors (MPP), to actually utilize MPP's as a research tool, and to develop improved representations of some processes essential to climate prediction. To explore these initiatives, we will exploit all available computing technology, and in particular MPP machines. We anticipate that significant improvements in modeling of climate on the decadal and longer time scales for regional space scales will result from our efforts. This report summarizes the activities of our group during a part of the first year's effort to meet the objectives stated in our proposal. We will comment on three research foci, time compression studies, subgrid scale model studies, and distributed climate ensemble studies and additional significant technical matters.

  20. The Spanish network for Gaia Science Exploitation

    Science.gov (United States)

    Figueras, F.; Jordi, C.; Luri, X.; Torra, J.; REG Executive Committee Team; Gaia UB Team

    2017-03-01

    The ''Red Española de Explotación Científica de Gaia'' (REG) continues to intensify its activities facing the imminent publication of the first and second Gaia data releases (14 September, 2016 and Q4-2017, respectively). The network, supported by the MINECO under contract Acciones de dinamizaci ´on, Redes de Excelencia (2016-2017), has as major priority the task to coordinate and support the collective activities developed by its more than 150 members. At present, REG plays a prominent role in the preparation of the Spanish community for the use of the Gaia data archive (a task lead by the Spanish team), in the work to exploit the Gaia-ESO survey collected during the last four years and in supporting the preparation of the science case and survey plan for WEAVE, the new multi-object spectrograph for the WHT at Canary Islands (commissioning, 2018). These activities are described together with the schedule of future national and international science meetings and the outreach activities being organized for the first and second Data Releases

  1. Understanding Online Child Sexual Exploitation Offenses.

    Science.gov (United States)

    Ly, Thanh; Murphy, Lisa; Fedoroff, J Paul

    2016-08-01

    In the past three decades, there has been an exponential increase in the worldwide availability of Internet access and devices that are able to access online materials. This literature review investigated whether increased accessibility of Internet child pornography (CP) increases the risk of in-person child sexual exploitation. The current review found little to no evidence that availability of the Internet has increased the worldwide incidence or prevalence of in-person child sexual abuse. In fact, during the time period in which the Internet has flourished, international crime statistics have shown a steady decrease of in-person child sexual abuse. The only exception to this trend is an increase in Internet child pornography or luring offenses (e.g., Stats Can, 2014), which involves child abuse by definition. This article reviews the impact of the Internet on child sexual abuse. It also reviews the characteristics of online CP offenders. Treatment of these offenders and prevention of such offenses is also discussed.

  2. Exploiting epigenetic vulnerabilities for cancer therapeutics.

    Science.gov (United States)

    Mair, Barbara; Kubicek, Stefan; Nijman, Sebastian M B

    2014-03-01

    Epigenetic deregulation is a hallmark of cancer, and there has been increasing interest in therapeutics that target chromatin-modifying enzymes and other epigenetic regulators. The rationale for applying epigenetic drugs to treat cancer is twofold. First, epigenetic changes are reversible, and drugs could therefore be used to restore the normal (healthy) epigenetic landscape. However, it is unclear whether drugs can faithfully restore the precancerous epigenetic state. Second, chromatin regulators are often mutated in cancer, making them attractive drug targets. However, in most instances it is unknown whether cancer cells are addicted to these mutated chromatin proteins, or whether their mutation merely results in epigenetic instability conducive to the selection of secondary aberrations. An alternative incentive for targeting chromatin regulators is the exploitation of cancer-specific vulnerabilities, including synthetic lethality, caused by epigenetic deregulation. We review evidence for the hypothesis that mechanisms other than oncogene addiction are a basis for the application of epigenetic drugs, and propose future research directions. Copyright © 2014 Elsevier Ltd. All rights reserved.

  3. Detect and exploit hidden structure in fatty acid signature data

    Science.gov (United States)

    Budge, Suzanne; Bromaghin, Jeffrey; Thiemann, Gregory

    2017-01-01

    Estimates of predator diet composition are essential to our understanding of their ecology. Although several methods of estimating diet are practiced, methods based on biomarkers have become increasingly common. Quantitative fatty acid signature analysis (QFASA) is a popular method that continues to be refined and extended. Quantitative fatty acid signature analysis is based on differences in the signatures of prey types, often species, which are recognized and designated by investigators. Similarly, predator signatures may be structured by known factors such as sex or age class, and the season or region of sample collection. The recognized structure in signature data inherently influences QFASA results in important and typically beneficial ways. However, predator and prey signatures may contain additional, hidden structure that investigators either choose not to incorporate into an analysis or of which they are unaware, being caused by unknown ecological mechanisms. Hidden structure also influences QFASA results, most often negatively. We developed a new method to explore signature data for hidden structure, called divisive magnetic clustering (DIMAC). Our DIMAC approach is based on the same distance measure used in diet estimation, closely linking methods of data exploration and parameter estimation, and it does not require data transformation or distributional assumptions, as do many multivariate ordination methods in common use. We investigated the potential benefits of the DIMAC method to detect and subsequently exploit hidden structure in signature data using two prey signature libraries with quite different characteristics. We found that the existence of hidden structure in prey signatures can increase the confusion between prey types and thereby reduce the accuracy and precision of QFASA diet estimates. Conversely, the detection and exploitation of hidden structure represent a potential opportunity to improve predator diet estimates and may lead to new

  4. For your first born child: an ethical defense of the exploitation argument against commercial surrogacy.

    Science.gov (United States)

    Osberg, Brendan

    2006-01-01

    In this essay I explore two arguments against commercial surrogacy, based on commodification and exploitation respectively. I adopt a consequentialist framework and argue that commodification arguments must be grounded in a resultant harm to either child or surrogate, and that a priori arguments which condemn the practice for puritanical reasons cannot form a basis for public law. Furthermore there is no overwhelming evidence of harm caused to either party involved in commercial surrogacy, and hence Canadian law (which forbids the practice) must (and can) be justified on exploitative grounds. Objections raised by Wilkinson based on an 'isolated case' approach are addressed when one takes into account the political implications of public policy. I argue that is precisely these implications that justify laws forbidding commercial surrogacy on the grounds of preventing systematic exploitation.

  5. The microeconomics of sexual exploitation of girls and young women in the Peruvian Amazon.

    Science.gov (United States)

    Mujica, Jaris

    2013-01-01

    This paper examines the sexual exploitation of girls and young women as an increasing phenomenon within the extractive industries of wood, oil, minerals and gas in Peruvian Amazonia. The analysis focuses on the city of Pucallpa and the northern part of the Ucayali River and aims to identify the social and economic dynamics underpinning the commercial sexual exploitation of female children and teenagers around the main river port. The study describes the local operating mechanisms of bars and restaurants in the port, the demand for and perceptions of the sexual exploitation of children and teenagers, and the economic logic that it entails. Using a discourse analytic approach, it is argued that this is a business whose profitability is tied to the trade in alcoholic beverages and foods and which responds to a set of family connections and networks.

  6. Transnational gestational surrogacy: does it have to be exploitative?

    Science.gov (United States)

    Kirby, Jeffrey

    2014-01-01

    This article explores the controversial practice of transnational gestational surrogacy and poses a provocative question: Does it have to be exploitative? Various existing models of exploitation are considered and a novel exploitation-evaluation heuristic is introduced to assist in the analysis of the potentially exploitative dimensions/elements of complex health-related practices. On the basis of application of the heuristic, I conclude that transnational gestational surrogacy, as currently practiced in low-income country settings (such as rural, western India), is exploitative of surrogate women. Arising out of consideration of the heuristic's exploitation conditions, a set of public education and enabled choice, enhanced protections, and empowerment reforms to transnational gestational surrogacy practice is proposed that, if incorporated into a national regulatory framework and actualized within a low income country, could possibly render such practice nonexploitative.

  7. Exploiting Concurrent Wake-Up Transmissions Using Beat Frequencies

    Directory of Open Access Journals (Sweden)

    Timo Kumberg

    2017-07-01

    Full Text Available Wake-up receivers are the natural choice for wireless sensor networks because of their ultra-low power consumption and their ability to provide communications on demand. A downside of ultra-low power wake-up receivers is their low sensitivity caused by the passive demodulation of the carrier signal. In this article, we present a novel communication scheme by exploiting purposefully-interfering out-of-tune signals of two or more wireless sensor nodes, which produce the wake-up signal as the beat frequency of superposed carriers. Additionally, we introduce a communication algorithm and a flooding protocol based on this approach. Our experiments show that our approach increases the received signal strength up to 3 dB, improving communication robustness and reliability. Furthermore, we demonstrate the feasibility of our newly-developed protocols by means of an outdoor experiment and an indoor setup consisting of several nodes. The flooding algorithm achieves almost a 100% wake-up rate in less than 20 ms.

  8. Proba-V Mission Exploitation Platform

    Science.gov (United States)

    Goor, Erwin; Dries, Jeroen

    2017-04-01

    VITO and partners developed the Proba-V Mission Exploitation Platform (MEP) as an end-to-end solution to drastically improve the exploitation of the Proba-V (a Copernicus contributing mission) EO-data archive (http://proba-v.vgt.vito.be/), the past mission SPOT-VEGETATION and derived vegetation parameters by researchers, service providers and end-users. The analysis of time series of data (+1PB) is addressed, as well as the large scale on-demand processing of near real-time data on a powerful and scalable processing environment. Furthermore data from the Copernicus Global Land Service is in scope of the platform. From November 2015 an operational Proba-V MEP environment, as an ESA operation service, is gradually deployed at the VITO data center with direct access to the complete data archive. Since autumn 2016 the platform is operational and yet several applications are released to the users, e.g. - A time series viewer, showing the evolution of Proba-V bands and derived vegetation parameters from the Copernicus Global Land Service for any area of interest. - Full-resolution viewing services for the complete data archive. - On-demand processing chains on a powerfull Hadoop/Spark backend e.g. for the calculation of N-daily composites. - Virtual Machines can be provided with access to the data archive and tools to work with this data, e.g. various toolboxes (GDAL, QGIS, GrassGIS, SNAP toolbox, …) and support for R and Python. This allows users to immediately work with the data without having to install tools or download data, but as well to design, debug and test applications on the platform. - A prototype of jupyter Notebooks is available with some examples worked out to show the potential of the data. Today the platform is used by several third party projects to perform R&D activities on the data, and to develop/host data analysis toolboxes. In parallel the platform is further improved and extended. From the MEP PROBA-V, access to Sentinel-2 and landsat data will

  9. Exploiting the bead-injection approach in the integrated sequential injection Lab-on-Valve format using hydrophobic packing materials for on-line matrix removal and preconcentration of trace levels of cadmium in environmental and biological samples via formation of non-charged chelates prior to ETAAS detection

    DEFF Research Database (Denmark)

    Miró, Manuel; Jonczyk, Sylwia; Wang, Jianhua

    2003-01-01

    The concept of renewable microcolumns within the conduits of an automated single injection lab-on-valve system was exploited in a sorption/elution fashion using sorbents of hydrophobic nature. The scheme's practical applicability was demonstrated for the electrothermal atomic absorption...... spectrometry determination of trace level concentrations of cadmium in complex matrices. Statistical comparisons between the proposed procedure and certified values revealed no significant differences at the 95% confidence level....

  10. Postural Hand Synergies during Environmental Constraint Exploitation

    Directory of Open Access Journals (Sweden)

    Cosimo Della Santina

    2017-08-01

    Full Text Available Humans are able to intuitively exploit the shape of an object and environmental constraints to achieve stable grasps and perform dexterous manipulations. In doing that, a vast range of kinematic strategies can be observed. However, in this work we formulate the hypothesis that such ability can be described in terms of a synergistic behavior in the generation of hand postures, i.e., using a reduced set of commonly used kinematic patterns. This is in analogy with previous studies showing the presence of such behavior in different tasks, such as grasping. We investigated this hypothesis in experiments performed by six subjects, who were asked to grasp objects from a flat surface. We quantitatively characterized hand posture behavior from a kinematic perspective, i.e., the hand joint angles, in both pre-shaping and during the interaction with the environment. To determine the role of tactile feedback, we repeated the same experiments but with subjects wearing a rigid shell on the fingertips to reduce cutaneous afferent inputs. Results show the persistence of at least two postural synergies in all the considered experimental conditions and phases. Tactile impairment does not alter significantly the first two synergies, and contact with the environment generates a change only for higher order Principal Components. A good match also arises between the first synergy found in our analysis and the first synergy of grasping as quantified by previous work. The present study is motivated by the interest of learning from the human example, extracting lessons that can be applied in robot design and control. Thus, we conclude with a discussion on implications for robotics of our findings.

  11. Exploitation of Parallelism in Climate Models

    Energy Technology Data Exchange (ETDEWEB)

    Baer, F.; Tribbia, J.J.; Williamson, D.L.

    1999-03-01

    The US Department of Energy (DOE), through its CHAMMP initiative, hopes to develop the capability to make meaningful regional climate forecasts on time scales exceeding a decade, such capability to be based on numerical prediction type models. We propose research to contribute to each of the specific items enumerated in the CHAMMP announcement (Notice 91-3); i.e., to consider theoretical limits to prediction of climate and climate change on appropriate time scales, to develop new mathematical techniques to utilize massively parallel processors (MPP), to actually utilize MPPs as a research tool, and to develop improved representations of some processes essential to climate prediction. In particular, our goals are to: (1) Reconfigure the prediction equations such that the time iteration process can be compressed by use of MMP architecture, and to develop appropriate algorithms. (2) Develop local subgrid scale models which can provide time and space dependent parameterization for a state- of-the-art climate model to minimize the scale resolution necessary for a climate model, and to utilize MPP capability to simultaneously integrate those subgrid models and their statistics. (3) Capitalize on the MPP architecture to study the inherent ensemble nature of the climate problem. By careful choice of initial states, many realizations of the climate system can be determined concurrently and more realistic assessments of the climate prediction can be made in a realistic time frame. To explore these initiatives, we will exploit all available computing technology, and in particular MPP machines. We anticipate that significant improvements in modeling of climate on the decadal and longer time scales for regional space scales will result from our efforts.

  12. Beyond Fair Benefits: Reconsidering Exploitation Arguments Against Organ Markets.

    Science.gov (United States)

    Koplin, Julian J

    2018-03-01

    One common objection to establishing regulated live donor organ markets is that such markets would be exploitative. Perhaps surprisingly, exploitation arguments against organ markets have been widely rejected in the philosophical literature on the subject. It is often argued that concerns about exploitation should be addressed by increasing the price paid to organ sellers, not by banning the trade outright. I argue that this analysis rests on a particular conception of exploitation (which I refer to as 'fair benefits' exploitation), and outline two additional ways that the charge of exploitation can be understood (which I discuss in terms of 'fair process' exploitation and complicity in injustice). I argue that while increasing payments to organ sellers may mitigate or eliminate fair benefits exploitation, such measures will not necessarily address fair process exploitation or complicity in injustice. I further argue that each of these three forms of wrongdoing is relevant to the ethics of paid living organ donation, as well as the design of public policy more generally.

  13. A Systematic Review of Financial Exploitation Measures in Prevalence Studies.

    Science.gov (United States)

    Jackson, Shelly L

    2016-05-01

    The financial exploitation of older adults has garnered the attention of society as well as state and federal governments in a way that elder abuse has never been able to achieve. It is frequently asserted that financial exploitation deserves this attention in part because it is the most prevalent form of elder abuse. This article systematically reviews the measurement of financial exploitation in comparison with other forms of elder abuse and concludes that its measurement is considerably more variable than other forms of abuse. Consequently, improvements in the measurement of financial exploitation are warranted.

  14. A novel flow-based strategy for implementing differential kinetic analysis

    Energy Technology Data Exchange (ETDEWEB)

    Fortes, Paula R. [Centro de Energia Nuclear na Agricultura, Universidade de Sao Paulo, P.O. Box 96, Piracicaba 13400-970 (Brazil); Meneses, Silvia R.P. [Centro de Energia Nuclear na Agricultura, Universidade de Sao Paulo, P.O. Box 96, Piracicaba 13400-970 (Brazil); Zagatto, Elias A.G. [Centro de Energia Nuclear na Agricultura, Universidade de Sao Paulo, P.O. Box 96, Piracicaba 13400-970 (Brazil)]. E-mail: ezagatto@cena.usp.br

    2006-07-21

    Differential kinetic analysis can be implemented in a multi-pumping flow system, and this was demonstrated in relation to an improved spectrophotometric catalytic determination of iron and vanadium in Fe-V alloys. The method exploited the influence of Fe(II) and V(IV) on the rate of iodide oxidation by Cr(VI) under acidic conditions; therefore the Jones reductor was needed. The sample was inserted into an acidic KI stream that acted also as carrier stream, and a Cr(VI) solution was added by confluence. Successive measurements were performed during sample passage through the detector, each one related to a different yet reproducible condition for reaction development. Data treatment involved multivariate calibration by the PLS algorithm. The proposed system is very simple and rugged, allowing about 50 samples to be run per hour, meaning 48 mg KI per determination. The first two latent variables carry ca. 94% of the analytical information, pointing out that the intrinsic dimensionality of the data set is two. Results are in agreement with inductively coupled argon plasma-optical emission spectrometry.

  15. A novel flow-based strategy for implementing differential kinetic analysis.

    Science.gov (United States)

    Fortes, Paula R; Meneses, Silvia R P; Zagatto, Elias A G

    2006-07-21

    Differential kinetic analysis can be implemented in a multi-pumping flow system, and this was demonstrated in relation to an improved spectrophotometric catalytic determination of iron and vanadium in Fe-V alloys. The method exploited the influence of Fe(II) and V(IV) on the rate of iodide oxidation by Cr(VI) under acidic conditions; therefore the Jones reductor was needed. The sample was inserted into an acidic KI stream that acted also as carrier stream, and a Cr(VI) solution was added by confluence. Successive measurements were performed during sample passage through the detector, each one related to a different yet reproducible condition for reaction development. Data treatment involved multivariate calibration by the PLS algorithm. The proposed system is very simple and rugged, allowing about 50 samples to be run per hour, meaning 48 mg KI per determination. The first two latent variables carry ca. 94% of the analytical information, pointing out that the intrinsic dimensionality of the data set is two. Results are in agreement with inductively coupled argon plasma-optical emission spectrometry.

  16. Exploiting node mobility for energy optimization in wireless sensor networks

    Science.gov (United States)

    El-Moukaddem, Fatme Mohammad

    Wireless Sensor Networks (WSNs) have become increasingly available for data-intensive applications such as micro-climate monitoring, precision agriculture, and audio/video surveillance. A key challenge faced by data-intensive WSNs is to transmit the sheer amount of data generated within an application's lifetime to the base station despite the fact that sensor nodes have limited power supplies such as batteries or small solar panels. The availability of numerous low-cost robotic units (e.g. Robomote and Khepera) has made it possible to construct sensor networks consisting of mobile sensor nodes. It has been shown that the controlled mobility offered by mobile sensors can be exploited to improve the energy efficiency of a network. In this thesis, we propose schemes that use mobile sensor nodes to reduce the energy consumption of data-intensive WSNs. Our approaches differ from previous work in two main aspects. First, our approaches do not require complex motion planning of mobile nodes, and hence can be implemented on a number of low-cost mobile sensor platforms. Second, we integrate the energy consumption due to both mobility and wireless communications into a holistic optimization framework. We consider three problems arising from the limited energy in the sensor nodes. In the first problem, the network consists of mostly static nodes and contains only a few mobile nodes. In the second and third problems, we assume essentially that all nodes in the WSN are mobile. We first study a new problem called max-data mobile relay configuration (MMRC ) that finds the positions of a set of mobile sensors, referred to as relays, that maximize the total amount of data gathered by the network during its lifetime. We show that the MMRC problem is surprisingly complex even for a trivial network topology due to the joint consideration of the energy consumption of both wireless communication and mechanical locomotion. We present optimal MMRC algorithms and practical distributed

  17. The Dark Side of Courtship: Violence and Sexual Exploitation.

    Science.gov (United States)

    Lloyd, Sally A.

    1991-01-01

    Reviews literature on physical violence and sexual exploitation between premarital partners. Suggests that two features of dating encourage exploitative behavior: different context of courtship for males versus females encourages male control of relationships and female compliance, and highly romanticized nature of courtship encourages partners to…

  18. A Descriptive Study on Sexually Exploited Children in Residential Treatment

    Science.gov (United States)

    Twill, Sarah E.; Green, Denise M.; Traylor, Amy

    2010-01-01

    Sexual exploitation and prostitution of children and adolescents is a multibillion dollar industry in the United States (Estes and Weiner in "Medical, legal & social science aspects of child sexual exploitation: A comprehensive review of pornography, prostitution, and internet crimes, vol I," G.W. Medical Publishing, Inc, St Louis,…

  19. Making and exploiting fullerenes, graphene, and carbon nanotubes

    Energy Technology Data Exchange (ETDEWEB)

    Marcaccio, Massimo; Paolucci, Francesco (eds.) [Bologna Univ. (Italy). Dept. of Chemistry G. Ciamician

    2014-11-01

    This volume contains nine chapters which are presenting critical reviews of the present and future trends in modern chemistry research. The chapter ''Solubilization of Fullerenes, Carbon Nanotubes and Graphene'' by Alain Penicaud describes the various ingenious approaches to solve the solubility issue and describes in particular how graphite, and modern nanocarbons, can be made soluble by reductive dissolution. A large part of the present volume concerns the merging of nanocarbons with nanotechnology and their impact on technical development in many areas. Fullerenes, carbon nanotubes, nanodiamond and graphene find, for instance, various applications in the development of solar cells, including dye sensitized solar cells. The chapter ''Incorporation of Balls, Tubes and Bowls in Nanotechnology'' by James Mack describes the recent development of the area of fullerene fragments, and corannulene in particular, and their direct applications to organic light emitting diode (OLED) technology, while, in the chapter ''Exploiting Nanocarbons in Dye-Sensitized Solar Cells'' by Ladislav Kavan, the exploitation of nanocarbons in the development of novel dye sensitized solar cells with improved efficiency, durability and costs is thoroughly reviewed. The functionalization of CNSs has the invaluable advantage of combining their unique properties with those of other classes of materials. Supramolecular chemistry represents an elegant alternative approach for the construction of functional systems by means of noncovalent bonding interactions. In the chapter ''Supramolecular Chemistry of Carbon Nanotubes'' by Gildas Gavrel et al., the incredibly varied world of supramolecular, non-covalent functionalization of carbon nanotubes and their applications is examined and reviewed, and the synthetic strategies devised for fabricating mechanically-linked molecular architectures are described in the chapter &apos

  20. [Ecotourism exploitation model in Bita Lake Natural Reserve of Yunnan].

    Science.gov (United States)

    Yang, G; Wang, Y; Zhong, L

    2000-12-01

    Bita lake provincial natural reserve is located in Shangri-La region of North-western Yunnan, and was set as a demonstrating area for ecotourism exploitation in 1998. After a year's exploitation construction and half a year's operation as a branch of the 99' Kunming International Horticulture Exposition to accept tourists, it was proved that the ecotourism demonstrating area attained four integrated functions of ecotourism, i.e., tourism, protection, poverty clearing and environment education. Five exploitation and management models including function zoned exploitation model, featured tourism communication model signs system designing model, local Tibetan family reception model and environmental monitoring model, were also successful, which were demonstrated and spreaded to the whole province. Bita lake provincial natural reserve could be a good sample for the ecotourism exploitation natural reserves of the whole country.

  1. Reverberant speech recognition exploiting clarity index estimation

    Science.gov (United States)

    Parada, Pablo Peso; Sharma, Dushyant; Naylor, Patrick A.; Waterschoot, Toon van

    2015-12-01

    We present single-channel approaches to robust automatic speech recognition (ASR) in reverberant environments based on non-intrusive estimation of the clarity index ( C 50). Our best performing method includes the estimated value of C 50 in the ASR feature vector and also uses C 50 to select the most suitable ASR acoustic model according to the reverberation level. We evaluate our method on the REVERB Challenge database employing two different C 50 estimators and show that our method outperforms the best baseline of the challenge achieved without unsupervised acoustic model adaptation, i.e. using multi-condition hidden Markov models (HMMs). Our approach achieves a 22.4 % relative word error rate reduction in comparison to the best baseline of the challenge.

  2. Financial Decision-making Abilities and Financial Exploitation in Older African Americans: Preliminary Validity Evidence for the Lichtenberg Financial Decision Rating Scale (LFDRS)

    Science.gov (United States)

    Ficker, Lisa J.; Rahman-Filipiak, Annalise

    2015-01-01

    This study examines preliminary evidence for the Lichtenberg Financial Decision Rating Scale (LFDRS), a new person-centered approach to assessing capacity to make financial decisions, and its relationship to self-reported cases of financial exploitation in 69 older African Americans. More than one third of individuals reporting financial exploitation also had questionable decisional abilities. Overall, decisional ability score and current decision total were significantly associated with cognitive screening test and financial ability scores, demonstrating good criterion validity. Financially exploited individuals, and non-exploited individuals, showed mean group differences on the Mini Mental State Exam, Financial Situational Awareness, Psychological Vulnerability, Current Decisional Ability, and Susceptibility to undue influence subscales, and Total Lichtenberg Financial Decision Rating Scale Score. Study findings suggest that impaired decisional abilities may render older adults more vulnerable to financial exploitation, and that the LFDRS is a valid tool for measuring both decisional abilities and financial exploitation. PMID:26285038

  3. Effects of anthropogenic groundwater exploitation on land surface processes: A case study of the Haihe River Basin, northern China

    Science.gov (United States)

    Zou, Jing; Xie, Zhenghui; Zhan, Chesheng; Qin, Peihua; Sun, Qin; Jia, Binghao; Xia, Jun

    2015-05-01

    In this study, we incorporated a groundwater exploitation scheme into the land surface model CLM3.5 to investigate the effects of the anthropogenic exploitation of groundwater on land surface processes in a river basin. Simulations of the Haihe River Basin in northern China were conducted for the years 1965-2000 using the model. A control simulation without exploitation and three exploitation simulations with different water demands derived from socioeconomic data related to the Basin were conducted. The results showed that groundwater exploitation for human activities resulted in increased wetting and cooling effects at the land surface and reduced groundwater storage. A lowering of the groundwater table, increased upper soil moisture, reduced 2 m air temperature, and enhanced latent heat flux were detected by the end of the simulated period, and the changes at the land surface were related linearly to the water demands. To determine the possible responses of the land surface processes in extreme cases (i.e., in which the exploitation process either continued or ceased), additional hypothetical simulations for the coming 200 years with constant climate forcing were conducted, regardless of changes in climate. The simulations revealed that the local groundwater storage on the plains could not contend with high-intensity exploitation for long if the exploitation process continues at the current rate. Changes attributable to groundwater exploitation reached extreme values and then weakened within decades with the depletion of groundwater resources and the exploitation process will therefore cease. However, if exploitation is stopped completely to allow groundwater to recover, drying and warming effects, such as increased temperature, reduced soil moisture, and reduced total runoff, would occur in the Basin within the early decades of the simulation period. The effects of exploitation will then gradually disappear, and the variables will approach the natural state and

  4. Separated Control and Data Stacks to Mitigate Buffer Overflow Exploits

    Directory of Open Access Journals (Sweden)

    Christopher Kugler

    2015-10-01

    Full Text Available Despite the fact that protection mechanisms like StackGuard, ASLR and NX are widespread, the development on new defense strategies against stack-based buffer overflows has not yet come to an end. In this article, we present a novel compiler-level protection called SCADS: Separated Control and Data Stacks that protects return addresses and saved frame pointers on a separate stack, called the control stack. In common computer programs, a single user mode stack is used to store control information next to data buffers. By separating control information from the data stack, we can protect sensitive pointers of a program’s control flow from being overwritten by buffer overflows. To substantiate the practicability of our approach, we provide SCADS as an open source patch for the LLVM compiler infrastructure. Focusing on Linux and FreeBSD running on the AMD64 architecture, we show compatibility, security and performance results. As we make control flow information simply unreachable for buffer overflows, many exploits are stopped at an early stage of progression with only negligible performance overhead.

  5. Methods for spectral image analysis by exploiting spatial simplicity

    Science.gov (United States)

    Keenan, Michael R.

    2010-11-23

    Several full-spectrum imaging techniques have been introduced in recent years that promise to provide rapid and comprehensive chemical characterization of complex samples. One of the remaining obstacles to adopting these techniques for routine use is the difficulty of reducing the vast quantities of raw spectral data to meaningful chemical information. Multivariate factor analysis techniques, such as Principal Component Analysis and Alternating Least Squares-based Multivariate Curve Resolution, have proven effective for extracting the essential chemical information from high dimensional spectral image data sets into a limited number of components that describe the spectral characteristics and spatial distributions of the chemical species comprising the sample. There are many cases, however, in which those constraints are not effective and where alternative approaches may provide new analytical insights. For many cases of practical importance, imaged samples are "simple" in the sense that they consist of relatively discrete chemical phases. That is, at any given location, only one or a few of the chemical species comprising the entire sample have non-zero concentrations. The methods of spectral image analysis of the present invention exploit this simplicity in the spatial domain to make the resulting factor models more realistic. Therefore, more physically accurate and interpretable spectral and abundance components can be extracted from spectral images that have spatially simple structure.

  6. Exploiting pallidal plasticity for stimulation in Parkinson’s disease

    Science.gov (United States)

    Lourens, Marcel A. J.; Schwab, Bettina C.; Nirody, Jasmine A.; Meijer, Hil G. E.; van Gils, Stephan A.

    2015-04-01

    Objective. Continuous application of high-frequency deep brain stimulation (DBS) often effectively reduces motor symptoms of Parkinson’s disease patients. While there is a growing need for more effective and less traumatic stimulation, the exact mechanism of DBS is still unknown. Here, we present a methodology to exploit the plasticity of GABAergic synapses inside the external globus pallidus (GPe) for the optimization of DBS. Approach. Assuming the existence of spike-timing-dependent plasticity (STDP) at GABAergic GPe-GPe synapses, we simulate neural activity in a network model of the subthalamic nucleus and GPe. In particular, we test different DBS protocols in our model and quantify their influence on neural synchrony. Main results. In an exemplary set of biologically plausible model parameters, we show that STDP in the GPe has a direct influence on neural activity and especially the stability of firing patterns. STDP stabilizes both uncorrelated firing in the healthy state and correlated firing in the parkinsonian state. Alternative stimulation protocols such as coordinated reset stimulation can clearly profit from the stabilizing effect of STDP. These results are widely independent of the STDP learning rule. Significance. Once the model settings, e.g., connection architectures, have been described experimentally, our model can be adjusted and directly applied in the development of novel stimulation protocols. More efficient stimulation leads to both minimization of side effects and savings in battery power.

  7. Research trends in wireless visual sensor networks when exploiting prioritization.

    Science.gov (United States)

    Costa, Daniel G; Guedes, Luiz Affonso; Vasques, Francisco; Portugal, Paulo

    2015-01-15

    The development of wireless sensor networks for control and monitoring functions has created a vibrant investigation scenario, where many critical topics, such as communication efficiency and energy consumption, have been investigated in the past few years. However, when sensors are endowed with low-power cameras for visual monitoring, a new scope of challenges is raised, demanding new research efforts. In this context, the resource-constrained nature of sensor nodes has demanded the use of prioritization approaches as a practical mechanism to lower the transmission burden of visual data over wireless sensor networks. Many works in recent years have considered local-level prioritization parameters to enhance the overall performance of those networks, but global-level policies can potentially achieve better results in terms of visual monitoring efficiency. In this paper, we make a broad review of some recent works on priority-based optimizations in wireless visual sensor networks. Moreover, we envisage some research trends when exploiting prioritization, potentially fostering the development of promising optimizations for wireless sensor networks composed of visual sensors.

  8. Fit for purpose quality management system for military forensic exploitation.

    Science.gov (United States)

    Wilson, Lauren Elizabeth; Gahan, Michelle Elizabeth; Robertson, James; Lennard, Chris

    2018-03-01

    In a previous publication we described a systems approach to forensic science applied in the military domain. The forensic science 'system of systems' describes forensic science as a sub-system in the larger criminal justice, law enforcement, intelligence, and military systems, with quality management being an important supporting system. Quality management systems help to ensure that organisations achieve their objective and continually improve their capability. Components of forensic science quality management systems can include standardisation of processes, accreditation of facilities to national/international standards, and certification of personnel. A fit for purpose quality management system should be balanced to allow organisations to meet objectives, provide continuous improvement; mitigate risk; and impart a positive quality culture. Considerable attention over the last decades has been given to the need for forensic science quality management systems to meet criminal justice and law enforcement objectives. More recently, the need for the forensic quality management systems to meet forensic intelligence objectives has been considered. This paper, for the first time, discusses the need for a fit for purpose quality management system for military forensic exploitation. Crown Copyright © 2018. Published by Elsevier B.V. All rights reserved.

  9. Research Trends in Wireless Visual Sensor Networks When Exploiting Prioritization

    Directory of Open Access Journals (Sweden)

    Daniel G. Costa

    2015-01-01

    Full Text Available The development of wireless sensor networks for control and monitoring functions has created a vibrant investigation scenario, where many critical topics, such as communication efficiency and energy consumption, have been investigated in the past few years. However, when sensors are endowed with low-power cameras for visual monitoring, a new scope of challenges is raised, demanding new research efforts. In this context, the resource-constrained nature of sensor nodes has demanded the use of prioritization approaches as a practical mechanism to lower the transmission burden of visual data over wireless sensor networks. Many works in recent years have considered local-level prioritization parameters to enhance the overall performance of those networks, but global-level policies can potentially achieve better results in terms of visual monitoring efficiency. In this paper, we make a broad review of some recent works on priority-based optimizations in wireless visual sensor networks. Moreover, we envisage some research trends when exploiting prioritization, potentially fostering the development of promising optimizations for wireless sensor networks composed of visual sensors.

  10. Augmented reality enabling intelligence exploitation at the edge

    Science.gov (United States)

    Kase, Sue E.; Roy, Heather; Bowman, Elizabeth K.; Patton, Debra

    2015-05-01

    Today's Warfighters need to make quick decisions while interacting in densely populated environments comprised of friendly, hostile, and neutral host nation locals. However, there is a gap in the real-time processing of big data streams for edge intelligence. We introduce a big data processing pipeline called ARTEA that ingests, monitors, and performs a variety of analytics including noise reduction, pattern identification, and trend and event detection in the context of an area of operations (AOR). Results of the analytics are presented to the Soldier via an augmented reality (AR) device Google Glass (Glass). Non-intrusive AR devices such as Glass can visually communicate contextually relevant alerts to the Soldier based on the current mission objectives, time, location, and observed or sensed activities. This real-time processing and AR presentation approach to knowledge discovery flattens the intelligence hierarchy enabling the edge Soldier to act as a vital and active participant in the analysis process. We report preliminary observations testing ARTEA and Glass in a document exploitation and person of interest scenario simulating edge Soldier participation in the intelligence process in disconnected deployment conditions.

  11. CellSs: Scheduling Techniques to Better Exploit Memory Hierarchy

    Directory of Open Access Journals (Sweden)

    Pieter Bellens

    2009-01-01

    Full Text Available Cell Superscalar's (CellSs main goal is to provide a simple, flexible and easy programming approach for the Cell Broadband Engine (Cell/B.E. that automatically exploits the inherent concurrency of the applications at a task level. The CellSs environment is based on a source-to-source compiler that translates annotated C or Fortran code and a runtime library tailored for the Cell/B.E. that takes care of the concurrent execution of the application. The first efforts for task scheduling in CellSs derived from very simple heuristics. This paper presents new scheduling techniques that have been developed for CellSs for the purpose of improving an application's performance. Additionally, the design of a new scheduling algorithm is detailed and the algorithm evaluated. The CellSs scheduler takes an extension of the memory hierarchy for Cell/B.E. into account, with a cache memory shared between the SPEs. All new scheduling practices have been evaluated showing better behavior of our system.

  12. AGILE: Autonomous Global Integrated Language Exploitation

    Science.gov (United States)

    2008-04-01

    controlling office. LR DISTRIBUTION STATEMENT E. Distribution authorized to DoD Components only. Other requests shall be referred to controlling office...BLEU for Chinese/English. • We trained our parser on more Treebank data. Moving from I m words of Treebank to 2m words yields a +0.5 BLEU improvement for...that is recovered using a treebank-trained parser . In our approach, a parse-tree structure in the target language is built step-by-step, based on

  13. Collaborative DDoS Defense using Flow-based Security Event Information

    NARCIS (Netherlands)

    Steinberger, Jessica; Kuhnert, Benjamin; Sperotto, Anna; Baier, Harald; Pras, Aiko

    Over recent years, network-based attacks evolved to the top concerns responsible for network infrastructure and service outages. To counteract such attacks, an approach is to move mitigation from the target network to the networks of Internet Service Providers (ISP). In addition, exchanging threat

  14. Mobile clouds exploiting distributed resources in wireless, mobile and social networks

    CERN Document Server

    Fitzek, Frank H P

    2013-01-01

    Includes a preface written by Professor Leonard Kleinrock, Distinguished Professor of Computer Science, UCLA, USA This book discusses and explores the concept of mobile cloud, creating an inspiring research space for exploiting opportunistic resource sharing, and covering from theoretical research approaches to the development of commercially profitable ideas. A mobile cloud is a cooperative arrangement of dynamically connected communication nodes sharing opportunistic resources. In this book, authors provide a comprehensive and motivating overview of this rapidly emerging technology. The b

  15. THE SUPPORTING OF EXPLOITATION AND MAINTENANCE MANAGEMENT WITHIN NETWORKED TECHNICAL SYSTEMS

    OpenAIRE

    Dąbrowski, Marcin

    2015-01-01

    Network technical systems are complex systems, which include distribution networks with devices and engineering objects supporting their work. These kind of systems are used for media distribution, such as: drinking water, fuel, gas, heat, etc. One of specific features of this system is large territorial dispersion of technical objects within the system. The exploitation specificity of networked technical systems requires a special approach for implementing maintenance and repair work, taking...

  16. Rationalising predictors of child sexual exploitation and sex-trading.

    Science.gov (United States)

    Klatt, Thimna; Cavner, Della; Egan, Vincent

    2014-02-01

    Although there is evidence for specific risk factors leading to child sexual exploitation and prostitution, these influences overlap and have rarely been examined concurrently. The present study examined case files for 175 young persons who attended a voluntary organization in Leicester, United Kingdom, which supports people who are sexually exploited or at risk of sexual exploitation. Based on the case files, the presence or absence of known risk factors for becoming a sex worker was coded. Data were analyzed using t-test, logistic regression, and smallest space analysis. Users of the voluntary organization's services who had been sexually exploited exhibited a significantly greater number of risk factors than service users who had not been victims of sexual exploitation. The logistic regression produced a significant model fit. However, of the 14 potential predictors--many of which were associated with each other--only four variables significantly predicted actual sexual exploitation: running away, poverty, drug and/or alcohol use, and having friends or family members in prostitution. Surprisingly, running away was found to significantly decrease the odds of becoming involved in sexual exploitation. Smallest space analysis of the data revealed 5 clusters of risk factors. Two of the clusters, which reflected a desperation and need construct and immature or out-of-control lifestyles, were significantly associated with sexual exploitation. Our research suggests that some risk factors (e.g. physical and emotional abuse, early delinquency, and homelessness) for becoming involved in sexual exploitation are common but are part of the problematic milieu of the individuals affected and not directly associated with sex trading itself. Our results also indicate that it is important to engage with the families and associates of young persons at risk of becoming (or remaining) a sex worker if one wants to reduce the numbers of persons who engage in this activity. Copyright

  17. A fuzzy model for exploiting customer requirements

    Directory of Open Access Journals (Sweden)

    Zahra Javadirad

    2016-09-01

    Full Text Available Nowadays, Quality function deployment (QFD is one of the total quality management tools, where customers’ views and requirements are perceived and using various techniques improves the production requirements and operations. The QFD department, after identification and analysis of the competitors, takes customers’ feedbacks to meet the customers’ demands for the products compared with the competitors. In this study, a comprehensive model for assessing the importance of the customer requirements in the products or services for an organization is proposed. The proposed study uses linguistic variables, as a more comprehensive approach, to increase the precision of the expression evaluations. The importance of these requirements specifies the strengths and weaknesses of the organization in meeting the requirements relative to competitors. The results of these experiments show that the proposed method performs better than the other methods.

  18. Implementation synergies that exploit situational knowledge strategically

    DEFF Research Database (Denmark)

    Quitzau, Maj-Britt; Petersen, Jens-Phillip

    This paper illustrates how strategic and situated forms of knowledge may increase capacity to implement energy strategies in local urban development projects. Through analysis of front runner implementation projects, we show that the involved planners utilize situational learning processes...... strategically to develop more viable implementation trajectories. These findings resonate well with relational and network orienteered research in contemporary planning theory. In the selected case studies, we can see that planners deliberately seek to extend traditional planning approaches, like e.......g. regulation, with broader context‐specific learning processes. In doing so, we argue that – what we call – an implementation synergy is established by interlacing different forms of situational knowledge with strategic knowledge about how to reach a desired energy target. In conclusion, the paper identifies...

  19. Pluriactivite et mode de financement des exploitations agricoles

    OpenAIRE

    Stéphane Krebs

    2005-01-01

    Cet article se propose de mettre en relation les décisions de pluriactivité des familles d’agriculteurs et les choix qu’ils opèrent en matière de financement de leurs exploitations. Les résultats obtenus à partir d’un panel d’exploitations individuelles françaises font ressortir d’importantes spécificités des exploitations pluriactives, tant en matière d’autofinancement que d’endettement. The aim of this article is to study the possible interrelationships between the off-farm work decision...

  20. Experimental demonstration of OpenFlow-based control plane for elastic lightpath provisioning in Flexi-Grid optical networks.

    Science.gov (United States)

    Zhang, Jiawei; Zhang, Jie; Zhao, Yongli; Yang, Hui; Yu, Xiaosong; Wang, Lei; Fu, Xihua

    2013-01-28

    Due to the prominent performance on networking virtualization and programmability, OpenFlow is widely regarded as a promising control plane technology in packet-switched IP networks as well as wavelength-switched optical networks. For the purpose of applying software programmable feature to future optical networks, we propose an OpenFlow-based control plane in Flexi-Grid optical networks. Experimental results demonstrate its feasibility of dynamic lightpath establishment and adjustment via extended OpenFlow protocol. Wireshark captures of the signaling procedure are printed out. Additionally, the overall latency including signaling and hardware for lightpath setup and adjustment is also reported.

  1. Rapid Exploitation and Analysis of Documents

    Energy Technology Data Exchange (ETDEWEB)

    Buttler, D J; Andrzejewski, D; Stevens, K D; Anastasiu, D; Gao, B

    2011-11-28

    Analysts are overwhelmed with information. They have large archives of historical data, both structured and unstructured, and continuous streams of relevant messages and documents that they need to match to current tasks, digest, and incorporate into their analysis. The purpose of the READ project is to develop technologies to make it easier to catalog, classify, and locate relevant information. We approached this task from multiple angles. First, we tackle the issue of processing large quantities of information in reasonable time. Second, we provide mechanisms that allow users to customize their queries based on latent topics exposed from corpus statistics. Third, we assist users in organizing query results, adding localized expert structure over results. Forth, we use word sense disambiguation techniques to increase the precision of matching user generated keyword lists with terms and concepts in the corpus. Fifth, we enhance co-occurrence statistics with latent topic attribution, to aid entity relationship discovery. Finally we quantitatively analyze the quality of three popular latent modeling techniques to examine under which circumstances each is useful.

  2. Exploiting osmosis for blood cell sorting.

    Science.gov (United States)

    Parichehreh, Vahidreza; Estrada, Rosendo; Kumar, Srikanth Suresh; Bhavanam, Kranthi Kumar; Raj, Vinay; Raj, Ashok; Sethu, Palaniappan

    2011-06-01

    Blood is a valuable tissue containing cellular populations rich in information regarding the immediate immune and inflammatory status of the body. Blood leukocytes or white blood cells (WBCs) provide an ideal sample to monitor systemic changes and understand molecular signaling mechanisms in disease processes. Blood samples need to be processed to deplete contaminating erythrocytes or red blood cells (RBCs) and sorted into different WBC sub-populations prior to analysis. This is typically accomplished using immuno-affinity protocols which result in undesirable activation. An alternative is size based sorting which by itself is unsuitable for WBCs sorting due to size overlap between different sub-populations. To overcome this limitation, we investigated the possibility of using controlled osmotic exposure to deplete and/or create a differential size increase between WBC populations. Using a new microfluidic cell docking platform, the response of RBCs and WBCs to deionized (DI) water was evaluated. Time lapse microscopy confirms depletion of RBCs within 15 s and creation of > 3 μm size difference between lymphocytes, monocytes and granulocytes. A flow through microfluidic device was also used to expose different WBCs to DI water for 30, 60 and 90 s to quantify cell loss and activation. Results confirm preservation of ~100% of monocytes, granulocytes and loss of ~30% of lymphocytes (mostly CD3+/CD4+) with minimal activation. These results indicate feasibility of this approach for monocyte, granulocyte and lymphocyte (sub-populations) isolation based on size.

  3. PROPOSITIONS REGARDING MANAGERIAL PERFORMANCE IN AGRICULTURAL EXPLOITATIONS

    Directory of Open Access Journals (Sweden)

    COSMINA – SIMONA TOADER

    2008-05-01

    Full Text Available The management is the process used by the managers to realize the functions of an organization by establishing and fulfilling the objectives set to maximize the results of the organization. The management plans, organizes, coordinates, trains and controls a group of interconnected activities in order to realize the objectives. The management uses some managerial abilities and skills which should be developed and improved by studying and understanding the management concepts, principles, techniques and methods. Peter Drucker said that “the managers are those who practice management. They do not practice either the behavioral science or the statistics. These are only instruments for the managers. As a specific discipline, the management has its own basic problems, specific approaches, separate interests. A person, who knows only techniques and skills, without understanding the basics of the management, is not a manager. In the best case, that person is a very good technician”. In order to be a successful manager, he/she has to have some qualities. In this study we will present the qualities that a manager should have and some propositions concerning the managerial performance.

  4. Exploiting relational database technology in a GIS

    Science.gov (United States)

    Batty, Peter

    1992-05-01

    All systems for managing data face common problems such as backup, recovery, auditing, security, data integrity, and concurrent update. Other challenges include the ability to share data easily between applications and to distribute data across several computers, whereas continuing to manage the problems already mentioned. Geographic information systems are no exception, and need to tackle all these issues. Standard relational database-management systems (RDBMSs) provide many features to help solve the issues mentioned so far. This paper describes how the IBM geoManager product approaches these issues by storing all its geographic data in a standard RDBMS in order to take advantage of such features. Areas in which standard RDBMS functions need to be extended are highlighted, and the way in which geoManager does this is explained. The performance implications of storing all data in the relational database are discussed. An important distinction is made between the storage and management of geographic data and the manipulation and analysis of geographic data, which needs to be made when considering the applicability of relational database technology to GIS.

  5. Conflicts Related to Natural Resources Exploitation: A Case Study of ...

    African Journals Online (AJOL)

    ... Study of Oil Crisis in Nigeria's Niger Delta Region and its Socio-Political and ... with oil exploration and exploitation have had adverse effects on the environment ... the confused atmosphere to unleash reign of terror on innocent citizens.

  6. Autonomous Industrial Mobile Manipulation (AIMM) - maturation, exploitation and implementation

    DEFF Research Database (Denmark)

    Hvilshøj, Mads

    This thesis introduces the Autonomous Industrial Mobile Manipulator ”Little Helper”, a robotic co-worker which extends the potential of industrial robotics by combining locomotion and manipulation capabilities. The thesis presents promising findings for industrial maturation, exploitation...

  7. 77 FR 36491 - Request for Information Regarding Senior Financial Exploitation

    Science.gov (United States)

    2012-06-19

    ... Americans'') seeks information on consumer financial products and services, financial literacy efforts, and... From the Federal Register Online via the Government Publishing Office BUREAU OF CONSUMER FINANCIAL PROTECTION Request for Information Regarding Senior Financial Exploitation AGENCY: Bureau of Consumer...

  8. L'exploitation des cephalopodes: situation et perspectives

    National Research Council Canada - National Science Library

    Mesnil, B

    1977-01-01

    Sans attendre que soit atteint ce degre de precision, nous avons voulu aborder une etape plus elementaire en reunissant les informations relatives a l'etat actuel de l'exploitation des cephalopodes at...

  9. Matching Terminological Heterogeneous Ontologies by Exploiting Partial Alignments

    NARCIS (Netherlands)

    Schadd, Frederik Christiaan; Roos, Nico

    2015-01-01

    Matching ontologies which utilize significantly heterogeneous terminologies is a challenging task for existing matching techniques. These techniques typically exploit lexical resources in order to enrich the ontologies with additional terminology such that more terminological matches can be found.

  10. Sustainable Exploitation of Natural Resources and National Security

    National Research Council Canada - National Science Library

    Maria Constantinescu

    2015-01-01

    ... to a country’s national security and long term development. The aim of this article is to outline the links and interactions between the availability of natural resources, their sustainable exploitation...

  11. A Practical Guide for Exploiting FBCB2 Capabilities

    National Research Council Canada - National Science Library

    Leibrecht, Bruce

    2003-01-01

    ... Battle Command Brigade and Below (FBCB2). The Leader's Primer for Exploiting FBCB2 describes twenty-two major FBCB2 capabilities, the tactical significance of each capability, the digital operator and user tasks involved in employing each...

  12. Human trafficking and exploitation: A global health concern.

    Science.gov (United States)

    Zimmerman, Cathy; Kiss, Ligia

    2017-11-01

    In this collection review, Cathy Zimmerman and colleague introduce the PLOS Medicine Collection on Human Trafficking, Exploitation and Health, laying out the magnitude of the global trafficking problem and offering a public health policy framework to guide responses to trafficking.

  13. Heat transfer optimization of SCO2 porous flow based on Brinkman model

    Directory of Open Access Journals (Sweden)

    Lin David T.W.

    2016-01-01

    Full Text Available The purpose of this study is to obtain the optimal operating condition in order to find the maximum supercritical CO2 heat extraction in the enhanced geothermal system (EGS. In this study, the heat transfer model conjugated with the Brinkman model is used to evaluate the thermal behavior in the reservoir of the EGS. This numerical model is validated by experiment. Optimization is processed based on the Nelder-Mead approach. The optimal operating conditions are proposed with different pressure, porosity. This study will build the optimal platform of heat source of geothermal power plant.

  14. Real-time estimation of optical flow based on optimized haar wavelet features

    DEFF Research Database (Denmark)

    Salmen, Jan; Caup, Lukas; Igel, Christian

    2011-01-01

    -objective optimization. In this work, we build on a popular algorithm developed for realtime applications. It is originally based on the Census transform and benefits from this encoding for table-based matching and tracking of interest points. We propose to use the more universal Haar wavelet features instead...... of the Census transform within the same framework. The resulting approach is more flexible, in particular it allows for sub-pixel accuracy. For comparison with the original method and another baseline algorithm, we considered both popular benchmark datasets as well as a long synthetic video sequence. We...

  15. Exploiting Elementary Landscapes for TSP, Vehicle Routing and Scheduling

    Science.gov (United States)

    2015-09-03

    AFRL-AFOSR-VA-TR-2015-0320 EXPLOITING ELEMENTARY LANDSCAPES FOR TSP , VEHICLE ROUTING AND SCHEDULING Darrell Whitley COLORADO STATE UNIVERSITY Final...4. TITLE AND SUBTITLE Exploiting Elementary Landscapes for TSP , Vehicle Routing and Scheduling 5a. CONTRACT NUMBER 5b. GRANT NUMBER FA9550-11-1-0088...Traveling Salesman Problem ( TSP ) and Graph Coloring are elementary. Problems such as MAX-kSAT are a superposition of k elementary landscapes. This

  16. Typologie des exploitations agricoles familiales : cas de la ...

    African Journals Online (AJOL)

    La gestion durable d'une formation forestière nécessite la prise en compte des activités humaines s'exerçant aux alentours en raison de leurs impacts sur la pérennité et la qualité des produits exploités. Cette étude visait ainsi à caractériser les exploitations agricoles familiales adjacentes de la forêt de Baban rafi. Pour y.

  17. Optimization Models for Petroleum Field Exploitation

    Energy Technology Data Exchange (ETDEWEB)

    Jonsbraaten, Tore Wiig

    1998-12-31

    This thesis presents and discusses various models for optimal development of a petroleum field. The objective of these optimization models is to maximize, under many uncertain parameters, the project`s expected net present value. First, an overview of petroleum field optimization is given from the point of view of operations research. Reservoir equations for a simple reservoir system are derived and discretized and included in optimization models. Linear programming models for optimizing production decisions are discussed and extended to mixed integer programming models where decisions concerning platform, wells and production strategy are optimized. Then, optimal development decisions under uncertain oil prices are discussed. The uncertain oil price is estimated by a finite set of price scenarios with associated probabilities. The problem is one of stochastic mixed integer programming, and the solution approach is to use a scenario and policy aggregation technique developed by Rockafellar and Wets although this technique was developed for continuous variables. Stochastic optimization problems with focus on problems with decision dependent information discoveries are also discussed. A class of ``manageable`` problems is identified and an implicit enumeration algorithm for finding optimal decision policy is proposed. Problems involving uncertain reservoir properties but with a known initial probability distribution over possible reservoir realizations are discussed. Finally, a section on Nash-equilibrium and bargaining in an oil reservoir management game discusses the pool problem arising when two lease owners have access to the same underlying oil reservoir. Because the oil tends to migrate, both lease owners have incentive to drain oil from the competitors part of the reservoir. The discussion is based on a numerical example. 107 refs., 31 figs., 14 tabs.

  18. Three-Phase AC Optimal Power Flow Based Distribution Locational Marginal Price: Preprint

    Energy Technology Data Exchange (ETDEWEB)

    Yang, Rui; Zhang, Yingchen

    2017-05-17

    Designing market mechanisms for electricity distribution systems has been a hot topic due to the increased presence of smart loads and distributed energy resources (DERs) in distribution systems. The distribution locational marginal pricing (DLMP) methodology is one of the real-time pricing methods to enable such market mechanisms and provide economic incentives to active market participants. Determining the DLMP is challenging due to high power losses, the voltage volatility, and the phase imbalance in distribution systems. Existing DC Optimal Power Flow (OPF) approaches are unable to model power losses and the reactive power, while single-phase AC OPF methods cannot capture the phase imbalance. To address these challenges, in this paper, a three-phase AC OPF based approach is developed to define and calculate DLMP accurately. The DLMP is modeled as the marginal cost to serve an incremental unit of demand at a specific phase at a certain bus, and is calculated using the Lagrange multipliers in the three-phase AC OPF formulation. Extensive case studies have been conducted to understand the impact of system losses and the phase imbalance on DLMPs as well as the potential benefits of flexible resources.

  19. VELOCITY FIELD COMPUTATION IN VIBRATED GRANULAR MEDIA USING AN OPTICAL FLOW BASED MULTISCALE IMAGE ANALYSIS METHOD

    Directory of Open Access Journals (Sweden)

    Johan Debayle

    2011-05-01

    Full Text Available An image analysis method has been developed in order to compute the velocity field of a granular medium (sand grains, mean diameter 600 μm submitted to different kinds of mechanical stresses. The differential method based on optical flow conservation consists in describing a dense motion field with vectors associated to each pixel. A multiscale, coarse-to-fine, analytical approach through tailor sized windows yields the best compromise between accuracy and robustness of the results, while enabling an acceptable computation time. The corresponding algorithmis presented and its validation discussed through different tests. The results of the validation tests of the proposed approach show that the method is satisfactory when attributing specific values to parameters in association with the size of the image analysis window. An application in the case of vibrated sand has been studied. An instrumented laboratory device provides sinusoidal vibrations and enables external optical observations of sand motion in 3D transparent boxes. At 50 Hz, by increasing the relative acceleration G, the onset and development of two convective rolls can be observed. An ultra fast camera records the grain avalanches, and several pairs of images are analysed by the proposed method. The vertical velocity profiles are deduced and allow to precisely quantify the dimensions of the fluidized region as a function of G.

  20. Exploiting Context to Identify Lexical Atoms A Statistical View of Linguistic Context

    CERN Document Server

    Zhai, C

    1997-01-01

    Interpretation of natural language is inherently context-sensitive. Most words in natural language are ambiguous and their meanings are heavily dependent on the linguistic context in which they are used. The study of lexical semantics can not be separated from the notion of context. This paper takes a contextual approach to lexical semantics and studies the linguistic context of lexical atoms, or "sticky" phrases such as "hot dog". Since such lexical atoms may occur frequently in unrestricted natural language text, recognizing them is crucial for understanding naturally-occurring text. The paper proposes several heuristic approaches to exploiting the linguistic context to identify lexical atoms from arbitrary natural language text.

  1. Form and function in hillslope hydrology: characterization of subsurface flow based on response observations

    Science.gov (United States)

    Angermann, Lisa; Jackisch, Conrad; Allroggen, Niklas; Sprenger, Matthias; Zehe, Erwin; Tronicke, Jens; Weiler, Markus; Blume, Theresa

    2017-07-01

    The phrase form and function was established in architecture and biology and refers to the idea that form and functionality are closely correlated, influence each other, and co-evolve. We suggest transferring this idea to hydrological systems to separate and analyze their two main characteristics: their form, which is equivalent to the spatial structure and static properties, and their function, equivalent to internal responses and hydrological behavior. While this approach is not particularly new to hydrological field research, we want to employ this concept to explicitly pursue the question of what information is most advantageous to understand a hydrological system. We applied this concept to subsurface flow within a hillslope, with a methodological focus on function: we conducted observations during a natural storm event and followed this with a hillslope-scale irrigation experiment. The results are used to infer hydrological processes of the monitored system. Based on these findings, the explanatory power and conclusiveness of the data are discussed. The measurements included basic hydrological monitoring methods, like piezometers, soil moisture, and discharge measurements. These were accompanied by isotope sampling and a novel application of 2-D time-lapse GPR (ground-penetrating radar). The main finding regarding the processes in the hillslope was that preferential flow paths were established quickly, despite unsaturated conditions. These flow paths also caused a detectable signal in the catchment response following a natural rainfall event, showing that these processes are relevant also at the catchment scale. Thus, we conclude that response observations (dynamics and patterns, i.e., indicators of function) were well suited to describing processes at the observational scale. Especially the use of 2-D time-lapse GPR measurements, providing detailed subsurface response patterns, as well as the combination of stream-centered and hillslope-centered approaches

  2. Women in mining still exploited and sexually harassed

    Directory of Open Access Journals (Sweden)

    Doret Botha

    2016-02-01

    Full Text Available Orientation: Globally, women have become an essential part of the mining workforce. Among other jobs, they fulfil management positions, operate heavy machinery and are involved in artisanal mining processes. In South Africa, new mining legislation not only prohibits the exclusion of women but requires from companies to actively change the demographic profile of their workforce. Mining companies are obliged to also employ women in core mining activities. Although well intended, women appointed in core positions work side by side with men, often in isolation, and are frequently at risk of sexual abuse and/or harassment.Research purpose: This research determined perceptions regarding the occurrence of sexual harassment among women working in core mining positions.Motivation for the study: Currently, there is a paucity of published data on the occurrence of sexual harassment in the mining industry.Method: A mixed-method research design was used including quantitative and qualitative research paradigms. Quantitative data were collected by means of a structured questionnaire. Qualitative data were collected by means of individual and group interviews.Main findings: From the literature review and the empirical findings, it is evident that women are still exploited and sexually harassed in the mining industry. Incidents taking place on a daily basis vary from whistling; name calling; use of vulgar or derogatory language; display of body parts; physical contact, ranging from touching to sexual assault and rape; to the exchange of sexual favours for promotion.Practical/managerial implications: It is evident from the research that a holistic approach is required to effectively eradicate sexual harassment in the mining industry, involving the commitment of relevant state departments, human resource managers and labour experts.Contribution: Practical recommendations are made to effectively address sexual harassment in the mining industry.

  3. A foundation for flow-based matching: using temporal logic and model checking

    DEFF Research Database (Denmark)

    Brunel, Julien Pierre Manuel; Doligez, Damien; Hansen, René Rydhof

    2009-01-01

    within different control-flow paths, and a notion of witnesses that record such existential bindings for use in the subsequent program transformation process. We formalize CTL-VW and describe its use in the context of Coccinelle. We then assess the performance of the approach in practice, using......Reasoning about program control-flow paths is an important functionality of a number of recent program matching languages and associated searching and transformation tools. Temporal logic provides a well-defined means of expressing properties of control-flow paths in programs, and indeed...... with variables and witnesses) that is a suitable basis for the semantics and implementation of the Coccinelle’s program matching language. Our extension to CTL includes existential quantification over program fragments, which allows metavariables in the program matching language to range over different values...

  4. A Foundation for Flow-Based Program Matching Using Temporal Logic and Model Checking

    DEFF Research Database (Denmark)

    Brunel, Julien Pierre Manuel; Doligez, Damien; Hansen, Rene Rydhof

    2008-01-01

    different values within different control-flow paths, and a notion of witnesses that record such existential bindings for use in the subsequent program transformation process. We formalize CTL-VW and describe its use in the context of Coccinelle. We then assess the performance of the approach in practice......Reasoning about program control-flow paths is an important functionality of a number of recent program matching languages and associated searching and transformation tools. Temporal logic provides a well-defined means of expressing properties of control-flow paths in programs, and indeed......-VW (CTL with variables and witnesses) that is a suitable basis for the semantics and implementation of the Coccinelle’s program matching language. Our extension to CTL includes existential quantification over program fragments, which allows metavariables in the program matching language to range over...

  5. Exploitation of Full-Waveform LiDAR to Characterize / Exploit Under Canopy Targets - Foliage Penetration (FOPEN)

    Science.gov (United States)

    2015-09-28

    specific targets, and (3) full waveform application in forestry . Exploitation of Full-waveform LiDAR to Characterize/Exploit under Canopy Targets...Foliage Penetration (FOPEN)   9    The review on current waveform processing methods, LiDAR-specific targets and forestry applications clearly indicates...proceedings of IGARSS 2012, Munich, Germany, July 23-27, 2012. Molnar, B., Laky, S., and Toth, Ch. (2011): Using Full Waveform Data in Urban Areas

  6. MATHEMATICS OF SENSING, EXPLOITATION, AND EXECUTION (MSEE) Sensing, Exploitation, and Execution (SEE) on a Foundation for Representation, Inference, and Learning

    Science.gov (United States)

    2016-07-01

    AFRL-RY-WP-TR-2016-0127 MATHEMATICS OF SENSING, EXPLOITATION, AND EXECUTION (MSEE) Sensing, Exploitation, and Execution (SEE) on a Foundation for...MM-YY) 2. REPORT TYPE 3. DATES COVERED (From - To) July 2016 Final 26 September 2011 – 15 March 2015 4. TITLE AND SUBTITLE MATHEMATICS OF SENSING... mathematical foundation for unified representation, inference, and learning for ISR problems. The result of the project is an end-to-end system for scene and

  7. Exploiting heterogeneous publicly available data sources for drug safety surveillance: computational framework and case studies.

    Science.gov (United States)

    Koutkias, Vassilis G; Lillo-Le Louët, Agnès; Jaulent, Marie-Christine

    2017-02-01

    Driven by the need of pharmacovigilance centres and companies to routinely collect and review all available data about adverse drug reactions (ADRs) and adverse events of interest, we introduce and validate a computational framework exploiting dominant as well as emerging publicly available data sources for drug safety surveillance. Our approach relies on appropriate query formulation for data acquisition and subsequent filtering, transformation and joint visualization of the obtained data. We acquired data from the FDA Adverse Event Reporting System (FAERS), PubMed and Twitter. In order to assess the validity and the robustness of the approach, we elaborated on two important case studies, namely, clozapine-induced cardiomyopathy/myocarditis versus haloperidol-induced cardiomyopathy/myocarditis, and apixaban-induced cerebral hemorrhage. The analysis of the obtained data provided interesting insights (identification of potential patient and health-care professional experiences regarding ADRs in Twitter, information/arguments against an ADR existence across all sources), while illustrating the benefits (complementing data from multiple sources to strengthen/confirm evidence) and the underlying challenges (selecting search terms, data presentation) of exploiting heterogeneous information sources, thereby advocating the need for the proposed framework. This work contributes in establishing a continuous learning system for drug safety surveillance by exploiting heterogeneous publicly available data sources via appropriate support tools.

  8. The ESA scientific exploitation element results and outlook

    Science.gov (United States)

    Desnos, Yves-louis; Regner, Peter; Delwart, Steven; Benveniste, Jerome; Engdahl, Marcus; Donlon, Craig; Mathieu, Pierre-Philippe; Fernandez, Diego; Gascon, Ferran; Zehner, Claus; Davidson, Malcolm; Goryl, Philippe; Koetz, Benjamin; Pinnock, Simon

    2017-04-01

    The Scientific Exploitation of Operational Missions (SEOM) element of ESA's fourth Earth Observation Envelope Programme (EOEP4) prime objective is to federate, support and expand the international research community built up over the last 25 years exploiting ESA's EO missions. SEOM enables the science community to address new scientific research areas that are opened by the free and open access to data from operational EO missions. Based on community-wide recommendations, gathered through a series of international thematic workshops and scientific user consultation meetings, key research studies have been launched over the last years to further exploit data from the Sentinels (http://seom.esa.int/). During 2016 several Science users consultation workshops have been organized, new results from scientific studies have been published and open-source multi-mission scientific toolboxes have been distributed (SNAP 80000 users from 190 countries). In addition the first ESA Massive Open Online Courses on Climate from space have been deployed (20000 participants) and the second EO Open Science conference was organized at ESA in September 2016 bringing together young EO scientists and data scientists. The new EOEP5 Exploitation element approved in 2016 and starting in 2017 is taking stock of all precursor activities in EO Open Science and Innovation and in particular a workplan for ESA scientific exploitation activities has been presented to Member States taking full benefit of the latest information and communication technology. The results and highlights from current scientific exploitation activities will be presented and an outlook on the upcoming activities under the new EOEP5 exploitation element will be given.

  9. Managing the exploitation life of the mining machinery for an unlimited duration of time

    Directory of Open Access Journals (Sweden)

    Vujić Slobodan

    2011-01-01

    Full Text Available The problem of determining the optimum exploitation life of machinery, namely, the optimum time for machinery and equipment replacement, represents a complex and highly responsible engineering task. Taking into consideration the situation prevailing at coal pit mines in Serbia, the tasks of this rank are very complex and difficult. To make a decision on the replacement of capital equipment and machinery, such as bucket wheel excavators within the mentioned systems, implies a management task of utmost responsibility. It requires high professional and analytical knowledge as well as reliable arguments, based on a multidisciplinary professional approach. In this paper, the authors present their views on the problem of establishing the optimum exploitation life of bucket wheel excavators, offering an algorithm, based on dynamic programming, as a solution.

  10. Pattern Extraction Algorithm for NetFlow-Based Botnet Activities Detection

    Directory of Open Access Journals (Sweden)

    Rafał Kozik

    2017-01-01

    Full Text Available As computer and network technologies evolve, the complexity of cybersecurity has dramatically increased. Advanced cyber threats have led to current approaches to cyber-attack detection becoming ineffective. Many currently used computer systems and applications have never been deeply tested from a cybersecurity point of view and are an easy target for cyber criminals. The paradigm of security by design is still more of a wish than a reality, especially in the context of constantly evolving systems. On the other hand, protection technologies have also improved. Recently, Big Data technologies have given network administrators a wide spectrum of tools to combat cyber threats. In this paper, we present an innovative system for network traffic analysis and anomalies detection to utilise these tools. The systems architecture is based on a Big Data processing framework, data mining, and innovative machine learning techniques. So far, the proposed system implements pattern extraction strategies that leverage batch processing methods. As a use case we consider the problem of botnet detection by means of data in the form of NetFlows. Results are promising and show that the proposed system can be a useful tool to improve cybersecurity.

  11. Sound source localization method in an environment with flow based on Amiet-IMACS

    Science.gov (United States)

    Wei, Long; Li, Min; Qin, Sheng; Fu, Qiang; Yang, Debin

    2017-05-01

    A sound source localization method is proposed to localize and analyze the sound source in an environment with airflow. It combines the improved mapping of acoustic correlated sources (IMACS) method and Amiet's method, and is called Amiet-IMACS. It can localize uncorrelated and correlated sound sources with airflow. To implement this approach, Amiet's method is used to correct the sound propagation path in 3D, which improves the accuracy of the array manifold matrix and decreases the position error of the localized source. Then, the mapping of acoustic correlated sources (MACS) method, which is as a high-resolution sound source localization algorithm, is improved by self-adjusting the constraint parameter at each irritation process to increase convergence speed. A sound source localization experiment using a pair of loud speakers in an anechoic wind tunnel under different flow speeds is conducted. The experiment exhibits the advantage of Amiet-IMACS in localizing a more accurate sound source position compared with implementing IMACS alone in an environment with flow. Moreover, the aerodynamic noise produced by a NASA EPPLER 862 STRUT airfoil model in airflow with a velocity of 80 m/s is localized using the proposed method, which further proves its effectiveness in a flow environment. Finally, the relationship between the source position of this airfoil model and its frequency, along with its generation mechanism, is determined and interpreted.

  12. Towards Integrated Powertrain Control: exploiting synergy between a diesel hybrid and aftertreatment system in a distribution truck

    NARCIS (Netherlands)

    Foster, D.L.; Cloudt, R.P.M.; Willems, F.P.T.

    2008-01-01

    With the increasing demands on driveability, fuel efficiency and emissions, it becomes essential to optimize the overall performance of future powertrains. Therefore, a system approach is required. In this study, the Integrated Powertrain Control concept is presented, which exploits the synergy

  13. Optic flow-based collision-free strategies: From insects to robots.

    Science.gov (United States)

    Serres, Julien R; Ruffier, Franck

    2017-09-01

    Flying insects are able to fly smartly in an unpredictable environment. It has been found that flying insects have smart neurons inside their tiny brains that are sensitive to visual motion also called optic flow. Consequently, flying insects rely mainly on visual motion during their flight maneuvers such as: takeoff or landing, terrain following, tunnel crossing, lateral and frontal obstacle avoidance, and adjusting flight speed in a cluttered environment. Optic flow can be defined as the vector field of the apparent motion of objects, surfaces, and edges in a visual scene generated by the relative motion between an observer (an eye or a camera) and the scene. Translational optic flow is particularly interesting for short-range navigation because it depends on the ratio between (i) the relative linear speed of the visual scene with respect to the observer and (ii) the distance of the observer from obstacles in the surrounding environment without any direct measurement of either speed or distance. In flying insects, roll stabilization reflex and yaw saccades attenuate any rotation at the eye level in roll and yaw respectively (i.e. to cancel any rotational optic flow) in order to ensure pure translational optic flow between two successive saccades. Our survey focuses on feedback-loops which use the translational optic flow that insects employ for collision-free navigation. Optic flow is likely, over the next decade to be one of the most important visual cues that can explain flying insects' behaviors for short-range navigation maneuvers in complex tunnels. Conversely, the biorobotic approach can therefore help to develop innovative flight control systems for flying robots with the aim of mimicking flying insects' abilities and better understanding their flight. Copyright © 2017 The Authors. Published by Elsevier Ltd.. All rights reserved.

  14. A cellular automata model for traffic flow based on kinetics theory, vehicles capabilities and driver reactions

    Science.gov (United States)

    Guzmán, H. A.; Lárraga, M. E.; Alvarez-Icaza, L.; Carvajal, J.

    2018-02-01

    In this paper, a reliable cellular automata model oriented to faithfully reproduce deceleration and acceleration according to realistic reactions of drivers, when vehicles with different deceleration capabilities are considered is presented. The model focuses on describing complex traffic phenomena by coding in its rules the basic mechanisms of drivers behavior, vehicles capabilities and kinetics, while preserving simplicity. In particular, vehiclés kinetics is based on uniform accelerated motion, rather than in impulsive accelerated motion as in most existing CA models. Thus, the proposed model calculates in an analytic way three safe preserving distances to determine the best action a follower vehicle can take under a worst case scenario. Besides, the prediction analysis guarantees that under the proper assumptions, collision between vehicles may not happen at any future time. Simulations results indicate that all interactions of heterogeneous vehicles (i.e., car-truck, truck-car, car-car and truck-truck) are properly reproduced by the model. In addition, the model overcomes one of the major limitations of CA models for traffic modeling: the inability to perform smooth approach to slower or stopped vehicles. Moreover, the model is also capable of reproducing most empirical findings including the backward speed of the downstream front of the traffic jam, and different congested traffic patterns induced by a system with open boundary conditions with an on-ramp. Like most CA models, integer values are used to make the model run faster, which makes the proposed model suitable for real time traffic simulation of large networks.

  15. Modelling of two-phase flow based on separation of the flow according to velocity

    Energy Technology Data Exchange (ETDEWEB)

    Narumo, T. [VTT Energy, Espoo (Finland). Nuclear Energy

    1997-12-31

    The thesis concentrates on the development work of a physical one-dimensional two-fluid model that is based on Separation of the Flow According to Velocity (SFAV). The conventional way to model one-dimensional two-phase flow is to derive conservation equations for mass, momentum and energy over the regions occupied by the phases. In the SFAV approach, the two-phase mixture is divided into two subflows, with as distinct average velocities as possible, and momentum conservation equations are derived over their domains. Mass and energy conservation are treated equally with the conventional model because they are distributed very accurately according to the phases, but momentum fluctuations follow better the flow velocity. Submodels for non-uniform transverse profile of velocity and density, slip between the phases within each subflow and turbulence between the subflows have been derived. The model system is hyperbolic in any sensible flow conditions over the whole range of void fraction. Thus, it can be solved with accurate numerical methods utilizing the characteristics. The characteristics agree well with the used experimental data on two-phase flow wave phenomena Furthermore, the characteristics of the SFAV model are as well in accordance with their physical counterparts as of the best virtual-mass models that are typically optimized for special flow regimes like bubbly flow. The SFAV model has proved to be applicable in describing two-phase flow physically correctly because both the dynamics and steady-state behaviour of the model has been considered and found to agree well with experimental data This makes the SFAV model especially suitable for the calculation of fast transients, taking place in versatile form e.g. in nuclear reactors. 45 refs. The thesis includes also five previous publications by author.

  16. Consumers’ Acceptance and Use of Information and Communications Technology: A UTAUT and Flow Based Theoretical Model

    Directory of Open Access Journals (Sweden)

    Saleh Alwahaishi

    2013-03-01

    Full Text Available The world has changed a lot in the past years. The rapid advances in technology and the changing of the communication channels have changed the way people work and, for many, where do they work from. The Internet and mobile technology, the two most dynamic technological forces in modern information and communications technology (ICT are converging into one ubiquitous mobile Internet service, which will change our way of both doing business and dealing with our daily routine activities. As the use of ICT expands globally, there is need for further research into cultural aspects and implications of ICT. The acceptance of Information Technology (IT has become a fundamental part of the research plan for most organizations (Igbaria 1993. In IT research, numerous theories are used to understand users’ adoption of new technologies. Various models were developed including the Technology Acceptance Model, Theory of Reasoned Action, Theory of Planned Behavior, and recently, the Unified Theory of Acceptance and Use of Technology. Each of these models has sought to identify the factors which influence a citizen’s intention or actual use of information technology. Drawing on the UTAUT model and Flow Theory, this research composes a new hybrid theoretical framework to identify the factors affecting the acceptance and use of Mobile Internet -as an ICT application- in a consumer context. The proposed model incorporates eight constructs: Performance Expectancy, Effort Expectancy, Facilitating Conditions, Social Influences, Perceived Value, Perceived Playfulness, Attention Focus, and Behavioral intention. Data collected online from 238 respondents in Saudi Arabia were tested against the research model, using the structural equation modeling approach. The proposed model was mostly supported by the empirical data. The findings of this study provide several crucial implications for ICT and, in particular, mobile Internet service practitioners and researchers

  17. Exploitation and Utilization of Oilfield Geothermal Resources in China

    Directory of Open Access Journals (Sweden)

    Shejiao Wang

    2016-09-01

    Full Text Available Geothermal energy is a clean, green renewable resource, which can be utilized for power generation, heating, cooling, and could effectively replace oil, gas, and coal. In recent years, oil companies have put more efforts into exploiting and utilizing geothermal energy with advanced technologies for heat-tracing oil gathering and transportation, central heating, etc., which has not only reduced resource waste, but also improved large-scale and industrial resource utilization levels, and has achieved remarkable economic and social benefits. Based on the analysis of oilfield geothermal energy development status, resource potential, and exploitation and utilization modes, the advantages and disadvantages of harnessing oilfield geothermal resource have been discussed. Oilfield geothermal energy exploitation and utilization have advantages in resources, technical personnel, technology, and a large number of abandoned wells that could be reconstructed and utilized. Due to the high heat demand in oilfields, geothermal energy exploitation and utilization can effectively replace oil, gas, coal, and other fossil fuels, and has bright prospects. The key factors limiting oilfield geothermal energy exploitation and utilization are also pointed out in this paper, including immature technologies, lack of overall planning, lack of standards in resource assessment, and economic assessment, lack of incentive policies, etc.

  18. Measurement of urinary N-telopeptides and serum C-telopeptides from type I collagen using a lateral flow-based immunoassay.

    Science.gov (United States)

    Lee, Kyoung Min; Lee, Min Ho; Chung, Chin Youb; Seong, Woo Kyeong; Lee, Sang Dae; Park, Moon Seok

    2012-12-24

    Measuring bone turnover markers could detect early stages of osteoporosis and early responses to anti-osteoporotic treatments. Currently, commonly used bone turnover markers, N-telopeptides (NTx) and C-telopeptides (CTx), are measured using ELISA tests, which demands time and increases cost. Bone turnover markers need to be measured more easily for general use. Lateral flow-based immunoassay would be an appropriate method for this context. This study was performed to investigate the precision of a newly developed lateral flow-based immunoassay for measuring the urinary NTx and serum CTx, and their correlations with ELISA measurements. Urine NTx and serum CTx concentrations were determined by photoscan of newly developed strips, using a lateral flow-based immunoassay for 36 subjects (mean age 66.2 years, SD 7.5 years; four males and 32 females). Repeated measurement of urinary NTx and serum CTx were performed three times, using this technology for a precision test. The correlation of the lateral flow-based immunoassay with the ELISA measurements was analyzed. Precision of the newly developed lateral flow based immunoassay was 0.974 (ICC, 95% confidence interval, 0.955 to 0.986) and 0.995 (ICC, 95% confidence interval, 0.991 to 0.997) for urinary NTx and serum CTx, respectively. The correlation of lateral flow based immunoassay with ELISA was 0.913 for urinary NTx and 0.872 for serum CTx. These results suggest that measuring the urinary NTx and serum CTx, using a lateral flow-based immunoassay, is a relevant method for point-of-care testing and screening of bone resorption markers.

  19. Measurement of Urinary N-Telopeptides and Serum C-Telopeptides from Type I Collagen Using a Lateral Flow-Based Immunoassay

    Directory of Open Access Journals (Sweden)

    Kyoung Min Lee

    2012-12-01

    Full Text Available Measuring bone turnover markers could detect early stages of osteoporosis and early responses to anti-osteoporotic treatments. Currently, commonly used bone turnover markers, N-telopeptides (NTx and C-telopeptides (CTx, are measured using ELISA tests, which demands time and increases cost. Bone turnover markers need to be measured more easily for general use. Lateral flow-based immunoassay would be an appropriate method for this context. This study was performed to investigate the precision of a newly developed lateral flow-based immunoassay for measuring the urinary NTx and serum CTx, and their correlations with ELISA measurements. Urine NTx and serum CTx concentrations were determined by photoscan of newly developed strips, using a lateral flow-based immunoassay for 36 subjects (mean age 66.2 years, SD 7.5 years; four males and 32 females. Repeated measurement of urinary NTx and serum CTx were performed three times, using this technology for a precision test. The correlation of the lateral flow-based immunoassay with the ELISA measurements was analyzed. Precision of the newly developed lateral flow based immunoassay was 0.974 (ICC, 95% confidence interval, 0.955 to 0.986 and 0.995 (ICC, 95% confidence interval, 0.991 to 0.997 for urinary NTx and serum CTx, respectively. The correlation of lateral flow based immunoassay with ELISA was 0.913 for urinary NTx and 0.872 for serum CTx. These results suggest that measuring the urinary NTx and serum CTx, using a lateral flow-based immunoassay, is a relevant method for point-of-care testing and screening of bone resorption markers.

  20. A novel physical eco-hydrological model concept for preferential flow based on experimental applications.

    Science.gov (United States)

    Jackisch, Conrad; van Schaik, Loes; Graeff, Thomas; Zehe, Erwin

    2014-05-01

    Preferential flow through macropores often determines hydrological characteristics - especially regarding runoff generation and fast transport of solutes. Macropore settings may yet be very different in nature and dynamics, depending on their origin. While biogenic structures follow activity cycles (e.g. earth worms) and population conditions (e.g. roots), pedogenic and geogenic structures may depend on water stress (e.g. cracks) or large events (e.g. flushed voids between skeleton and soil pipes) or simply persist (e.g. bedrock interface). On the one hand, such dynamic site characteristics can be observed in seasonal changes in its reaction to precipitation. On the other hand, sprinkling experiments accompanied by tracers or time-lapse 3D Ground-Penetrating-Radar are suitable tools to determine infiltration patterns and macropore configuration. However, model representation of the macropore-matrix system is still problematic, because models either rely on effective parameters (assuming well-mixed state) or on explicit advection strongly simplifying or neglecting interaction with the diffusive flow domain. Motivated by the dynamic nature of macropores, we present a novel model approach for interacting diffusive and advective water, solutes and energy transport in structured soils. It solely relies on scale- and process-aware observables. A representative set of macropores (data from sprinkling experiments) determines the process model scale through 1D advective domains. These are connected to a 2D matrix domain which is defined by pedo-physical retention properties. Water is represented as particles. Diffusive flow is governed by a 2D random walk of these particles while advection may take place in the macropore domain. Macropore-matrix interaction is computed as dissipation of the advective momentum of a particle by its experienced drag from the matrix domain. Through a representation of matrix and macropores as connected diffusive and advective domains for water

  1. Experimental Simulation of the Exploitation of Natural Gas Hydrate

    Directory of Open Access Journals (Sweden)

    Chang-Yu Sun

    2012-02-01

    Full Text Available Natural gas hydrates are cage-like crystalline compounds in which a large amount of methane is trapped within a crystal structure of water, forming solids at low temperature and high pressure. Natural gas hydrates are widely distributed in permafrost regions and offshore. It is estimated that the worldwide amounts of methane bound in gas hydrates are total twice the amount of carbon to be found in all known fossil fuels on earth. A proper understanding of the relevant exploitation technologies is then important for natural gas production applications. In this paper, the recent advances on the experimental simulation of natural gas hydrate exploitation using the major hydrate production technologies are summarized. In addition, the current situation of the industrial exploitation of natural gas hydrate is introduced, which are expected to be useful for establishing more safe and efficient gas production technologies.

  2. The exploitation of swamp plants for dewatering liquid sewage sludge

    Directory of Open Access Journals (Sweden)

    Jiří Šálek

    2006-01-01

    Full Text Available The operators of little rural wastewater treatment plants have been interested in economic exploitation of sewage sludge in local conditions. The chance is searching simply and natural ways of processing and exploitation stabilized sewage sludge in agriculture. Manure substrate have been obtained by composting waterless sewage sludge including rest plant biomass after closing 6–8 years period of filling liquid sewage sludge to the basin. Main attention was focused on exploitation of swamp plants for dewatering liquid sewage sludge and determination of influence sewage sludge on plants, intensity and course of evapotranspiration and design and setting of drying beds. On the base of determined ability of swamp plants evapotranspiration were edited suggestion solutions of design and operation sludge bed facilities in the conditions of small rural wastewater treatment plant.

  3. Screening for Child Sexual Exploitation in Online Sexual Health Services: An Exploratory Study of Expert Views.

    Science.gov (United States)

    Spencer-Hughes, Victoria; Syred, Jonathan; Allison, Alison; Holdsworth, Gillian; Baraitser, Paula

    2017-02-14

    Sexual health services routinely screen for child sexual exploitation (CSE). Although sexual health services are increasingly provided online, there has been no research on the translation of the safeguarding function to online services. We studied expert practitioner views on safeguarding in this context. The aim was to document expert practitioner views on safeguarding in the context of an online sexual health service. We conducted semistructured interviews with lead professionals purposively sampled from local, regional, or national organizations with a direct influence over CSE protocols, child protection policies, and sexual health services. Interviews were analyzed by three researchers using a matrix-based analytic method. Our respondents described two different approaches to safeguarding. The "information-providing" approach considers that young people experiencing CSE will ask for help when they are ready from someone they trust. The primary function of the service is to provide information, provoke reflection, generate trust, and respond reliably to disclosure. The approach values online services as an anonymous space to test out disclosure without commitment. The "information-gathering" approach considers that young people may withhold information about exploitation. Therefore, services should seek out information to assess risk and initiate disclosure. This approach values face-to-face opportunities for individualized questioning and immediate referral. The information-providing approach is associated with confidential telephone support lines and the information-gathering approach with clinical services. The approach adopted online will depend on ethos and the range of services provided. Effective transition from online to clinic services after disclosure is an essential element of this process and further research is needed to understand and support this transition.

  4. The human traffickers and exploitation of children and young adults.

    Directory of Open Access Journals (Sweden)

    Sara Scala

    2012-06-01

    Full Text Available The article focuses on the traffic of children, who are kidnapped, cheated and purchased by their families to be exploited in many ways. These victims have severe mental and physical traumas. Many of them, slaves of their exploiters, remain invisible and live their lifes without fundamental rights and without any kind of support or help. The traffic in human beings is a new kind of slavery, which acts in the dark, is criminal and involves different subjects of different ages, different nationalities and generations. The traffic in human beings is managed by transnational criminal organizations and is a disturbing and growing phenomena around the world.

  5. NUMERICAL ANALYSES OF THE UNDERGROUND EXPLOITATION OF DIMENSION STONE

    Directory of Open Access Journals (Sweden)

    Biljana Kovačević-Zelić

    1996-12-01

    Full Text Available Underground exploitation of dimension stone is spreading lately for three main reasons; economy, organisation and environment. Moreover, underground openings can be used for many purposes. Underground exploitation is different from surface quarrying only in the first stage, the removal of top slice, descending slices are worked as in conventional quarries. In underground stone quarries, stability problems require adequate studies in order to avoid expensive artificial support measures, The article presents numerical analyses of an underground stone quarry made using of the finite difference code FLAC (the paper is published in Croatian.

  6. The Hegemony Handbook: Exploiting the Space between War and Peace

    Science.gov (United States)

    2016-11-01

    I N S T I T U T E F O R D E F E N S E A N A L Y S E S The Hegemony Handbook: Exploiting the Space between War and Peace Prashant R. Patel...Jun 2013]. The Hegemony Handbook: Exploiting the Space between War and Peace Prashant R. Patel, Project Leader David A. Sparrow I N S T I T U T E F O...making us appear weak and ineffective because we cannot stop these short-of- war actions. The A2AD systems increase the risk to our conventional forces

  7. From Exploitation to Industry: Definitions, Risks, and Consequences of Domestic Sexual Exploitation and Sex Work Among Women and Girls

    Science.gov (United States)

    Gerassi, Lara

    2015-01-01

    In the last 15 years, terms such as prostitution, sex trafficking, sexual exploitation, modern-day slavery, and sex work have elicited much confusion and debate as to their definitions. Consequently several challenges have emerged for both law enforcement in the prosecution of criminals and practitioners in service provision. This article reviews the state of the literature with regard to domestic, sexual exploitation among women and girls in the United States and seeks to (1) provide definitions and describe the complexity of all terms relating to domestic sexual exploitation of women and girls in the United States, (2) explore available national prevalence data according to the definitions provided, and (3) review the evidence of mental health, social, and structural risk factors at the micro-, mezzo-, and macrolevels. PMID:26726289

  8. Child trafficking and commercial sexual exploitation: a review of promising prevention policies and programs.

    Science.gov (United States)

    Rafferty, Yvonne

    2013-10-01

    Child trafficking, including commercial sexual exploitation (CSE), is one of the fastest growing and most lucrative criminal activities in the world. The global enslavement of children affects countless numbers of victims who are trafficked within their home countries or transported away from their homes and treated as commodities to be bought, sold, and resold for labor or sexual exploitation. All over the world, girls are particularly likely to be trafficked into the sex trade: Girls and women constitute 98% of those who are trafficked for CSE. Health and safety standards in exploitative settings are generally extremely low, and the degree of experienced violence has been linked with adverse physical, psychological, and social-emotional development. The human-rights-based approach to child trafficking provides a comprehensive conceptual framework whereby victim-focused and law enforcement responses can be developed, implemented, and evaluated. This article highlights promising policies and programs designed to prevent child trafficking and CSE by combating demand for sex with children, reducing supply, and strengthening communities. The literature reviewed includes academic publications as well as international and governmental and nongovernmental reports. Implications for social policy and future research are presented. © 2013 American Orthopsychiatric Association.

  9. Environmental impact assessment of bitumen exploitation on animal ...

    African Journals Online (AJOL)

    This study was carried out to assess the environmental impact of Bitumen exploitation on wildlife resources in Ode-Irele forest area of Ondo-State, Nigeria. The result of the study showed that there are 9 orders and 40 species of mammals in the study area. Primates recorded the highest specie number (13,) and rodentia as ...

  10. Exporting DNA – striking a balance between preventing exploitation ...

    African Journals Online (AJOL)

    Three important points that complement the above need to be considered: (i) the details in the MTA must reflect what is stipulated in the informed consent ... they not only contain information that may be of importance from ... And how can we achieve a balance between preventing exploitation and promoting innovation?

  11. Exploitation of Bush Mango ( Irvingia wombolu and Irvingia ...

    African Journals Online (AJOL)

    The study was undertaken to assess the exploitation of Bush Mango Irvingia gabonensis and Irvingia wombolu (ogbono) among rural households in Enugu State, Nigeria. Interview schedule was used to collect data from 91 respondents and data were analyzed by use of descriptive statistics and factor analysis. The mean ...

  12. Fishery benefits from exploiting spawning aggregations not solely ...

    African Journals Online (AJOL)

    The vulnerability of spawning aggregations to exploitation varies among fisheries as a result of differences in the population-density changes associated with this behaviour. However, vulnerability to fishing is also influenced by technology, environmental factors, and fish and fisher behaviours. Focusing on a fishery for the ...

  13. Exploiting wild relatives of S. lycopersicum for quality traits

    NARCIS (Netherlands)

    Víquez Zamora, A.M.

    2015-01-01

    Exploiting wild relatives of S. lycopersicum for quality traits Ana Marcela Víquez Zamora Tomatoes are consumed worldwide and became a model for crop plant research. A part of the research aims at expanding genetic diversity in tomato; this can be done by incorporating

  14. Six scenarios of exploiting an ontology based, mobilized learning environment

    NARCIS (Netherlands)

    Kismihók, G.; Szabó, I.; Vas, R.

    2012-01-01

    In this article, six different exploitation possibilities of an educational ontology based, mobilized learning management system are presented. The focal point of this system is the educational ontology model. The first version of this educational ontology model serves as a foundation for curriculum

  15. Software defined radio receivers exploiting noise cancelling: A tutorial review

    NARCIS (Netherlands)

    Klumperink, Eric A.M.; Nauta, Bram

    2014-01-01

    Traditional radio receivers were narrowband and dedicated to a single frequency band exploiting LC tanks, whereas software defined radios target a flexibly programmable frequency. The broadband noise cancelling circuit technique has proven useful to achieve this target, as it breaks the traditional

  16. Spatial dynamics of fuel wood exploitation in Delta State, Nigeria ...

    African Journals Online (AJOL)

    This study examined the spatial and temporal changes in fuel wood exploitation as a result of environmental degradation, between 2008 and 2013 in Delta State, Nigeria. It utilised data from both primary and secondary sources. Primary data were obtained from a survey of selected settlements using a questionnaire.

  17. Exploiting Policies in an Open Infrastructure for Lifelong Learning

    NARCIS (Netherlands)

    De Coi, Juri L.; Koesling, Arne; Kärger, Philipp; Olmedilla, Daniel

    2007-01-01

    De Coi, J. L., Kösling, A., Kärger, P., Olmedilla, D., (2007) Exploiting Policies in an Open Infrastructure for Lifelong Learning. In Duval, E., Klamma, R. and Wolpers, M. (Eds.), Second European Conference on Technology Enhanced Learning, Lecture Notes in Computer Science, 4753, pp.26-40.

  18. Traditional exploitation of edible freshwater oyster Etheria elliptica ...

    African Journals Online (AJOL)

    Finally, oyster`s shell, a main substrate for larval settlement and bed restoration, were left on riverbanks after exploitation, reducing stocks reconstitution potential. Appropriate measures were suggested to Reserve staff for sustainable management. Keywords: Freshwater mollusk, harvesting activities, human pressure, ...

  19. Key points in biotechnological patents to be exploited.

    Science.gov (United States)

    García, Alfredo Mateos; López-Moya, José Rafael; Ramos, Patricia

    2013-08-01

    Patents in some biotechnological fields are controversial. Despite this fact, the number of patent applications increases every year. Total revenues in the global biotechnology market are expected to increase in the middle term. Nowadays, the bioeconomy is an important socio-economic area, which is reflected in the number of firms dedicated to or using biotechnology. The exploitation of biotechnological patents is an essential task in the management of intellectual capital. This paper explains the multiplicity of factors that influence the exploitation of biotechnological patents; specifically, the internal and external key points of patents exploitation. The external determining factors for patents are: (i) the market need for biotechnological products and services, (ii) the importance of the freedom to operate analysis before entering the market, and (iii) efficiency in prosecution by Patent Offices. This paper primarily focuses on the internal determining factors, more particularly, the characteristics that the patent's owner must take into consideration in order to have a strong, broad subject-matter in the granted patent. The experimentation needed to obtain an adequate scope of the subject- matter in the claims is a critical issue in the exploitation of a patent or patent application.

  20. Evaluating Maximum Wind Energy Exploitation in Active Distribution Networks

    DEFF Research Database (Denmark)

    Siano, Pierluigi; Chen, Peiyuan; Chen, Zhe

    2010-01-01

    The increased spreading of distributed and renewable generation requires moving towards active management of distribution networks. In this paper, in order to evaluate maximum wind energy exploitation in active distribution networks, a method based on a multi-period optimal power flow (OPF...

  1. Confirmatory Factor Analysis of Perceived Exploitation of College Athletes Questionnaire

    Science.gov (United States)

    Van Rheenen, Derek; Atwood, Jason R.

    2014-01-01

    The exploitation of college athletes has been a topic of controversy within American higher education for over half of a century. Especially in the revenue-generating sports of men's basketball and football, critics have highlighted the surplus gains expropriated by colleges and universities on the backs of these young men, who are…

  2. Exploring, exploiting and evolving diversity of aquatic ecosystem models

    NARCIS (Netherlands)

    Janssen, A.B.G.; Arhonditsis, G.B.; Beusen, Arthur; Bolding, Karsten; Bruce, Louise; Bruggeman, Jorn; Couture, Raoul Marie; Downing, Andrea S.; Alex Elliott, J.; Frassl, M.A.; Gal, Gideon; Gerla, Daan J.; Hipsey, M.R.; Hu, Fenjuan; Ives, S.C.; Janse, J.H.; Jeppesen, Erik; Jöhnk, K.D.; Kneis, David; Kong, Xiangzhen; Kuiper, J.J.; Lehmann, M.K.; Lemmen, Carsten; Özkundakci, Deniz; Petzoldt, Thomas; Rinke, Karsten; Robson, B.J.; Sachse, René; Schep, S.A.; Schmid, Martin; Scholten, Huub; Teurlincx, Sven; Trolle, Dennis; Troost, T.A.; Dam, Van A.A.; Gerven, Van L.P.A.; Weijerman, Mariska; Wells, S.A.; Mooij, W.M.

    2015-01-01

    Here, we present a community perspective on how to explore, exploit and evolve the diversity in aquatic ecosystem models. These models play an important role in understanding the functioning of aquatic ecosystems, filling in observation gaps and developing effective strategies for water quality

  3. Efficient Depth Map Compression Exploiting Segmented Color Data

    DEFF Research Database (Denmark)

    Milani, Simone; Zanuttigh, Pietro; Zamarin, Marco

    2011-01-01

    performances is still an open research issue. This paper presents a novel compression scheme that exploits a segmentation of the color data to predict the shape of the different surfaces in the depth map. Then each segment is approximated with a parameterized plane. In case the approximation is sufficiently...

  4. Rural Fuelwood Exploitation in Mbo Local Government Area – A ...

    African Journals Online (AJOL)

    Rural Fuelwood Exploitation in Mbo Local Government Area – A Nigerian Coastal Settlement. ... Ethiopian Journal of Environmental Studies and Management ... Result show that 90% of the total local energy requirement is from fuelwood, the average per capita production rate of fuelwood in the local area is 0.38m3 and the ...

  5. Sexual exploitation and abuse by UN peacekeepers: the ...

    African Journals Online (AJOL)

    United Nations peacekeepers have been subject to allegations of serious sexual misconduct for many years. Such incidents of sexual assault perpetrated by peacekeepers have been documented over the years in a number of countries. The violation of codes of conduct, particularly regarding sexual exploitation and abuse, ...

  6. Desiring TESOL and International Education: Market Abuse and Exploitation

    Science.gov (United States)

    Chowdhury, Raqib; Ha, Phan Le

    2014-01-01

    This book addresses how Western universities have constructed themselves as global providers of education, and are driven to be globally competitive. It examines how the term "international" has been exploited by the market in the form of government educational policies and agencies, host institutions, academia and the mass media. The…

  7. Wideband Low Noise Amplifiers Exploiting Thermal Noise Cancellation

    NARCIS (Netherlands)

    Bruccoleri, F.; Klumperink, Eric A.M.; Nauta, Bram

    2005-01-01

    Low Noise Amplifiers (LNAs) are commonly used to amplify signals that are too weak for direct processing for example in radio or cable receivers. Traditionally, low noise amplifiers are implemented via tuned amplifiers, exploiting inductors and capacitors in resonating LC-circuits. This can render

  8. Human trafficking and exploitation: A global health concern.

    Directory of Open Access Journals (Sweden)

    Cathy Zimmerman

    2017-11-01

    Full Text Available In this collection review, Cathy Zimmerman and colleague introduce the PLOS Medicine Collection on Human Trafficking, Exploitation and Health, laying out the magnitude of the global trafficking problem and offering a public health policy framework to guide responses to trafficking.

  9. Conflicts Related to Natural Resources Exploitation: A Case Study of ...

    African Journals Online (AJOL)

    Conflicts Related to Natural Resources Exploitation: A Case Study of Oil Crisis in Nigeria's Niger Delta Region and its Socio-Political and Economic Implications. ... This has tremendously disrupted the primary sources of livelihood of the people namely fishing and farming which has left them in abject poverty. It is this ...

  10. Exploitation Rates and Management Implications for the Fisheries of ...

    African Journals Online (AJOL)

    The exploitation rates of eight major component fishery species, Auchenoglanis occidentalis, Brycinus nurse, Clarias gariepinus, Hemichromis fasciatus, Marcusenius senegalensis, Oreochromis niloticus, Sarotherodon galilaeus and Tilapia zillii, of gill net fishery of Bontanga reservoir, were studied from March 2004 to ...

  11. Future potential for anti-infectives from bacteria - how to exploit biodiversity and genomic potential.

    Science.gov (United States)

    Müller, Rolf; Wink, Joachim

    2014-01-01

    The early stages of antibiotic development include the identification of novel hit compounds. Since actinomycetes and myxobacteria are still the most important natural sources of active metabolites, we provide an overview on these producers and discuss three of the most promising approaches toward finding novel anti-infectives from microorganisms. These are defined as the use of biodiversity to find novel producers, the variation of culture conditions and induction of silent genes, and the exploitation of the genomic potential of producers via "genome mining". Challenges that exist beyond compound discovery are outlined in the last section. Copyright © 2013 Elsevier GmbH. All rights reserved.

  12. Exploitation des propriétés des signaux dans les systèmes radar MIMO pour la détection et la localisation

    OpenAIRE

    bencheikh, mohamed-laïd

    2011-01-01

    The main objective of this thesis is to exploit the properties of the signals used in MIMO radar systems to improve the localisation performances. Thecohérent bistatic MIMO radar conguration present a good trade-o between the complexity, the diversity gains and the coherence gains. For this conguration, several new approaches based on the hight resolution techniques, which decompose the two dimensional joint estimation in double one dimensional estimation, have been proposed. By exploitation ...

  13. Financial Decision-making Abilities and Financial Exploitation in Older African Americans: Preliminary Validity Evidence for the Lichtenberg Financial Decision Rating Scale (LFDRS)

    OpenAIRE

    Lichtenberg, Peter A.; Ficker, Lisa J.; Rahman-Filipiak, Annalise

    2015-01-01

    This study examines preliminary evidence for the Lichtenberg Financial Decision Rating Scale (LFDRS), a new person-centered approach to assessing capacity to make financial decisions, and its relationship to self-reported cases of financial exploitation in 69 older African Americans. More than one third of individuals reporting financial exploitation also had questionable decisional abilities. Overall, decisional ability score and current decision total were significantly associated with cogn...

  14. Flow-Based Provenance

    National Research Council Canada - National Science Library

    Sabah Al-Fedaghi

    2017-01-01

    ...: Multiple models for abstract representation of provenance have been proposed to describe entities, people, and activities involved in producing a piece of data, including the Open Provenance Model (OPM...

  15. Continuous sample drop flow-based microextraction method as a microextraction technique for determination of organic compounds in water sample.

    Science.gov (United States)

    Moinfar, Soleyman; Khayatian, Gholamreza; Milani-Hosseini, Mohammad-Reza

    2014-11-01

    Continuous sample drop flow-based microextraction (CSDF-ME) is an improved version of continuous-flow microextraction (CFME) and a novel technique developed for extraction and preconcentration of benzene, toluene, ethyl benzene, m-xylene and o-xylene (BTEXs) from aqueous samples prior to gas chromatography-flame ionization detection (GC-FID). In this technique, a small amount (a few microliters) of organic solvent is transferred to the bottom of a conical bottom test tube and a few mL of aqueous solution is moved through the organic solvent at relatively slow flow rate. The aqueous solution transforms into fine droplets while passing through the organic solvent. After extraction, the enriched analyte in the extraction solvent is determined by GC-FID. The type of extraction solvent, its volume, needle diameter, and aqueous sample flow rate were investigated. The enrichment factor was 221-269 under optimum conditions and the recovery was 89-102%. The linear ranges and limits of detection for BTEXs were 2-500 and 1.4-3.1 µg L(-1), respectively. The relative standard deviations for 10 µg L(-1) of BTEXs in water were 1.8-6.2% (n=5). The advantages of CSDF-ME are its low cost, relatively short sample preparation time, low solvent consumption, high recovery, and high enrichment factor. Copyright © 2014 Elsevier B.V. All rights reserved.

  16. Host exploitation strategies of the social parasite Maculinea alcon

    DEFF Research Database (Denmark)

    Fürst, Matthias Alois

    . Throughout the first instars M. alcon lives on a specific food plant, however, in the last instar before pupation it develops into an obligate social parasite, posing a considerably cost to its host ant colony. I here focus on the different exploitation strategies of M. alcon throughout its lifecycle......  Coevolution is the process where at least two species put some selective pressure on each other, thereby reciprocally influencing each others evolution. To explain co-adaptations invoked by coevolution of interacting species, evolutionary biologists predominantly use host-parasite interactions...... as model systems. These enable the study of adaptations and counter-adaptations that might evolve in the arms-race between a parasite pursuing maximum gain and a host trying to avoid exploitation. One such system is the socially parasitic butterfly Maculinea alcon and its host the ant Myrmica rubra...

  17. Commodification and exploitation: arguments in favour of compensated organ donation.

    Science.gov (United States)

    de Castro, L D

    2003-06-01

    This paper takes the view that compensated donation and altruism are not incompatible. In particular, it holds that the arguments against giving compensation stand on weak rational grounds: (1) the charge that compensation fosters "commodification" has neither been specific enough to account for different types of monetary transactions nor sufficiently grounded in reality to be rationally convincing; (2) although altruism is commendable, organ donors should not be compelled to act purely on the basis of altruistic motivations, especially if there are good reasons to believe that significantly more lives can be saved and enhanced if incentives are put in place, and (3) offering compensation for organs does not necessarily lead to exploitation-on the contrary, it may be regarded as a necessity in efforts to minimise the level of exploitation that already exists in current organ procurement systems.

  18. Analysis Of Damage Arising From Exploitation Of The Aircraft

    Directory of Open Access Journals (Sweden)

    Woźny Piotr

    2014-12-01

    Full Text Available During exploitation, due to a variety of reasons, aircrafts are damaged or suffer from different failures. In the process of operation, using appropriate methods of diagnosis, failure, damage, and relative deregulation of individual elements or units can be detected. For this purpose, one can apply a number of indirect diagnostic methods with the use of recorded diagnostic signals or a direct diagnosis with the use of non-destructive methods. The proper identification of the technical condition allows to determine the causes of irregularities and take actions aimed at preventing their occurrence. The article presents the types of exploitation damage of a multi-purpose aircraft. In addition, the criteria for the division of damage and research methods of the causes of damage are presented. Furthermore, an analysis of the scope of activities to be performed during the research of causes of damage to the aircraft is made.

  19. Exploration and Exploitation Fit and Performance in International Strategic Alliances

    DEFF Research Database (Denmark)

    Nielsen, Bo Bernhard; Gudergan, Siegfried

    2012-01-01

    Exploration and exploitation constitute two separate, potentially conflicting strategic choices for firms engaged in international strategic alliances. Our empirical study challenges the ambidexterity argument and demonstrates that exploration and exploitation are separate (though not necessarily...... antithetical) strategies with different antecedents and performance consequences. Our results show that while competency similarity is conducive to upstream innovative performance, prior experience with the partner is potentially damaging for this type of performance and trust and cultural distance do not play...... significant roles. When the motive is efficiency and downstream market performance, prior experience with the partner instead is beneficial, as are high levels of trust and low levels of cultural distance. These findings have key implications for literature on strategic fit and alliance performance....

  20. Exploiting cantilever curvature for noise reduction in atomic force microscopy.

    Science.gov (United States)

    Labuda, Aleksander; Grütter, Peter H

    2011-01-01

    Optical beam deflection is a widely used method for detecting the deflection of atomic force microscope (AFM) cantilevers. This paper presents a first order derivation for the angular detection noise density which determines the lower limit for deflection sensing. Surprisingly, the cantilever radius of curvature, commonly not considered, plays a crucial role and can be exploited to decrease angular detection noise. We demonstrate a reduction in angular detection shot noise of more than an order of magnitude on a home-built AFM with a commercial 450 μm long cantilever by exploiting the optical properties of the cantilever curvature caused by the reflective gold coating. Lastly, we demonstrate how cantilever curvature can be responsible for up to 45% of the variability in the measured sensitivity of cantilevers on commercially available AFMs.

  1. Mathematical modeling of the behavior of geothermal systems under exploitation

    Energy Technology Data Exchange (ETDEWEB)

    Bodvarsson, G.S.

    1982-01-01

    Analytical and numerical methods have been used in this investigation to model the behavior of geothermal systems under exploitation. The work is divided into three parts: (1) development of a numerical code, (2) theoretical studies of geothermal systems, and (3) field applications. A new single-phase three-dimensional simulator, capable of solving heat and mass flow problems in a saturated, heterogeneous porous or fractured medium has been developed. The simulator uses the integrated finite difference method for formulating the governing equations and an efficient sparse solver for the solution of the linearized equations. In the theoretical studies, various reservoir engineering problems have been examined. These include (a) well-test analysis, (b) exploitation strategies, (c) injection into fractured rocks, and (d) fault-charged geothermal reservoirs.

  2. Exploitation Strategies in Social Parasites of Fungus Growing Ants

    DEFF Research Database (Denmark)

    Clement, Janni Dolby

    One of the most remarkable and complex parasitic interactions is social parasitism, where a parasite exploits a complete society, rather than an individual organism. By integrating into a society the parasite gains protection against predators and diseases, and can redirect resources from the host...... to increase its own fitness. The host will use a sophisticated recognition system in order to accept nestmates and expel intruders from their societies. However this defence barrier can be overcome by parasites. Among the most specialized social parasites are the inquilines that exploit social insect colonies...... to this are Acromyrmex insinuator and Acromyrmex ameliae, parasites of fungus-growing ants. By still producing a worker caste both species offers a rare opportunity to study adaptive features in parasite worker behaviour. Furthermore can closely related inquiline-host combinations give us an insight in the trade...

  3. Information source exploitation/exploration and NPD decision-making

    DEFF Research Database (Denmark)

    Jespersen, Kristina Risom

    of gate decision-making and information sources was developed across five generic stages (idea, concept, design, test, and commercialization). Our data was generated with a participatory agent-based simulation of NPD gate decision-points in the development process. The sample consists of 134 managers from......The purpose of this study is to examine how the exploration/exploitation continuum is applied by decision-makers in new product gate decision-making. Specifically, we analyze at gate decision-points how the evaluation of a new product project is affected by the information source exploitation....../exploration search behavior of decision-makers. In addition, overexploitation and overexploration in new product development decision-making is investigated through mediating effects of perceived information usefulness and applied performance criteria by decision-makers at gates. To this end a conceptual model...

  4. Design and Exploitation Problems of Drill String in Directional Drilling

    Directory of Open Access Journals (Sweden)

    Bednarz Stanislaw

    2004-09-01

    Full Text Available Drill string design for directional drilling requires accounting for a number of factors. First, types and expected values of loads should be determined. Then, elements of the drill string should be so selected as to enable realization of the plan at specified loads. Some of additional factors, e. g. purchase, exploitation cost, geological conditions in the bore-hole, washing of the bore-hole, stability, trajectory, rig parameters, accuracy of gauges, pumps parameters remain in conflict. Drill pipes are made of rolled pipes, upset and welded with tool joints to 9,5 m long; the shorter ones can be made of hot forged rods. Exploitation requirements, being a result of practical experience supported by theoretical and laboratory analyses should be a part of syllabuses of technical staff educational programs. Apart from designing the string, it is also vital to lower the risk of a drilling failure. The significance of these aspects seems to be unquestionable.

  5. Environmental Impacts of Sand Exploitation. Analysis of Sand Market

    Directory of Open Access Journals (Sweden)

    Marius Dan Gavriletea

    2017-06-01

    Full Text Available Sand is an indispensable natural resource for any society. Despite society’s increasing dependence on sand, there are major challenges that this industry needs to deal with: limited sand resources, illegal mining, and environmental impact of sand mining. The purpose of this paper is twofold: to present an overview of the sand market, highlighting the main trends and actors for production, export and import, and to review the main environmental impacts associated with sand exploitation process. Based on these findings, we recommend different measures to be followed to reduce negative impacts. Sand mining should be done in a way that limits environmental damage during exploitation and restores the land after mining operations are completed.

  6. Exploitation of Natural Resources and the Public Sector in Greenland

    DEFF Research Database (Denmark)

    Nielsen, Søren Bo

    This paper considers the role of the public sector in future exploitation of non-renewable resources, especially minerals, in Greenland. The focus is on fiscal sustainability, principles for public sector involvement and the form of government take from mining activities. At present, the public...... to GDP. Hence, fiscal policy is quite far from being sustainable. Apart from a need for reforms, these facts also constrain the possible role of the public sector in future resource exploitation. In any case, the government should preferably adhere to strict principles when developing the mineral sector...... in Greenland. Furthermore, serious attention should be given to how to secure an appropriate government take from mineral activities. The paper discusses several types of taxes as well as financing models....

  7. Exploring, exploiting and evolving diversity of aquatic ecosystem models

    DEFF Research Database (Denmark)

    Janssen, Annette B. G.; Arhonditsis, George B.; Beusen, Arthur

    2015-01-01

    Here, we present a community perspective on how to explore, exploit and evolve the diversity in aquatic ecosystem models. These models play an important role in understanding the functioning of aquatic ecosystems, filling in observation gaps and developing effective strategies for water quality...... management. In this spirit, numerous models have been developed since the 1970s. We set off to explore model diversity by making an inventory among 42 aquatic ecosystem modellers, by categorizing the resulting set of models and by analysing them for diversity. We then focus on how to exploit model diversity...... by comparing and combining different aspects of existing models. Finally, we discuss how model diversity came about in the past and could evolve in the future. Throughout our study, we use analogies from biodiversity research to analyse and interpret model diversity. We recommend to make models publicly...

  8. An Approach to Visual Interaction in Mixed-Initiative Planning

    National Research Council Canada - National Science Library

    Pegram, David A; St. Amant, Robert; Riedl, Mark

    1999-01-01

    .... For mixed-initiative interaction through a visual medium, however, an approach that exploits our visual perceptual abilities and the benefits of direct manipulation mechanisms is equally compelling...

  9. Transformation-aware Exploit Generation using a HI-CFG

    Science.gov (United States)

    2013-05-16

    buffer structure (the chain of buffers used between transformations) of a program, and use this structure to construct an exploit input by inverting one...make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or... inverting one transformation at a time. We propose a new program representation, a hybrid information- and control-flow graph (HI-CFG), and give

  10. variabilite des productions et des revenus des exploitations ...

    African Journals Online (AJOL)

    diversification pratiquées sont les prestations de service, la foresterie et pisciculture, la migration, l'artisanat et autres (Tableau 7). Les activités de diversification ont rapporté assez de revenus aux exploitations agricoles familiales dans les villages étudiés. Il est estimé à plus de. 400 000 Fcfa dans les villages de Kokélé, ...

  11. Exploiting Network Topology Information to Mitigate Ambiguities in VMP Localization

    DEFF Research Database (Denmark)

    Pedersen, Claus; Pedersen, Troels; Fleury, Bernard Henri

    2011-01-01

    We investigate an extension to the probabilistic model of a wireless sensor network (WSN) in the variational message passing localization algorithm. This extension exploits network topology information to mitigate ambiguities in WSN localization schemes. In a simulation case study we show...... that this extension in some cases improves the location estimates produced by the algorithm. The final version of the paper will present quantitative results from more extensive investigations that will document the extent of this improvement....

  12. Enhanced surrogate models for statistical design exploiting space mapping technology

    DEFF Research Database (Denmark)

    Koziel, Slawek; Bandler, John W.; Mohamed, Achmed S.

    2005-01-01

    We present advances in microwave and RF device modeling exploiting Space Mapping (SM) technology. We propose new SM modeling formulations utilizing input mappings, output mappings, frequency scaling and quadratic approximations. Our aim is to enhance circuit models for statistical analysis...... and yield-driven design. We illustrate our results using a capacitively-loaded two-section impedance transformer, a single-resonator waveguide filter and a six-section H-plane waveguide filter....

  13. aspects economiques de l'exploitation des ressources halieutiques ...

    African Journals Online (AJOL)

    ECONOM/C ASPECTS OF THE EXPLOITATION OF HALIEUTIC RESSOURCES OF “PETITS BARRAGES”. INLAND ..... journalière du travail et la gestion familiale ou du comité de gestion,. TRF est le taux de rémunération des fonds propres,. BNE est le bénéfice net d'exploita- tien, ..... Ces bas prix de marché s'expliquent.

  14. Generalized image deconvolution by exploiting spatially variant point spread functions

    OpenAIRE

    Lee, Sangyun; Lee, KyeoReh; Shin, Seungwoo; Park, YongKeun

    2017-01-01

    An optical imaging system forms an object image by recollecting light scattered by the object. However, intact optical information of the object delivered through the imaging system is deteriorated by imperfect optical elements and unwanted defects. Image deconvolution, also known as inverse filtering, has been widely exploited as a recovery technique because of its practical feasibility, and operates by assuming the linear shift-invariant property of the imaging system. However, shift invari...

  15. Exploiting Temporal Secondary Access Opportunities in Radar Spectrum

    OpenAIRE

    Tercero, Miurel; Sung, Ki Won; Zander, Jens

    2013-01-01

    In this paper, we quantify the temporal opportunities for secondary access to radar spectrum. Secondary users are assumed to be WLANs which opportunistically share the radar frequency band under the constraint that the aggregate interference does not harm radar operation. Each WLAN device employs dynamic frequency selection (DFS) as a mechanism to protect the radar from the interference. We also consider an advanced interference protection mechanism, which is termed temporal DFS. It exploits ...

  16. Exploitation and Utilization of Oilfield Geothermal Resources in China

    OpenAIRE

    Shejiao Wang; Jiahong Yan; Feng Li; Junwen Hu; Kewen Li

    2016-01-01

    Geothermal energy is a clean, green renewable resource, which can be utilized for power generation, heating, cooling, and could effectively replace oil, gas, and coal. In recent years, oil companies have put more efforts into exploiting and utilizing geothermal energy with advanced technologies for heat-tracing oil gathering and transportation, central heating, etc., which has not only reduced resource waste, but also improved large-scale and industrial resource utilization levels, and has ac...

  17. MAPI: towards the integrated exploitation of bioinformatics Web Services

    OpenAIRE

    Karlsson Johan; Ramirez Sergio; Trelles Oswaldo

    2011-01-01

    Abstract Background Bioinformatics is commonly featured as a well assorted list of available web resources. Although diversity of services is positive in general, the proliferation of tools, their dispersion and heterogeneity complicate the integrated exploitation of such data processing capacity. Results To facilitate the construction of software clients and make integrated use of this variety of tools, we present a modular programmatic application interface (MAPI) that provides the necessar...

  18. Exploiting Lexical Regularities in Designing Natural Language Systems.

    Science.gov (United States)

    1988-04-01

    ELEMENT. PROJECT. TASKN Artificial Inteligence Laboratory A1A4WR NTumet 0) 545 Technology Square Cambridge, MA 02139 Ln *t- CONTROLLING OFFICE NAME AND...RO-RI95 922 EXPLOITING LEXICAL REGULARITIES IN DESIGNING NATURAL 1/1 LANGUAGE SYSTENS(U) MASSACHUSETTS INST OF TECH CAMBRIDGE ARTIFICIAL INTELLIGENCE...oes.ary and ftdou.Ip hr Nl wow" L,2This paper presents the lexical component of the START Question Answering system developed at the MIT Artificial

  19. Exploiting design patterns to automate validation of class invariants

    OpenAIRE

    Malloy, Brian A.; Power, James F.

    2006-01-01

    In this paper, techniques are presented that exploit two design patterns, the Visitor pattern and the Decorator pattern, to automatically validate invariants about the data attributes in a C++ class. To investigate the pragmatics involved in using the two patterns, a study of an existing, well-tested application, keystone, a parser and frontend for the C++ language, is presented. Results from the study indicate that these two patterns provide flexibility in terms of the frequen...

  20. Combating sexual exploitation at the macro and micro levels.

    Science.gov (United States)

    Perpinan, M S

    1998-01-01

    The Third World Movement against the Exploitation of Women (TW-MAE-W) is an international nongovernmental organization based in the Philippines which conducts advocacy upon global issues such as the root causes of exploitation and campaigns against sex tourism and military prostitution. TW-MAE-W began providing direct services at the local level in 1987, and now has 7 drop-in centers and 3 homes around the country, run by 35 female staff members. In addition, the Bethany Transition Home in Quezon City, Manila, houses 10-20 women, all who have outside employment. The girls and women who come to TW-MAE-W's facilities have all been exploited in some way. For example, they may be battered wives, women who have experienced incest, or girls who have been sold or tricked into prostitution. They arrive after either calling a telephone hotline on their own or being referred by social workers and nongovernmental organizations. Following an initial 3-month course of recuperation, center residents are helped to either continue their academic training, receive vocational training, or find a job. Basic health services are provided to the residents and drop-in center clients.

  1. Sentinel-1 data exploitation for geohazard activity map generation

    Science.gov (United States)

    Barra, Anna; Solari, Lorenzo; Béjar-Pizarro, Marta; Monserrat, Oriol; Herrera, Gerardo; Bianchini, Silvia; Crosetto, Michele; María Mateos, Rosa; Sarro, Roberto; Moretti, Sandro

    2017-04-01

    This work is focused on geohazard mapping and monitoring by exploiting Sentinel-1 (A and B) data and the DInSAR (Differential interferometric SAR (Synthetic Aperture Radar)) techniques. Sometimes the interpretation of the DInSAR derived product (like the velocity map) can be complex, mostly for a final user who do not usually works with radar. The aim of this work is to generate, in a rapid way, a clear product to be easily exploited by the authorities in the geohazard management: intervention planning and prevention activities. Specifically, the presented methodology has been developed in the framework of the European project SAFETY, which is aimed at providing Civil Protection Authorities (CPA) with the capability of periodically evaluating and assessing the potential impact of geohazards (volcanic activity, earthquakes, landslides and subsidence) on urban areas. The methodology has three phases, the interferograms generation, the activity map generation, in terms of velocity and accumulated deformation (with time-series), and the Active Deformation Area (ADA) map generation. The last one is the final product, derived from the original activity map by analyzing the data in a Geographic Information System (GIS) environment, which isolate only the true deformation areas over the noise. This product can be more easily read by the authorities than the original activity map, i.e. can be better exploited to integrate other information and analysis. This product also permit an easy monitoring of the active areas.

  2. Neanderthal exploitation of ibex and chamois in southwestern Europe.

    Science.gov (United States)

    Yravedra, José; Cobo-Sánchez, Lucía

    2015-01-01

    There is increasing evidence that Neanderthals had a diverse and flexible diet. They exploited a wide range of resources from large proboscideans to small animals like turtles, rabbits, and marine species. Here, we discuss the importance of ibex and chamois in Neanderthal hunting strategies. The exploitation of both animals has traditionally been regarded as typical of Homo sapiens hunting behavior but was not a feature of Neanderthal behavior, which was thought to have focused on other kinds of game like deer, horses or large bovids. Our analysis of an extensive sample of Middle Paleolithic sites with faunal remains in the Iberian Peninsula reveals that Iberian ibex and chamois were frequently present throughout this period. Statistical analyses allowed us to assess the conditions that might have favored the presence or absence of these animals in the sites, while the taphonomic analyses enabled us to address the issue of whether ibex and chamois were indeed hunted by Neanderthals in the Iberian Peninsula. Our results indicate a better representation of both species in rocky and mountainous areas. The taphonomy of some sites reveals that chamois and ibex were hunted by Neanderthals, who showed great adaptive capacities to a wide variety of environments, including mountainous habitats. In contrast, other sites with favorable ecological conditions for ibex and chamois where these animals were not exploited by Neanderthals, who chose to hunt other species like deer, horses or aurochs, suggest behavioral complexity and large versatility. Copyright © 2014 Elsevier Ltd. All rights reserved.

  3. Potentially exploitable supercritical geothermal resources in the ductile crust

    Science.gov (United States)

    Watanabe, Noriaki; Numakura, Tatsuya; Sakaguchi, Kiyotoshi; Saishu, Hanae; Okamoto, Atsushi; Ingebritsen, Steven E.; Tsuchiya, Noriyoshi

    2017-01-01

    The hypothesis that the brittle–ductile transition (BDT) drastically reduces permeability implies that potentially exploitable geothermal resources (permeability >10−16 m2) consisting of supercritical water could occur only in rocks with unusually high transition temperatures such as basalt. However, tensile fracturing is possible even in ductile rocks, and some permeability–depth relations proposed for the continental crust show no drastic permeability reduction at the BDT. Here we present experimental results suggesting that the BDT is not the first-order control on rock permeability, and that potentially exploitable resources may occur in rocks with much lower BDT temperatures, such as the granitic rocks that comprise the bulk of the continental crust. We find that permeability behaviour for fractured granite samples at 350–500 °C under effective confining stress is characterized by a transition from a weakly stress-dependent and reversible behaviour to a strongly stress-dependent and irreversible behaviour at a specific, temperature-dependent effective confining stress level. This transition is induced by onset of plastic normal deformation of the fracture surface (elastic–plastic transition) and, importantly, causes no ‘jump’ in the permeability. Empirical equations for this permeability behaviour suggest that potentially exploitable resources exceeding 450 °C may form at depths of 2–6 km even in the nominally ductile crust.

  4. Relativistic quantum metrology: exploiting relativity to improve quantum measurement technologies.

    Science.gov (United States)

    Ahmadi, Mehdi; Bruschi, David Edward; Sabín, Carlos; Adesso, Gerardo; Fuentes, Ivette

    2014-05-22

    We present a framework for relativistic quantum metrology that is useful for both Earth-based and space-based technologies. Quantum metrology has been so far successfully applied to design precision instruments such as clocks and sensors which outperform classical devices by exploiting quantum properties. There are advanced plans to implement these and other quantum technologies in space, for instance Space-QUEST and Space Optical Clock projects intend to implement quantum communications and quantum clocks at regimes where relativity starts to kick in. However, typical setups do not take into account the effects of relativity on quantum properties. To include and exploit these effects, we introduce techniques for the application of metrology to quantum field theory. Quantum field theory properly incorporates quantum theory and relativity, in particular, at regimes where space-based experiments take place. This framework allows for high precision estimation of parameters that appear in quantum field theory including proper times and accelerations. Indeed, the techniques can be applied to develop a novel generation of relativistic quantum technologies for gravimeters, clocks and sensors. As an example, we present a high precision device which in principle improves the state-of-the-art in quantum accelerometers by exploiting relativistic effects.

  5. Pork and Carcasses Quality in Swine Exploited in Family Farms

    Directory of Open Access Journals (Sweden)

    Loredana Heber

    2010-10-01

    Full Text Available Maximum values of dry matter and fat (% of the carcass weight is achieved in swine exploited on small private family farms at 137 kg of dry matter and 115 kg of protein. Slaughtering swine at higher weight results in an increase of the dry matter and of the caloric value because of the increase of the amount of fat in the muscular fibber; thus, pork is of low quality because of the massive accumulation fat substance and the economic efficiency of producing pork is improper, with supplementary expenses on feed. Fattening swine on small family exploitations up to over 11 kg results in changes of the meat /fat ratio, detrimental to pork meat because of both thickening of lard on the animals' back and of fat depositions in the muscular fibber; though this improves pork quality, it is done with high expenses of energy, resulting in inefficient exploitation on private family farms that in most cases only supply for their families and rarely sell extra production.

  6. Harsh childhood environmental characteristics predict exploitation and retaliation in humans.

    Science.gov (United States)

    McCullough, Michael E; Pedersen, Eric J; Schroder, Jaclyn M; Tabak, Benjamin A; Carver, Charles S

    2013-01-07

    Across and within societies, people vary in their propensities towards exploitative and retaliatory defection in potentially cooperative interaction. We hypothesized that this variation reflects adaptive responses to variation in cues during childhood that life will be harsh, unstable and short--cues that probabilistically indicate that it is in one's fitness interests to exploit co-operators and to retaliate quickly against defectors. Here, we show that childhood exposure to family neglect, conflict and violence, and to neighbourhood crime, were positively associated for men (but not women) with exploitation of an interaction partner and retaliatory defection after that partner began to defect. The associations between childhood environment and both forms of defection for men appeared to be mediated by participants' endorsement of a 'code of honour'. These results suggest that individual differences in mutual benefit cooperation are not merely due to genetic noise, random developmental variation or the operation of domain-general cultural learning mechanisms, but rather, might reflect the adaptive calibration of social strategies to local social-ecological conditions.

  7. Research Optimization for the Utilization-Exploitation of Hellenic Army Vacant Warehouses

    Directory of Open Access Journals (Sweden)

    Zikos Theodoros

    2017-01-01

    Full Text Available The aim of this paper is the research optimization of all factors concerning the utilization and exploitation of empty warehouses belonging to the Hellenic Army, pointing out that in periods of economic crisis the Hellenic Army has the capability of self-sustainability at every level of command. This approach analyzes the acknowledge of the objectives and the strategies employed by the Hellenic Army Logistics Department and also the analysis of the environment (internal and external, approaching factors that lead to the necessity of the exploitation, such as the adequacy of the warehouses, the reduction of human resources, the difficulty of maintaining the facilities by allocated credits and the capability of their evacuation. Formal methods like SWOT (Strengths, Weaknesses, Opportunities, Threats analysis, Political/Law, Economic, Social, Technological, Demographic, Global Environment analysis, structural-industry analysis of the competitive environment and value chain analysis are used for the accurate determination of all optimal options which will lead to the best possible solution for the development and utilization of the aforementioned facilities. This optimization which invests in the extroversion of the Hellenic Army enhances our vision for the full utilization – operation of the Hellenic Army Empty Warehouses.

  8. Data Curation for the Exploitation of Large Earth Observation Products Databases - The MEA system

    Science.gov (United States)

    Mantovani, Simone; Natali, Stefano; Barboni, Damiano; Cavicchi, Mario; Della Vecchia, Andrea

    2014-05-01

    National Space Agencies under the umbrella of the European Space Agency are performing a strong activity to handle and provide solutions to Big Data and related knowledge (metadata, software tools and services) management and exploitation. The continuously increasing amount of long-term and of historic data in EO facilities in the form of online datasets and archives, the incoming satellite observation platforms that will generate an impressive amount of new data and the new EU approach on the data distribution policy make necessary to address technologies for the long-term management of these data sets, including their consolidation, preservation, distribution, continuation and curation across multiple missions. The management of long EO data time series of continuing or historic missions - with more than 20 years of data available already today - requires technical solutions and technologies which differ considerably from the ones exploited by existing systems. Several tools, both open source and commercial, are already providing technologies to handle data and metadata preparation, access and visualization via OGC standard interfaces. This study aims at describing the Multi-sensor Evolution Analysis (MEA) system and the Data Curation concept as approached and implemented within the ASIM and EarthServer projects, funded by the European Space Agency and the European Commission, respectively.

  9. Exploitative and hierarchical antagonism in a cooperative bacterium.

    Directory of Open Access Journals (Sweden)

    2005-11-01

    Full Text Available Social organisms that cooperate with some members of their own species, such as close relatives, may fail to cooperate with other genotypes of the same species. Such noncooperation may take the form of outright antagonism or social exploitation. Myxococcus xanthus is a highly social prokaryote that cooperatively develops into spore-bearing, multicellular fruiting bodies in response to starvation. Here we have characterized the nature of social interactions among nine developmentally proficient strains of M. xanthus isolated from spatially distant locations. Strains were competed against one another in all possible pairwise combinations during starvation-induced development. In most pairings, at least one competitor exhibited strong antagonism toward its partner and a majority of mixes showed bidirectional antagonism that decreased total spore production, even to the point of driving whole populations to extinction. Differential response to mixing was the primary determinant of competitive superiority rather than the sporulation efficiencies of unmixed populations. In some competitive pairings, the dominant partner sporulated more efficiently in mixed populations than in clonal isolation. This finding represents a novel form of exploitation in bacteria carried out by socially competent genotypes and is the first documentation of social exploitation among natural bacterial isolates. Patterns of antagonistic superiority among these strains form a highly linear dominance hierarchy. At least some competition pairs construct chimeric, rather than segregated, fruiting bodies. The cooperative prokaryote M. xanthus has diverged into a large number of distinct social types that cooperate with clone-mates but exhibit intense antagonism toward distinct social types of the same species. Most lengthy migration events in nature may thus result in strong antagonism between migratory and resident populations, and this antagonism may have large effects on local

  10. Common Ground Station For Imagery Processing And Exploitation

    Science.gov (United States)

    Johnston, Morris V.

    1989-02-01

    The Joint Service Imagery Processing System (JSIPS) provides the services with an imagery receipt, processing, exploitation, and reporting capability that is responsive to the requirements of the tactical commanders. JSIPS combines existing and modified hardware and software with all-source digital imagery processing and exploitationto provide intelligence support that enhances the commander's ability to act within the enemy's decision cycle. JSIPS provides not only Tactical all-source imagery processing but integrates the Tactical, National, Auxiliary and Secondary imagery sources into one resource available to the image analyst for production of the commander's comprehensive report. JSIPS has been designed as a modular architecture which is readily expandable and reconfigurable to meet individual user needs. Pre-planned capabilities along with allocated space has been provided for growth in processing, throughput, and I/O requirements. JSIPS provides interoperability with several other imagery programs such as IDPS, TRAC, SYERS, IITS/FIST, NITF, UPD-8, and ATARS. It provides the ability to add additional imagery programs with little or no changes in the JSIPS design. JSIPS provides a softcopy and hardcopy exploitation capability for all military branches with output to their respective intelligence centers. The JSIPS system design, as shown in figure 1.0-1, has the following segments: Tactical Input Segment (TIS), National Input Segment (NIS), Exploitation Support Segment (ESS), Softcopy Exploitation Segment (SES), Hardcopy Exploitation Segment (HES), Communications Support Segment (CSS), and System Support Segment (SSS). JSIPS consists of standardized modules and segments with the collective capability to receive, process, exploit and disseminate imagery and reports based on multi-source imagery from the Tactical and National inputs. The overall JSIPS System operates in either a shelterized or non-shelterized configuration. Tailored JSIPS Systems are packaged in

  11. Friend or foe: exploiting sensor failures for transparent object localization and classification

    Science.gov (United States)

    Seib, Viktor; Barthen, Andreas; Marohn, Philipp; Paulus, Dietrich

    2017-02-01

    In this work we address the problem of detecting and recognizing transparent objects using depth images from an RGB-D camera. Using this type of sensor usually prohibits the localization of transparent objects since the structured light pattern of these cameras is not reflected by transparent surfaces. Instead, transparent surfaces often appear as undefined values in the resulting images. However, these erroneous sensor readings form characteristic patterns that we exploit in the presented approach. The sensor data is fed into a deep convolutional neural network that is trained to classify and localize drinking glasses. We evaluate our approach with four different types of transparent objects. To our best knowledge, no datasets offering depth images of transparent objects exist so far. With this work we aim at closing this gap by providing our data to the public.

  12. The exploitation of brown coal at Megalopolis (Greece). L'exploitation de lignite de Megalopolis (Grece)

    Energy Technology Data Exchange (ETDEWEB)

    1993-01-01

    In Greece, the exploitation of brown coal at Megalopolis makes it possible to feed fuel to a thermal power station which supplies not less than 16% of the electricity requirements of the country. A great effort has been made here to improve productivity, even when the progressive restoration of the site is given prominence. The operation of this site is expected to last another forty years. 3 photos.

  13. Extractive waste exploitation towards the natural resource preservation: two Italian case studies

    Science.gov (United States)

    Antonella Dino, Giovanna; Rossetti, Piergiorgio; Biglia, Giulio; Mehta, Neha; Rodeghiero, Franco

    2017-04-01

    In 2012 the extractive industry represented the second most important sector in terms of waste quantities produced in the EU-27 (29% or 734 million tons). Italy was and still is one of the most important countries as for quarry and mine exploitation, with a consequent huge production of extractive waste (EW; represented by rock waste, operating residues and tailings), which are present in mining dumps (EW facilities). The EU guidelines about waste management aim to the exploitation, based on environmental protection, of any kind of material which can be recovered and recycled, with a consequent natural resources preservation. The decision n. 1600/2002/CE, establishing the VI Environment Action Program, pushes to the revision of the legislation on waste and to the development of specific actions for waste prevention and management. The decisive factors to achieve these results are the minimization of waste production and the recovery of as much waste as possible from the different productive cycles and from landfills, including EW facilities. According to this approach, "WASTE" must be considered as a "RESOURCE", and "LANDFILLS" as "NEW ORE BODIES". In the recent years several projects investigate the recovery of Critical Raw Materials (CRM) and SRM from landfills (Smart Ground, Prosum, etc.). The main objective of the present research, which is one of the activities linked to Smart Ground project (Grant Agreement No 641988), is the estimation of the SRM and CRM present in two selected Italian EW facilities: - Campello Monti mining site (NE Piedmont Region), important for Ni exploitation. The area is characterized by the presence of EW facilities, mainly represented by rock waste and operating residues. - Gorno mining site (N Lombardy Region), famous for Zn exploitation. The area is characterized by the presence of several EW facility areas, mainly represented by rock waste dumps and tailing basins. To appreciate if an EW facility can be considered as an "ore body

  14. A gas-surface interaction kernel for diatomic rarefied gas flows based on the Cercignani-Lampis-Lord model

    Science.gov (United States)

    Hossein Gorji, M.; Jenny, Patrick

    2014-12-01

    This work presents a kinetic wall boundary model for diatomic gas molecules. The model is derived by generalizing the Cercignani-Lampis-Lord gas-surface interaction kernel in order to account for the gas internal degrees of freedom. Here, opposed to the extensions by Lord ["Some extensions to the Cercignani-Lampis gas-surface scattering kernel," Phys. Fluids 3, 706-710 (1991)], energy exchange between different molecular modes is honored and thus, different physical phenomena arising from inelastic gas-surface collisions can be described. For practical implementations of the model, a Monte-Carlo algorithm was devised, which significantly reduces the computational cost associated with sampling. Comparisons of model predictions with experimental and molecular dynamics data exhibit good agreement. Moreover, simulation studies are performed to demonstrate how energy transfers between different modes due to wall collisions can be exploited for gas separation.

  15. On a model of mixtures with internal variables: Extended Liu procedure for the exploitation of the entropy principle

    Directory of Open Access Journals (Sweden)

    Francesco Oliveri

    2016-01-01

    Full Text Available The exploitation of second law of thermodynamics for a mixture of two fluids with a scalar internal variable and a first order nonlocal state space is achieved by using the extended Liu approach. This method requires to insert as constraints in the entropy inequality either the field equations or their gradient extensions. Consequently, the thermodynamic restrictions imposed by the entropy principle are derived without introducing extra terms neither in the energy balance equation nor in the entropy inequality.

  16. Compete, coordinate, and cooperate: How to exploit uncertain environments with social interaction.

    Science.gov (United States)

    Schulze, Christin; Newell, Ben R

    2015-10-01

    Countless decisions, from the trivial to the crucial, are made in complex social contexts while facing uncertain consequences. Yet a large portion of decision making research focuses on either the effects of social interaction or the effects of environmental uncertainty by examining strategic games against others or individual games against nature. Drawing a connection between these approaches, the authors extend a standard individual choice paradigm to include social interaction with 1 other person. In this paradigm, 2 competing decision makers repeatedly select among 2 options, each offering a particular probability of a fixed payoff. When both players choose the same, correct option, the payoff is evenly split; when they choose different options, the player choosing the correct option receives the full payoff. The addition of this social dimension gives players an opportunity to fully exploit an uncertain environment via cooperation: By consistently choosing opposite options, two players can exploit the uncertain environment more effectively than a single player could. We present 2 experiments that manipulate environmental (Experiment 1) and social (Experiment 2) aspects of the paradigm. In Experiment 1, the outcome probabilities were either known or unknown to participants; in Experiment 2, participants' attention was drawn to individual or group gains by introducing either within- or between-group competition. Efficient cooperation did not emerge spontaneously in Experiment 1. Instead, most people probability maximized, mirroring the behavior observed in individual choice. By contrast, between--group competition in Experiment 2 facilitated efficient-but not always equitable--exploitation of uncertain environments. This work links the concepts of individual risky choice and strategic decision making under both environmental and social uncertainty. (c) 2015 APA, all rights reserved).

  17. Collaborative Networks - Premises for Exploitation of Inter-Organizational Knowledge Management

    Directory of Open Access Journals (Sweden)

    Marinela MIRCEA

    2015-01-01

    Full Text Available Inter-organization knowledge management in the context of collaborative networks is a critical activity for business success. During the evolution of collaborative network specific technologies, increasingly performant instruments were created to exploit this knowledge. As a development cycle, inter-organizational knowledge is built on the foundation of information and data owned by the participants in the collaborative networks. One of the most widely used instruments to exploit this data and knowledge, with the purpose of creating new knowledge, is Data Mining. In the context of this paper, data mining is the process of discovering patterns and hidden relations in very large data collections, stored in data banks or data bases. Because only in extremely rare cases reading data tables record by record leads to the discovery of useful patterns, the information must be processed automatically, process known as Knowledge Discovery. Knowledge Discovery is a component that combines the power of computers with a human operator that has the ability to find the visual patterns revealed by the system. Using an automated data mining system, the computer finds the existing informational patterns and the human factor (the analyst evaluates those patterns and picks the ones that are really relevant for the current analysis. Considering the current technological context, where storage devices are more and more accessible and performant, the storage capacity is no longer a barrier preventing storage of all required data. Exploitation of inter-organizational knowledge in collaborative networks leads the research to the field of business intelligence applied even on social environment. This approach belongs in literature to the general branch of social business intelligence.

  18. Using choice architecture to exploit a university Distinct Urban Mine.

    Science.gov (United States)

    Pierron, Xavier; Williams, Ian D; Shaw, Peter J; Cleaver, Victoria

    2017-10-01

    There are widespread concerns regarding the potential future scarcity of ferrous and non-ferrous materials. However, there are already potentially rich reserves of secondary materials via high ownership of Electrical and Electronic Equipment (EEE) in economically-developed nations. Young people are particularly high consumers of EEE, thus university students and campuses may present an opportunity to harness this potential. University Distinct Urban Mines (DUM) may be used to exemplify how potential reserves of secondary metals may be exploited, and could contribute to the transition from a linear to a circular economy. This study aimed to evaluate small household appliances (SHA) DUM from a UK university, with the objectives to identify and quantify student households' SHA ownership, WEEE recycling, stockpiling and discarding habits amongst student households, assess and evaluate the monetary potential of SHA DUM at UK level, and propose methods to exploit DUM for universities in the UK. To this purpose, a quantitative survey was undertaken to measure students' ownership and discarding behaviour with respect to SHA. The amounts of ferrous and non-ferrous materials were then estimated and converted to monetary values from secondary materials market data to appraise the SHA DUM overall value. Thirty-five per cent of SHA are discarded in the general refuse. Broken personal care appliances (PCA) tend to be discarded due to hygiene and small size factors. When in working order, SHA tend to be equally reused, recycled or stockpiled. We conclude that a total of 189 tonnes of ferrous and non-ferrous materials were available via discarding or being stockpiled at the University of Southampton. Extrapolated to UK higher education level, discarded and stockpiled SHA represent a potential worth ∼USD 11 million. To initiate DUM exploitation within Higher Education campuses, we suggest improving users' choice architecture by providing collection methods specific to broken SHA

  19. Human collective intelligence under dual exploration-exploitation dilemmas.

    Directory of Open Access Journals (Sweden)

    Wataru Toyokawa

    Full Text Available The exploration-exploitation dilemma is a recurrent adaptive problem for humans as well as non-human animals. Given a fixed time/energy budget, every individual faces a fundamental trade-off between exploring for better resources and exploiting known resources to optimize overall performance under uncertainty. Colonies of eusocial insects are known to solve this dilemma successfully via evolved coordination mechanisms that function at the collective level. For humans and other non-eusocial species, however, this dilemma operates within individuals as well as between individuals, because group members may be motivated to take excessive advantage of others' exploratory findings through social learning. Thus, even though social learning can reduce collective exploration costs, the emergence of disproportionate "information scroungers" may severely undermine its potential benefits. We investigated experimentally whether social learning opportunities might improve the performance of human participants working on a "multi-armed bandit" problem in groups, where they could learn about each other's past choice behaviors. Results showed that, even though information scroungers emerged frequently in groups, social learning opportunities reduced total group exploration time while increasing harvesting from better options, and consequentially improved collective performance. Surprisingly, enriching social information by allowing participants to observe others' evaluations of chosen options (e.g., Amazon's 5-star rating system in addition to choice-frequency information had a detrimental impact on performance compared to the simpler situation with only the choice-frequency information. These results indicate that humans groups can handle the fundamental "dual exploration-exploitation dilemmas" successfully, and that social learning about simple choice-frequencies can help produce collective intelligence.

  20. Human collective intelligence under dual exploration-exploitation dilemmas.

    Science.gov (United States)

    Toyokawa, Wataru; Kim, Hye-rin; Kameda, Tatsuya

    2014-01-01

    The exploration-exploitation dilemma is a recurrent adaptive problem for humans as well as non-human animals. Given a fixed time/energy budget, every individual faces a fundamental trade-off between exploring for better resources and exploiting known resources to optimize overall performance under uncertainty. Colonies of eusocial insects are known to solve this dilemma successfully via evolved coordination mechanisms that function at the collective level. For humans and other non-eusocial species, however, this dilemma operates within individuals as well as between individuals, because group members may be motivated to take excessive advantage of others' exploratory findings through social learning. Thus, even though social learning can reduce collective exploration costs, the emergence of disproportionate "information scroungers" may severely undermine its potential benefits. We investigated experimentally whether social learning opportunities might improve the performance of human participants working on a "multi-armed bandit" problem in groups, where they could learn about each other's past choice behaviors. Results showed that, even though information scroungers emerged frequently in groups, social learning opportunities reduced total group exploration time while increasing harvesting from better options, and consequentially improved collective performance. Surprisingly, enriching social information by allowing participants to observe others' evaluations of chosen options (e.g., Amazon's 5-star rating system) in addition to choice-frequency information had a detrimental impact on performance compared to the simpler situation with only the choice-frequency information. These results indicate that humans groups can handle the fundamental "dual exploration-exploitation dilemmas" successfully, and that social learning about simple choice-frequencies can help produce collective intelligence.

  1. Examples of Sentinel-2A Mission Exploitation Results

    Science.gov (United States)

    Koetz, Benjamin; Hoersch, Bianca; Gascon, Ferran; Desnos, Yves-Louis; Seifert, Frank Martin; Paganini, Marc; Ramoino, Fabrizio; Arino, Olivier

    2017-04-01

    The Sentinel-2 Copernicus mission will bring significant breakthrough in the exploitation of space borne optical data. Sentinel-2 time series will transform land cover, agriculture, forestry, in-land water and costal EO applications from mapping to monitoring, from snapshot to time series data analysis, from image-based to pixel-based processing. The 5-days temporal revisiting of the Sentinel-2 satellites, when both units will be operated together, will usher us in a new era for time series analysis at high spatial resolutions (HR) of 10-20 meters. The monitoring of seasonal variations and processes in phenology and hydrology are examples of the many R&D areas to be studied. The mission's large swath and systematic acquisitions will further support unprecedented coverage at the national scale addressing information requirements of national to regional policies. Within ESA programs, such as the Data User Element (DUE), Scientific Exploitation of Operational Missions (SEOM) and Climate Change Initiative (CCI), several R&D activities are preparing the exploitation of the Sentinel-2 mission towards reliable measurements and monitoring of e.g. Essential Climate Variables and indicators for the Sustainable Development Goals. Early Sentinel-2 results will be presented related to a range of applications and scientific domains such as agricultural monitoring at national scale (DUE Sen2Agri), wetland extent and condition over African Ramsar sites (DUE GlobWetland-Africa), land cover mapping for climate change (CCI Land Cover), national land monitoring (Cadaster-Env), forest degradation (DUE ForMoSa), urban mapping (DUE EO4Urban), in-land water quality (DUE SPONGE), map of Mediterranean aquaculture (DUE SMART) and coral reef habitat mapping (SEOM S2-4Sci Coral). The above-mentioned activities are only a few examples from the very active international land imaging community building on the long-term Landsat and Spot heritage and knowledge.

  2. Exploitation of eukaryotic subcellular targeting mechanisms by bacterial effectors.

    Science.gov (United States)

    Hicks, Stuart W; Galán, Jorge E

    2013-05-01

    Several bacterial species have evolved specialized secretion systems to deliver bacterial effector proteins into eukaryotic cells. These effectors have the capacity to modulate host cell pathways in order to promote bacterial survival and replication. The spatial and temporal context in which the effectors exert their biochemical activities is crucial for their function. To fully understand effector function in the context of infection, we need to understand the mechanisms that lead to the precise subcellular localization of effectors following their delivery into host cells. Recent studies have shown that bacterial effectors exploit host cell machinery to accurately target their biochemical activities within the host cell.

  3. Exploitation of natural resources and conflict in Colombia

    Directory of Open Access Journals (Sweden)

    Luis Eduardo Sandoval

    2017-11-01

    Full Text Available Colombia has increasingly been specializing in the extraction of mineral and energy resources such as gold, coal, oil and ferronickel. These activities, in the context of state weakness, have engendered conflicts of different dimensions. This paper proposes an indicator of conflict related to mineral exploitation that classifies five dimensions of conflict: social, economic, cultural, political and environmental. The aggregate indicator shows that murders, displacement of Afrodescendent populations, flooding, pollution, fires, infant mortality, coca crops and sexual offenses are highly and positively correlated with the number of conflicts.

  4. Research to longevity brake lines on the exploitations

    Directory of Open Access Journals (Sweden)

    Sergey TUJRIN

    2015-08-01

    Full Text Available Brake lines are tested for strength and durability. However, tests of strength are short-term, but tests of durability are durable, since their aim is to assess the effectiveness of the brake linings during operation. Therefore, reduction of time evaluating the durability of brake linings exploitation is urgent. The article describes the results of the research on the longevity of the brake linings of different types of vehicles based on their controllable operation and the method of accelerated estimation of the longevity of brake linings based on the operation of their analogues

  5. Construct exploit constraint in crash analysis by bypassing canary

    Science.gov (United States)

    Huang, Ning; Huang, Shuguang; Huang, Hui; Chang, Chao

    2017-08-01

    Selective symbolic execution is a common program testing technology. Developed on the basis of it, some crash analysis systems are often used to test the fragility of the program by constructing exploit constraints, such as CRAX. From the study of crash analysis based on symbolic execution, this paper find that this technology cannot bypass the canary stack protection mechanisms. This paper makes the improvement uses the API hook in Linux. Experimental results show that the use of API hook can effectively solve the problem that crash analysis cannot bypass the canary protection.

  6. Transformation of national economy and the problem of exploiting

    Directory of Open Access Journals (Sweden)

    Vodzinský Vladimír

    1997-03-01

    Full Text Available The present course of transformation of our society has been influenced by the process of continuous clarifying the content and the methods of attaining the "ultimate goal". Some disunited views on the realization of the transformation process caused its ambiguous development, as documented by the absence of the state raw material and energy policy needed for designating today´s position of the Slovak mining. A typical example is the situation of enterprises exploiting Slovak brown coal. This paper deals with a possibility of solving this problem.

  7. Real-time video exploitation system for small UAVs

    Science.gov (United States)

    Su, Ang; Zhang, Yueqiang; Dong, Jing; Xu, Yuhua; Zhu, Xianwei; Zhang, Xiaohu

    2013-08-01

    The high portability of small Unmanned Aircraft Vehicles (UAVs) makes them play an important role in surveillance and reconnaissance tasks, so the military and civilian desires for UAVs are constantly growing. Recently, we have developed a real-time video exploitation system for our small UAV which is mainly used in forest patrol tasks. Our system consists of six key models, including image contrast enhancement, video stabilization, mosaicing, salient target indication, moving target indication, and display of the footprint and flight path on map. Extensive testing on the system has been implemented and the result shows our system performed well.

  8. VCSELs and silicon light sources exploiting SOI grating mirrors

    DEFF Research Database (Denmark)

    Chung, Il-Sug; Mørk, Jesper

    2012-01-01

    grating works as a highly-reflective mirror as well as routes light into a Si in-plane output waveguide connected to the grating. In the vertical-cavity surface-emitting laser (VCSEL) version, there is no in-plane output waveguide connected to the grating. Thus, light is vertically emitted through...... the Bragg reflector. Numerical simulations show that both the silicon light source and the VCSEL exploiting SOI grating mirrors have superior performances, compared to existing silicon light sources and long wavelength VCSELs. These devices are highly adequate for chip-level optical interconnects as well...

  9. Operational Decision Aids for Exploiting or Mitigating Electromagnetic Propagation Effects

    Science.gov (United States)

    1989-09-01

    CORRECTION OF IONOSPHERIC EFFECTS FOR THE PRECISE ORBIT DETERMINATION OF SATELLITES by F.Foucher, R.Fleury and P.Lassudrie-Duchesne 33 THE USE OF...Eventually, three dimensional models will become reality. With TESS(3), we can more fully exploit a wide range of environmental satellites already on orbit ...dane las courbas d’iso-indice caracterise par un effondrement cur use trancha distance se situant entre 50 at 90 km par rapport A l’origina. La but des

  10. The Exploitation of the Electric Contributions in Infrared Power Generation

    Science.gov (United States)

    2016-02-02

    thermoelectric-type behavior obeying the Seebeck effect : AV(t) = S*AT(t), where S is the Seebeck coefficient. We have yet to explain Atomic layer deposited...linearly vs. average power and with similar slopes, 0.008 mV/mW and 0.009 °C/mW, respectively. This behavior is consistent with the Seebeck effect , and...by exploiting the Seebeck effect [17]-[20], i.e. producing a voltage difference AV directly proportional to the temperature difference AT applied to

  11. Pork and Carcasses Quality in Swine Exploited in Family Farms

    OpenAIRE

    Loredana Heber; Cornelia Petroman; Ioan Petroman; Ioana Bălan; Diana Marin; Gabriela Ivaşcu; Călin Popovici

    2010-01-01

    Maximum values of dry matter and fat (% of the carcass weight) is achieved in swine exploited on small private family farms at 137 kg of dry matter and 115 kg of protein. Slaughtering swine at higher weight results in an increase of the dry matter and of the caloric value because of the increase of the amount of fat in the muscular fibber; thus, pork is of low quality because of the massive accumulation fat substance and the economic efficiency of producing pork is improper, with supplementar...

  12. Exploiting Additive Manufacturing Infill in Topology Optimization for Improved Buckling Load

    Directory of Open Access Journals (Sweden)

    Anders Clausen

    2016-06-01

    Full Text Available Additive manufacturing (AM permits the fabrication of functionally optimized components with high geometrical complexity. The opportunity of using porous infill as an integrated part of the manufacturing process is an example of a unique AM feature. Automated design methods are still incapable of fully exploiting this design freedom. In this work, we show how the so-called coating approach to topology optimization provides a means for designing infill-based components that possess a strongly improved buckling load and, as a result, improved structural stability. The suggested approach thereby addresses an important inadequacy of the standard minimum compliance topology optimization approach, in which buckling is rarely accounted for; rather, a satisfactory buckling load is usually assured through a post-processing step that may lead to sub-optimal components. The present work compares the standard and coating approaches to topology optimization for the MBB beam benchmark case. The optimized structures are additively manufactured using a filamentary technique. This experimental study validates the numerical model used in the coating approach. Depending on the properties of the infill material, the buckling load may be more than four times higher than that of solid structures optimized under the same conditions.

  13. The Useless Arctic: Exploiting Nature in the Arctic in the 1870s

    Directory of Open Access Journals (Sweden)

    Ulrike Spring

    2015-04-01

    Full Text Available What is the discursive genealogy of an ecological approach to the Arctic? Building on distinctions suggested by Francis Spufford and Gísli Pálsson, this article examines a specific juncture in the history of European–Arctic interaction – the reception of the Austro-Hungarian Arctic Expedition in 1874 – and traces the potential for ecological and relational understandings in what seems to be an orientalist and exploitative material. Examining the medial reception in Austria and in Norway, along with certain key texts in which Arctic wildlife is described, we find that the Norwegian reception of the expedition emphasizes practical issues connected with resource exploitation in the Arctic, while the Austrian reception mostly sees the Arctic as a symbolic resource with which to negotiate issues of identity and modernity. The Austrian discourse revolves around a set of paradoxical contradictions, the most central being those between materialism and idealism and emptiness and fullness; we argue it is the instability of such ambiguities which produces the possibility of a future ecological discourse.

  14. Exploitation of unique properties of zeolites in the development of gas sensors.

    Science.gov (United States)

    Zheng, Yangong; Li, Xiaogan; Dutta, Prabir K

    2012-01-01

    The unique properties of microporous zeolites, including ion-exchange properties, adsorption, molecular sieving, catalysis, conductivity have been exploited in improving the performance of gas sensors. Zeolites have been employed as physical and chemical filters to improve the sensitivity and selectivity of gas sensors. In addition, direct interaction of gas molecules with the extraframework cations in the nanoconfined space of zeolites has been explored as a basis for developing new impedance-type gas/vapor sensors. In this review, we summarize how these properties of zeolites have been used to develop new sensing paradigms. There is a considerable breadth of transduction processes that have been used for zeolite incorporated sensors, including frequency measurements, optical and the entire gamut of electrochemical measurements. It is clear from the published literature that zeolites provide a route to enhance sensor performance, and it is expected that commercial manifestation of some of the approaches discussed here will take place. The future of zeolite-based sensors will continue to exploit its unique properties and use of other microporous frameworks, including metal organic frameworks. Zeolite composites with electronic materials, including metals will lead to new paradigms in sensing. Use of nano-sized zeolite crystals and zeolite membranes will enhance sensor properties and make possible new routes of miniaturized sensors.

  15. Exploitation of Unique Properties of Zeolites in the Development of Gas Sensors

    Directory of Open Access Journals (Sweden)

    Prabir K. Dutta

    2012-04-01

    Full Text Available The unique properties of microporous zeolites, including ion-exchange properties, adsorption, molecular sieving, catalysis, conductivity have been exploited in improving the performance of gas sensors. Zeolites have been employed as physical and chemical filters to improve the sensitivity and selectivity of gas sensors. In addition, direct interaction of gas molecules with the extraframework cations in the nanoconfined space of zeolites has been explored as a basis for developing new impedance-type gas/vapor sensors. In this review, we summarize how these properties of zeolites have been used to develop new sensing paradigms. There is a considerable breadth of transduction processes that have been used for zeolite incorporated sensors, including frequency measurements, optical and the entire gamut of electrochemical measurements. It is clear from the published literature that zeolites provide a route to enhance sensor performance, and it is expected that commercial manifestation of some of the approaches discussed here will take place. The future of zeolite-based sensors will continue to exploit its unique properties and use of other microporous frameworks, including metal organic frameworks. Zeolite composites with electronic materials, including metals will lead to new paradigms in sensing. Use of nano-sized zeolite crystals and zeolite membranes will enhance sensor properties and make possible new routes of miniaturized sensors.

  16. Vision-mediated exploitation of a novel host plant by a tephritid fruit fly.

    Science.gov (United States)

    Piñero, Jaime C; Souder, Steven K; Vargas, Roger I

    2017-01-01

    Shortly after its introduction into the Hawaiian Islands around 1895, the polyphagous, invasive fruit fly Bactrocera (Zeugodacus) cucurbitae (Coquillett) (Diptera: Tephritidae) was provided the opportunity to expand its host range to include a novel host, papaya (Carica papaya). It has been documented that female B. cucurbitae rely strongly on vision to locate host fruit. Given that the papaya fruit is visually conspicuous in the papaya agro-ecosystem, we hypothesized that female B. cucurbitae used vision as the main sensory modality to find and exploit the novel host fruit. Using a comparative approach that involved a series of studies under natural and semi-natural conditions in Hawaii, we assessed the ability of female B. cucurbitae to locate and oviposit in papaya fruit using the sensory modalities of olfaction and vision alone and also in combination. The results of these studies demonstrate that, under a variety of conditions, volatiles emitted by the novel host do not positively stimulate the behavior of the herbivore. Rather, vision seems to be the main mechanism driving the exploitation of the novel host. Volatiles emitted by the novel host papaya fruit did not contribute in any way to the visual response of females. Our findings highlight the remarkable role of vision in the host-location process of B. cucurbitae and provide empirical evidence for this sensory modality as a potential mechanism involved in host range expansion.

  17. Vision-mediated exploitation of a novel host plant by a tephritid fruit fly.

    Directory of Open Access Journals (Sweden)

    Jaime C Piñero

    Full Text Available Shortly after its introduction into the Hawaiian Islands around 1895, the polyphagous, invasive fruit fly Bactrocera (Zeugodacus cucurbitae (Coquillett (Diptera: Tephritidae was provided the opportunity to expand its host range to include a novel host, papaya (Carica papaya. It has been documented that female B. cucurbitae rely strongly on vision to locate host fruit. Given that the papaya fruit is visually conspicuous in the papaya agro-ecosystem, we hypothesized that female B. cucurbitae used vision as the main sensory modality to find and exploit the novel host fruit. Using a comparative approach that involved a series of studies under natural and semi-natural conditions in Hawaii, we assessed the ability of female B. cucurbitae to locate and oviposit in papaya fruit using the sensory modalities of olfaction and vision alone and also in combination. The results of these studies demonstrate that, under a variety of conditions, volatiles emitted by the novel host do not positively stimulate the behavior of the herbivore. Rather, vision seems to be the main mechanism driving the exploitation of the novel host. Volatiles emitted by the novel host papaya fruit did not contribute in any way to the visual response of females. Our findings highlight the remarkable role of vision in the host-location process of B. cucurbitae and provide empirical evidence for this sensory modality as a potential mechanism involved in host range expansion.

  18. The Potential and Challenges of Exploiting the Vast But Dynamic Neoepitope Landscape for Immunotherapy

    Directory of Open Access Journals (Sweden)

    Els M. E. Verdegaal

    2017-09-01

    Full Text Available Somatic non-synonymous mutations in the DNA of tumor cells may result in the presentation of tumor-specific peptides to T cells. The recognition of these so-called neoepitopes now has been firmly linked to the clinical success of checkpoint blockade and adoptive T cell therapy. Following proof-of-principle studies in preclinical models there was a surge of strategies to identify and exploit genetically defined clonally expressed neoepitopes. These approaches assume that neoepitope availability remains stable during tumor progression but tumor genetics has taught us otherwise. Under the pressure of the immune system, neoepitope expression dynamically evolves rendering neoepitope specific T cells ineffective. This implies that the immunotherapeutic strategy applied should be flexible in order to cope with these changes and/or aiming at a broad range of epitopes to prevent the development of escape variants. Here, we will address the heterogeneous and dynamic expression of neoepitopes and describe our perspective and demonstrate possibilities how to further exploit the clinical potential of the neoepitope repertoire.

  19. Sparsity-Based Color Image Super Resolution via Exploiting Cross Channel Constraints

    Science.gov (United States)

    Mousavi, Hojjat Seyed; Monga, Vishal

    2017-11-01

    Sparsity constrained single image super-resolution (SR) has been of much recent interest. A typical approach involves sparsely representing patches in a low-resolution (LR) input image via a dictionary of example LR patches, and then using the coefficients of this representation to generate the high-resolution (HR) output via an analogous HR dictionary. However, most existing sparse representation methods for super resolution focus on the luminance channel information and do not capture interactions between color channels. In this work, we extend sparsity based super-resolution to multiple color channels by taking color information into account. Edge similarities amongst RGB color bands are exploited as cross channel correlation constraints. These additional constraints lead to a new optimization problem which is not easily solvable; however, a tractable solution is proposed to solve it efficiently. Moreover, to fully exploit the complementary information among color channels, a dictionary learning method is also proposed specifically to learn color dictionaries that encourage edge similarities. Merits of the proposed method over state of the art are demonstrated both visually and quantitatively using image quality metrics.

  20. REG and GREAT, two networks to optimize Gaia scientific exploitation

    Science.gov (United States)

    Figueras, F.; Jordi, C.; Spanish Participants in Reg; Great

    2013-05-01

    The launch of Gaia satellite by the European Space Agency is a year ahead (last quarter of 2013), and Spanish and European community have already out in place two networks devoted to the preparation of the scientific exploitation of the data acquired by the satellite: GREAT (Gaia Research for European Astronomy Training), funded by the European Science Foundation and by Marie Curie Actions in its People 7th Programme, and REG (Spanish Network for the scientific exploitation of Gaia) funded by MINECO. These networks, which are open to the international community, have adopted the challenges of Gaia mission: to revolutionize our understanding of the Milky Way and its components, trace the distribution of dark matter in the local universe, validate and improve models of stellar structure and evolution, characterizing solar system objects, ... and many more. Both networks promote the close interaction among researchers of different institutes, by supporting short and long exchange visits, workshops, schools and large conferences. Currently, 128 Spanish people actively participate in the several working groups in GREAT and REG and 2 students are performing their PhD in the framework of the GREAT-ITN Spanish node. This paper provides detailed information about the structure of these networks, the Spanish participation, and present and future tasks that are foreseen.

  1. A case study of exploiting enterprise resource planning requirements

    Science.gov (United States)

    Niu, Nan; Jin, Mingzhou; Cheng, Jing-Ru C.

    2011-05-01

    The requirements engineering (RE) processes have become a key to conceptualising corporate-wide integrated solutions based on packaged enterprise resource planning (ERP) software. The RE literature has mainly focused on procuring the most suitable ERP package. Little is known about how an organisation exploits the chosen ERP RE model to frame the business application development. This article reports an exploratory case study of a key tenet of ERP RE adoption, namely that aligning business applications to the packaged RE model leads to integral practices and economic development. The case study analysed a series interrelated pilot projects developed for a business division of a large IT manufacturing and service company, using Oracle's appl1ication implementation method (AIM). The study indicated that AIM RE improved team collaboration and project management experience, but needed to make hidden assumptions explicit to support data visibility and integrity. Our study can direct researchers towards rigorous empirical evaluations of ERP RE adoption, collect experiences and lessons learned for practitioners, and help generate more effective and mature processes when exploiting ERP RE methods.

  2. The environmental impacts of foamed concrete production and exploitation

    Science.gov (United States)

    Namsone, E.; Korjakins, A.; Sahmenko, G.; Sinka, M.

    2017-10-01

    This paper presents a study focusing on the environmental impacts of foamed concrete production and exploitation. CO2 emissions are very important factor for describing durability and sustainability of any building material and its life cycle. The building sector is one of the largest energy-consuming sectors in the world. In this study CO2 emissions are evaluated with regard to three types of energy resources (gas, coal and eco-friendly fuel). The related savings on raw materials are up to 120 t of water per 1000 t of traditionally mixed foamed concrete and up to 350 t of sand per 1000 t of foamed concrete produced with intensive mixing technology. In addition, total reduction of CO2 emissions (up to 60 t per 1000 m3 of material) and total energy saving from introduction of foamed concrete production (depending on the type of fuel) were calculated. In order to analyze the conditions of exploitation, both thermal conductivity and thickness of wall was determined. All obtained and calculated results were compared to those of the commercially produced autoclaved aerated concrete.

  3. The exploration-exploitation dilemma: a multidisciplinary framework.

    Directory of Open Access Journals (Sweden)

    Oded Berger-Tal

    Full Text Available The trade-off between the need to obtain new knowledge and the need to use that knowledge to improve performance is one of the most basic trade-offs in nature, and optimal performance usually requires some balance between exploratory and exploitative behaviors. Researchers in many disciplines have been searching for the optimal solution to this dilemma. Here we present a novel model in which the exploration strategy itself is dynamic and varies with time in order to optimize a definite goal, such as the acquisition of energy, money, or prestige. Our model produced four very distinct phases: Knowledge establishment, Knowledge accumulation, Knowledge maintenance, and Knowledge exploitation, giving rise to a multidisciplinary framework that applies equally to humans, animals, and organizations. The framework can be used to explain a multitude of phenomena in various disciplines, such as the movement of animals in novel landscapes, the most efficient resource allocation for a start-up company, or the effects of old age on knowledge acquisition in humans.

  4. Cheating by exploitation of developmental prestalk patterning in Dictyostelium discoideum.

    Science.gov (United States)

    Khare, Anupama; Shaulsky, Gad

    2010-02-26

    The cooperative developmental system of the social amoeba Dictyostelium discoideum is susceptible to exploitation by cheaters-strains that make more than their fair share of spores in chimerae. Laboratory screens in Dictyostelium have shown that the genetic potential for facultative cheating is high, and field surveys have shown that cheaters are abundant in nature, but the cheating mechanisms are largely unknown. Here we describe cheater C (chtC), a strong facultative cheater mutant that cheats by affecting prestalk differentiation. The chtC gene is developmentally regulated and its mRNA becomes stalk-enriched at the end of development. chtC mutants are defective in maintaining the prestalk cell fate as some of their prestalk cells transdifferentiate into prespore cells, but that defect does not affect gross developmental morphology or sporulation efficiency. In chimerae between wild-type and chtC mutant cells, the wild-type cells preferentially give rise to prestalk cells, and the chtC mutants increase their representation in the spore mass. Mixing chtC mutants with other cell-type proportioning mutants revealed that the cheating is directly related to the prestalk-differentiation propensity of the victim. These findings illustrate that a cheater can victimize cooperative strains by exploiting an established developmental pathway.

  5. Cheating by exploitation of developmental prestalk patterning in Dictyostelium discoideum.

    Directory of Open Access Journals (Sweden)

    Anupama Khare

    2010-02-01

    Full Text Available The cooperative developmental system of the social amoeba Dictyostelium discoideum is susceptible to exploitation by cheaters-strains that make more than their fair share of spores in chimerae. Laboratory screens in Dictyostelium have shown that the genetic potential for facultative cheating is high, and field surveys have shown that cheaters are abundant in nature, but the cheating mechanisms are largely unknown. Here we describe cheater C (chtC, a strong facultative cheater mutant that cheats by affecting prestalk differentiation. The chtC gene is developmentally regulated and its mRNA becomes stalk-enriched at the end of development. chtC mutants are defective in maintaining the prestalk cell fate as some of their prestalk cells transdifferentiate into prespore cells, but that defect does not affect gross developmental morphology or sporulation efficiency. In chimerae between wild-type and chtC mutant cells, the wild-type cells preferentially give rise to prestalk cells, and the chtC mutants increase their representation in the spore mass. Mixing chtC mutants with other cell-type proportioning mutants revealed that the cheating is directly related to the prestalk-differentiation propensity of the victim. These findings illustrate that a cheater can victimize cooperative strains by exploiting an established developmental pathway.

  6. Exploitation of Clustering Techniques in Transactional Healthcare Data

    Directory of Open Access Journals (Sweden)

    Naeem Ahmad Mahoto

    2014-03-01

    Full Text Available Healthcare service centres equipped with electronic health systems have improved their resources as well as treatment processes. The dynamic nature of healthcare data of each individual makes it complex and difficult for physicians to manually mediate them; therefore, automatic techniques are essential to manage the quality and standardization of treatment procedures. Exploratory data analysis, patternanalysis and grouping of data is managed using clustering techniques, which work as an unsupervised classification. A number of healthcare applications are developed that use several data mining techniques for classification, clustering and extracting useful information from healthcare data. The challenging issue in this domain is to select adequate data mining algorithm for optimal results. This paper exploits three different clustering algorithms: DBSCAN (Density-Based Clustering, agglomerative hierarchical and k-means in real transactional healthcare data of diabetic patients (taken as case study to analyse their performance in large and dispersed healthcare data. The best solution of cluster sets among the exploited algorithms is evaluated using clustering quality indexes and is selected to identify the possible subgroups of patients having similar treatment patterns

  7. Human trafficking for labour exploitation:
    Interpreting the crime

    Directory of Open Access Journals (Sweden)

    Jill E.B. Coster van Voorhout

    2007-12-01

    Full Text Available The definition of human trafficking for labour exploitation, as follows from the European Council Framework Decision, proves to be unclear. Literal interpretation does not suffice, because it does not clarify all elements of what is deemed to be criminal behaviour, and hermeneutical interpretation also falls short discouraging the aim of this legislation, namely harmonisation. Hence, another solution is required. This article does so by firstly challenging assumptions about human trafficking for labour exploitation that are generally pertinent, but nonetheless untrue. This accurate appraisal of the crime’s nature is followed by a synopsis of national legislation and adjudication in three Member States, so as to also focus on these actualities regarding the crime that are commonly not conceived. This article examines two countries that have implemented the Framework Decision, namely Belgium and the Netherlands, and one that has not yet done so, the United Kingdom. Thereafter remaining unexplained elements of the Framework Decision’s definition are interpreted with use of international, pan-European and European legislation and adjudication. Based upon all this, a suggested interpretation of the Framework Decision’s definition is provided so as to overcome all identified difficulties with it.

  8. Exploiting GPUs in Virtual Machine for BioCloud

    Directory of Open Access Journals (Sweden)

    Heeseung Jo

    2013-01-01

    Full Text Available Recently, biological applications start to be reimplemented into the applications which exploit many cores of GPUs for better computation performance. Therefore, by providing virtualized GPUs to VMs in cloud computing environment, many biological applications will willingly move into cloud environment to enhance their computation performance and utilize infinite cloud computing resource while reducing expenses for computations. In this paper, we propose a BioCloud system architecture that enables VMs to use GPUs in cloud environment. Because much of the previous research has focused on the sharing mechanism of GPUs among VMs, they cannot achieve enough performance for biological applications of which computation throughput is more crucial rather than sharing. The proposed system exploits the pass-through mode of PCI express (PCI-E channel. By making each VM be able to access underlying GPUs directly, applications can show almost the same performance as when those are in native environment. In addition, our scheme multiplexes GPUs by using hot plug-in/out device features of PCI-E channel. By adding or removing GPUs in each VM in on-demand manner, VMs in the same physical host can time-share their GPUs. We implemented the proposed system using the Xen VMM and NVIDIA GPUs and showed that our prototype is highly effective for biological GPU applications in cloud environment.

  9. User-driven sampling strategies in image exploitation

    Science.gov (United States)

    Harvey, Neal; Porter, Reid

    2013-12-01

    Visual analytics and interactive machine learning both try to leverage the complementary strengths of humans and machines to solve complex data exploitation tasks. These fields overlap most significantly when training is involved: the visualization or machine learning tool improves over time by exploiting observations of the human-computer interaction. This paper focuses on one aspect of the human-computer interaction that we call user-driven sampling strategies. Unlike relevance feedback and active learning sampling strategies, where the computer selects which data to label at each iteration, we investigate situations where the user selects which data is to be labeled at each iteration. User-driven sampling strategies can emerge in many visual analytics applications but they have not been fully developed in machine learning. User-driven sampling strategies suggest new theoretical and practical research questions for both visualization science and machine learning. In this paper we identify and quantify the potential benefits of these strategies in a practical image analysis application. We find user-driven sampling strategies can sometimes provide significant performance gains by steering tools towards local minima that have lower error than tools trained with all of the data. In preliminary experiments we find these performance gains are particularly pronounced when the user is experienced with the tool and application domain.

  10. An automated data exploitation system for airborne sensors

    Science.gov (United States)

    Chen, Hai-Wen; McGurr, Mike

    2014-06-01

    Advanced wide area persistent surveillance (WAPS) sensor systems on manned or unmanned airborne vehicles are essential for wide-area urban security monitoring in order to protect our people and our warfighter from terrorist attacks. Currently, human (imagery) analysts process huge data collections from full motion video (FMV) for data exploitation and analysis (real-time and forensic), providing slow and inaccurate results. An Automated Data Exploitation System (ADES) is urgently needed. In this paper, we present a recently developed ADES for airborne vehicles under heavy urban background clutter conditions. This system includes four processes: (1) fast image registration, stabilization, and mosaicking; (2) advanced non-linear morphological moving target detection; (3) robust multiple target (vehicles, dismounts, and human) tracking (up to 100 target tracks); and (4) moving or static target/object recognition (super-resolution). Test results with real FMV data indicate that our ADES can reliably detect, track, and recognize multiple vehicles under heavy urban background clutters. Furthermore, our example shows that ADES as a baseline platform can provide capability for vehicle abnormal behavior detection to help imagery analysts quickly trace down potential threats and crimes.

  11. Noise-exploitation and adaptation in neuromorphic sensors

    Science.gov (United States)

    Hindo, Thamira; Chakrabartty, Shantanu

    2012-04-01

    Even though current micro-nano fabrication technology has reached integration levels where ultra-sensitive sensors can be fabricated, the sensing performance (resolution per joule) of synthetic systems are still orders of magnitude inferior to those observed in neurobiology. For example, the filiform hairs in crickets operate at fundamental limits of noise; auditory sensors in a parasitoid fly can overcome fundamental limitations to precisely localize ultra-faint acoustic signatures. Even though many of these biological marvels have served as inspiration for different types of neuromorphic sensors, the main focus these designs have been to faithfully replicate the biological functionalities, without considering the constructive role of "noise". In man-made sensors device and sensor noise are typically considered as a nuisance, where as in neurobiology "noise" has been shown to be a computational aid that enables biology to sense and operate at fundamental limits of energy efficiency and performance. In this paper, we describe some of the important noise-exploitation and adaptation principles observed in neurobiology and how they can be systematically used for designing neuromorphic sensors. Our focus will be on two types of noise-exploitation principles, namely, (a) stochastic resonance; and (b) noise-shaping, which are unified within our previously reported framework called Σ▵ learning. As a case-study, we describe the application of Σ▵ learning for the design of a miniature acoustic source localizer whose performance matches that of its biological counterpart(Ormia Ochracea).

  12. Exploiting GPUs in Virtual Machine for BioCloud

    Science.gov (United States)

    Jo, Heeseung; Jeong, Jinkyu; Lee, Myoungho; Choi, Dong Hoon

    2013-01-01

    Recently, biological applications start to be reimplemented into the applications which exploit many cores of GPUs for better computation performance. Therefore, by providing virtualized GPUs to VMs in cloud computing environment, many biological applications will willingly move into cloud environment to enhance their computation performance and utilize infinite cloud computing resource while reducing expenses for computations. In this paper, we propose a BioCloud system architecture that enables VMs to use GPUs in cloud environment. Because much of the previous research has focused on the sharing mechanism of GPUs among VMs, they cannot achieve enough performance for biological applications of which computation throughput is more crucial rather than sharing. The proposed system exploits the pass-through mode of PCI express (PCI-E) channel. By making each VM be able to access underlying GPUs directly, applications can show almost the same performance as when those are in native environment. In addition, our scheme multiplexes GPUs by using hot plug-in/out device features of PCI-E channel. By adding or removing GPUs in each VM in on-demand manner, VMs in the same physical host can time-share their GPUs. We implemented the proposed system using the Xen VMM and NVIDIA GPUs and showed that our prototype is highly effective for biological GPU applications in cloud environment. PMID:23710465

  13. Salmonella Typhimurium exploits inflammation to its own advantage in piglets

    Directory of Open Access Journals (Sweden)

    Barbara eChirullo

    2015-09-01

    Full Text Available Salmonella Typhimurium (S. Typhimurium is responsible for foodborne zoonotic infections that, in humans, induce self-limiting gastroenteritis. The aim of this study was to evaluate whether the wild-type strain S. Typhimurium (STM14028 is able to exploit inflammation fostering an active infection.Due to the similarity between human and porcine diseases induced by S. Typhimurium, we used piglets as a model for salmonellosis and gastrointestinal research. This study showed that STM14028 is able to efficiently colonize in vitro porcine mono-macrophages and intestinal columnar epithelial (IPEC-J2 cells, and that the colonization significantly increases with LPS pre-treatment. This increase was then reversed by inhibiting the LPS stimulation through LPS antagonist, confirming an active role of LPS stimulation in the STM14028-intracellular colonization. Moreover, LPS in vivo treatment induces increased cytokines blood level and body temperature at 4 hours post infection, which is consistent with an acute inflammatory stimulus, capable to influence the colonization of STM14028 in different organs and tissues. The present study proves for the first time that in acute enteric salmonellosis, S.Typhimurium exploits inflammation for its benefit in piglets.

  14. The HACMS program: using formal methods to eliminate exploitable bugs

    Science.gov (United States)

    Launchbury, John; Richards, Raymond

    2017-01-01

    For decades, formal methods have offered the promise of verified software that does not have exploitable bugs. Until recently, however, it has not been possible to verify software of sufficient complexity to be useful. Recently, that situation has changed. SeL4 is an open-source operating system microkernel efficient enough to be used in a wide range of practical applications. Its designers proved it to be fully functionally correct, ensuring the absence of buffer overflows, null pointer exceptions, use-after-free errors, etc., and guaranteeing integrity and confidentiality. The CompCert Verifying C Compiler maps source C programs to provably equivalent assembly language, ensuring the absence of exploitable bugs in the compiler. A number of factors have enabled this revolution, including faster processors, increased automation, more extensive infrastructure, specialized logics and the decision to co-develop code and correctness proofs rather than verify existing artefacts. In this paper, we explore the promise and limitations of current formal-methods techniques. We discuss these issues in the context of DARPA’s HACMS program, which had as its goal the creation of high-assurance software for vehicles, including quadcopters, helicopters and automobiles. This article is part of the themed issue ‘Verified trustworthy software systems’. PMID:28871050

  15. Gas exploitation and gas conversion; Gassutnyttelse og gasskonvertering

    Energy Technology Data Exchange (ETDEWEB)

    Laading, Gjert

    1998-07-01

    This presentation deals with some of the challenges and possibilities connected with ''stranded'' gas. These are offshore gas reserves, especially associated gas, that is not connected with the market and that cannot be piped onshore, and where reinjection is not profitable, and where flaring off is not an option. There is increasing interest all over the world to find economical and environmentally friendly solutions to this problem. A good solution will render such fields economically developable and will to a high degree increase the total volume of the world's exploitable gas reserves. Since synthesis gas is a dominating cost element in most chemical conversion processes for gas, the synthesis gases are discussed in some detail. There is also a discussion of the conversion of the gas to Methanol, Synthetic oil (Syncrude and Synfuels) and to DME (Di-methyl-ether). Two methods for gas transport from the field are discussed; LNG on floating production storage and off loading (FPSO), and Gas hydrates. Principles, limitations and conditions for placing those processes on a FPSO. Finally, the presentation discusses the most important economic factors related to the exploitation of offshore gas, and suggests some possibilities for future development.11 figs.

  16. Exploiting first-class arrays in Fortran for accelerator programming

    Energy Technology Data Exchange (ETDEWEB)

    Rasmussen, Craig E [Los Alamos National Laboratory; Weseloh, Wayne N [Los Alamos National Laboratory; Robey, Robert W [Los Alamos National Laboratory; Matthew, Sottile J [GALORIS, INC.; Quinlan, Daniel [LLNL; Overbye, Jeffrey [INDIANA UNIV.

    2010-12-15

    Emerging architectures for high performance computing often are well suited to a data parallel programming model. This paper presents a simple programming methodology based on existing languages and compiler tools that allows programmers to take advantage of these systems. We will work with the array features of Fortran 90 to show how this infrequently exploited, standardized language feature is easily transformed to lower level accelerator code. Our transformations are based on a mapping from Fortran 90 to C++ code with OpenCL extensions. The sheer complexity of programming for clusters of many or multi-core processors with tens of millions threads of execution make the simplicity of the data parallel model attractive. Furthermore, the increasing complexity of todays applications (especially when convolved with the increasing complexity of the hardware) and the need for portability across hardware architectures make a higher-level and simpler programming model like data parallel attractive. The goal of this work has been to exploit source-to-source transformations that allow programmers to develop and maintain programs at a high-level of abstraction, without coding to a specific hardware architecture. Furthermore these transformations allow multiple hardware architectures to be targeted without changing the high-level source. It also removes the necessity for application programmers to understand details of the accelerator architecture or to know OpenCL.

  17. The Potential Socio-economic Impacts of Gas Hydrate Exploitation

    Science.gov (United States)

    Riley, David; Schaafsma, Marije; Marin-Moreno, Héctor; Minshull, Tim A.

    2017-04-01

    Gas hydrate has garnered significant interest as a possible clean fossil fuel resource, especially in countries with limited energy supplies. Whilst the sector is still in its infancy, there has been escalating development towards commercial production. To the best of our knowledge it appears that, despite its potential, existing analyses of the social and economic impacts of hydrate exploitation have been very limited. Before any viable commercial production commences, the potential impacts across society must be considered. It is likely that such impact assessments will become a legislative requirement for hydrate exploitation, similar to their requirement in conventional oil and gas projects. Social impact analysis should guide hydrate development to have the highest possible net benefits to the human and natural environment. Without active commercial hydrate operations, potential socio-economic impacts can only be inferred from other fossil fuel resource focused communities, including those directly or indirectly affected by the oil and gas industry either in the vicinity of the well or further afield. This review attempts to highlight potential impacts by synthesising current literature, focusing on social impacts at the extraction stage of operation, over time. Using a DPSIR (Driving forces; Pressures; States; Impacts; Responses) framework, we focus on impacts upon: health and wellbeing, land use and access, services and infrastructure, population, employment opportunities, income and lifestyles. Human populations directly or indirectly related with fossil fuel extraction activities often show boom and bust dynamics, and so any impacts may be finite or change temporally. Therefore potential impacts have to be reassessed throughout the lifetime of the exploitation. Our review shows there are a wide range of possible positive and negative socio-economic impacts from hydrate development. Exploitation can bring jobs and infrastructure to remote areas, although

  18. A Case Study of How Organisational Members do Affect the Balancing of Exploitation and Exploration

    DEFF Research Database (Denmark)

    Andreassen, Mads R.

    2008-01-01

    study using semi-structured interviews and observation techniques this paper explores exploitation and exploration in a Danish industrial manufacture. Findings suggest that conditions affecting the balance between exploitation and exploration activities would depend on how an organisational member...

  19. Using ImageJ for the quantitative analysis of flow-based adhesion assays in real-time under physiologic flow conditions.

    Science.gov (United States)

    Meyer dos Santos, Sascha; Klinkhardt, Ute; Schneppenheim, Reinhard; Harder, Sebastian

    2010-01-01

    This article intends to close the gap between the abundance of regular articles focusing on adhesive mechanisms of cells in a flow field and purely technical reports confined to the description of newly developed algorithms, not yet ready to be used by users without programming skills. A simple and robust method is presented for analysing raw videomicroscopic data of flow-based adhesion assays using the freely available public domain software ImageJ. We describe in detail the image processing routines used to rapidly and reliably evaluate the number of adherent and translocating platelets in videomicroscopic recordings. The depicted procedures were exemplified by analysing platelet interaction with immobilized von Willebrand factor and fibrinogen in flowing blood under physiological wall shear rates. Neutralizing GPIbalpha function reduced shear-dependent platelet translocation on von Willebrand factor and abolished firm platelet adhesion. Abciximab, Tirofiban and Eptifibatide completely inhibited GPIIb/IIIa-dependent stable platelet deposition on fibrinogen. The presented method to analyse videomicroscopic recordings from flow-based adhesion assays offers the advantage of providing a simple and reliable way to quantify flow-based adhesion assays, which is completely based on ImageJ and can easily be applied to study adhesion mechanisms of cells in non-fluorescent modes without the need to deviate from the presented protocol.

  20. Exploiting Wireless Received Signal Strength Indicators to Detect Evil-Twin Attacks in Smart Homes

    Directory of Open Access Journals (Sweden)

    Zhanyong Tang

    2017-01-01

    Full Text Available Evil-Twin is becoming a common attack in smart home environments where an attacker can set up a fake AP to compromise the security of the connected devices. To identify the fake APs, The current approaches of detecting Evil-Twin attacks all rely on information such as SSIDs, the MAC address of the genuine AP, or network traffic patterns. However, such information can be faked by the attacker, often leading to low detection rates and weak protection. This paper presents a novel Evil-Twin attack detection method based on the received signal strength indicator (RSSI. Our approach considers the RSSI as a fingerprint of APs and uses the fingerprint of the genuine AP to identify fake ones. We provide two schemes to detect a fake AP in two different scenarios where the genuine AP can be located at either a single or multiple locations in the property, by exploiting the multipath effect of the Wi-Fi signal. As a departure from prior work, our approach does not rely on any professional measurement devices. Experimental results show that our approach can successfully detect 90% of the fake APs, at the cost of a one-off, modest connection delay.

  1. 25 CFR 20.516 - How are child abuse, neglect or exploitation cases to be handled?

    Science.gov (United States)

    2010-04-01

    ... 25 Indians 1 2010-04-01 2010-04-01 false How are child abuse, neglect or exploitation cases to be... FINANCIAL ASSISTANCE AND SOCIAL SERVICES PROGRAMS Child Assistance Foster Care § 20.516 How are child abuse, neglect or exploitation cases to be handled? Reported child abuse, neglect or exploitation cases and the...

  2. 75 FR 40838 - Establishment of the Advisory Board on Elder Abuse, Neglect, and Exploitation

    Science.gov (United States)

    2010-07-14

    ... HUMAN SERVICES Establishment of the Advisory Board on Elder Abuse, Neglect, and Exploitation AGENCY... Board on Elder Abuse, Neglect, and Exploitation is authorized under section 2021, Subtitle H--Elder... establishment of the Advisory Board on Elder Abuse, Neglect, and Exploitation, as directed by section 2022...

  3. The community structure of a tropical intertidal mudflat under human exploitation

    NARCIS (Netherlands)

    Boer, de W.F.; Prins, H.H.T.

    2002-01-01

    The impact of human exploitation on the community structure of intertidal mudflats was investigated in an exploited and unexploited control area at Inhaca Island, Mozambique. An increase in the species richness in the exploited area, as expected by the intermediate disturbance hypothesis, was not

  4. Sentinel-2 data exploitation with ESA's Sentinel-2 Toolbox

    Science.gov (United States)

    Gascon, Ferran; Ramoino, Fabrizzio; deanos, Yves-louis

    2017-04-01

    The Sentinel-2 Toolbox is a project kicked off by ESA in early 2014, under the umbrella of the ESA SEOM programme with the aim to provide a tool for visualizing, analysing, and processing the Sentinel-2 datasets. The toolbox is an extension of the SeNtinel Application Platform (SNAP), a project resulting from the effort of the developers of the Sentinel-1, Sentinel-2 and Sentinel-3 toolbox to provide a single common application framework suited for the mixed exploitation of SAR, high resolution optical and medium resolution optical datasets. All three development teams collaborate to drive the evolution of the common SNAP framework in a developer forum. In this triplet, the Sentinel-2 toolbox is dedicated to enhance SNAP support for high resolution optical imagery. It is a multi-mission toolbox, already providing support for Sentinel-2, RapidEye, Deimos, SPOT 1 to SPOT 5 datasets. In terms of processing algorithms, SNAP provides tools specific to the Sentinel-2 mission : • An atmospheric correction module, Sen2Cor, is integrated into the toolbox, and provides scene classification, atmospheric correction, cirrus detection and correction. The output L2A products can be opened seamlessly in the toolbox. • A multitemporal synthesis processor (L3) • A biophysical products processor (L2B) • A water processor • A deforestation detector • OTB tools integration • SNAP Engine for Cloud Exploitation along with a set of more generic tools for high resolution optical data exploitation. Together with the generic functionalities of SNAP this provides an ideal environment for designing multi-missions processing chains and producing value-added products from raw datasets. The use of SNAP is manifold and the desktop tools provides a rich application for interactive visualization, analysis and processing of data. But all tools available from SNAP can be accessed via command-line through the Graph Processing Framework (GPT), the kernel of the SNAP processing engine. This

  5. Exploiting ten years of MERIS data over Land Surfaces

    Science.gov (United States)

    Gobron, Nadine

    2012-07-01

    Envisat's Medium Resolution Imaging Spectrometer (MERIS) acquires multi-spectral imagery of the Earth in the optical domain over terrestrial surfaces since a decade at global scale. Characteristics of the instrument will be first summarized and then several achievements for terrestrial applications will be presented as scientists have used data or products for characterizing the state of the global system and its variability. The ESA- GlobCover which has developed a service capable of delivering land cover maps on the basis of 300m spectral reflectance measurements will be summarized (Bicheron et al, 2008; Arino et al, 2010). We will highlight recent research results for continental land cover mapping over South America using MERIS data from 2009 and 2010 (Hojas Gascon et al, 2012). The objective and originality of this work was to generate a new land cover using selected MERIS data instead of all available images and supplementary information from associated Level-2 product, i.e. FAPAR, provided at a reduced resolution of 1 km. As the actual two level-2 products provided by ESA correspond to geophysical products such as the FAPAR (Fraction of Synthetically Active Radiation) and the MERIS terrestrial chlorophyll index (MTCI). With this latter, phenology studies as this product is sensitive to canopy chlorophyll content, a vegetation property that is a useful proxy for the canopy physical and chemical alterations associated with phenological change. (Dash and Curran, 2004; Boyd et al, 2011). For exploiting the use of the MGVI, ESA-Joint Research Center (JRC) FAPAR project has been created for producing time-series of geophysical products and will be summarized (Gobron et al, 2006, 2010; Fusco et al, 2003). It uses through various examples such as assessing drought at regional scale (Rossi etl a, 2010) or monitoring the state and changes of land surfaces global scale (Gobron et al, 2012). As the FAPAR value constitutes a state variable in advanced Earth system models

  6. Child Sexual Abuse and Exploitation: Guest Editor’s Introduction

    Directory of Open Access Journals (Sweden)

    Michael Salter

    2015-07-01

    Full Text Available One of the most unnerving aspects of child sexual abuse is that it is constantly manifesting in unexpected ways. The current Royal Commission into Institutional Responses to Child Sexual Abuse has collected testimony of abuse in churches, schools, out-of-home care, hospitals and religious communities, demonstrating the breadth of institutional arrangements whose structures and cultures have facilitated child sexual abuse. Cases of serious and prolonged sexual abuse in family contexts have been excluded from the terms of reference of the Royal Commission but nonetheless continue to surface in media reports. In 2013, twelve children were permanently removed from an extended family living in rural NSW in what has been described as one of the worst cases of child abuse in Australia, involving intergenerational incest going back at least three generations (Auebach 2014. Another recent high-profile case involved the use of the Internet to facilitate the sexual exploitation of an adopted child by his parents in Queensland (Ralston 2013. These cases challenge the received wisdom that child sexual abuse is characterised by the victimisation of one child by one opportunistic offender. Such incidents suggest instead that child sexual abuse takes varied and systemic forms, and can operate to perpetuate and entrench toxic cultures and power structures.   This special issue on Child Sexual Abuse and Exploitation is a timely contribution to ongoing efforts to understand the multiplicity of child sexual abuse. It is an interdisciplinary collection of insights drawn from criminology, sociology, psychiatry, psychology and psychoanalysis, and includes papers from academic researchers alongside academic practitioners whose writing is grounded in their work with affected individuals and communities. A key aim of the special issue is to contextualise the diversity of child sexual abuse socially, politically and historically, recognising the dynamic and iterative

  7. Exploiting temporal correlation of speech for error robust and bandwidth flexible distributed speech recognition

    DEFF Research Database (Denmark)

    Tan, Zheng-Hua; Dalsgaard, Paul; Lindberg, Børge

    2007-01-01

    In this paper the temporal correlation of speech is exploited in front-end feature extraction, client based error recovery and server based error concealment (EC) for distributed speech recognition. First, the paper investigates a half frame rate (HFR) front-end that uses double frame shifting...... and concealment is conducted at the sub-vector level as opposed to conventional techniques where an entire vector is replaced even though only a single bit error occurs. The sub-vector EC is further combined with weighted Viterbi decoding. Encouraging recognition results are observed for the proposed techniques....... Lastly, to understand the effects of applying various EC techniques, this paper introduces three approaches consisting of speech feature, dynamic programming distance and hidden Markov model state duration comparison....

  8. The Impact of Tayub Exploitation on The Tradition and Life of Javanese Society

    Directory of Open Access Journals (Sweden)

    Noordiana Noordiana

    2017-01-01

    Full Text Available This study is aiming at finding out the impact of Tayub exploitation on the tradition and life of Javanese society. Research approach implemented in this study was qualitative. In addition, the research technique employed was interview, observation, documentation, and literary study. Results show that the new form of Tayub diminishes the structure of feminism, neglects simplicity, gentleness and spontaneity that are supposed to be part of Tayub dance. The movement of dance, music, and costume are also changed into a total different form, compared with the genuine version of Tayub dance. These major changes do not only bring negative impacts on the dance structure, but also change the society’s mindset and behavior. People living in the countryside part of Java have lost their control towards customs’ regulation and a philosophy that used to be held tightly by them.

  9. Exploiting the contextual cues for bio-entity name recognition in biomedical literature.

    Science.gov (United States)

    Yang, Zhihao; Lin, Hongfei; Li, Yanpeng

    2008-08-01

    To extract biomedical information about bio-entities from the huge amount of biomedical literature, the first key step is recognizing their names in these literatures, which remains a challenging task due to the irregularities and ambiguities in bio-entities nomenclature. The recognition performances of the current popular methods, machine learning techniques, still have much space to be improved. This paper presents a Conditional Random Field-based approach used to recognize the names of bio-entities including gene, protein, cell type, cell line and studies the methods of improving the performance by the exploitation of the contextual cues including bracket pair, heuristic syntax structure and interaction words cue. Experiment results on both JNLPBA2004 and BioCreative2004 task 1A datasets show that these methods can improve Conditional Random Field-based recognition performance by more than 2 points in F-score.

  10. Exploiting Scanning Behavior for Predators Can Reduce Rice Damage Caused by Birds

    Directory of Open Access Journals (Sweden)

    Takeshi Honda

    2015-01-01

    Full Text Available Rice is often damaged by birds, especially sparrows, in Asia. Bird nets are sometimes used as countermeasures; however this approach is expensive and labor intensive. For this reason, farmers generally eschew bird nets, even though no alternative countermeasures are available. This study focused on exploiting the bird behavior of scanning for predators to reduce crop damage. When birds forage for seeds on the ground they often stop pecking and briefly raise their heads, apparently to scan for predators. Low visibility habitats increase scanning behavior and increased scanning behavior reduces habitat quality from the bird’s perspective; therefore, this study tested the relationship between rice damage rate and visibility at the periphery of rice fields, where tree sparrows rest after feeding. Overall, low visibility reduced damage to rice. Because visibility was mainly affected by weeds, weed management techniques contribute to crop damage management. To reduce damage, weeding can be decreased; therefore, this technique is cost- and labor-efficient.

  11. Gene Therapy Strategies to Exploit TRIM Derived Restriction Factors against HIV-1

    Directory of Open Access Journals (Sweden)

    Emma Chan

    2014-01-01

    Full Text Available Restriction factors are a collection of antiviral proteins that form an important aspect of the innate immune system. Their constitutive expression allows immediate response to viral infection, ahead of other innate or adaptive immune responses. We review the molecular mechanism of restriction for four categories of restriction factors; TRIM5, tetherin, APOBEC3G and SAMHD1 and go on to consider how the TRIM5 and TRIMCyp proteins in particular, show promise for exploitation using gene therapy strategies. Such approaches could form an important alternative to current anti-HIV-1 drug regimens, especially if combined with strategies to eradicate HIV reservoirs. Autologous CD4+ T cells or their haematopoietic stem cell precursors engineered to express TRIMCyp restriction factors, and provided in a single therapeutic intervention could then be used to restore functional immunity with a pool of cells protected against HIV. We consider the challenges ahead and consider how early clinical phase testing may best be achieved.

  12. Chemomimetic biocatalysis: exploiting the synthetic potential of cofactor-dependent enzymes to create new catalysts.

    Science.gov (United States)

    Prier, Christopher K; Arnold, Frances H

    2015-11-11

    Despite the astonishing breadth of enzymes in nature, no enzymes are known for many of the valuable catalytic transformations discovered by chemists. Recent work in enzyme design and evolution, however, gives us good reason to think that this will change. We describe a chemomimetic biocatalysis approach that draws from small-molecule catalysis and synthetic chemistry, enzymology, and molecular evolution to discover or create enzymes with non-natural reactivities. We illustrate how cofactor-dependent enzymes can be exploited to promote reactions first established with related chemical catalysts. The cofactors can be biological, or they can be non-biological to further expand catalytic possibilities. The ability of enzymes to amplify and precisely control the reactivity of their cofactors together with the ability to optimize non-natural reactivity by directed evolution promises to yield exceptional catalysts for challenging transformations that have no biological counterparts.

  13. THE SUPPORTING OF EXPLOITATION AND MAINTENANCE MANAGEMENT WITHIN NETWORKED TECHNICAL SYSTEMS

    Directory of Open Access Journals (Sweden)

    Marcin DĄBROWSKI

    2015-04-01

    Full Text Available Network technical systems are complex systems, which include distribution networks with devices and engineering objects supporting their work. These kind of systems are used for media distribution, such as: drinking water, fuel, gas, heat, etc. One of specific features of this system is large territorial dispersion of technical objects within the system. The exploitation specificity of networked technical systems requires a special approach for implementing maintenance and repair work, taking into account the large territorial dispersion of their components and limited access to technical infra-structure. The features pointed above show the difference between networked technical system and the typical industri-al technical objects (e.g. available in manufacturing plants. This difference also requires the use of specific IT tools for maintenance management. This article discusses examples of selected tools in this class.

  14. A Mobile Application Recommendation Framework by Exploiting Personal Preference with Constraints

    Directory of Open Access Journals (Sweden)

    Konglin Zhu

    2017-01-01

    Full Text Available Explosive mobile applications (Apps are proliferating with the popularity of mobile devices (e.g., smartphones, tablets. These Apps are developed to satisfy different function needs of users. Majority of existing App Stores have difficulty in recommending proper Apps for users. Therefore, it is of significance to recommend mobile Apps for users according to personal preference and various constraints of mobile devices (e.g., battery power. In this paper, we propose a mobile App recommendation framework by incorporating different requirements from users. We exploit modern portfolio theory (MPT to combine the popularity of mobile Apps, personal preference, and mobile device constraints for mobile App recommendation. Based on this framework, we discuss the recommendation approaches by constraints of phone power and limited mobile data plan. Extensive evaluations show that the proposed mobile App recommendation framework can well adapt to power and network data plan constraints. It satisfies the user App preference and mobile device constraints.

  15. Marine Metagenomics: New Tools for the Study and Exploitation of Marine Microbial Metabolism

    Directory of Open Access Journals (Sweden)

    Alan D. W. Dobson

    2010-03-01

    Full Text Available The marine environment is extremely diverse, with huge variations in pressure and temperature. Nevertheless, life, especially microbial life, thrives throughout the marine biosphere and microbes have adapted to all the divergent environments present. Large scale DNA sequence based approaches have recently been used to investigate the marine environment and these studies have revealed that the oceans harbor unprecedented microbial diversity. Novel gene families with representatives only within such metagenomic datasets represent a large proportion of the ocean metagenome. The presence of so many new gene families from these uncultured and highly diverse microbial populations represents a challenge for the understanding of and exploitation of the biology and biochemistry of the ocean environment. The application of new metagenomic and single cell genomics tools offers new ways to explore the complete metabolic diversity of the marine biome.

  16. Exploiting attractiveness in persuasion: senders' implicit theories about receivers' processing motivation.

    Science.gov (United States)

    Vogel, Tobias; Kutzner, Florian; Fiedler, Klaus; Freytag, Peter

    2010-06-01

    Previous research suggests a positive correlation between physical attractiveness and the expectation of positive outcomes in social interactions, such as successful persuasion. However, prominent persuasion theories do not imply a general advantage of attractive senders. Instead, the persuasion success should vary with the receivers' processing motivation and processing capacity. Focusing on the perspective of the sender, the authors elaborate on lay theories about how attractiveness affects persuasion success. They propose that lay theories (a) match scientific models in that they also comprise the interaction of senders' attractiveness and receivers' processing characteristics, (b) guide laypersons' anticipation of persuasion success, and (c) translate into strategic behavior. They show that anticipated persuasion success depends on the interplay of perceived attractiveness and expectations about receivers' processing motivation (Experiment 1 and 2). Further experiments show that laypersons strategically attempt to exploit attractiveness in that they approach situations (Experiment 3) and persons (Experiment 4) that promise persuasion success.

  17. Exploiting Remotely Piloted Aircraft: Understanding the Impact of Strategy on the Approach to Autonomy

    Science.gov (United States)

    2011-06-01

    64. 34 Robert Gilpin‟s War & Change in World Politics serves as the basis from which to think about war and change as a guide to future...Westport, CT: Praeger Security International, 2008), 150. 2 Robert Gilpin, War & Change in World Politics , (Cambridge, UK: Cambridge University...Press, 1981), 25. 3 Robert Gilpin, War & Change in World Politics , 207. 4 Robert Gilpin, War & Change in World Politics , 6. Gilpin‟s hegemonic

  18. Matching Multi-Source Optical Satellite Imagery Exploiting a Multi-Stage Approach

    Directory of Open Access Journals (Sweden)

    Yuxuan Liu

    2017-12-01

    Full Text Available Geometric distortions and intensity differences always exist in multi-source optical satellite imagery, seriously reducing the similarity between images, making it difficult to obtain adequate, accurate, stable, and well-distributed matches for image registration. With the goal of solving these problems, an effective image matching method is presented in this study for multi-source optical satellite imagery. The proposed method includes three steps: feature extraction, initial matching, and matching propagation. Firstly, a uniform robust scale invariant feature transform (UR-SIFT detector was used to extract adequate and well-distributed feature points. Secondly, initial matching was conducted based on the Euclidean distance to obtain a few correct matches and the initial projective transformation between the image pair. Finally, two matching strategies were used to propagate matches and produce more reliable matching results. By using the geometric relationship between the image pair, geometric correspondence matching found more matches than the initial UR-SIFT feature points. Further probability relaxation matching propagated some new matches around the initial UR-SIFT feature points. Comprehensive experiments on Chinese ZY3 and GaoFen (GF satellite images revealed that the proposed algorithm performs well in terms of the number of correct matches, correct matching rate, spatial distribution, and matching accuracy, compared to the standard UR-SIFT and triangulation-based propagation method.

  19. Exploiting problem structure in a genetic algorithm approach to a nurse rostering problem

    OpenAIRE

    Aickelin, Uwe; Dowsland, Kathryn

    2008-01-01

    There is considerable interest in the use of genetic algorithms to solve problems arising in the areas of scheduling and timetabling. However, the classical genetic algorithm paradigm is not well equipped to handle the conflict between objectives and constraints that typically occurs in such problems. In order to overcome this, successful implementations frequently make use of problem specific knowledge. This paper is concerned with the development of a GA for a nurse rostering problem at a m...

  20. Current and upcoming approaches to exploit the reversibility of epigenetic mutations in breast cancer

    NARCIS (Netherlands)

    Falahi, Fahimeh; van Kruchten, Michel; Martinet, Nadine; Hospers, Geesiena; Rots, Marianne G.

    2014-01-01

    DNA methylation and histone modifications are important epigenetic modifications associated with gene (dys) regulation. The epigenetic modifications are balanced by epigenetic enzymes, so-called writers and erasers, such as DNA (de)methylases and histone (de)acetylases. Aberrant epigenetic

  1. Exploiting Terrorist Vulnerabilities: A Law Enforcement Approach to Fighting Terrorist Organizations

    Science.gov (United States)

    2009-05-01

    terror-be-won.html (accessed November 6, 2008). 4 Ergun Mehmet Caner and Emir Fethi Caner, Unveiling Islam: An Insider’s Look at Muslim Life and Beliefs...Inc., 2008. Caner, Ergun Mehmet and Emir Fethi Caner. Unveiling Islam: An Insider’s Look at Muslim Life and Beliefs. Grand Rapids: Kregel

  2. Exploiting the therapeutic potential of leptin signaling in cachexia.

    Science.gov (United States)

    Mak, Robert H; Cheung, Wai W; Gertler, Arieh

    2014-12-01

    The anorexia-cachexia syndrome is a complication of many chronic conditions including cancer, chronic obstructive pulmonary disease, congestive heart failure, and chronic kidney disease (CKD). Leptin levels are significantly elevated in CKD patients and are associated with markers of poor nutritional status as well as mortality and morbidity. This review will focus on the mechanism and exploit the therapeutic potential of leptin signaling in CKD-associated cachexia. Studies in db/db mice show that the lack of leptin receptor is protective against CKD-induced cachexia. Blockade of leptin's downstream mediators, such as melanocortin-4 receptor, attenuated CKD-associated cachexia. Pegylation of leptin antagonists resulted in a potent and effective long-acting reagents suitable for in-vivo studies or therapies. Pegylated leptin antagonist treatment ameliorates CKD-associated cachexia in mice. Leptin antagonism may represent a viable therapeutic strategy for cachexia in CKD.

  3. Exploiting large-scale correlations to detect continuous gravitational waves.

    Science.gov (United States)

    Pletsch, Holger J; Allen, Bruce

    2009-10-30

    Fully coherent searches (over realistic ranges of parameter space and year-long observation times) for unknown sources of continuous gravitational waves are computationally prohibitive. Less expensive hierarchical searches divide the data into shorter segments which are analyzed coherently, then detection statistics from different segments are combined incoherently. The novel method presented here solves the long-standing problem of how best to do the incoherent combination. The optimal solution exploits large-scale parameter-space correlations in the coherent detection statistic. Application to simulated data shows dramatic sensitivity improvements compared with previously available (ad hoc) methods, increasing the spatial volume probed by more than 2 orders of magnitude at lower computational cost.

  4. ANALYSIS OF ANDROID VULNERABILITIES AND MODERN EXPLOITATION TECHNIQUES

    Directory of Open Access Journals (Sweden)

    Himanshu Shewale

    2014-03-01

    Full Text Available Android is an operating system based on the Linux kernel. It is the most widely used and popular operating system among Smartphones and portable devices. Its programmable and open nature attracts attackers to take undue advantage. Android platform allows developers to freely access and modify source code. But at the same time it increases the security issue. A user is likely to download and install malicious applications written by software hackers. This paper focuses on understanding and analyzing the vulnerabilities present in android platform. In this paper firstly we study the android architecture; analyze the existing threats and security weaknesses. Then we identify various exploit mitigation techniques to mitigate known vulnerabilities. A detailed analysis will help us to identify the existing loopholes and it will give strategic direction to make android operating system more secure.

  5. Selfrando: Securing the Tor Browser against De-anonymization Exploits

    Directory of Open Access Journals (Sweden)

    Conti Mauro

    2016-10-01

    Full Text Available Tor is a well-known anonymous communication system used by millions of users, including journalists and civil rights activists all over the world. The Tor Browser gives non-technical users an easy way to access the Tor Network. However, many government organizations are actively trying to compromise Tor not only in regions with repressive regimes but also in the free world, as the recent FBI incidents clearly demonstrate. Exploiting software vulnerabilities in general, and browser vulnerabilities in particular, constitutes a clear and present threat to the Tor software. The Tor Browser shares a large part of its attack surface with the Firefox browser. Therefore, Firefox vulnerabilities (even patched ones are highly valuable to attackers trying to monitor users of the Tor Browser.

  6. Exploiting mitochondria as targets for the development of new antifungals.

    Science.gov (United States)

    Li, Dongmei; Calderone, Richard

    2017-02-17

    Mitochondria are essential for cell growth and survival of most fungal pathogens. Energy (ATP) produced during oxidation/reduction reactions of the electron transport chain (ETC) Complexes I, III and IV (CI, CIII, CIV) fuel cell synthesis. The mitochondria of fungal pathogens are understudied even though more recent published data suggest critical functional assignments to fungal-specific proteins. Proteins of mammalian mitochondria are grouped into 16 functional categories. In this review, we focus upon 11 proteins from 5 of these categories in fungal pathogens, OXPHOS, protein import, stress response, carbon source metabolism, and fission/fusion morphology. As these proteins also are fungal-specific, we hypothesize that they may be exploited as targets in antifungal drug discovery. We also discuss published transcriptional profiling data of mitochondrial CI subunit protein mutants, in which we advance a novel concept those CI subunit proteins have both shared as well as specific responsibilities for providing ATP to cell processes.

  7. Remotely Exploiting AT Command Attacks on ZigBee Networks

    Directory of Open Access Journals (Sweden)

    Ivan Vaccari

    2017-01-01

    Full Text Available Internet of Things networks represent an emerging phenomenon bringing connectivity to common sensors. Due to the limited capabilities and to the sensitive nature of the devices, security assumes a crucial and primary role. In this paper, we report an innovative and extremely dangerous threat targeting IoT networks. The attack is based on Remote AT Commands exploitation, providing a malicious user with the possibility of reconfiguring or disconnecting IoT sensors from the network. We present the proposed attack and evaluate its efficiency by executing tests on a real IoT network. Results demonstrate how the threat can be successfully executed and how it is able to focus on the targeted nodes, without affecting other nodes of the network.

  8. Exploiting open data: a new era in pharmacoinformatics.

    Science.gov (United States)

    Goldmann, Daria; Montanari, Floriane; Richter, Lars; Zdrazil, Barbara; Ecker, Gerhard F

    2014-04-01

    Within the last decade open data concepts has been gaining increasing interest in the area of drug discovery. With the launch of ChEMBL and PubChem, an enormous amount of bioactivity data was made easily accessible to the public domain. In addition, platforms that semantically integrate those data, such as the Open PHACTS Discovery Platform, permit querying across different domains of open life science data beyond the concept of ligand-target-pharmacology. However, most public databases are compiled from literature sources and are thus heterogeneous in their coverage. In addition, assay descriptions are not uniform and most often lack relevant information in the primary literature and, consequently, in databases. This raises the question how useful large public data sources are for deriving computational models. In this perspective, we highlight selected open-source initiatives and outline the possibilities and also the limitations when exploiting this huge amount of bioactivity data.

  9. Commercial Sexual Exploitation of Children and State Child Welfare Systems.

    Science.gov (United States)

    Bounds, Dawn; Julion, Wrenetha A; Delaney, Kathleen R

    2015-01-01

    In several states, commercial sexual exploitation of children (CSEC) is now a reportable child abuse offense. Illinois has taken the lead in tackling the issue and the Illinois experience illuminates valuable lessons. This article delineates the protection, practice, and policy implications that evolve when CSEC falls under a state child welfare system. The specific aims are to (a) discuss CSEC, its victims, risks, harms, and challenges inherent in providing effective care; (b) use Illinois as an exemplar to explicate the consequences and implementation challenges of establishing a state reporting system that frames CSEC as a child welfare issue; (c) recommend strategies for developing effective state reporting models, and (d) demonstrate how nurses are well poised to advocate for victims of human trafficking on both state and national levels. Recommendations for improving the identification of CSEC victims and overcoming challenges to state implementation are offered. © The Author(s) 2015.

  10. Autonomous Industrial Mobile Manipulation (AIMM) - maturation, exploitation and implementation

    DEFF Research Database (Denmark)

    Hvilshøj, Mads

    and implementation of AIMM. The first part concerns the missing links and gaps for bringing AIMM from research to industry. A general AIMM manufacturing concept has been formulated, AIMM prototypes have been developed and laboratory experiments have been conducted. From this, we have joined forces with Grundfos A......This thesis introduces the Autonomous Industrial Mobile Manipulator ”Little Helper”, a robotic co-worker which extends the potential of industrial robotics by combining locomotion and manipulation capabilities. The thesis presents promising findings for industrial maturation, exploitation...... system, and it is unacceptable to have a dedicated AIMM system for each task. By utilizing modules, it is possible to (re)configure the system to a specific set of manufacturing needs. To realize this, the AIMM technology has been treated as a Mass Customization product. From this, industrially suited...

  11. Exploiting Channel Correlations - Simple Interference Alignment Schemes with no CSIT

    CERN Document Server

    Jafar, Syed A

    2009-01-01

    We explore 5 network communication problems where the possibility of interference alignment, and consequently the total number of degrees of freedom (DoF) with channel uncertainty at the transmitters are unknown. These problems share the common property that in each case the best known outer bounds are essentially robust to channel uncertainty and represent the outcome with interference alignment, but the best inner bounds -- in some cases conjectured to be optimal -- predict a total collapse of DoF, thus indicating the infeasibility of interference alignment under channel uncertainty at transmitters. Our main contribution is to show that even with no knowledge of channel coefficient values at the transmitters, the knowledge of the channels' correlation structure can be exploited to achieve interference alignment. In each case, we show that under a staggered block fading model, the transmitters are able to align interference without the knowledge of channel coefficient values. The alignment schemes are based ...

  12. Smart facility application: exploiting space technology for smart city solution

    Science.gov (United States)

    Termizi, A. A. A.; Ahmad, N.; Omar, M. F.; Wahap, N. A.; Zainal, D.; Ismail, N. M.

    2016-06-01

    Facilities and amenities management is amongst the core functionalities of local government. Considering the vast area that local government has to manage, a smart solution is extremely inevitable to solve issues such as inefficient maintenance of public parks, drainage system and so forth. Therefore, this paper aims to offer a smart city solution which exploits the benefit of space technology. This proposed solution is one of the modules developed in Spatial Smart City Service Delivery Engine (SSC SDE) Project undertaken by Agensi Angkasa Negara (ANGKASA). Various levels of local government have been chosen to understand real issues faced by them. Based on this data, a Smart Facility application has been developed with the aim to enhance the service delivery by the local government hence improving citizens’ satisfaction. Since this project is still in progress, this paper will merely discussing the concept of this application.

  13. Autonomous Industrial Mobile Manipulation (AIMM) - maturation, exploitation and implementation

    DEFF Research Database (Denmark)

    Hvilshøj, Mads

    This thesis introduces the Autonomous Industrial Mobile Manipulator ”Little Helper”, a robotic co-worker which extends the potential of industrial robotics by combining locomotion and manipulation capabilities. The thesis presents promising findings for industrial maturation, exploitation...... and implementation of AIMM. The first part concerns the missing links and gaps for bringing AIMM from research to industry. A general AIMM manufacturing concept has been formulated, AIMM prototypes have been developed and laboratory experiments have been conducted. From this, we have joined forces with Grundfos A....../S, where full-scale industrial AIMM demonstrations in terms of automatic multiple part feeding have been successfully realized. The second part concerns the development of modular and (re)configurable AIMM systems. At present, it is technically and/or economically unfeasible to create a hyper flexible AIMM...

  14. Exploitation and Benefits of BIM in Construction Project Management

    Science.gov (United States)

    Mesároš, Peter; Mandičák, Tomáš

    2017-10-01

    BIM is increasingly getting into the awareness in construction industry. BIM is the process of creating and data managing of the building during its life cycle. BIM became a part of management tools in modern construction companies. Construction projects have a number of participants. It means difficulty process of construction project management and a serious requirement for processing the huge amount of information including design, construction, time and cost parameters, economic efficiency and sustainability. Progressive information and communication technologies support cost management and management of construction project. One of them is Building Information Modelling. Aim of the paper is to examine the impact of BIM exploitation and benefits on construction project management in Slovak companies.

  15. Exploiting peer group concept for adaptive and highly available services

    CERN Document Server

    Jan, M A; Fraz, M M; Ali, A; Ali, Arshad; Fraz, Mohammad Moazam; Jan, Muhammad Asif; Zahid, Fahd Ali

    2003-01-01

    This paper presents a prototype for redundant, highly available and fault tolerant peer to peer framework for data management. Peer to peer computing is gaining importance due to its flexible organization, lack of central authority, distribution of functionality to participating nodes and ability to utilize unused computational resources. Emergence of GRID computing has provided much needed infrastructure and administrative domain for peer to peer computing. The components of this framework exploit peer group concept to scope service and information search, arrange services and information in a coherent manner, provide selective redundancy and ensure availability in face of failure and high load conditions. A prototype system has been implemented using JXTA peer to peer technology and XML is used for service description and interfaces, allowing peers to communicate with services implemented in various platforms including web services and JINI services. It utilizes code mobility to achieve role interchange amo...

  16. Exploiting Receptor Competition to Enhance Nanoparticle Binding Selectivity

    Science.gov (United States)

    Angioletti-Uberti, Stefano

    2017-02-01

    Nanoparticles functionalized with multiple ligands can be programed to bind biological targets depending on the receptors they express, providing a general mechanism exploited in various technologies, from selective drug delivery to biosensing. For binding to be highly selective, ligands should exclusively interact with specific targeted receptors, because the formation of bonds with other, untargeted ones would lead to nonspecific binding and potentially harmful behavior. This poses a particular problem for multivalent nanoparticles, because even very weak bonds can collectively lead to strong binding. A statistical mechanical model is used here to describe how competition between different receptors together with multivalent effects can be harnessed to design ligand-functionalized nanoparticles insensitive to the presence of untargeted receptors, preventing nonspecific binding.

  17. Exploiting the Undesired: Beam-Gas Interactions in the LHC

    CERN Document Server

    Versaci, R; Baglin, V; Mereghetti, A

    2012-01-01

    The vacuum inside the LHC pipes has a key role in correct operation of the accelerator. The interaction of the beam with residual gas in the pipes can lead to the loss of the beam itself and damage accelerator components. Nevertheless, beam-gas interactions can be exploited to indirectly measure the gas pressure inside the beam pipe, detecting the secondaries produced. The showers generated are detected by Beam Loss Monitors, whose signals depend on the gas pressure. This technique would also allow to punctually measure the gas pressure in sections of the accelerator where vacuum gauges are not frequent, such as the arcs. The problem has been addressed by means of FLUKA simulations and the results have been benchmarked with direct measurements performed in the LHC in 2011.

  18. Evolution of a Communication System by Sensory Exploitation of Startle Behavior.

    Science.gov (United States)

    Ter Hofstede, Hannah M; Schöneich, Stefan; Robillard, Tony; Hedwig, Berthold

    2015-12-21

    New communication signals can evolve by sensory exploitation if signaling taps into preexisting sensory biases in receivers [1, 2]. For mate attraction, signals are typically similar to attractive environmental cues like food [3-6], which amplifies their attractiveness to mates, as opposed to aversive stimuli like predator cues. Female field crickets approach the low-frequency calling song of males, whereas they avoid high-frequency sounds like predatory bat calls [7]. In one group of crickets (Eneopterinae: Lebinthini), however, males produce exceptionally high-frequency calling songs in the range of bat calls [8], a surprising signal in the context of mate attraction. We found that female lebinthines, instead of approaching singing males, produce vibrational responses after male calls, and males track the source of vibrations to find females. We also demonstrate that field cricket species closely related to the Lebinthini show an acoustic startle response to high-frequency sounds that generates substrate vibrations similar to those produced by female lebinthine crickets. Therefore, the startle response is the most likely evolutionary origin of the female lebinthine vibrational signal. In field crickets, the brain receives activity from two auditory interneurons; AN1 tuned to male calling song controls positive phonotaxis, and AN2 tuned to high-frequency bat calls triggers negative phonotaxis [9, 10]. In lebinthine crickets, however, we found that auditory ascending neurons are only tuned to high-frequency sounds, and their tuning matches the thresholds for female vibrational signals. Our results demonstrate how sensory exploitation of anti-predator behavior can evolve into a communication system that benefits both senders and receivers. Copyright © 2015 Elsevier Ltd. All rights reserved.

  19. GOCE and Future Gravity Missions for Geothermal Energy Exploitation

    Science.gov (United States)

    Pastorutti, Alberto; Braitenberg, Carla; Pivetta, Tommaso; Mariani, Patrizia

    2016-08-01

    Geothermal energy is a valuable renewable energy source the exploitation of which contributes to the worldwide reduction of consumption of fossil fuels oil and gas. The exploitation of geothermal energy is facilitated where the thermal gradient is higher than average leading to increased surface heat flow. Apart from the hydrologic circulation properties which depend on rock fractures and are important due to the heat transportation from the hotter layers to the surface, essential properties that increase the thermal gradient are crustal thinning and radiogenic heat producing rocks. Crustal thickness and rock composition form the link to the exploration with the satellite derived gravity field, because both induce subsurface mass changes that generate observable gravity anomalies. The recognition of gravity as a useful investigation tool for geothermal energy lead to a cooperation with ESA and the International Renewable Energy Agency (IRENA) that included the GOCE derived gravity field in the online geothermal energy investigation tool of the IRENA database. The relation between the gravity field products as the free air gravity anomaly, the Bouguer and isostatic anomalies and the heat flow values is though not straightforward and has not a unique relationship. It is complicated by the fact that it depends on the geodynamical context, on the geologic context and the age of the crustal rocks. Globally the geological context and geodynamical history of an area is known close to everywhere, so that a specific known relationship between gravity and geothermal potential can be applied. In this study we show the results of a systematic analysis of the problem, including some simulations of the key factors. The study relies on the data of GOCE and the resolution and accuracy of this satellite. We also give conclusions on the improved exploration power of a gravity mission with higher spatial resolution and reduced data error, as could be achieved in principle by flying

  20. Automated motion imagery exploitation for surveillance and reconnaissance

    Science.gov (United States)

    Se, Stephen; Laliberte, France; Kotamraju, Vinay; Dutkiewicz, Melanie

    2012-06-01

    Airborne surveillance and reconnaissance are essential for many military missions. Such capabilities are critical for troop protection, situational awareness, mission planning and others, such as post-operation analysis / damage assessment. Motion imagery gathered from both manned and unmanned platforms provides surveillance and reconnaissance information that can be used for pre- and post-operation analysis, but these sensors can gather large amounts of video data. It is extremely labour-intensive for operators to analyse hours of collected data without the aid of automated tools. At MDA Systems Ltd. (MDA), we have previously developed a suite of automated video exploitation tools that can process airborne video, including mosaicking, change detection and 3D reconstruction, within a GIS framework. The mosaicking tool produces a geo-referenced 2D map from the sequence of video frames. The change detection tool identifies differences between two repeat-pass videos taken of the same terrain. The 3D reconstruction tool creates calibrated geo-referenced photo-realistic 3D models. The key objectives of the on-going project are to improve the robustness, accuracy and speed of these tools, and make them more user-friendly to operational users. Robustness and accuracy are essential to provide actionable intelligence, surveillance and reconnaissance information. Speed is important to reduce operator time on data analysis. We are porting some processor-intensive algorithms to run on a Graphics Processing Unit (GPU) in order to improve throughput. Many aspects of video processing are highly parallel and well-suited for optimization on GPUs, which are now commonly available on computers. Moreover, we are extending the tools to handle video data from various airborne platforms and developing the interface to the Coalition Shared Database (CSD). The CSD server enables the dissemination and storage of data from different sensors among NATO countries. The CSD interface allows

  1. Nontrilocality: Exploiting nonlocality from three-particle systems

    Science.gov (United States)

    Mukherjee, Kaushiki; Paul, Biswajit; Sarkar, Debasis

    2017-08-01

    Branciard et al. [Phys. Rev. Lett. 104, 170401 (2010), 10.1103/PhysRevLett.104.170401] first characterized the correlations arising in an entanglement swapping network under the assumption that the sources generating the initially uncorrelated quantum systems are independent. Precisely speaking, Branciard et al. [Phys. Rev. Lett. 104, 170401 (2010), 10.1103/PhysRevLett.104.170401 and later in Phys. Rev. A 85, 032119 (2012), 10.1103/PhysRevA.85.032119] analyzed the importance of bilocal (source independence) assumption to lower the restrictions over correlations for revealing quantumness in the network where each of two sources generates a bipartite entangled state. In this context, one may find interest to characterize correlations in a network involving independent sources which can correlate more than two initially uncorrelated multipartite entangled quantum systems. Our present topic of discussion basically analyzes such a network scenario. Specifically, we introduce a trilocal network scenario where each of three sources independently generates a tripartite entangled quantum system, thereby exploring the role of source independence assumption to exploit nonlocality in a network involving multipartite entanglement analogous to bilocal assumption in a network where only bipartite entanglement was considered. Interestingly, genuine entanglement content did not turn out to be an essential requirement for exploiting nonlocality in such a scenario. Moreover, it is interesting to explore whether such a scenario can be generalized so as to characterize correlations arising in a network involving n number of n -partite systems for any finite value of n ≥4 under source independence assumption.

  2. Numerical simulation of gas hydrate exploitation from subsea reservoirs in the Black Sea

    Science.gov (United States)

    Janicki, Georg; Schlüter, Stefan; Hennig, Torsten; Deerberg, Görge

    2017-04-01

    Natural gas (methane) is the most environmental friendly source of fossil energy. When coal is replace by natural gas in power production the emission of carbon dioxide is reduced by 50 %. The vast amount of methane assumed in gas hydrate deposits can help to overcome a shortage of fossil energy resources in the future. To increase their potential for energy applications new technological approaches are being discussed and developed worldwide. Besides technical challenges that have to be overcome climate and safety issues have to be considered before a commercial exploitation of such unconventional reservoirs. The potential of producing natural gas from subsea gas hydrate deposits by various means (e. g. depressurization and/or carbon dioxide injection) is numerically studied in the frame of the German research project »SUGAR - Submarine Gas Hydrate Reservoirs«. In order to simulate the exploitation of hydrate-bearing sediments in the subsea, an in-house simulation model HyReS which is implemented in the general-purpose software COMSOL Multiphysics is used. This tool turned out to be especially suited for the flexible implementation of non-standard correlations concerning heat transfer, fluid flow, hydrate kinetics, and other relevant model data. Partially based on the simulation results, the development of a technical concept and its evaluation are the subject of ongoing investigations, whereby geological and ecological criteria are to be considered. The results illustrate the processes and effects occurring during the gas production from a subsea gas hydrate deposit by depressurization. The simulation results from a case study for a deposit located in the Black Sea reveal that the production of natural gas by simple depressurization is possible but with quite low rates. It can be shown that the hydrate decomposition and thus the gas production strongly depend on the geophysical properties of the reservoir, the mass and heat transport within the reservoir, and

  3. Quality and innovation between tipical products exploiting and new food design

    Directory of Open Access Journals (Sweden)

    Marco Dalla Rosa

    2011-02-01

    Full Text Available Scientific approach is often ignored in the production of typical and marginal foods which come from empiric trial and procedures consolidated along the time. At the beginning of the twentieth century food science starter influencing food production and processing by a multidisciplinary approach aiming at the safety guarantee of industrial products intended for large scale consumption. In the last decades researchers started taking into account traditional and marginal food products by an accurate scientific approach aiming to their exploitation and to define their quality and safety parameters. Scientific approach to marginal products can be schematically divided in two levels: analytical and technological/engineering. In general, the analytical approach focuses on chemical aspects, physical properties, aromatic and sensorial characteristics and on the microbiological and genetic characterizations. 

    The technological/engineering approach must be considered a san integration of the knowledge both about the finished product and the production process and consists of: the definition of markers connecting quality to first matter; the study of seasonal and annual variability; the search for correlations among process/environment/quality on molecular basis; the pointing out of markers to set traceability systems up; the definition of key-factors to characterize the land according to its food production as an impulse for the development of other sectors such as tourism. Finally, innovation in the sector of traditional and marginal production should concern the definition of chemicalphysical and sensorial characteristics, the rationalization of traditional processes and the introduction of new compatible technology phases, the introduction of new packaging forms to elongate the shelf life and to enlarge distribution areas guaranteeing, at the same time, the maintenance of product peculiarity and typicality. New food design is one of the most

  4. Economic value of ecological information in ecosystem-based natural resource management depends on exploitation history.

    Science.gov (United States)

    Essington, Timothy E; Sanchirico, James N; Baskett, Marissa L

    2018-02-13

    Ecosystem approaches to natural resource management are seen as a way to provide better outcomes for ecosystems and for people, yet the nature and strength of interactions among ecosystem components is usually unknown. Here we characterize the economic benefits of ecological knowledge through a simple model of fisheries that target a predator (piscivore) and its prey. We solve for the management (harvest) trajectory that maximizes net present value (NPV) for different ecological interactions and initial conditions that represent different levels of exploitation history. Optimal management trajectories generally approached similar harvest levels, but the pathways toward those levels varied considerably by ecological scenario. Application of the wrong harvest trajectory, which would happen if one type of ecological interaction were assumed but in fact another were occurring, generally led to only modest reductions in NPV. However, the risks were not equal across fleets: risks of incurring large losses of NPV and missing management targets were much higher in the fishery targeting piscivores, especially when piscivores were heavily depleted. Our findings suggest that the ecosystem approach might provide the greatest benefits when used to identify system states where management performs poorly with imperfect knowledge of system linkages so that management strategies can be adopted to avoid those states. Copyright © 2018 the Author(s). Published by PNAS.

  5. Rare earth elements exploitation, geopolitical implications and raw materials trading

    Science.gov (United States)

    Chemin, Marie-Charlotte

    2015-04-01

    Rare earth elements (REE) correspond to seventeen elements of the periodic table. They are used in high technology, cracking, electric cars' magnet, metal alloy for batteries, and also in phone construction or ceramics for electronic card. REEs are an important resource for high technology. This project targets 16 years old students in the subject "personalized aid" and will last six weeks. The purpose of this project is to develop autonomy and research in groups for a transdisciplinary work. This project gathers knowledge in geology, geography and economics. During the first session students analyze the geology applications of the REE. They begin the analysis with learning the composition in different rocks such as basalt and diorite to make the link with crystallization. Then they compare it with adakite to understand the formation of these rocks. In the second session, they study REE exploitation. We can find them as oxides in many deposits. The principal concentrations of rare earth elements are associated with uncommon varieties of igneous rocks, such as carbonatites. They can use Qgis, to localize this high concentration. In the third session, they study the environmental costs of REE exploitation. Indeed, the exploitation produces thorium and carcinogenic toxins: sulphates, ammonia and hydrochloric acid. Processing one ton of rare earths produces 2,000 tons of toxic waste. This session focuses, first, on Baotou's region, and then on an example they are free to choose. In the fourth session, they study the geopolitical issues of REE with a focus on China. In fact this country is the largest producer of REE, and is providing 95% of the overall production. REE in China are at the center of a geopolitical strategy. In fact, China implements a sort of protectionism. Indeed, the export tax on REE is very high so, as a foreign company, it is financially attractive to establish a manufacturing subsidiary in China in order to use REE. As a matter of fact

  6. Gender peer effects in school, a birth cohort approach

    OpenAIRE

    Ciccone, Antonio; Garcia-Fontes, Walter

    2014-01-01

    We propose estimating gender peer effects in school by exploiting within-school variation in gender composition across birth cohorts. Our approach differs from the existing literature, which exploits variation in gender composition at a given grade level in different years. We argue that the birth cohort approach is a useful alternative as the grade level approach generally yields spurious gender peer effects when there is grade retention. The birth cohort approach applied to p...

  7. Balancing exploration and exploitation in learning to rank online

    NARCIS (Netherlands)

    Hofmann, K.; Whiteson, S.; de Rijke, M.

    2011-01-01

    As retrieval systems become more complex, learning to rank approaches are being developed to automatically tune their parameters. Using online learning to rank approaches, retrieval systems can learn directly from implicit feedback, while they are running. In such an online setting, algorithms need

  8. Experimental demonstration of an OpenFlow based software-defined optical network employing packet, fixed and flexible DWDM grid technologies on an international multi-domain testbed.

    Science.gov (United States)

    Channegowda, M; Nejabati, R; Rashidi Fard, M; Peng, S; Amaya, N; Zervas, G; Simeonidou, D; Vilalta, R; Casellas, R; Martínez, R; Muñoz, R; Liu, L; Tsuritani, T; Morita, I; Autenrieth, A; Elbers, J P; Kostecki, P; Kaczmarek, P

    2013-03-11

    Software defined networking (SDN) and flexible grid optical transport technology are two key technologies that allow network operators to customize their infrastructure based on application requirements and therefore minimizing the extra capital and operational costs required for hosting new applications. In this paper, for the first time we report on design, implementation & demonstration of a novel OpenFlow based SDN unified control plane allowing seamless operation across heterogeneous state-of-the-art optical and packet transport domains. We verify and experimentally evaluate OpenFlow protocol extensions for flexible DWDM grid transport technology along with its integration with fixed DWDM grid and layer-2 packet switching.

  9. Cosimulation of electromagnetics-circuit systems exploiting DGTD and MNA

    KAUST Repository

    Li, Ping

    2014-06-01

    A hybrid electromagnetics (EM)-circuit simulator exploiting the discontinuous Galerkin time domain (DGTD) method and the modified nodal analysis (MNA) algorithm is developed for analyzing hybrid distributive and nonlinear multiport lumped circuit systems. The computational domain is split into two subsystems. One is the EM subsystem that is analyzed by DGTD, while the other is the circuit subsystem that is solved by the MNA method. The coupling between the EM and circuit subsystems is enforced at the lumped port where related field and circuit unknowns are coupled via the use of numerical flux, port voltages, and current sources. Since the spatial operations of DGTD are localized, thanks to the use of numerical flux, coupling matrices between EM and circuit subsystems are small and are directly inverted. To handle nonlinear devices within the circuit subsystem, the standard Newton-Raphson method is applied to the nonlinear coupling matrix system. In addition, a local time-stepping scheme is applied to improve the efficiency of the hybrid solver. Numerical examples including single and multiport linear/nonlinear circuit networks are presented to validate the proposed solver. © 2014 IEEE.

  10. Exploitation réseau électrique Bilan 2000

    CERN Document Server

    Cumer, G

    2001-01-01

    Ce document présente le bilan annuel d'exploitation du réseau électrique pour l'année 2000. Après une présentation succincte des nouvelles sous-stations et équipements mis en service cette année, ce bilan est proposé au travers des statistiques des pannes et des demandes d'interventions des salles de contrôles PCR, MCR et PCR. Cette année 2000 aura été marquée par quelques pannes majeures ayant affecté le LEP et le SPS. L'analyse de ces incidents en fait apparaître les causes d'origines techniques, humaines ou extérieures au CERN, détaille les catégories d'équipements concernés. Ces données permettent de souligner l'impact et les conséquences lourdes de la moindre coupure électrique sur le fonctionnement des accélérateurs. Elles permettent d'autre part de mettre en lumière les points faibles actuels que sont les contrôleurs Micène, les câbles et les protections 18 kV SPS. Dans ce contexte et au vu des incidents de ces dernières années, un historique des pannes survenues sur les...

  11. Exploiting macrophages as targeted carrier to guide nanoparticles into glioma.

    Science.gov (United States)

    Pang, Liang; Qin, Jing; Han, Limei; Zhao, Wenjie; Liang, Jianming; Xie, Zhongyi; Yang, Pei; Wang, Jianxin

    2016-06-14

    The restriction of anti-cancer drugs entry to tumor sites in the brain is a major impediment to the development of new strategies for the treatment of glioma. Based on the finding that macrophages possess an intrinsic homing property enabling them to migrate to tumor sites across the endothelial barriers in response to the excretion of cytokines/chemokines in the diseased tissues, we exploited macrophages as 'Trojan horses' to carry drug-loading nanoparticles (NPs), pass through barriers, and offload them into brain tumor sites. Anticancer drugs were encapsulated in nanoparticles to avoid their damage to the cells. Drug loading NPs was then incubated with RAW264.7 cells in vitro to prepare macrophage-NPs (M-NPs). The release of NPs from M-NPs was very slow in medium of DMEM and 10% FBS and significantly accelerated when LPS and IFN-γ were added to mimic tumor inflammation microenvironment. The viability of macrophages was not affected when the concentration of doxorubicin lower than 25 μg/ml. The improvement of cellular uptake and penetration into the core of glioma spheroids of M-NPs compared with NPs was verified in in vitro studies. The tumor-targeting efficiency of NPs was also significantly enhanced after loading into macrophages in nude mice bearing intracranial U87 glioma. Our results provided great potential of macrophages as an active biocarrier to deliver anticancer drugs to the tumor sites in the brain and improve therapeutic effects of glioma.

  12. Efficient Resource Scheduling by Exploiting Relay Cache for Cellular Networks

    Directory of Open Access Journals (Sweden)

    Chun He

    2015-01-01

    Full Text Available In relay-enhanced cellular systems, throughput of User Equipment (UE is constrained by the bottleneck of the two-hop link, backhaul link (or the first hop link, and access link (the second hop link. To maximize the throughput, resource allocation should be coordinated between these two hops. A common resource scheduling algorithm, Adaptive Distributed Proportional Fair, only ensures that the throughput of the first hop is greater than or equal to that of the second hop. But it cannot guarantee a good balance of the throughput and fairness between the two hops. In this paper, we propose a Two-Hop Balanced Distributed Scheduling (TBS algorithm by exploiting relay cache for non-real-time data traffic. The evolved Node Basestation (eNB adaptively adjusts the number of Resource Blocks (RBs allocated to the backhaul link and direct links based on the cache information of relays. Each relay allocates RBs for relay UEs based on the size of the relay UE’s Transport Block. We also design a relay UE’s ACK feedback mechanism to update the data at relay cache. Simulation results show that the proposed TBS can effectively improve resource utilization and achieve a good trade-off between system throughput and fairness by balancing the throughput of backhaul and access link.

  13. Instrumental variable analyses. Exploiting natural randomness to understand causal mechanisms.

    Science.gov (United States)

    Iwashyna, Theodore J; Kennedy, Edward H

    2013-06-01

    Instrumental variable analysis is a technique commonly used in the social sciences to provide evidence that a treatment causes an outcome, as contrasted with evidence that a treatment is merely associated with differences in an outcome. To extract such strong evidence from observational data, instrumental variable analysis exploits situations where some degree of randomness affects how patients are selected for a treatment. An instrumental variable is a characteristic of the world that leads some people to be more likely to get the specific treatment we want to study but does not otherwise change those patients' outcomes. This seminar explains, in nonmathematical language, the logic behind instrumental variable analyses, including several examples. It also provides three key questions that readers of instrumental variable analyses should ask to evaluate the quality of the evidence. (1) Does the instrumental variable lead to meaningful differences in the treatment being tested? (2) Other than through the specific treatment being tested, is there any other way the instrumental variable could influence the outcome? (3) Does anything cause patients to both receive the instrumental variable and receive the outcome?

  14. Exploiting parallel R in the cloud with SPRINT.

    Science.gov (United States)

    Piotrowski, M; McGilvary, G A; Sloan, T M; Mewissen, M; Lloyd, A D; Forster, T; Mitchell, L; Ghazal, P; Hill, J

    2013-01-01

    Advances in DNA Microarray devices and next-generation massively parallel DNA sequencing platforms have led to an exponential growth in data availability but the arising opportunities require adequate computing resources. High Performance Computing (HPC) in the Cloud offers an affordable way of meeting this need. Bioconductor, a popular tool for high-throughput genomic data analysis, is distributed as add-on modules for the R statistical programming language but R has no native capabilities for exploiting multi-processor architectures. SPRINT is an R package that enables easy access to HPC for genomics researchers. This paper investigates: setting up and running SPRINT-enabled genomic analyses on Amazon's Elastic Compute Cloud (EC2), the advantages of submitting applications to EC2 from different parts of the world and, if resource underutilization can improve application performance. The SPRINT parallel implementations of correlation, permutation testing, partitioning around medoids and the multi-purpose papply have been benchmarked on data sets of various size on Amazon EC2. Jobs have been submitted from both the UK and Thailand to investigate monetary differences. It is possible to obtain good, scalable performance but the level of improvement is dependent upon the nature of the algorithm. Resource underutilization can further improve the time to result. End-user's location impacts on costs due to factors such as local taxation. Although not designed to satisfy HPC requirements, Amazon EC2 and cloud computing in general provides an interesting alternative and provides new possibilities for smaller organisations with limited funds.

  15. Exploiting communication concurrency on high performance computing systems

    Energy Technology Data Exchange (ETDEWEB)

    Chaimov, Nicholas [Univ. of Oregon, Eugene, OR (United States); Ibrahim, Khaled Z. [Lawrence Berkeley National Lab. (LBNL), Berkeley, CA (United States); Williams, Samuel [Lawrence Berkeley National Lab. (LBNL), Berkeley, CA (United States); Iancu, Costin [Lawrence Berkeley National Lab. (LBNL), Berkeley, CA (United States)

    2015-01-01

    Although logically available, applications may not exploit enough instantaneous communication concurrency to maximize hardware utilization on HPC systems. This is exacerbated in hybrid programming models such as SPMD+OpenMP. We present the design of a "multi-threaded" runtime able to transparently increase the instantaneous network concurrency and to provide near saturation bandwidth, independent of the application configuration and dynamic behavior. The runtime forwards communication requests from application level tasks to multiple communication servers. Our techniques alleviate the need for spatial and temporal application level message concurrency optimizations. Experimental results show improved message throughput and bandwidth by as much as 150% for 4KB bytes messages on InfiniBand and by as much as 120% for 4KB byte messages on Cray Aries. For more complex operations such as all-to-all collectives, we observe as much as 30% speedup. This translates into 23% speedup on 12,288 cores for a NAS FT implemented using FFTW. We also observe as much as 76% speedup on 1,500 cores for an already optimized UPC+OpenMP geometric multigrid application using hybrid parallelism.

  16. Exploiting topic modeling to boost metagenomic reads binning.

    Science.gov (United States)

    Zhang, Ruichang; Cheng, Zhanzhan; Guan, Jihong; Zhou, Shuigeng

    2015-01-01

    With the rapid development of high-throughput technologies, researchers can sequence the whole metagenome of a microbial community sampled directly from the environment. The assignment of these metagenomic reads into different species or taxonomical classes is a vital step for metagenomic analysis, which is referred to as binning of metagenomic data. In this paper, we propose a new method TM-MCluster for binning metagenomic reads. First, we represent each metagenomic read as a set of "k-mers" with their frequencies occurring in the read. Then, we employ a probabilistic topic model -- the Latent Dirichlet Allocation (LDA) model to the reads, which generates a number of hidden "topics" such that each read can be represented by a distribution vector of the generated topics. Finally, as in the MCluster method, we apply SKWIC -- a variant of the classical K-means algorithm with automatic feature weighting mechanism to cluster these reads represented by topic distributions. Experiments show that the new method TM-MCluster outperforms major existing methods, including AbundanceBin, MetaCluster 3.0/5.0 and MCluster. This result indicates that the exploitation of topic modeling can effectively improve the binning performance of metagenomic reads.

  17. Exploitation of vegetables and fruits through lactic acid fermentation.

    Science.gov (United States)

    Di Cagno, Raffaella; Coda, Rossana; De Angelis, Maria; Gobbetti, Marco

    2013-02-01

    Lactic acid fermentation represents the easiest and the most suitable way for increasing the daily consumption of fresh-like vegetables and fruits. Literature data are accumulating, and this review aims at describing the main features of the lactic acid bacteria to be used for fermentation. Lactic acid bacteria are a small part of the autochthonous microbiota of vegetables and fruits. The diversity of the microbiota markedly depends on the intrinsic and extrinsic parameters of the plant matrix. Notwithstanding the reliable value of the spontaneous fermentation to stabilize and preserve raw vegetables and fruits, a number of factors are in favour of using selected starters. Two main options may be pursued for the controlled lactic acid fermentation of vegetables and fruits: the use of commercial/allochthonous and the use of autochthonous starters. Several evidences were described in favour of the use of selected autochthonous starters, which are tailored for the specific plant matrix. Pro-technological, sensory and nutritional criteria for selecting starters were reported as well as several functional properties, which were recently ascribed to autochthonous lactic acid bacteria. The main features of the protocols used for the manufacture of traditional, emerging and innovative fermented vegetables and fruits were reviewed. Tailored lactic acid bacteria starters completely exploit the potential of vegetables and fruits, which enhances the hygiene, sensory, nutritional and shelf life properties. Copyright © 2012 Elsevier Ltd. All rights reserved.

  18. The business of exploiting induced pluripotent stem cells.

    Science.gov (United States)

    Prescott, Catherine

    2011-08-12

    Induced pluripotent stem cells (iPS cells) can be exploited for both research and clinical applications. The first part of this review seeks to provide an understanding of the financial drivers and key elements of a successful business strategy that underpin a company focused on developing iPS-related products and services targeted at the research market. The latter part of the review highlights some of the reasons as to why the reprogramming of somatic cells is currently being used to develop cell-based models to screen for small molecules with drug-like properties rather than to develop cell-based regenerative medicines per se. The latter may be used to repair or replace a patient's damaged cells and thereby have the potential to 'cure' a disease and, in doing so, prevent or delay the onset of associated medical conditions. However, the cost of an expensive regenerative medicine and time to accrue any benefit linked to a decrease in co-morbidity expenditure may not outweigh the benefit for a healthcare community that has finite resources. The implications of this are discussed together with evidence that the UK National Institute for Health and Clinical Excellence (NICE) and the National Health Service (NHS) have established a precedent for a cost-sharing strategy with the pharmaceutical industry.

  19. The Exploitation of Low-Energy Electrons in Cancer Treatment.

    Science.gov (United States)

    Rezaee, Mohammad; Hill, Richard P; Jaffray, David A

    2017-08-01

    Given the distinct characteristics of low-energy electrons (LEEs), particularly at energies less than 30 eV, they can be applied to a wide range of therapeutic modalities to improve cancer treatment. LEEs have been shown to efficiently produce complex molecular damage resulting in substantial cellular toxicities. Since LEEs are produced in copious amounts from high-energy radiation beam, including photons, protons and ions; the control of LEE distribution can potentially enhance the therapeutic radio of such beams. LEEs can play a substantial role in the synergistic effect between radiation and chemotherapy, particularly halogenated and platinum-based anticancer drugs. Radiosensitizing entities containing atoms of high atomic number such as gold nanoparticles can be a source of LEE production if high-energy radiation interacts with them. This can provide a high local density of LEEs in a cell and produce cellular toxicity. Auger-electron-emitting radionuclides also create a high number of LEEs in each decay, which can induce lethal damage in a cell. Exploitation of LEEs in cancer treatment, however, faces a few challenges, such as dosimetry of LEEs and selective delivery of radiosensitizing and chemotherapeutic molecules close to cellular targets. This review first discusses the rationale for utilizing LEEs in cancer treatment by explaining their mechanism of action, describes theoretical and experimental studies at the molecular and cellular levels, then discusses strategies for achieving modification of the distribution and effectiveness of LEEs in cancerous tissue and their associated clinical benefit.

  20. Evolution of Cretan Aqueducts and Their Potential for Hydroelectric Exploitation

    Directory of Open Access Journals (Sweden)

    Triantafyllia G. Nikolaou

    2017-01-01

    Full Text Available In this article, several archaeological, historical and other aspects of aqueducts in Crete, Greece, since the prehistoric times until today, are reviewed and presented. In Crete, since the Minoan era, various water management techniques that are found in modern water technologies were developed and applied. One of the most significant features of the Minoan civilization was the architecture of water supply systems in the palaces and other settlements. These technologies were continued and improved mainly during the Classical, Hellenistic and Roman periods and at the same time spread to other towns in the mainland and islands. The aqueduct technologies developed during the Classical and Hellenistic periods were further developed by Romans, mainly by enlarging their application scale (e.g., water bridges. Several paradigms of Cretan aqueducts are considered by which the significance of those technologies for water supply in areas with limited water resources is justified. A brief presentation and discussion of climatic conditions, the karst hydrogeology and the water resources management in Crete is also included. The article also describes the present water management profile of the island, in terms of the water plants, water supply–irrigation networks, and water renewable energy exploitation of dams and water pipelines.

  1. Exploiting pallidal plasticity for stimulation in Parkinson's disease.

    Science.gov (United States)

    Lourens, Marcel A J; Schwab, Bettina C; Nirody, Jasmine A; Meijer, Hil G E; van Gils, Stephan A

    2015-04-01

    Continuous application of high-frequency deep brain stimulation (DBS) often effectively reduces motor symptoms of Parkinson's disease patients. While there is a growing need for more effective and less traumatic stimulation, the exact mechanism of DBS is still unknown. Here, we present a methodology to exploit the plasticity of GABAergic synapses inside the external globus pallidus (GPe) for the optimization of DBS. Assuming the existence of spike-timing-dependent plasticity (STDP) at GABAergic GPe-GPe synapses, we simulate neural activity in a network model of the subthalamic nucleus and GPe. In particular, we test different DBS protocols in our model and quantify their influence on neural synchrony. In an exemplary set of biologically plausible model parameters, we show that STDP in the GPe has a direct influence on neural activity and especially the stability of firing patterns. STDP stabilizes both uncorrelated firing in the healthy state and correlated firing in the parkinsonian state. Alternative stimulation protocols such as coordinated reset stimulation can clearly profit from the stabilizing effect of STDP. These results are widely independent of the STDP learning rule. Once the model settings, e.g., connection architectures, have been described experimentally, our model can be adjusted and directly applied in the development of novel stimulation protocols. More efficient stimulation leads to both minimization of side effects and savings in battery power.

  2. MAPI: towards the integrated exploitation of bioinformatics Web Services.

    Science.gov (United States)

    Ramirez, Sergio; Karlsson, Johan; Trelles, Oswaldo

    2011-10-27

    Bioinformatics is commonly featured as a well assorted list of available web resources. Although diversity of services is positive in general, the proliferation of tools, their dispersion and heterogeneity complicate the integrated exploitation of such data processing capacity. To facilitate the construction of software clients and make integrated use of this variety of tools, we present a modular programmatic application interface (MAPI) that provides the necessary functionality for uniform representation of Web Services metadata descriptors including their management and invocation protocols of the services which they represent. This document describes the main functionality of the framework and how it can be used to facilitate the deployment of new software under a unified structure of bioinformatics Web Services. A notable feature of MAPI is the modular organization of the functionality into different modules associated with specific tasks. This means that only the modules needed for the client have to be installed, and that the module functionality can be extended without the need for re-writing the software client. The potential utility and versatility of the software library has been demonstrated by the implementation of several currently available clients that cover different aspects of integrated data processing, ranging from service discovery to service invocation with advanced features such as workflows composition and asynchronous services calls to multiple types of Web Services including those registered in repositories (e.g. GRID-based, SOAP, BioMOBY, R-bioconductor, and others).

  3. Image exploitation algorithms for reconnaissance and surveillance with UAV

    Science.gov (United States)

    Heinze, N.; Esswein, M.; Krüger, W.; Saur, G.

    2010-04-01

    UAV have a growing importance for reconnaissance and surveillance. Due to improved technical capability also small UAVs have an endurance of about 6 hours, but less sophisticated sensors due to strong weight limitations. This puts a high strain and workload on the small teams usually deployed with such systems. To lessen the strain for photo interpreters and to improve the capability of such systems we have developed and integrated automatic image exploitation algorithms. An import aspect is the detection of moving objects to give the photo interpreter (PI) hints were such objects are. Mosaiking of imagery helps to gain better oversight over the scene. By computing stereo-mosaics from mono-ocular video-data also 3-d-models can be derived from tactical UAV-data in a further processing step. A special instrument of gaining oversight is to use multi-temporal and multifocal images of video-sensors with different resolution of the platform and to fusion them into one image. This results in a good situation awareness of the scene with a light-weight sensor-platform and a standard video link.

  4. Exploiting Information and Communication Technologies in Teaching a Foreign Language

    Directory of Open Access Journals (Sweden)

    Niculescu Brândușa-Oana

    2017-06-01

    Full Text Available Education has to constantly adapt and renew itself in order to be compatible with the technology-dominated world we live in. There has been heated debate over the introduction of information and communication technology (ICT in the educational process. The ICT, especially in foreign language teaching, has become the researchers’ focus of attention in the last two decades. Today’s armed forces require highly-skilled military personnel to be digitally literate and to have well-developed cultural awareness, intercultural communication ability and critical thinking competence. In this context, foreign language classes in the military higher education system should become an environment in which language, culture and civilisation encounters may be facilitated and enhanced by ICT, promoting the acquisition of knowledge and skills demanded by the exercise of roles that the armed forces have in the international theatres of operations. This paper aims at examining the necessity of introducing ICT in foreign language teaching, pointing to the numerous advantages of using these new technologies. The paper also discusses the new role and skills of the teacher in the context of exploiting the various resources provided by the ICT. In addition, we mention some of the modalities in which ICT can be put to good use in developing the cadets’ foreign language skills.

  5. Autonomous Industrial Mobile Manipulation (AIMM) - Maturation, Exploitation and Implementation

    DEFF Research Database (Denmark)

    Bøgh, Simon

    2012-01-01

    The overall topic of this PhD thesis is Autonomous Industrial Mobile Manipulation (AIMM) - maturation, exploitation and implementation. The thesis addresses two topics. The first topic is “From research to industry” and the challenges this holds. The Autonomous Industrial Mobile Manipulator (AIMM...... for AIMM robots. Firstly an application-based analysis is conducted, to identify skills in the logistic domain, based on real-world experiments at the industrial partner. Secondly an analysis based on standard operating procedures (SOPs) is conducted.......) "Little Helper" is introduced, a manufacturing assistant inspired by the Walt Disney character. The main rationale of the AIMM concept is a compromise between traditional automation (efficiency) and manual labor (flexibility), which contributes to realizing transformable manufacturing systems. From...... a state-of-the-art review, it is observed that implementations of mobile manipulators in industry have been limited although the needs for flexible automation are present. The second topic is “Identifying skills for AIMM robots” and is dedicated to defining a unifying terminology for task...

  6. Compressed Sensing MR Image Reconstruction Exploiting TGV and Wavelet Sparsity

    Directory of Open Access Journals (Sweden)

    Di Zhao

    2014-01-01

    Full Text Available Compressed sensing (CS based methods make it possible to reconstruct magnetic resonance (MR images from undersampled measurements, which is known as CS-MRI. The reference-driven CS-MRI reconstruction schemes can further decrease the sampling ratio by exploiting the sparsity of the difference image between the target and the reference MR images in pixel domain. Unfortunately existing methods do not work well given that contrast changes are incorrectly estimated or motion compensation is inaccurate. In this paper, we propose to reconstruct MR images by utilizing the sparsity of the difference image between the target and the motion-compensated reference images in wavelet transform and gradient domains. The idea is attractive because it requires neither the estimation of the contrast changes nor multiple times motion compensations. In addition, we apply total generalized variation (TGV regularization to eliminate the staircasing artifacts caused by conventional total variation (TV. Fast composite splitting algorithm (FCSA is used to solve the proposed reconstruction problem in order to improve computational efficiency. Experimental results demonstrate that the proposed method can not only reduce the computational cost but also decrease sampling ratio or improve the reconstruction quality alternatively.

  7. Compressed sensing MR image reconstruction exploiting TGV and wavelet sparsity.

    Science.gov (United States)

    Zhao, Di; Du, Huiqian; Han, Yu; Mei, Wenbo

    2014-01-01

    Compressed sensing (CS) based methods make it possible to reconstruct magnetic resonance (MR) images from undersampled measurements, which is known as CS-MRI. The reference-driven CS-MRI reconstruction schemes can further decrease the sampling ratio by exploiting the sparsity of the difference image between the target and the reference MR images in pixel domain. Unfortunately existing methods do not work well given that contrast changes are incorrectly estimated or motion compensation is inaccurate. In this paper, we propose to reconstruct MR images by utilizing the sparsity of the difference image between the target and the motion-compensated reference images in wavelet transform and gradient domains. The idea is attractive because it requires neither the estimation of the contrast changes nor multiple times motion compensations. In addition, we apply total generalized variation (TGV) regularization to eliminate the staircasing artifacts caused by conventional total variation (TV). Fast composite splitting algorithm (FCSA) is used to solve the proposed reconstruction problem in order to improve computational efficiency. Experimental results demonstrate that the proposed method can not only reduce the computational cost but also decrease sampling ratio or improve the reconstruction quality alternatively.

  8. Exploitation of complement regulatory proteins by Borrelia and Francisella.

    Science.gov (United States)

    Madar, Marian; Bencurova, Elena; Mlynarcik, Patrik; Almeida, André M; Soares, Renata; Bhide, Katarina; Pulzova, Lucia; Kovac, Andrej; Coelho, Ana V; Bhide, Mangesh

    2015-06-01

    Pathogens have developed sophisticated mechanisms of complement evasion such as binding to the host complement regulatory proteins (CRPs) on their surface or expression of CRP mimicking molecules. The ability of pathogens to evade the complement system has been correlated with pathogenesis and host selectivity. Hitherto, little work has been undertaken to determine whether Borrelia and Francisella exploit various CRPs to block complement attack. Seventeen Borrelia (twelve species) and six Francisella (three subspecies) strains were used to assess their ability to bind human, sheep and cattle CRPs or mimic membrane associated complement regulators. A series of experiments including affinity ligand binding experiments, pull-down assays and mass spectrometry based protein identification, revealed an array of CRP binding proteins of Borrelia and Francisella. Unlike Francisella, Borrelia strains were able to bind multiple human CRPs. Three strains of Borrelia (SKT-4, SKT-2 and HO14) showed the presence of a human CD46-homologous motif, indicating their ability to possess putative human CD46 mimicking molecules. Similarly, five strains of Borrelia and two strains of Francisella may have surface proteins with human CD59-homologous motifs. Among ovine and bovine CRPs, the only CRP bound by Francisella (LVS, Tul4 strain) was vitronectin, while ovine C4BP, ovine factor H and bovine factor H were bound to Borrelia strains SKT-2, DN127 and Co53. This study presents an array of proteins of Borrelia and Francisella that bind CRPs or may mimic membrane-CRPs, thus enabling multiphasic complement evasion strategies of these pathogens.

  9. Exploiting Seams and Closing Gaps: Lessons from Mumbai and Beyond

    Directory of Open Access Journals (Sweden)

    Dr. Andrea J. Dew

    2012-01-01

    Full Text Available This article analyzes a single event—the 2008 Mumbai attacks—in order to consider the strategic and operational lessons for dealing with other armed groups. How and why was Lashkar-e-Tayyiba (LeT able to carry out such a sophisticated attack in the heart of Mumbai? And what lessons does Mumbai hold for strategists seeking to counter other armed groups around the world? While tactical level lessons from Mumbai have been well documented, it is important to also consider what the Mumbai attacks tell us at the strategic and operational levels. Specifically, the Mumbai attacks provide valuable insight into how armed groups use the maritime environment, and how they use surprise, denial, and deception to mask intention and invite over-reaction by states. In addition, studying the Mumbai attacks provides insight into some of the strategic and operational seams and gaps that armed groups seek to exploit. These include environmental and geographical factors; institutional, bureaucratic, and jurisdictional seams and gaps between agencies; cognitive seams and gaps that made the use of the sea by LeT so difficult to conceptualize; and the diplomatic seams and gaps that led to heightened tensions among states— in this case, India, Pakistan, and the United States. This article discusses how to categorize these seams and gaps in order to better address the problems they create, and how states might best direct and focus their limited resources when faced with similar challenges.

  10. Exploitation of a large COSMO-SkyMed interferometric dataset

    Science.gov (United States)

    Nutricato, Raffaele; Nitti, Davide O.; Bovenga, Fabio; Refice, Alberto; Chiaradia, Maria T.

    2014-10-01

    In this work we explored a dataset made by more than 100 images acquired by COSMO-SkyMed (CSK) constellation over the Port-au-Prince (Haiti) metropolitan and surrounding areas that were severely hit by the January 12th, 2010 earthquake. The images were acquired along ascending pass by all the four sensors of the constellation with a mean rate of 1 acquisition/week. This consistent CSK dataset was fully exploited by using the Persistent Scatterer Interferometry algorithm SPINUA with the aim of: i) providing a displacement map of the area; ii) assessing the use of CSK and PSI for ground elevation measurements; iii) exploring the CSK satellite orbital tube in terms of both precision and size. In particular, significant subsidence phenomena were detected affecting river deltas and coastal areas of the Port-au-Prince and Carrefour region, as well as very slow slope movements and local ground instabilities. Ground elevation was also measured on PS targets with resolution of 3m. The density of these measurable targets depends on the ground coverage, and reaches values higher than 4000 PS/km2 over urban areas, while it drops over vegetated areas or along slopes affected by layover and shadow. Heights values were compared with LIDAR data at 1m of resolution collected soon after the 2010 earthquake. Furthermore, by using geocoding procedures and the precise LIDAR data as reference, the orbital errors affecting CSK records were investigated. The results are in line with other recent studies.

  11. Exploiting dimensionality and defect mitigation to create tunable microwave dielectrics.

    Science.gov (United States)

    Lee, Che-Hui; Orloff, Nathan D; Birol, Turan; Zhu, Ye; Goian, Veronica; Rocas, Eduard; Haislmaier, Ryan; Vlahos, Eftihia; Mundy, Julia A; Kourkoutis, Lena F; Nie, Yuefeng; Biegalski, Michael D; Zhang, Jingshu; Bernhagen, Margitta; Benedek, Nicole A; Kim, Yongsam; Brock, Joel D; Uecker, Reinhard; Xi, X X; Gopalan, Venkatraman; Nuzhnyy, Dmitry; Kamba, Stanislav; Muller, David A; Takeuchi, Ichiro; Booth, James C; Fennie, Craig J; Schlom, Darrell G

    2013-10-24

    The miniaturization and integration of frequency-agile microwave circuits--relevant to electronically tunable filters, antennas, resonators and phase shifters--with microelectronics offers tantalizing device possibilities, yet requires thin films whose dielectric constant at gigahertz frequencies can be tuned by applying a quasi-static electric field. Appropriate systems such as BaxSr1-xTiO3 have a paraelectric-ferroelectric transition just below ambient temperature, providing high tunability. Unfortunately, such films suffer significant losses arising from defects. Recognizing that progress is stymied by dielectric loss, we start with a system with exceptionally low loss--Srn+1TinO3n+1 phases--in which (SrO)2 crystallographic shear planes provide an alternative to the formation of point defects for accommodating non-stoichiometry. Here we report the experimental realization of a highly tunable ground state arising from the emergence of a local ferroelectric instability in biaxially strained Srn+1TinO3n+1 phases with n ≥ 3 at frequencies up to 125 GHz. In contrast to traditional methods of modifying ferroelectrics-doping or strain-in this unique system an increase in the separation between the (SrO)2 planes, which can be achieved by changing n, bolsters the local ferroelectric instability. This new control parameter, n, can be exploited to achieve a figure of merit at room temperature that rivals all known tunable microwave dielectrics.

  12. Tuning oxygen sensitivity of ruthenium complex exploiting silver nanoparticles

    Energy Technology Data Exchange (ETDEWEB)

    Ozturk, Osman [Department of Chemistry, Faculty of Science, University of Dicle, Diyarbakır (Turkey); Oter, Ozlem [Department of Chemistry, Faculty of Science, University of Dokuz Eylul, 35397 Buca, Izmir (Turkey); Center for Fabrication and Application of Electronic Materials (EMUM), University of Dokuz Eylul, 35397 Buca, Tinaztepe, Izmir (Turkey); Department of Nanoscience and Nanoengineering, University of Dokuz Eylul, 35397 Buca, Tinaztepe, Izmir (Turkey); Yildirim, Serdar [Center for Fabrication and Application of Electronic Materials (EMUM), University of Dokuz Eylul, 35397 Buca, Tinaztepe, Izmir (Turkey); Department of Metallurgical and Materials Engineering, University of Dokuz Eylul, 35397 Buca, Tinaztepe, Izmir (Turkey); Subasi, Elif [Department of Chemistry, Faculty of Science, University of Dokuz Eylul, 35397 Buca, Izmir (Turkey); Department of Nanoscience and Nanoengineering, University of Dokuz Eylul, 35397 Buca, Tinaztepe, Izmir (Turkey); Ertekin, Kadriye, E-mail: kadriye.ertekin@deu.edu.tr [Department of Chemistry, Faculty of Science, University of Dokuz Eylul, 35397 Buca, Izmir (Turkey); Center for Fabrication and Application of Electronic Materials (EMUM), University of Dokuz Eylul, 35397 Buca, Tinaztepe, Izmir (Turkey); Department of Nanoscience and Nanoengineering, University of Dokuz Eylul, 35397 Buca, Tinaztepe, Izmir (Turkey); Celik, Erdal [Center for Fabrication and Application of Electronic Materials (EMUM), University of Dokuz Eylul, 35397 Buca, Tinaztepe, Izmir (Turkey); Department of Nanoscience and Nanoengineering, University of Dokuz Eylul, 35397 Buca, Tinaztepe, Izmir (Turkey); Department of Metallurgical and Materials Engineering, University of Dokuz Eylul, 35397 Buca, Tinaztepe, Izmir (Turkey); Temel, Hamdi [Department of Chemistry, Faculty of Science, University of Dicle, Diyarbakır (Turkey)

    2014-11-15

    In this study, we utilized silver nanoparticles (Ag NPs) along with ionic liquids as additives for fabrication of polymeric oxygen sensitive fibers. Plasticized polymethyl methacrylate and ethyl cellulose (EC) were used as matrix materials. Fibers and porous films were produced by electrospinning technique. Oxygen induced spectral response of the fluorescent tris(2,2′-bipyridyl) ruthenium(II) chloride (Ru(bipy){sub 3}{sup 2+}) was followed as the analytical signal. Utilization of silver nanoparticles in electrospun polymeric fibers for oxygen sensing purposes resulted with many advantages such as tuned sensitivity, linear calibration plot for larger concentration ranges, increased surface area and enhancement in all sensor dynamics. Linearity of the calibration plot for the offered composition was superior with respect to the previously reported ones. When stored at the ambient air of the laboratory there was no significant drift in intensity after 12 months. Our sensitivity and stability tests are still in progress. - Highlights: • Ag nanoparticles and Ru(II) complex doped together into polymers for the first time for O{sub 2} sensing. • The ionic liquid EMIMBF{sub 4} was used for matrix modification. • Fabricated electrospun nanofibers offered enhanced linearity for a large concentration range. • Exploited polymeric matrix materials and additives provided long-term stability. • Silver nanoparticles tuned oxygen sensitivity and facilitated fabrication process.

  13. Energy harvesting from human motion: exploiting swing and shock excitations

    Science.gov (United States)

    Ylli, K.; Hoffmann, D.; Willmann, A.; Becker, P.; Folkmer, B.; Manoli, Y.

    2015-02-01

    Modern compact and low power sensors and systems are leading towards increasingly integrated wearable systems. One key bottleneck of this technology is the power supply. The use of energy harvesting techniques offers a way of supplying sensor systems without the need for batteries and maintenance. In this work we present the development and characterization of two inductive energy harvesters which exploit different characteristics of the human gait. A multi-coil topology harvester is presented which uses the swing motion of the foot. The second device is a shock-type harvester which is excited into resonance upon heel strike. Both devices were modeled and designed with the key constraint of device height in mind, in order to facilitate the integration into the shoe sole. The devices were characterized under different motion speeds and with two test subjects on a treadmill. An average power output of up to 0.84 mW is achieved with the swing harvester. With a total device volume including the housing of 21 cm3 a power density of 40 μW cm-3 results. The shock harvester generates an average power output of up to 4.13 mW. The power density amounts to 86 μW cm-3 for the total device volume of 48 cm3. Difficulties and potential improvements are discussed briefly.

  14. IN A PARALLEL UNIVERSE: HOW ART EXPLOITS TECHNOLOGY

    CERN Multimedia

    CERN. Geneva

    2012-01-01

    Technical innovation in the arts creates new opportunities for perceptual shifts that lead to lasting achievements. One of the most important events took place in the 15th century not far from CERN on the other side of the Alps in Venice. Titian, in one life time, exploited these new material developments to expand the range of expression like no other artist of his generation. Titian was able to harness these new innovations to emerge as the supreme competitor and hustler, a notion that seems very much a part of the modern promotion of art as exemplified by Warhol , Jeff Koons and Damian Hirst. The language of science and technology has created social networks, changed the mediums and the subject of fine art. Fast forward to CERN 2012, the most expensive experiment in the history of science. The knowledge of dark matter will either help confirm, or not, the Standard Model. This information will be part of what Michel Foucault calls "epistemological breaks", shifts in consciousness that change our p...

  15. MAPI: towards the integrated exploitation of bioinformatics Web Services

    Directory of Open Access Journals (Sweden)

    Karlsson Johan

    2011-10-01

    Full Text Available Abstract Background Bioinformatics is commonly featured as a well assorted list of available web resources. Although diversity of services is positive in general, the proliferation of tools, their dispersion and heterogeneity complicate the integrated exploitation of such data processing capacity. Results To facilitate the construction of software clients and make integrated use of this variety of tools, we present a modular programmatic application interface (MAPI that provides the necessary functionality for uniform representation of Web Services metadata descriptors including their management and invocation protocols of the services which they represent. This document describes the main functionality of the framework and how it can be used to facilitate the deployment of new software under a unified structure of bioinformatics Web Services. A notable feature of MAPI is the modular organization of the functionality into different modules associated with specific tasks. This means that only the modules needed for the client have to be installed, and that the module functionality can be extended without the need for re-writing the software client. Conclusions The potential utility and versatility of the software library has been demonstrated by the implementation of several currently available clients that cover different aspects of integrated data processing, ranging from service discovery to service invocation with advanced features such as workflows composition and asynchronous services calls to multiple types of Web Services including those registered in repositories (e.g. GRID-based, SOAP, BioMOBY, R-bioconductor, and others.

  16. Exploitation of parallelism in climate models. Final report

    Energy Technology Data Exchange (ETDEWEB)

    Baer, Ferdinand; Tribbia, Joseph J.; Williamson, David L.

    2001-02-05

    This final report includes details on the research accomplished by the grant entitled 'Exploitation of Parallelism in Climate Models' to the University of Maryland. The purpose of the grant was to shed light on (a) how to reconfigure the atmospheric prediction equations such that the time iteration process could be compressed by use of MPP architecture; (b) how to develop local subgrid scale models which can provide time and space dependent parameterization for a state-of-the-art climate model to minimize the scale resolution necessary for a climate model, and to utilize MPP capability to simultaneously integrate those subgrid models and their statistics; and (c) how to capitalize on the MPP architecture to study the inherent ensemble nature of the climate problem. In the process of addressing these issues, we created parallel algorithms with spectral accuracy; we developed a process for concurrent climate simulations; we established suitable model reconstructions to speed up computation; we identified and tested optimum realization statistics; we undertook a number of parameterization studies to better understand model physics; and we studied the impact of subgrid scale motions and their parameterization in atmospheric models.

  17. Improving industrial yeast strains: exploiting natural and artificial diversity

    Science.gov (United States)

    Steensels, Jan; Snoek, Tim; Meersman, Esther; Nicolino, Martina Picca; Voordeckers, Karin; Verstrepen, Kevin J

    2014-01-01

    Yeasts have been used for thousands of years to make fermented foods and beverages, such as beer, wine, sake, and bread. However, the choice for a particular yeast strain or species for a specific industrial application is often based on historical, rather than scientific grounds. Moreover, new biotechnological yeast applications, such as the production of second-generation biofuels, confront yeast with environments and challenges that differ from those encountered in traditional food fermentations. Together, this implies that there are interesting opportunities to isolate or generate yeast variants that perform better than the currently used strains. Here, we discuss the different strategies of strain selection and improvement available for both conventional and nonconventional yeasts. Exploiting the existing natural diversity and using techniques such as mutagenesis, protoplast fusion, breeding, genome shuffling and directed evolution to generate artificial diversity, or the use of genetic modification strategies to alter traits in a more targeted way, have led to the selection of superior industrial yeasts. Furthermore, recent technological advances allowed the development of high-throughput techniques, such as ‘global transcription machinery engineering’ (gTME), to induce genetic variation, providing a new source of yeast genetic diversity. PMID:24724938

  18. TH-E-BRF-01: Exploiting Tumor Shrinkage in Split-Course Radiotherapy

    Energy Technology Data Exchange (ETDEWEB)

    Unkelbach, J; Craft, D; Hong, T; Papp, D; Wolfgang, J; Bortfeld, T [Massachusetts General Hospital, Boston, MA (United States); Ramakrishnan, J [University of Wisconsin, Madison, Wisconsin (United States); Salari, E [Wichita State University, Wichita, KS (United States)

    2014-06-15

    Purpose: In split-course radiotherapy, a patient is treated in several stages separated by weeks or months. This regimen has been motivated by radiobiological considerations. However, using modern image-guidance, it also provides an approach to reduce normal tissue dose by exploiting tumor shrinkage. In this work, we consider the optimal design of split-course treatments, motivated by the clinical management of large liver tumors for which normal liver dose constraints prohibit the administration of an ablative radiation dose in a single treatment. Methods: We introduce a dynamic tumor model that incorporates three factors: radiation induced cell kill, tumor shrinkage, and tumor cell repopulation. The design of splitcourse radiotherapy is formulated as a mathematical optimization problem in which the total dose to the liver is minimized, subject to delivering the prescribed dose to the tumor. Based on the model, we gain insight into the optimal administration of radiation over time, i.e. the optimal treatment gaps and dose levels. Results: We analyze treatments consisting of two stages in detail. The analysis confirms the intuition that the second stage should be delivered just before the tumor size reaches a minimum and repopulation overcompensates shrinking. Furthermore, it was found that, for a large range of model parameters, approximately one third of the dose should be delivered in the first stage. The projected benefit of split-course treatments in terms of liver sparing depends on model assumptions. However, the model predicts large liver dose reductions by more than a factor of two for plausible model parameters. Conclusion: The analysis of the tumor model suggests that substantial reduction in normal tissue dose can be achieved by exploiting tumor shrinkage via an optimal design of multi-stage treatments. This suggests taking a fresh look at split-course radiotherapy for selected disease sites where substantial tumor regression translates into reduced

  19. PANTHER. Pattern ANalytics To support High-performance Exploitation and Reasoning.

    Energy Technology Data Exchange (ETDEWEB)

    Czuchlewski, Kristina Rodriguez [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Hart, William E. [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States)

    2015-09-01

    Sandia has approached the analysis of big datasets with an integrated methodology that uses computer science, image processing, and human factors to exploit critical patterns and relationships in large datasets despite the variety and rapidity of information. The work is part of a three-year LDRD Grand Challenge called PANTHER (Pattern ANalytics To support High-performance Exploitation and Reasoning). To maximize data analysis capability, Sandia pursued scientific advances across three key technical domains: (1) geospatial-temporal feature extraction via image segmentation and classification; (2) geospatial-temporal analysis capabilities tailored to identify and process new signatures more efficiently; and (3) domain- relevant models of human perception and cognition informing the design of analytic systems. Our integrated results include advances in geographical information systems (GIS) in which we discover activity patterns in noisy, spatial-temporal datasets using geospatial-temporal semantic graphs. We employed computational geometry and machine learning to allow us to extract and predict spatial-temporal patterns and outliers from large aircraft and maritime trajectory datasets. We automatically extracted static and ephemeral features from real, noisy synthetic aperture radar imagery for ingestion into a geospatial-temporal semantic graph. We worked with analysts and investigated analytic workflows to (1) determine how experiential knowledge evolves and is deployed in high-demand, high-throughput visual search workflows, and (2) better understand visual search performance and attention. Through PANTHER, Sandia's fundamental rethinking of key aspects of geospatial data analysis permits the extraction of much richer information from large amounts of data. The project results enable analysts to examine mountains of historical and current data that would otherwise go untouched, while also gaining meaningful, measurable, and defensible insights into

  20. Spatio-temporal patterns of key exploited marine species in the Northwestern Mediterranean Sea.

    Directory of Open Access Journals (Sweden)

    Marie Morfin

    Full Text Available This study analyzes the temporal variability/stability of the spatial distributions of key exploited species in the Gulf of Lions (Northwestern Mediterranean Sea. To do so, we analyzed data from the MEDITS bottom-trawl scientific surveys from 1994 to 2010 at 66 fixed stations and selected 12 key exploited species. We proposed a geostatistical approach to handle zero-inflated and non-stationary distributions and to test for the temporal stability of the spatial structures. Empirical Orthogonal Functions and other descriptors were then applied to investigate the temporal persistence and the characteristics of the spatial patterns. The spatial structure of the distribution (i.e. the pattern of spatial autocorrelation of the 12 key species studied remained highly stable over the time period sampled. The spatial distributions of all species obtained through kriging also appeared to be stable over time, while each species displayed a specific spatial distribution. Furthermore, adults were generally more densely concentrated than juveniles and occupied areas included in the distribution of juveniles. Despite the strong persistence of spatial distributions, we also observed that the area occupied by each species was correlated to its abundance: the more abundant the species, the larger the occupation area. Such a result tends to support MacCall's basin theory, according to which density-dependence responses would drive the expansion of those 12 key species in the Gulf of Lions. Further analyses showed that these species never saturated their habitats, suggesting that they are below their carrying capacity; an assumption in agreement with the overexploitation of several of these species. Finally, the stability of their spatial distributions over time and their potential ability to diffuse outside their main habitats give support to Marine Protected Areas as a potential pertinent management tool.