WorldWideScience

Sample records for forty-eighth ieee holm

  1. Sherlock Holmes and the Nebulous Nitro

    Science.gov (United States)

    Waddell, Thomas G.; Rybolt, Thomas R.

    1996-12-01

    The following story describes a chemical mystery with an emphasis on knowledge in basic organic chemistry, scientific observation, and reasoning skills. This is the eighth article in a series presenting a scientific problem in mystery form in the context of the popular and beloved characters Sherlock Holmes and Dr. Watson (1 - 7). There is a break in the story where the reader (students and teachers) can ponder and solve the mystery. Sherlock Holmes provides his solution in the paragraphs following this break.

  2. Sherlock Holmes.

    OpenAIRE

    Gilbody, J S

    1993-01-01

    Sir Arthur Conan Doyles' Sherlock Holmes 'canon' consists of 56 short stories and 4 novels published between 1887 and 1927. Holmes first appeared in A Study in Scarlet in 1887 in Beeton's Christmas Annual. Doyle killed off the character in The Adventure of the Final Problem in December 1893. Doyle returned to Holmes in the serialised (1901-2) The Hound of the Baskervilles, which was set before the character's death. Lucrative offers from the Strand Magazine in the UK and Collier's Weekly in t...

  3. HOLMES

    OpenAIRE

    Alpert, B.National Institute of Standards and Technology (NIST), Boulder, CO, USA; Balata, M.(Laboratori Nazionali del Gran Sasso (LNGS), INFN, Assergi, AQ, Italy); Bennett, D.(National Institute of Standards and Technology (NIST), Boulder, CO, USA); Biasotti, M.(Dipartimento di Fisica, Università di Genova, Genoa, Italy); Boragno, C.(Dipartimento di Fisica, Università di Genova, Genoa, Italy); Brofferio, C.(Dipartimento di Fisica, Università di Milano-Bicocca, Milan, Italy); Ceriale, V.(Dipartimento di Fisica, Università di Genova, Genoa, Italy); Corsini, D.(Dipartimento di Fisica, Università di Genova, Genoa, Italy); Day, P. K.(Jet Propulsion Laboratory, California Institute of Technology (CALTECH), Pasadena, CA, USA); De Gerone, M.(Dipartimento di Fisica, Università di Genova, Genoa, Italy); Dressler, R.(Paul Scherrer Institut (PSI), Villigen, Switzerland); Faverzani, M.(Dipartimento di Fisica, Università di Milano-Bicocca, Milan, Italy); Ferri, E.(Dipartimento di Fisica, Università di Milano-Bicocca, Milan, Italy); Fowler, J.(National Institute of Standards and Technology (NIST), Boulder, CO, USA); Gatti, F.(Dipartimento di Fisica, Università di Genova, Genoa, Italy)

    2015-01-01

    The European Research Council has recently funded HOLMES, a new experiment to directly measure the neutrino mass. HOLMES will perform a calorimetric measurement of the energy released in the decay of \\documentclass[12pt]{minimal} \\usepackage{amsmath} \\usepackage{wasysym} \\usepackage{amsfonts} \\usepackage{amssymb} \\usepackage{amsbsy} \\usepackage{mathrsfs} \\usepackage{upgreek} \\setlength{\\oddsidemargin}{-69pt} \\begin{document}$$^{163}$$\\end{document} 163 Ho. The calorimetric measurement elimina...

  4. Sherlock Holmes: scientific detective.

    Science.gov (United States)

    Snyder, Laura J

    2004-09-01

    Sherlock Holmes was intended by his creator, Arthur Conan Doyle, to be a 'scientific detective'. Conan Doyle criticized his predecessor Edgar Allan Poe for giving his creation - Inspector Dupin - only the 'illusion' of scientific method. Conan Doyle believed that he had succeeded where Poe had failed; thus, he has Watson remark that Holmes has 'brought detection as near an exact science as it will ever be brought into the world.' By examining Holmes' methods, it becomes clear that Conan Doyle modelled them on certain images of science that were popular in mid- to late-19th century Britain. Contrary to a common view, it is also evident that rather than being responsible for the invention of forensic science, the creation of Holmes was influenced by the early development of it.

  5. Hvem ejer Sherlock Holmes

    DEFF Research Database (Denmark)

    Lauridsen, Palle Schantz

    2013-01-01

    Gennemgang af akterne i en igangværende amerikansk retssag om, hvem der ejer rettighederne til Sherlock Holmes- fortællingerne......Gennemgang af akterne i en igangværende amerikansk retssag om, hvem der ejer rettighederne til Sherlock Holmes- fortællingerne...

  6. Sherlock Holmes as a Social Scientist.

    Science.gov (United States)

    Ward, Veronica; Orbell, John

    1988-01-01

    Presents a way of teaching the scientific method through studying the adventures of Sherlock Holmes. Asserting that Sherlock Holmes used the scientific method to solve cases, the authors construct Holmes' method through excerpts from novels featuring his adventures. Discusses basic assumptions, paradigms, theory building, and testing. (SLM)

  7. The eighth national electromagnetics meeting. Extended abstracts

    Energy Technology Data Exchange (ETDEWEB)

    Eloranta, E.; Jokela, K. [eds.

    1998-09-01

    The National Electromagnetics Meeting has been arranged annually since 1991 in Finland. The purpose of the meeting is to convene the persons working with problems of electromagnetics and to enhance the interaction between different research groups in different disciplines. The eighth meeting was held at the Radiation and Nuclear Safety Authority (STUK) August 27, 1998. The meeting is also the national meeting of the URSI (L`Union Radio-Scientifique Internationals)(Commission B: Fields and Waves) and the IEEE MTT/AP/ED Finland Chapter (Institute of Electrical and Electronics Engineers, Inc.). The report includes the extended abstracts of the presentations given in the National Electromagnetics Meeting at STUK. (orig.)

  8. The eighth national electromagnetics meeting. Extended abstracts

    International Nuclear Information System (INIS)

    Eloranta, E.; Jokela, K.

    1998-01-01

    The National Electromagnetics Meeting has been arranged annually since 1991 in Finland. The purpose of the meeting is to convene the persons working with problems of electromagnetics and to enhance the interaction between different research groups in different disciplines. The eighth meeting was held at the Radiation and Nuclear Safety Authority (STUK) August 27, 1998. The meeting is also the national meeting of the URSI (L'Union Radio-Scientifique Internationals)(Commission B: Fields and Waves) and the IEEE MTT/AP/ED Finland Chapter (Institute of Electrical and Electronics Engineers, Inc.). The report includes the extended abstracts of the presentations given in the National Electromagnetics Meeting at STUK. (orig.)

  9. Asperger's in the Holmes family.

    Science.gov (United States)

    Altschuler, Eric L

    2013-09-01

    I show that Mycroft Holmes (Sherlock Holmes' brother) is a formally described case of Asperger's syndrome a half century before Asperger's description of the syndrome. Further, given the genetic similarity and links between the brothers stated by Sherlock, this also cinches the same diagnosis for Sherlock.

  10. Gammel Sherlock Holmes-film fundet - igen

    DEFF Research Database (Denmark)

    Lauridsen, Palle Schantz

    2017-01-01

    Om genfunden af en forsvundet Sherlock Holmes-film fra 1911, produceret af Nordisk Films Kompagni......Om genfunden af en forsvundet Sherlock Holmes-film fra 1911, produceret af Nordisk Films Kompagni...

  11. Sherlock Holmes and anaesthesia.

    Science.gov (United States)

    Maltby, J R

    1988-01-01

    Sir Arthur Conan Doyle's first Sherlock Holmes adventure, A Study in Scarlet, was published 100 years ago. Between 1887 and 1927 he wrote 56 short stories and four novels about his fictional detective. Episodes in the adventures which relate to anaesthetic drugs are described. Use of the drugs was criminal in the case of chloroform, opium, and curare; therapeutic in the case of morphine; and recreational when Holmes himself used cocaine.

  12. [Sherlock Holmes as amateur physician].

    Science.gov (United States)

    Madsen, S

    1998-03-30

    The medical literature contains numerous articles dealing with Sherlock Holmes and his companion Dr. Watson. Some of the articles are concerned with the medical and scientific aspects of his cases. Other articles adopt a more philosophical view: They compare the methods of the master detective with those of the physician--the ideal clinician should be as astute in his profession as the detective must be in his. It this article the author briefly reviews the abilities of Sherlock Holmes as an amateur physician. Often Holmes was brilliant, but sometimes he made serious mistakes. In one of his cases (The Adventure of the Lion's Mane) he misinterpreted common medical signs.

  13. Sherlock Holmes i arkiverne

    DEFF Research Database (Denmark)

    Lauridsen, Palle Schantz

    2014-01-01

    Er præsentation af, hvordan arkiver og museer har været af afgørende betydning for, at det overhovedet kunne lade sig gøre for forfatteren at finde materiale til bogen "Sherlock Holmes i Danmark".......Er præsentation af, hvordan arkiver og museer har været af afgørende betydning for, at det overhovedet kunne lade sig gøre for forfatteren at finde materiale til bogen "Sherlock Holmes i Danmark"....

  14. I believe in Sherlock Holmes

    DEFF Research Database (Denmark)

    Lauridsen, Palle Schantz

    2012-01-01

    Sherlock Holmes så første gang dagens lys i 1887. I 4 romaner og 56 korte fortællinger berettede Arthur Conan Doyle i en periode på 40 år om de kriminalsager, hans consulting detective løste i samarbejde med sin ven, hjælper og kronikør, Dr. John Watson. Allerede, mens Doyle stadig skrev om Holmes......, vandrede hans figur over i andre medier, og historierne om ham hører i dag til de mest adapterede i verden. Inden for de sidste år er Holmes igen blevet populær både på film og tv. Både BBC’s tv-serie og Guy Ritchies film forholder sig legende til Doyles univers og til Holmes’ seksualitet....

  15. Da Sherlock Holmes kom til Danmark første gang

    DEFF Research Database (Denmark)

    Lauridsen, Palle Schantz

    2011-01-01

    Præsentation og analyse af Holmes-figurens udvikling i populærkulturen med udgangspunkt i det succesfulde teaterstykke "Sherlock Holmes" fra 1901......Præsentation og analyse af Holmes-figurens udvikling i populærkulturen med udgangspunkt i det succesfulde teaterstykke "Sherlock Holmes" fra 1901...

  16. IEEE Smart Grid Series of Standards IEEE 2030 (Interoperability) and IEEE 1547 (Interconnection) Status: Preprint

    Energy Technology Data Exchange (ETDEWEB)

    Basso, T.; DeBlasio, R.

    2012-04-01

    The IEEE American National Standards smart grid publications and standards development projects IEEE 2030, which addresses smart grid interoperability, and IEEE 1547TM, which addresses distributed resources interconnection with the grid, have made substantial progress since 2009. The IEEE 2030TM and 1547 standards series focus on systems-level aspects and cover many of the technical integration issues involved in a mature smart grid. The status and highlights of these two IEEE series of standards, which are sponsored by IEEE Standards Coordinating Committee 21 (SCC21), are provided in this paper.

  17. Holmes for Historians: Sherlock and the Elusive Quest.

    Science.gov (United States)

    Vacha, J. E.

    1988-01-01

    Examines the Sherlock Holmes stories of Sir Arthur Conan Doyle to see what interest and value the fictional detective may hold for historians. Reviewing several of the detective's adventures, the author states that both Holmes and historians are searching for a usable past and that, as explained by Holmes, historical method need not be a complex,…

  18. Gamle og nye Holmes-fans

    DEFF Research Database (Denmark)

    Lauridsen, Palle Schantz

    2016-01-01

    På baggrund af et internetbaseret spørgeskema undersøger artiklen forskelle og ligheder mellem medlemmer af Sherlock Holmes Klubben i Danmark og følgere af facebook-siden Sherlocked.dk......På baggrund af et internetbaseret spørgeskema undersøger artiklen forskelle og ligheder mellem medlemmer af Sherlock Holmes Klubben i Danmark og følgere af facebook-siden Sherlocked.dk...

  19. Occult Phenomena in Sherlock Holmes the Movie

    OpenAIRE

    NAMAZCARRA, CHRIESHER

    2014-01-01

    Keywords: Occult phenomena, Sherlock Holmes, movie. Lately, it is not difficult for people to find occult practices. There are many television programs and movie which air mystical programme aggressively to raise the rating and attract the viewers. A movie that raise occultism theme is Sherlock Holmes, the Movie. This movie tells about the struggle of detective Sherlock Holmes to fight the black magic power of Lord Blackwood.To carry out the study, the theories of Occultism such as the secrec...

  20. Reciprocal link for a coupled Camassa–Holm type equation

    International Nuclear Information System (INIS)

    Li, Nianhua; Zhang, Jinshun; Wu, Lihua

    2016-01-01

    Highlights: • We construct a reciprocal transformation for a coupled Camassa–Holm type equation proposed by Geng and Xue. • The transformed coupled Camassa–Holm type system is a reduction of the first negative flow in a modified Drinfeld–Sokolov III hierarchy. • The Lax pair and bi-Hamiltonian structure behaviors of the coupled Camassa–Holm type equation under the reciprocal transformation are analyzed. - Abstract: A coupled Camassa–Holm type equation is linked to the first negative flow in a modified Drinfeld–Sokolov III hierarchy by a transformation of reciprocal type. Meanwhile the Lax pair and bi-Hamiltonian structure behaviors of this coupled Camassa–Holm type equation under the reciprocal transformation are analyzed.

  1. Sherlock Holmes i litteratur, film og tv

    DEFF Research Database (Denmark)

    Lauridsen, Palle Schantz

    2017-01-01

    Korte præsentationer af centrale Sherlock Holmes-fortællinger til brug for Ordrup Biblioteks litteraturformidling på hjemmesiden......Korte præsentationer af centrale Sherlock Holmes-fortællinger til brug for Ordrup Biblioteks litteraturformidling på hjemmesiden...

  2. Adaptation and film style in "Sherlock Holmes"

    DEFF Research Database (Denmark)

    Lauridsen, Palle Schantz

    2017-01-01

    A film historical and stylistic analysis of Arthur Berthelet's 1916-movie "Sherlock Holmes" which was re-found and restored in 2013.......A film historical and stylistic analysis of Arthur Berthelet's 1916-movie "Sherlock Holmes" which was re-found and restored in 2013....

  3. Asperger's in the Holmes Family

    Science.gov (United States)

    Altschuler, Eric L.

    2013-01-01

    I show that Mycroft Holmes (Sherlock Holmes' brother) is a formally described case of Asperger's syndrome a half century before Asperger's description of the syndrome. Further, given the genetic similarity and links between the brothers stated by Sherlock, this also cinches the same diagnosis for Sherlock.

  4. Sherlock Holmes and intelligent design.

    Science.gov (United States)

    McCuskey, Brian

    2012-09-01

    This article examines how both scientists and creationists, as they argue over intelligent design, invoke and quote the fictional character of Sherlock Holmes to support their opposed positions. Rhetorical analysis ofHolmes's repeated contributions to the debate reveals not only how the argument for design falls apart, but also how the argument for Darwin compromises itself when following the detective onto shaky logical ground. The sciences and the humanities must work together to combat the corrosive influence ofpseudoscientific reasoning on our students and the general public; this article contributes to that joint enterprise.

  5. Holmes versus Traditional Teacher Candidates: Labor Market Receptivity.

    Science.gov (United States)

    Young, I. Phillip; And Others

    1997-01-01

    "Typical" paper credentials were used to create 12 hypothetical teacher candidates. Credential contents were varied to reflect all combinations of college preparatory institutions (Holmes vs. traditional), education degree types, and chronological ages. Randomly selected high school principals then evaluated candidates. Holmes-prepared…

  6. Sherlock Holmes' methods of deductive reasoning applied to medical diagnostics.

    Science.gov (United States)

    Miller, L

    1985-03-01

    Having patterned the character of Sherlock Holmes after one of his professors, Sir Arthur Conan Doyle, himself a physician, incorporated many of the didactic qualities of the 19th century medical diagnostician into the character of Holmes. In this paper I explore Holmes's techniques of deductive reasoning and their basis in 19th and 20th century medical diagnostics.

  7. Tit-Bits, New Journalism, and early Sherlock Holmes fandom

    Directory of Open Access Journals (Sweden)

    Ann K. McClellan

    2017-03-01

    Full Text Available The Strand's more popular sister magazine, Tit-Bits, played a significant role in establishing Sherlock Holmes as a literary and cultural icon, particularly through its use of participatory practices, cross-promotion, and transmedia storytelling. I argue that Tit-Bits' late 19th-century New Journalism techniques like contests and prizes, inquiry columns, correspondence, and internal advertising fostered a corporately devised participatory fandom that directly contributed to Sherlock Holmes's popularity. Tit-Bits audiences were invited and encouraged to imagine new scenarios for their favorite character that were validated through publication. Such practices not only created a unique identity for Sherlock Holmes fandom but also directly contributed to the creation and maintenance of Holmes's fictional world. With fandom studies reaching more and more audiences—both academic and popular—historicizing early fan practices like the early publication and reception of the Sherlock Holmes stories provides important insight into how audiences have historically responded to, and interacted with, fictional characters, and how they helped sustain and expand those characters' fictional worlds.

  8. Sherlock Holmes's Methods of Deductive Reasoning Applied to Medical Diagnostics

    Science.gov (United States)

    Miller, Larry

    1985-01-01

    Having patterned the character of Sherlock Holmes after one of his professors, Sir Arthur Conan Doyle, himself a physician, incorporated many of the didactic qualities of the 19th century medical diagnostician into the character of Holmes. In this paper I explore Holmes's techniques of deductive reasoning and their basis in 19th and 20th century medical diagnostics. PMID:3887762

  9. The Autistic Detective: Sherlock Holmes and his Legacy

    Directory of Open Access Journals (Sweden)

    Sonya Freeman Loftis

    2014-12-01

    Full Text Available Sherlock Holmes has long been rumored to be on the autism spectrum. Yet the significance of the great detective's autism "diagnosis" has been largely overlooked. While it would be impossible to diagnose a fictional character with a neurological difference, it says something about the way that the public imagines autism that Holmes is consistently imagined and described as a person on the spectrum. Indeed, Conan Doyle's character popularized the stereotype of the detective with autistic traits, thus perpetuating several common tropes about autism. Emulating Conan Doyle's famous tales, contemporary crime fiction frequently creates detective characters with autistic characteristics. For example, popular television shows such as Criminal Minds present detectives with autistic traits who are clearly constructed to remind audiences of Holmes. While figures such as Spenser Reid (and other crime fighters following in Holmes's shadow may seem to counteract fears of people with cognitive disabilities as deviant, criminal, or dangerous, they may actually reinforce those stereotypes.

  10. Tool Wear Detection Based on Duffing-Holmes Oscillator

    Directory of Open Access Journals (Sweden)

    Wanqing Song

    2008-01-01

    Full Text Available The cutting sound in the audible range includes plenty of tool wear information. The sound is sampled by the acoustic emission (AE sensor as a short-time sequence, then worn wear can be detected by the Duffing-Holmes oscillator. A novel engineering method is proposed for determining the chaotic threshold of the Duffing-Holmes oscillator. First, a rough threshold value is calculated by local Lyapunov exponents with a step size 0.1. Second, the exact threshold value is calculated by the Duffing-Holmes system in terms of the law of the golden section. The advantage of the method is low computation cost. The feasibility for tool condition detection is demonstrated by the 27 kinds of cutting conditions with sharp tool and worn tool in turning experiments. The 54 group data sampled as noisy are embedded into the Duffing-Holmes oscillator, respectively. Finally, one chaotic threshold is determined conveniently which can distinguish between worn tool or sharp tool.

  11. Reversible Holmes' tremor due to spontaneous intracranial hypotension.

    Science.gov (United States)

    Iyer, Rajesh Shankar; Wattamwar, Pandurang; Thomas, Bejoy

    2017-07-27

    Holmes' tremor is a low-frequency hand tremor and has varying amplitude at different phases of motion. It is usually unilateral and does not respond satisfactorily to drugs and thus considered irreversible. Structural lesions in the thalamus and brainstem or cerebellum are usually responsible for Holmes' tremor. We present a 23-year-old woman who presented with unilateral Holmes' tremor. She also had hypersomnolence and headache in the sitting posture. Her brain imaging showed brain sagging and deep brain swelling due to spontaneous intracranial hypotension (SIH). She was managed conservatively and had a total clinical and radiological recovery. The brain sagging with the consequent distortion of the midbrain and diencephalon was responsible for this clinical presentation. SIH may be considered as one of the reversible causes of Holmes' tremor. © BMJ Publishing Group Ltd (unless otherwise stated in the text of the article) 2017. All rights reserved. No commercial use is permitted unless otherwise expressly granted.

  12. Sherlock Holmes: From literary character to pop culture symbol

    OpenAIRE

    HULCOVÁ, Anna

    2013-01-01

    The bachelor thesis Sherlock Holmes: From literary character to pop culture symbol deals with the collection of sixty detective stories by Arthur Conan Doyle, the canon. The aim of the thesis is to highlight the aspects that contributed to the popularity of Sherlock Holmes and the series as such. The character of Sherlock Holmes became one of the most adapted literary characters, which is reflected in many areas of popular culture. Special attention is paid to the recent adaptations presentin...

  13. The HOLMES project

    International Nuclear Information System (INIS)

    Drevermann, H.; Geissler, K.K.

    1982-01-01

    HOLMES is a working prototype of a scanning and measuring machine for HOBC holograms. The machine is connected via CAMAC electronics, a MIK-11 microcomputer, and a serial link to a VAX computer. The scanning process is based on the use of TV displays. (orig./HSI)

  14. Revalidating Sherlock Holmes for a role in medical education.

    Science.gov (United States)

    Levine, David

    2012-04-01

    Sir Arthur Conan Doyle endowed Sherlock Holmes with extraordinary skills that Dr Watson and others found incomprehensible until Holmes gave explanations, often in the form of memorable maxims and short monologues. Intentionally or not, Doyle left us crime-solving precepts that still inform aspects of medical practice. Experienced clinicians share with Holmes the dilemma of how to make complex, often unconscious, capability accessible to novices. Doctors still invoke Holmes's methods in clinical contexts, but the validity of some of the parallels has been challenged and quoting the more popular sayings has been equated with conceit. This paper examines how the use of selected maxims and monologues can help to link abstract principles and live context in a credible way in order to make aspects of clinical reasoning and professional behaviour more accessible and memorable.

  15. "There's a west wind coming" : Sherlock Holmes in Meiji Japan

    OpenAIRE

    堤林, 恵

    2015-01-01

    IntroductionJapan's Aspiration and the Reception of English Literature"Europeanization" and the Rising Tide of NationalismThe Standing of Detective FictionA Brief Overview of Sherlock Holmes TranslationsSherlock Holmes Refracted Through a PrismConclusion

  16. Null controllability of the viscous Camassa–Holm equation with ...

    Indian Academy of Sciences (India)

    In this paper, we study the null controllability of the viscous Camassa–. Holm equation on the one-dimensional torus. By using a moving distributed control, we obtain that the system is null controllable for a given data with certain regularity. Keywords. Viscous Camassa–Holm equation; null controllability; moving control;.

  17. Book Review: Leslie Holmes, Corruption: A Very Short Introduction

    DEFF Research Database (Denmark)

    Keremis, Anestis

    2017-01-01

    Book review of: Corruption. A Very Short Introduction / by Leslie Holmes. Oxford: Oxford University Press, 2015. 143pp., £7.99 (p/b), ISBN 9780199689699.......Book review of: Corruption. A Very Short Introduction / by Leslie Holmes. Oxford: Oxford University Press, 2015. 143pp., £7.99 (p/b), ISBN 9780199689699....

  18. Sherlock Holmes, Master Problem Solver.

    Science.gov (United States)

    Ballew, Hunter

    1994-01-01

    Shows the connections between Sherlock Holmes's investigative methods and mathematical problem solving, including observations, characteristics of the problem solver, importance of data, questioning the obvious, learning from experience, learning from errors, and indirect proof. (MKR)

  19. Observation, Sherlock Holmes, and Evidence Based Medicine.

    Science.gov (United States)

    Osborn, John

    2002-01-01

    Sir Arthur Conan Doyle, the creator of the fictional detective Sherlock Holmes, studied medicine at the University of Edinburgh between 1876 and 1881 under Doctor Joseph Bell who emphasised in his teaching the importance of observation, deduction and evidence. Sherlock Holmes was modelled on Joseph Bell. The modern notions of Evidence Based Medicine (EBM) are not new. A very brief indication of some of the history of EBM is presented including a discussion of the important and usually overlooked contribution of statisticians to the Popperian philosophy of EBM.

  20. Holmes i danske tegneserier

    DEFF Research Database (Denmark)

    Lauridsen, Palle Schantz

    2017-01-01

    En mediehistorisk og -analytisk undersøgelse af fremstillingen af Sherlock Holmes-karakteren og -universet i tegneserier udgivet i Danmark. Del 1 omhandler en upåagtet række søndagsstriber, Storm P. tegnede for Ekstrabladet i 1910-11. De hører til blandt Danmarks allerførste tegneserier...

  1. The Empire Bites Back: Sherlock Holmes as an Imperial Immune System

    Directory of Open Access Journals (Sweden)

    Laura Otis

    1998-01-01

    Full Text Available Trained as a physician in the bacteriological age, Sir Arthur Conan Doyle created a detective-hero who acts both like a masterful bacteriologist and an imperial immune system. Doyle's experiences as a doctor in South Africa taught him that the colonies' microbes were his Empire's worst enemy. In 1890, Doyle visited Berlin, where Robert Koch was testing a "cure" for tuberculosis, and in Doyle's subsequent character sketch of Koch, the scientist sounds remarkably like Sherlock Holmes. Based on Doyle's medical instructor Joe Bell, Holmes shares Koch's relentless drive to hunt down and unmask tiny invaders. Imperialism, by the 1880s, had opened Europe to the peoples, cultures, and diseases of the lands it claimed. Holmes plays a defensive role, as an imperial intelligence network to detect foreigners "passing" in British society. The revenge, blackmail, and counterfeiting around which the Holmes stories are built reflect readers' anxieties about infiltration, about punishment for their colonial theft, and about the legitimacy of their own identity in a socio-economic system built on contradictions. Holmes thus responds to conflicting social demands, exposing interlopers who mimic traditional signs of respectability, and protecting "respectable" citizens from the consequences of their colonial crimes.

  2. The Sherlock Holmes method in clinical practice.

    Science.gov (United States)

    Sopeña, B

    2014-04-01

    This article lists the integral elements of the Sherlock Holmes method, which is based on the intelligent collection of information through detailed observation, careful listening and thorough examination. The information thus obtained is analyzed to develop the main and alternative hypotheses, which are shaped during the deductive process until the key leading to the solution is revealed. The Holmes investigative method applied to clinical practice highlights the advisability of having physicians reason through and seek out the causes of the disease with the data obtained from acute observation, a detailed review of the medical history and careful physical examination. Copyright © 2013 Elsevier España, S.L. All rights reserved.

  3. Sherlock Holmes and the Educational Process.

    Science.gov (United States)

    Kellog, Richard L.

    1980-01-01

    Examines significant factors in the teaching-learning process which appear in Arthur Conan Doyle's fiction about Sherlock Holmes. These processes include deduction, memory, specialized knowledge, perception, emotional control, and divergent thinking. (Author/KC)

  4. Access to IEEE Electronic Library

    CERN Multimedia

    2007-01-01

    From 2007, the CERN Library now offers readers online access to the complete IEEE Electronic Library (Institute of Electrical and Electronics Engineers). This new licence gives unlimited online access to all IEEE and IET (previously IEE) journals and proceedings as well as all current IEEE standards and selected archived ones. Some of the titles offer volumes back to 1913. This service currently represents more than 1,400,000 full-text articles! This leading engineering information resource replaces the previous service, a sub-product of the IEEE database called 'IEEE Enterprise', which offered online access to the complete collection of IEEE journals and proceedings, but with limited features. The service had become so popular that the CERN Working Group for Acquisitions recommended that the Library subscribe to the complete IEEE Electronic Library for 2007. Usage statistics for recent months showed there was a demand for the service from a large community of CERN users and we were aware that many users h...

  5. On a Comparison and Contrast of Sherlock Holmes And Miss Jane Marple

    Institute of Scientific and Technical Information of China (English)

    张豪若

    2014-01-01

    In the history of detective stories, Sherlock Holmes and Miss Jane Marple remain as two of the most prominent fig-ures. Focusing on the two detectives' images, personality traits, detective strategies as well as settings of the stories, this study ex-amines the grounds that magnetize readers.The purpose of this research is to inquire into readers' orientations to Sherlock Holm-es and Miss Jane Marple, and to investigate the causes for their views. To fulfill that purpose, a questionnaire was designed and dis-tributed. Sherlock Holmes and Miss Jane Marple prove themselves to be successful detectives. Both of them have distinct images and personality traits as well as plausible detective strategies. The settings, combining reality with imagination, also play a dispens-able role. Besides, reasons given by students who disbelieve that they are real persons fail to convince.

  6. The Public, the Press, and Celebrities in The Return of Sherlock Holmes

    Directory of Open Access Journals (Sweden)

    Thomas Vranken

    2015-11-01

    Full Text Available Arthur Conan Doyle and his consulting detective had been famous for more than ten years when Doyle came to write The Return of Sherlock Holmes. In the following essay, I argue that this experience of fame shaped the composition of the third series of Holmes stories, in which the detective is resurrected a decade after going over the Reichenbach Falls. The essay approaches celebrity as a competitive interaction in which the public, the press, and the celebrity vie for control. It is argued that the stories in The Return of Sherlock Holmes work to empower the various celebrities that they portray – including not just Holmes but also well-known aristocrats, statesmen, scholars, and female ‘beauties’ – and to disempower their rival co-participants in the celebrity dynamic: the public and the press.

  7. The Chemical Adventures of Sherlock Holmes: The Ghost of Gordon Square.

    Science.gov (United States)

    Waddell, Thomas G.; Rybolt, Thomas R.

    2000-01-01

    Describes a scientific mystery with an emphasis on chemical magic presented in the context of the characters Sherlock Holmes and Dr. Watson. The story contains a break where students and teachers pause to ponder and solve the mystery. Sherlock Holmes provides his solution in the paragraphs following this break. (WRM)

  8. Marketingová strategie klubů Holmes Place v České republice pro rok 2009

    OpenAIRE

    Ješinová, Tereza

    2009-01-01

    The Marketing Strategy of Holmes Place Czech Republic in 2009 Aim of the study The main goal is to create a marketing plan for Holmes Place clubs in Czech Republic in 2009 , including the evaluation of the first quarter after the introduction of this plan reality. The marketing plan should be based on the current situation of Holmes Place clubs and market environment . Its aim is to achieve an increase in profits of the company and the overall implementation Holmes Place brand in the Czech en...

  9. The Landscapes of Sherlock Holmes.

    Science.gov (United States)

    Tuan, Yi-Fu

    1985-01-01

    By critically reading Conan Doyle's "Sherlock Holmes," geography students can learn about the major beliefs, values, and fears of late Victorian England. The geographical scope of the work is discussed, as well as what the work tells us about beliefs concerning nature, environmental influence, and human nature of the period. (RM)

  10. Nonlocal symmetries and a Darboux transformation for the Camassa-Holm equation

    International Nuclear Information System (INIS)

    Hernandez-Heredero, Rafael; Reyes, Enrique G

    2009-01-01

    We announce two new structures associated with the Camassa-Holm (CH) equation: a Lie algebra of nonlocal symmetries, and a Darboux transformation for this important equation, which we construct using only our symmetries. We also extend our results to the associated Camassa-Holm equation introduced by J Schiff (1998 Physica D 121 24-43). (fast track communication)

  11. Nonlocal symmetries and a Darboux transformation for the Camassa-Holm equation

    Energy Technology Data Exchange (ETDEWEB)

    Hernandez-Heredero, Rafael [Departamento de Matematica Aplicada, EUIT de Telecomunicacion, Universidad Politecnica de Madrid, Campus Sur Ctra de Valencia Km. 7. 28031, Madrid (Spain); Reyes, Enrique G [Departamento de Matematica y Ciencia de la Computacion, Universidad de Santiago de Chile, Casilla 307 Correo 2, Santiago (Chile)], E-mail: rafahh@euitt.upm.es, E-mail: ereyes@fermat.usach.cl

    2009-05-08

    We announce two new structures associated with the Camassa-Holm (CH) equation: a Lie algebra of nonlocal symmetries, and a Darboux transformation for this important equation, which we construct using only our symmetries. We also extend our results to the associated Camassa-Holm equation introduced by J Schiff (1998 Physica D 121 24-43). (fast track communication)

  12. Mr. Sherlock Holmes: Teaching Exemplar Extraordinary.

    Science.gov (United States)

    Abrell, Ron

    1979-01-01

    Literature offers an unusually rich store of fictional characters from which all educators can learn much. Sherlock Holmes constitutes a model whose personal characteristics, love of truth, concern for his fellow man, and teaching ability exemplify the best in pedagogy. (Author)

  13. The Great Detective, by Zach Dundas; Gender and the modern Sherlock Holmes, edited by Nadine Farghaly; and Sherlock Holmes, edited by Alex Werner [book review

    Directory of Open Access Journals (Sweden)

    Julia Knaus

    2017-03-01

    Full Text Available Review of: Zach Dundas. The Great Detective: The amazing rise and immortal life of Sherlock Holmes. Boston: Houghton Mifflin Harcourt, 2015, hardcover, $26 (336p, ISBN 978-0-544-21404-0, e-book $15.95 (2378 KB, ISBN 978-0-544-22020-1, ASIN B00LZ7GP6U. Nadine Farghaly, ed. Gender and the modern Sherlock Holmes: Essays on film and television adaptations since 2009. Jefferson, NC: McFarland, 2015, paperback, $35 (260p, ISBN 978-0-786-49459-0, e-book $9.99 (3353 KB, ISBN 978-1-4766-2281-1, ASIN B019WQQEY8. Alex Werner, ed. Sherlock Holmes: The man who never lived and will never die. London: Ebury Press, 2014, hardcover, £25 (256p, ISBN 978-0-09-195872-5, e-book £12.99, ISBN 978-1-47-350264-2.

  14. Robust tracking control of uncertain Duffing-Holmes control systems

    International Nuclear Information System (INIS)

    Sun, Y.-J.

    2009-01-01

    In this paper, the notion of virtual stabilizability for dynamical systems is introduced and the virtual stabilizability of uncertain Duffing-Holmes control systems is investigated. Based on the time-domain approach with differential inequality, a tracking control is proposed such that the states of uncertain Duffing-Holmes control system track the desired trajectories with any pre-specified exponential decay rate and convergence radius. Moreover, we present an algorithm to find such a tracking control. Finally, a numerical example is provided to illustrate the use of the main results.

  15. The IEEE Milestone event at CERN

    CERN Multimedia

    2005-01-01

    On the initiative of its French and Swiss Sections, the IEEE has honoured CERN with an 'IEEE Milestone in the history of electricity and electronics' for the invention of the multi-wire proportional chamber in 1968. The IEEE established the Electrical Engineering Milestones programe in 1983 to honour significant achievements in the history of electrical and electronics engineering. To be designated, an achievement must be at least 25 years old, must have involved a unique solution to an engineering problem, and must have had at least regional impact. Currently there are more than  50 IEEE Milestones around the world. http://www.ieee.org/organizations/history_center/cern.html The installation and unveiling of this IEEE Milestone will provide the opportunity to emphasize the close relationship between science, technology, industry and well-being in society.  A ceremony, organised with the support of a group of IEEE members working at CERN, will be held at the CERN Globe of Science and Inn...

  16. Active Channel Reservation for Coexistence Mechanism (ACROS) for IEEE 802.15.4 and IEEE 802.11

    Science.gov (United States)

    Shin, Soo Young; Woo, Dong Hyuk; Lee, Jong Wook; Park, Hong Seong; Kwon, Wook Hyun

    In this paper, a coexistence mechanism between IEEE 802.15.4 and IEEE 802.11b, Active Channel Reservation for cOexiStence (ACROS), is proposed. The key idea underlining ACROS is to reserve the channel for IEEE 802.15.4 transmission, where IEEE 802.11 transmissions are forbidden. The request-to-send (RTS)/clear-to send (CTS) mechanism within IEEE 802.11 is used to reserve a channel. The proposed ACROS mechanism is implemented into a PC based prototype. The embedded version of ACROS is also developed to mitigate the timing drift problem in the PC-based ACROS. The efficiency of ACROS is shown using the throughput and packet error rate achieved in actual experiments.

  17. 2012 IEEE Vehicular Networking Conference (VNC)

    NARCIS (Netherlands)

    Altintas, Onur; Chen, Wai; Heijenk, Geert; Oh, Hyun Seo; Chung, Jong-Moon; Dressler, Falko; Kargl, Frank; Pau, Giovanni; Schoch, Elmar

    2012-01-01

    On behalf of the Organizing Committee, we would like to welcome you to the fourth edition of the IEEE Vehicular Networking Conference in Seoul, Korea. IEEE VNC is a unique conference sponsored by both IEEE Communications Society and Intelligent Transportation Systems Society. It brings together

  18. Development of microwave-multiplexed superconductive detectors for the HOLMES experiment

    Science.gov (United States)

    Giachero, A.; Becker, D.; Bennett, D. A.; Faverzani, M.; Ferri, E.; Fowler, J. W.; Gard, J. D.; Hays-Wehle, J. P.; Hilton, G. C.; Maino, M.; Mates, J. A. B.; Puiu, A.; Nucciotti, A.; Reintsema, C. D.; Swetz, D. S.; Ullom, J. N.; Vale, L. R.

    2016-05-01

    In recent years, the progress on low temperature detector technologies has allowed design of large scale experiments aiming at pushing down the sensitivity on the neutrino mass below 1 eV. Even with outstanding performances in both energy (~eV on keV) and time resolution (~ 1 μs) on the single channel, a large number of detectors working in parallel is required to reach a sub-eV sensitivity. HOLMES is a new experiment to directly measure the neutrino mass with a sensitivity as low as 2eV. HOLMES will perform a calorimetric measurement of the energy released in the electron capture (EC) decay of 163 Ho. In its final configuration, HOLMES will deploy 1000 detectors of low temperature microcalorimeters with implanted 163 Ho nuclei. The baseline sensors for HOLMES are Mo/Cu TESs (Transition Edge Sensors) on SiNx membrane with gold absorbers. The readout is based on the use of rf-SQUIDs as input devices with flux ramp modulation for linearization purposes; the rf-SQUID is then coupled to a superconducting lambda/4-wave resonator in the GHz range, and the modulated signal is finally read out using the homodyne technique. The TES detectors have been designed with the aim of achieving an energy resolution of a few eV at the spectrum endpoint and a time resolution of a few micro-seconds, in order to minimize pile-up artifacts.

  19. Simulasi Kinerja Jaringan Nirkabel IEEE-802.11a dan IEEE-802.11g Menggunakan NS-2

    Directory of Open Access Journals (Sweden)

    Helm Fitriawan

    2014-03-01

    Full Text Available Wireless network uses transmission media based on radio waves. This type of networks is mainly useddue to its efficiency and mobility in data exchanging. This paper reports the modeling and simulation of wirelessnetworks based on Cisco Aironet 1130ag access point devices with IEEE 802.11a and IEEE 802.11g standards. Themodeling and simulation are performed using network simulator version 2 (NS-2 that is installed on operationsystem Linux Ubuntu v.10.10. The NS-2 is commonly used and works well in numerous types of network simulation. From simulation, we obtain quality of service parameters by employing several simulation scenarios in terms ofnumber of nodes, distances, and packet data sizes. It can be concluded from simulation results that the IEEE 802.11gnetworks transfer data with better quality than those of IEEE 802.11a networks.  Furthermore, the IEEE 802.11gnetworks provide a higher throughput, with smaller amount of delay and packet loss percentage compared to thoseof IEEE 802.11a networks.

  20. A medical perspective on the adventures of Sherlock Holmes.

    Science.gov (United States)

    Reed, J

    2001-12-01

    The adventures of Sherlock Holmes, although primarily famous as stories of detection of crime, offer a considerable amount to interest the medical reader. There are many medical references in the stories, and the influence of Conan Doyle's medical background is clearly seen in the main characters. Aspects of the stories also reflect Conan Doyle's medical career, and also something of his attitude towards the profession. From Holmes's sayings and accounts of his methods, parallels can be drawn between Holmesian deduction and the diagnostic process. It is concluded, however, that deduction cannot be used as a direct paradigm since medical problems are rarely soluble through a process of logic alone.

  1. Arthur Conan Doyle, Joseph Bell, and Sherlock Holmes. A neurologic connection.

    Science.gov (United States)

    Westmoreland, B F; Key, J D

    1991-03-01

    Neurologists, like physicians in several other medical specialties, can lay claim to Sherlock Holmes as one of their own. This assertion is validated by the number of neurologic conditions, such as seizures, stroke, syncope, encephalopathies, and head trauma, that are mentioned in the stories and novels. In addition, the article reviews the powers of observation and the deductive approach utilized by Conan Doyle and Joseph Bell, the models for Sherlock Holmes, and how these skills can be applied to medical problems.

  2. The Chemical Adventures of Sherlock Holmes: The Blackwater Escape.

    Science.gov (United States)

    Waddell, Thomas G.; Rybolt, Thomas R.

    2003-01-01

    Presents a mystery based on the well-known characters, Sherlock Holmes and Dr. Watson. Emphasizes qualitative inorganic analysis, laboratory observations, and oxidation-reduction processes. (Author/YDS)

  3. Delay Analysis of GTS Bridging between IEEE 802.15.4 and IEEE 802.11 Networks for Healthcare Applications

    Science.gov (United States)

    Mišić, Jelena; (Sherman) Shen, Xuemin

    2009-01-01

    We consider interconnection of IEEE 802.15.4 beacon-enabled network cluster with IEEE 802.11b network. This scenario is important in healthcare applications where IEEE 802.15.4 nodes comprise patient's body area network (BAN) and are involved in sensing some health-related data. BAN nodes have very short communication range in order to avoid harming patient's health and save energy. Sensed data needs to be transmitted to an access point in the ward room using wireless technology with higher transmission range and rate such as IEEE 802.11b. We model the interconnected network where IEEE 802.15.4-based BAN operates in guaranteed time slot (GTS) mode, and IEEE 802.11b part of the bridge conveys GTS superframe to the 802.11b access point. We then analyze the network delays. Performance analysis is performed using EKG traffic from continuous telemetry, and we discuss the delays of communication due the increasing number of patients. PMID:19107184

  4. Delay Analysis of GTS Bridging between IEEE 802.15.4 and IEEE 802.11 Networks for Healthcare Applications.

    Science.gov (United States)

    Misić, Jelena; Sherman Shen, Xuemin

    2009-01-01

    We consider interconnection of IEEE 802.15.4 beacon-enabled network cluster with IEEE 802.11b network. This scenario is important in healthcare applications where IEEE 802.15.4 nodes comprise patient's body area network (BAN) and are involved in sensing some health-related data. BAN nodes have very short communication range in order to avoid harming patient's health and save energy. Sensed data needs to be transmitted to an access point in the ward room using wireless technology with higher transmission range and rate such as IEEE 802.11b. We model the interconnected network where IEEE 802.15.4-based BAN operates in guaranteed time slot (GTS) mode, and IEEE 802.11b part of the bridge conveys GTS superframe to the 802.11b access point. We then analyze the network delays. Performance analysis is performed using EKG traffic from continuous telemetry, and we discuss the delays of communication due the increasing number of patients.

  5. A coexistence model of IEEE 802.15.4 and IEEE 802.1 lbIg

    NARCIS (Netherlands)

    Yuan, Wei; Wang, Xiangyu; Linnartz, J.P.M.G.

    2007-01-01

    IEEE 802.15.4 was developed to meet the needs for low-rate wireless communication. However, due to its low power, IEEE 802.15.4 is potentially vulnerable to interference by other wireless technologies having much higher power and working in the same industrial, scientific, and medical (ISM) band

  6. Construction and performance of the scanning and measuring machine HOLMES used for bubble chamber holograms

    International Nuclear Information System (INIS)

    Drevermann, H.; Geissler, K.K.; Johansson, K.E.

    1985-01-01

    The construction and performance of the scanning and measuring machine HOLMES are described. It has been used to analyse in-line holograms taken with the small bubble chamber HOBC. A total of 8000 holograms has up to now been analysed on HOLMES. (orig.)

  7. The Chemical Adventures of Sherlock Holmes: Autopsy in Blue

    Science.gov (United States)

    Waddell, Thomas G.; Rybolt, Thomas R.

    2004-01-01

    A chemical mystery with an emphasis on qualitative inorganic analysis, forensic chemistry and medicinal substances is discussed. The mystery is solved by Sherlock Holmes with the help of clues provided.

  8. A. Conan Doyle, Sherlock Holmes, and murder by tropical infection.

    Science.gov (United States)

    Ehrenkranz, N J

    1987-01-01

    The scientific insights with which A. Conan Doyle endowed his creation, the master detective Sherlock Holmes, continue to attract scholarly interest. Indeed, the clinical and/or scientific aspects of Doyle's fiction hold appeal for those interested in the epidemiology of tropical infectious diseases. The origins and routes of transmission of tropical infections were subjects of fruitful investigation in the latter half of the nineteenth century. In "The Adventure of the Dying Detective," Sherlock Holmes investigates a murder that he suspects to have resulted from a fatal Asiatic disease associated with a short incubation period: the indications point to primary septicemic plague as the murder weapon.

  9. Il segreto di Holmes

    Directory of Open Access Journals (Sweden)

    Silio Bozzi

    2012-11-01

    Full Text Available The most famous of detectives, Sherlock Holmes, is not only a relentless solver of mysteries, but is also an enigma himself. Only another investigator may shed light on the hidden contradictions and mysteries of the universe and perhaps on Holmes’s most secret soul. Nothing short of the merciless analysis of another detective, with his or her scientific training, is able to disassemble and reassemble the theoretic and cognitive machinery of the famous tenant of the 221/b Baker Street and discover that some parts will not fall back into place and that nothing, perhaps, will ever be the same…

  10. Performance comparison of IEEE 802.11g and IEEE 802.11n in the presence of interference from 802.15.4 networks

    OpenAIRE

    Masood, Syed Haani

    2013-01-01

    In this paper we compare the packet error rate (PER) and maximum throughput of IEEE 802.11n and IEEE 802.11g under interference from IEEE 802.15.4 by using MATLAB to simulate the IEEE PHY for 802.11n and 802.11g networks.

  11. Development of microwave superconducting microresonators for neutrino mass measurement in the HOLMES framework

    OpenAIRE

    Giachero, A.; Day, P. K.; Falferi, P.; Faverzani, M.; Ferri, E.; Giordano, C.; Maino, M.; Margesin, B.; Mezzena, R.; Nizzolo, R.; Nucciotti, A.; Puiu, A.; Zanetti, L.

    2015-01-01

    The European Research Council has recently funded HOLMES, a project with the aim of performing a calorimetric measurement of the electron neutrino mass measuring the energy released in the electron capture decay of 163Ho. The baseline for HOLMES are microcalorimeters coupled to Transition Edge Sensors (TESs) read out with rf-SQUIDs, for microwave multiplexing purposes. A promising alternative solution is based on superconducting microwave resonators, that have undergone rapid development in t...

  12. Bilateral Hypertrophic Olivary Degeneration and Holmes Tremor without Palatal Tremor: An Unusual Association

    Directory of Open Access Journals (Sweden)

    Carlos Cosentino

    2016-07-01

    Full Text Available Background: Lesions in the Guillain–Mollaret triangle or dentate-rubro-olivary pathway may lead to hypertrophic olivary degeneration (HOD, a secondary trans-synaptic degeneration of the inferior olivary nucleus. HOD is usually associated with palatal tremor and rarely with Holmes tremor. Bilateral HOD is a very unusual condition and very few cases are reported. Case Report: We report here two cases of bilateral HOD after two different vascular lesions located at the decussation of superior cerebellar peduncles, thus impairing both central tegmental tracts and interrupting bilaterally the dentate-rubral-olivary pathway. Interestingly, both developed bilateral Holmes tremor but not palatal tremor. Discussion: Lesions in some of the components in the Guillain–Mollaret triangle may develop Holmes tremor with HOD and without palatal tremor. Magnetic resonance imaging is an invaluable tool in these cases. Better understanding of the pathways in this loop is needed.

  13. IEEE International Symposium on Biomedical Imaging.

    Science.gov (United States)

    2017-01-01

    The IEEE International Symposium on Biomedical Imaging (ISBI) is a scientific conference dedicated to mathematical, algorithmic, and computational aspects of biological and biomedical imaging, across all scales of observation. It fosters knowledge transfer among different imaging communities and contributes to an integrative approach to biomedical imaging. ISBI is a joint initiative from the IEEE Signal Processing Society (SPS) and the IEEE Engineering in Medicine and Biology Society (EMBS). The 2018 meeting will include tutorials, and a scientific program composed of plenary talks, invited special sessions, challenges, as well as oral and poster presentations of peer-reviewed papers. High-quality papers are requested containing original contributions to the topics of interest including image formation and reconstruction, computational and statistical image processing and analysis, dynamic imaging, visualization, image quality assessment, and physical, biological, and statistical modeling. Accepted 4-page regular papers will be published in the symposium proceedings published by IEEE and included in IEEE Xplore. To encourage attendance by a broader audience of imaging scientists and offer additional presentation opportunities, ISBI 2018 will continue to have a second track featuring posters selected from 1-page abstract submissions without subsequent archival publication.

  14. A Rare Case in the Emergency Department: Holmes-Adie Syndrome

    Directory of Open Access Journals (Sweden)

    Sahin COLAK

    2015-03-01

    Full Text Available SUMMARY: Holmes-Adie syndrome (HAS is a rare syndrome characterized by tonic pupil and the absence of deep tendon reflexes. HAS was first described in 1931 and is usually idiopathic, with incidences reported to be 4-7 per 100,000. Although tonic pupil is usually unilateral, it can also be bilateral. Enlarged and irregular pupil is usually noticed by the patient. Light reflex is weak or unresponsive. Another characteristic of HAS is the absence of deep tendon reflexes, and unilateral involvement is more common. This case report emphasizes that HAS should be considered in the differential diagnosis of patients presenting to the emergency department with anisocoria, and the dilute pilocarpine test can be used in diagnosis. Key words: Emergency department, Holmes-Adie syndrome, pilocarpine

  15. The Chemical Adventures of Sherlock Holmes: The Death Puzzle at 221B Baker Street

    Science.gov (United States)

    Rybolt, Thomas R.; Waddell, Thomas G.

    1999-04-01

    This story describes a chemical mystery with an emphasis on medicinal chemistry and qualitative analysis. It is the tenth article in a series presenting a scientific problem in mystery format in the context of the popular and beloved characters Sherlock Holmes and Dr. Watson. There is a break in the story where the reader (students and teachers) can ponder and solve the mystery. Sherlock Holmes then provides his solution.

  16. The Chemical Adventures of Sherlock Holmes: The Baker Street Burning.

    Science.gov (United States)

    Waddell, Thomas G.; Rybolt, Thomas R.

    1998-01-01

    Presents the ninth story in a series of chemical mysteries with emphasis on forensic chemistry, physical properties, and qualitative organic analysis. The mystery centers around the adventures of Sherlock Holmes. (DDR)

  17. The Allison V. Armour / William Henry Holmes 1895 Expedition to Mexico

    Directory of Open Access Journals (Sweden)

    Warren Haskin

    2001-11-01

    Full Text Available The foundation of the Field Museum's reputation as a place where serious science is practiced was laid by Allison V. Armour and William Henry Holmes in 1895, a little more than a year after the Museum was established. Looking back after a career of almost 60 years as an anthropologist, and having twice been honored as the outstanding practitioner in the field, Holmes described the trip to Mexico (the only expedition he led during his brief tenure as the Museum's first Curator of An­thropology as "one of the most gratifying and important events of my life." It was also one of the most important events in the history of anthropology at the Museum.

  18. New compacton solutions and solitary wave solutions of fully nonlinear generalized Camassa-Holm equations

    International Nuclear Information System (INIS)

    Tian Lixin; Yin Jiuli

    2004-01-01

    In this paper, we introduce the fully nonlinear generalized Camassa-Holm equation C(m,n,p) and by using four direct ansatzs, we obtain abundant solutions: compactons (solutions with the absence of infinite wings), solitary patterns solutions having infinite slopes or cups, solitary waves and singular periodic wave solutions and obtain kink compacton solutions and nonsymmetry compacton solutions. We also study other forms of fully nonlinear generalized Camassa-Holm equation, and their compacton solutions are governed by linear equations

  19. Coexistence of IEEE 802.11b/g WLANs and IEEE 802.15.4 WSNs : Modeling and Protocol Enhancements

    NARCIS (Netherlands)

    Yuan, W.

    2011-01-01

    As an emerging short-range wireless technology, IEEE 802.15.4/ZigBee Wireless Sensor Networks (WSNs) are increasingly used in the fields of home control, industrial control, consumer electronics, energy management, building automation, telecom services, personal healthcare, etc. IEEE

  20. Researching the roots of IEEE Region 8

    NARCIS (Netherlands)

    Bastiaans, M.J.

    2013-01-01

    This paper describes the preliminary steps towards the foundation and the early history of IRE Region 9 / IEEE Region 8. The information has been gathered mainly from the archives of the IEEE Benelux Section.

  1. The circumstances of the missing biographer or why Watson didn't narrate these four Sherlock Holmes stories.

    Science.gov (United States)

    Caplan, R M

    1982-06-01

    The author provides arguments to explain why four of Arthur Conan Doyle's sixty stories about Sherlock Holmes were not narrated by Dr. Watson. The arguments relate to logical demands of the plot in the cases of the two stories told by an unidentified narrator. The two told by Holmes seem to demand Watson's absence because the final elucidation requires skill in cutaneous diagnosis; the presence of a medical man would have, or should have, relieved the dramatic tension of the mystery too soon. The Sherlock Holmes stories can provide delightful diversion as well as serve constantly to enhance our appreciation for highly alert and careful physical examination.

  2. Analogue Electrical Circuit for Simulation of the Duffing-Holmes Equation

    DEFF Research Database (Denmark)

    Tamaseviciute, E.; Tamasevicius, A.; Mykolaitis, G.

    2008-01-01

    An extremely simple second order analogue electrical circuit for simulating the two-well Duffing-Holmes mathematical oscillator is described. Numerical results and analogue electrical simulations are illustrated with the snapshots of chaotic waveforms, phase portraits (Lissajous figures...

  3. Continuous properties of the data-to-solution map for a generalized μ-Camassa-Holm integrable equation

    Science.gov (United States)

    Yu, Shengqi

    2018-05-01

    This work studies a generalized μ-type integrable equation with both quadratic and cubic nonlinearities; the μ-Camassa-Holm and modified μ-Camassa-Holm equations are members of this family of equations. It has been shown that the Cauchy problem for this generalized μ-Camassa-Holm integrable equation is locally well-posed for initial data u0 ∈ Hs, s > 5/2. In this work, we further investigate the continuity properties to this equation. It is proved in this work that the data-to-solution map of the proposed equation is not uniformly continuous. It is also found that the solution map is Hölder continuous in the Hr-topology when 0 ≤ r < s with Hölder exponent α depending on both s and r.

  4. Sherlock Holmes: an expert's view of expertise.

    Science.gov (United States)

    André, Didierjean; Fernand, Gobet

    2008-02-01

    In recent years, there has been an intense research effort to understand the cognitive processes and structures underlying expert behaviour. Work in different fields, including scientific domains, sports, games and mnemonics, has shown that there are vast differences in perceptual abilities between experts and novices, and that these differences may underpin other cognitive differences in learning, memory and problem solving. In this article, we evaluate the progress made in the last years through the eyes of an outstanding, albeit fictional, expert: Sherlock Holmes. We first use the Sherlock Holmes character to illustrate expert processes as described by current research and theories. In particular, the role of perception, as well as the nature and influence of expert knowledge, are all present in the description of Conan Doyle's hero. In the second part of the article, we discuss a number of issues that current research on expertise has barely addressed. These gaps include, for example, several forms of reasoning, the influence of emotions on cognition, and the effect of age on experts' knowledge and cognitive processes. Thus, although nearly 120-year-old, Conan Doyle's books show remarkable illustrations of expert behaviour, including the coverage of themes that have mostly been overlooked by current research.

  5. Aerial Photography and Imagery, Ortho-Corrected - 2007 Digital Orthophotos - Holmes County

    Data.gov (United States)

    NSGIC Education | GIS Inventory — This dataset is a collection of GeoTIFF and MrSID format natural color orthophotos covering Washington, Holmes, and Bay County, Florida. An orthophoto is remotely...

  6. Aerial Photography and Imagery, Ortho-Corrected - 2012 Digital Orthophotos - Holmes County

    Data.gov (United States)

    NSGIC Education | GIS Inventory — This dataset is a collection of GeoTIFF and MrSID format natural color orthophotos covering Holmes and Washington County, Florida. An orthophoto is remotely sensed...

  7. Aerial Photography and Imagery, Ortho-Corrected - 2009 Digital Orthophotos - Holmes County

    Data.gov (United States)

    NSGIC Education | GIS Inventory — This dataset is a collection of GeoTIFF and MrSID format natural color orthophotos covering Washington and Holmes County, Florida. An orthophoto is remotely sensed...

  8. Extending Service Area of IEEE 802.11 Ad Hoc Networks

    Science.gov (United States)

    Choi, Woo-Yong

    2012-06-01

    According to the current IEEE 802.11 wireless LAN standards, IEEE 802.11 ad hoc networks have the limitation that all STAs (Stations) are in the one-hop transmission range of each other. In this paper, to alleviate the limitation of IEEE 802.11 ad hoc networks we propose the efficient method for selecting the most appropriate pseudo AP (Access Point) from among the set of ad hoc STAs and extending the service area of IEEE 802.11 ad hoc networks by the pseudo AP's relaying the internal traffic of IEEE 802.11 ad hoc networks. Numerical examples show that the proposed method significantly extends the service area of IEEE 802.11 ad hoc networks.

  9. IEEE C37.82-1987: IEEE standard for the qualification of switchgear assemblies for Class 1E applications in nuclear power generating stations

    International Nuclear Information System (INIS)

    Anon.

    1992-01-01

    This document describes the methods and requirements for qualifying switchgear assemblies for indoor areas outside of the containment in nuclear power generating stations. These assemblies include (1) metal-enclosed low-voltage power circuit breaker switchgear assemblies, as defined in ANSI/IEEE C37.20.1-1987, (2) metal-clad switchgear assemblies, as defined in ANSI/IEEE C37.20.2-1987, (3) metal-enclosed bus, as defined in ANSI/IEEE C37.23-1987, and (4) metal-enclosed interrupter switchgear assemblies, as defined in ANSI/IEEE C37.20.3-1987. The purpose of this document is to provide amplification of the general requirements of ANSI/IEEE Std 323-1983 as they apply to the specific features of Class 1E switchgear assemblies. Where differences exist between this document and ANSI/IEEE Std 323-1983, this document takes precedence insofar as switchgear assemblies are concerned

  10. Aerial Photography and Imagery, Ortho-Corrected - 2013 Digital Orthophotos - Holmes County

    Data.gov (United States)

    NSGIC Education | GIS Inventory — This dataset is a collection of GeoTIFF and MrSID format natural color orthophotos covering Holmes County, Florida. An orthophoto is remotely sensed image data in...

  11. Cardiovascular disease in the Adventures of Sherlock Holmes.

    Science.gov (United States)

    Ramanan, S V

    2001-03-12

    The Adventures of Sherlock Holmes by Sir Arthur Conan Doyle contains many incidents of medical interest. While disorders of the cardiovascular system do not play an important role in these tales, there are, nevertheless, some illnesses that invite speculation. Eleven such incidents are reviewed and discussed in light of the times in which they occurred and in light of current medical knowledge.

  12. Sherlock Holmes and tropical medicine: a centennial appraisal.

    Science.gov (United States)

    Sodeman, W A

    1994-01-01

    Sir Arthur Conan Doyle incorporated an unidentified tropical disease as a murder weapon in the Sherlock Holmes story, "The Dying Detective," written in 1913. Documentary and circumstantial evidence suggests that the disease mentioned was melioidosis. The description of the newly identified disease occurred shortly before Doyle's death. Doyle's other works at the time reflect a consistent interest in tropical disease.

  13. 'The greatest Brahmin among them': William Osler's (1849-1919) perspective on Oliver Wendell Holmes (1809-94).

    Science.gov (United States)

    Bryan, Charles S

    2010-02-01

    Although North American physicians commonly identify William Osler as their best example of excellence in both medicine and the humanities, Osler himself held Oliver Wendell Holmes as the best example of such an avatar. Holmes made substantial contributions to medicine, including a landmark essay on the 'Contagiousness of Puerperal Fever', and was for a while the best-selling American author on both sides of the Atlantic. Holmes' lesser reputation today when compared with Osler's is best explained by his having fewer devoted protégées, his confining his adult life to Boston and its environs, and his tendency to flit from one thing to another as opposed to consolidating his efforts in a single task as Osler did in writing his Principles and Practice of Medicine.

  14. Comet 17P/Holmes: Possibility of a CO driven explosion

    Science.gov (United States)

    Kossacki, Konrad J.; Szutowicz, Slawomira

    2011-04-01

    This work is a continuation of our previous paper about brightening of Comet 17P/Holmes (Kossacki, K.J., Szutowicz, S. [2010]. Icarus 207, 320-340). In that paper we presented results of simulations indicating that the nonuniform crystallization of amorphous water ice itself is probably not sufficient for an explosion. In the present work we investigate the possibility that the explosion is caused by a rapid sublimation of the CO ice leading to the rise of gas pressure above the tensile strength of the nucleus. We simulated evolution of a model nucleus in the orbit of Comet 17P/Holmes. The nucleus is composed of water ice, carbon monoxide ice and dust and has the shape of an elongated ellipsoid. The simulations include crystallization of amorphous ice in the nucleus, changes of the dust mantle thickness, and sublimation of the CO ice. In our model CO is mantling grains composed of dust and amorphous water ice. Orientation of the nuclear spin axis in space is the same as derived in Moreno et al. (Moreno, F., Ortiz, J.L., Santos-Sanz, P., Morales, N., Vidal-Nunez, M.J., Lara, L.M., Gutierrez, P.J. [2008]. Astrophys. J. 677, L63-L66) for Comet Holmes during recent brightening event. Hence, the angle between the orbital and the equatorial planes of the comet is I = 95°, and the cometocentric solar longitude at perihelion is Φ = 210°. The calculations are performed for the south pole being the sub-solar point close to time of the outburst. Our computations indicate, that the CO pressure within the comet nucleus can rise to high values. When the layer between the dust mantle and the crystallization front of the amorphous water ice is very fine grained, few microns in radius, the CO pressure within the nucleus can exceed 10 kPa. This value is the lowest estimate for the tensile strength of the nucleus of Comet Holmes (Reach, W.T., Vaubaillon, J., Lisse, C.M., Holloway, M., Rho, J. [2010]. Icarus 208, 276-292). Hence, when the gas pressure reaches this value the nucleus

  15. Spicing Up the N Gene: F. O. Holmes and Tobacco mosaic virus Resistance in Capsicum and Nicotiana Plants.

    Science.gov (United States)

    Scholthof, Karen-Beth G

    2017-02-01

    One of the seminal events in plant pathology was the discovery by Francis O. Holmes that necrotic local lesions induced on certain species of Nicotiana following rub-inoculation of Tobacco mosaic virus (TMV) was due to a specific interaction involving a dominant host gene (N). From this, Holmes had an idea that if the N gene from N. glutinosa was introgressed into susceptible tobacco, the greatly reduced titer of TMV would, by extension, prevent subsequent infection of tomato and pepper plants by field workers whose hands were contaminated with TMV from their use of chewing and smoking tobacco. The ultimate outcome has many surprising twists and turns, including Holmes' failure to obtain fertile crosses of N. glutinosa × N. tabacum after 3 years of intensive work. Progress was made with N. digluta, a rare amphidiploid that was readily crossed with N. tabacum. And, importantly, the first demonstration by Holmes of the utility of interspecies hybridization for virus resistance was made with Capsicum (pepper) species with the identification of the L gene in Tabasco pepper, that he introgressed into commercial bell pepper varieties. Holmes' findings are important as they predate Flor's gene-for-gene hypothesis, show the use of interspecies hybridization for control of plant pathogens, and the use of the local lesion as a bioassay to monitor resistance events in crop plants.

  16. Explicit solutions of the Camassa-Holm equation

    International Nuclear Information System (INIS)

    Parkes, E.J.; Vakhnenko, V.O.

    2005-01-01

    Explicit travelling-wave solutions of the Camassa-Holm equation are sought. The solutions are characterized by two parameters. For propagation in the positive x-direction, both periodic and solitary smooth-hump, peakon, cuspon and inverted-cuspon waves are found. For propagation in the negative x-direction, there are solutions which are just the mirror image in the x-axis of the aforementioned solutions. Some composite wave solutions of the Degasperis-Procesi equation are given in an appendix

  17. Sherlock Holmes Meets Othello: A MDS Analysis of Literary Characters.

    Science.gov (United States)

    Russell, G. W.; Lambert, W. B.

    1980-01-01

    Changes in college freshmen's perceptual organization of characters from "Othello" after three weeks of study and lecture were assessed using multidimensional scaling procedures. Sherlock Holmes experts also provided dissimilarity ratings of Conan Doyle's characters. Discussion centers on the extent to which the lectures on…

  18. Is a new version of philosophical pragmatism necessary? A reply to Barnes-Holmes

    Science.gov (United States)

    Leigland, Sam

    2003-01-01

    Barnes-Holmes (2000) discussed certain issues regarding philosophy, pragmatism, and behavior analysis, and offered a “behavioral pragmatism” based on or derived from behavior-analytic perspectives. In a comparison of certain philosophical views, Quine's concept of observation sentences was employed for representing pragmatism, but this concept is not sufficiently representative of the literature of philosophical pragmatism to warrant the broad conclusions drawn by Barnes-Holmes. Further, although the extensive and diverse literature of philosophical pragmatism has been shown by a number of writers to have various themes and perspectives in common with Skinner's radical behaviorism, it is unnecessary to extract a limited, generic version of pragmatism because (a) the latter cannot match the range and depth of the various extant versions and (b) the problems raised by Barnes-Holmes in justification for the new version yield readily to the current versions in philosophy. A set of philosophical views may provide additional verbal support for a given system of science, and the science of behavior analysis may eventually contribute to philosophical discourse. The latter, however, will not be achieved by proposing new versions of old philosophy, but rather by approaching established philosophical issues in new ways. PMID:22478409

  19. HOLMES. The electron capture decay of 163Ho to measure the electron neutrino mass with sub-eV sensitivity

    International Nuclear Information System (INIS)

    Alpert, B.; Balata, M.; Bennett, D.; Biasotti, M.; Boragno, C.; Brofferio, C.; Ceriale, V.; Corsini, D.; Day, P.K.; De Gerone, M.; Dressler, R.; Faverzani, M.; Ferri, E.; Fowler, J.; Gatti, F.; Giachero, A.; Hays-Wehle, J.; Heinitz, S.; Hilton, G.; Koester, U.; Lusignoli, M.; Maino, M.; Mates, J.; Nisi, S.; Nizzolo, R.; Nucciotti, A.; Pessina, G.; Pizzigoni, G.; Puiu, A.; Ragazzi, S.; Reintsema, C.; Gomes, M.R.; Schmidt, D.; Schumann, D.; Sisti, M.; Swetz, D.; Terranova, F.; Ullom, J.

    2015-01-01

    The European Research Council has recently funded HOLMES, a new experiment to directly measure the neutrino mass. HOLMES will perform a calorimetric measurement of the energy released in the decay of 163 Ho. The calorimetric measurement eliminates systematic uncertainties arising from the use of external beta sources, as in experiments with beta spectrometers. This measurement was proposed in 1982 by A. De Rujula and M. Lusignoli, but only recently the detector technological progress allowed to design a sensitive experiment. HOLMES will deploy a large array of low temperature microcalorimeters with implanted 163 Ho nuclei. The resulting mass sensitivity will be as low as 0.4 eV. HOLMES will be an important step forward in the direct neutrino mass measurement with a calorimetric approach as an alternative to spectrometry. It will also establish the potential of this approach to extend the sensitivity down to 0.1 eV. We outline here the project with its technical challenges and perspectives. (orig.)

  20. Playing "Sherlock Holmes": Enhancing Students' Understanding of Prejudice and Stereotyping.

    Science.gov (United States)

    Junn, Ellen N.; Grier, Leslie K.; Behrens, Debra P.

    2001-01-01

    Describes an experiential classroom exercise that was designed to help students understand stereotyping and prejudice. The instructor read behavioral and psychological descriptions, asked students to imagine they were Sherlock Holmes, and identify classmates to whom the descriptions might apply. States that students of color reported more benefits…

  1. Numerical study of traveling-wave solutions for the Camassa-Holm equation

    International Nuclear Information System (INIS)

    Kalisch, Henrik; Lenells, Jonatan

    2005-01-01

    We explore numerically different aspects of periodic traveling-wave solutions of the Camassa-Holm equation. In particular, the time evolution of some recently found new traveling-wave solutions and the interaction of peaked and cusped waves is studied

  2. Fiber optics backbone for IEEE 802.3 networks

    Science.gov (United States)

    Shani, Ron

    1990-01-01

    In the last few years the IEEE 802.3 committee has developed fiber optics inter-repeater link standard called FOIRL. This standard defines the "Fiber Optics Media Access Unit" (FOMAU) which is used to connect two IEEE 802.3 repeaters that are up to 1Km apart. The IEEE 802.3 lOBaseF task force is currently standardizing a full F/O system in two directions: passive and active. The active approach is a compromise between the FOIRL (Asynchronous) approach and the Synchronous approach. As a result of this activity the IEEE 802.3 standard will define three different F/O interfaces and several devices that will not inter-operate. Such a standard will lower the credibility among the IEEE 802.3 user community, as customers will be confused amidst the many chapters and devices with no clear choice. This paper describes a method that can reduce the number of standards to two (passive and active), while proposing a solution for all the requirements of 802.3 F/O LAN. (The question of passive vs active approach will be discussed in this paper).

  3. Sherlock (Holmes in Japanese (fan works [symposium

    Directory of Open Access Journals (Sweden)

    Lori Morimoto

    2017-03-01

    Full Text Available I explore the history of Japanese writing centered on Sherlock Holmes as a means of interrogating the 2014 BBC Sherlock pastiche John and Sherlock Casebook 1: Jon, zenchi renmei e iku (The stark naked league, written by Japanese Sherlockian Kitahara Naohiko for mainstream publication by the publishing house Hayakawa shobō. I argue that exploration of the Japanese (fan cultural contexts of Kitahara's book begins to reveal the limits of the Anglo-American-centered framework through which fan studies scholars explore fan/producer relationships.

  4. Les aventure de Sherlock Holmes: organisation et utilisationde l'espace

    Directory of Open Access Journals (Sweden)

    Loïc RAVENEL

    1992-09-01

    Full Text Available Les aventures de Sherlock Holmes ont pour cadre un espace idéalisé qui reflète les désirs et les espérances de la société victorienne. En fait, cette organisation de l’espace correspond aux besoins romanesques de l’auteur.

  5. HOLMES. The electron capture decay of {sup 163}Ho to measure the electron neutrino mass with sub-eV sensitivity

    Energy Technology Data Exchange (ETDEWEB)

    Alpert, B. [National Institute of Standards and Technology (NIST), Boulder, CO (United States); Balata, M. [INFN, Laboratori Nazionali del Gran Sasso (LNGS), Assergi, AQ (Italy); Bennett, D. [National Institute of Standards and Technology (NIST), Boulder, CO (United States); Biasotti, M. [Universita di Genova, Dipartimento di Fisica, Genoa (Italy); Sezione di Genova, Istituto Nazionale di Fisica Nucleare (INFN), Genoa (Italy); Boragno, C. [Universita di Genova, Dipartimento di Fisica, Genoa (Italy); Sezione di Genova, Istituto Nazionale di Fisica Nucleare (INFN), Genoa (Italy); Brofferio, C. [Universita di Milano-Bicocca, Dipartimento di Fisica, Milan (Italy); Sezione di Milano-Bicocca, Istituto Nazionale di Fisica Nucleare (INFN), Milan (Italy); Ceriale, V. [Universita di Genova, Dipartimento di Fisica, Genoa (Italy); Sezione di Genova, Istituto Nazionale di Fisica Nucleare (INFN), Genoa (Italy); Corsini, D. [Universita di Genova, Dipartimento di Fisica, Genoa (Italy); Sezione di Genova, Istituto Nazionale di Fisica Nucleare (INFN), Genoa (Italy); Day, P.K. [California Institute of Technology (CALTECH), Jet Propulsion Laboratory, Pasadena, CA (United States); De Gerone, M. [Universita di Genova, Dipartimento di Fisica, Genoa (Italy); Sezione di Genova, Istituto Nazionale di Fisica Nucleare (INFN), Genoa (Italy); Dressler, R. [Paul Scherrer Institut (PSI), Villigen (Switzerland); Faverzani, M. [Universita di Milano-Bicocca, Dipartimento di Fisica, Milan (Italy); Sezione di Milano-Bicocca, Istituto Nazionale di Fisica Nucleare (INFN), Milan (Italy); Ferri, E. [Universita di Milano-Bicocca, Dipartimento di Fisica, Milan (Italy); Sezione di Milano-Bicocca, Istituto Nazionale di Fisica Nucleare (INFN), Milan (Italy); Fowler, J. [National Institute of Standards and Technology (NIST), Boulder, CO (United States); Gatti, F. [Universita di Genova, Dipartimento di Fisica, Genoa (Italy); Sezione di Genova, Istituto Nazionale di Fisica Nucleare (INFN), Genoa (Italy); Giachero, A. [Universita di Milano-Bicocca, Dipartimento di Fisica, Milan (Italy); Sezione di Milano-Bicocca, Istituto Nazionale di Fisica Nucleare (INFN), Milan (Italy); Hays-Wehle, J. [National Institute of Standards and Technology (NIST), Boulder, CO (United States); Heinitz, S. [Paul Scherrer Institut (PSI), Villigen (CH); Hilton, G. [National Institute of Standards and Technology (NIST), Boulder, CO (US); Koester, U. [Institut Laue-Langevin (ILL), Grenoble (FR); Lusignoli, M. [Sezione di Roma 1, Istituto Nazionale di Fisica Nucleare (INFN), Rome (IT); Maino, M. [Universita di Milano-Bicocca, Dipartimento di Fisica, Milan (IT); Sezione di Milano-Bicocca, Istituto Nazionale di Fisica Nucleare (INFN), Milan (IT); Mates, J. [National Institute of Standards and Technology (NIST), Boulder, CO (US); Nisi, S. [INFN, Laboratori Nazionali del Gran Sasso (LNGS), Assergi, AQ (IT); Nizzolo, R. [Universita di Milano-Bicocca, Dipartimento di Fisica, Milan (IT); Sezione di Milano-Bicocca, Istituto Nazionale di Fisica Nucleare (INFN), Milan (IT); Nucciotti, A. [Universita di Milano-Bicocca, Dipartimento di Fisica, Milan (IT); Sezione di Milano-Bicocca, Istituto Nazionale di Fisica Nucleare (INFN), Milan (IT); Pessina, G. [Sezione di Milano-Bicocca, Istituto Nazionale di Fisica Nucleare (INFN), Milan (IT); Pizzigoni, G. [Universita di Genova, Dipartimento di Fisica, Genoa (IT); Sezione di Genova, Istituto Nazionale di Fisica Nucleare (INFN), Genoa (IT); Puiu, A. [Universita di Milano-Bicocca, Dipartimento di Fisica, Milan (IT); Sezione di Milano-Bicocca, Istituto Nazionale di Fisica Nucleare (INFN), Milan (IT); Ragazzi, S. [Universita di Milano-Bicocca, Dipartimento di Fisica, Milan (IT); Sezione di Milano-Bicocca, Istituto Nazionale di Fisica Nucleare (INFN), Milan (IT); Reintsema, C. [National Institute of Standards and Technology (NIST), Boulder, CO (US); Gomes, M.R. [University of Lisbon, Multidisciplinary Centre for Astrophysics (CENTRA-IST), Lisbon (PT); Schmidt, D. [National Institute of Standards and Technology (NIST), Boulder, CO (US); Schumann, D. [Paul Scherrer Institut (PSI), Villigen (CH); Sisti, M. [Universita di Milano-Bicocca, Dipartimento di Fisica, Milan (IT); Sezione di Milano-Bicocca, Istituto Nazionale di Fisica Nucleare (INFN), Milan (IT); Swetz, D. [National Institute of Standards and Technology (NIST), Boulder, CO (US); Terranova, F. [Universita di Milano-Bicocca, Dipartimento di Fisica, Milan (IT); Sezione di Milano-Bicocca, Istituto Nazionale di Fisica Nucleare (INFN), Milan (IT); Ullom, J. [National Institute of Standards and Technology (NIST), Boulder, CO (US)

    2015-03-01

    The European Research Council has recently funded HOLMES, a new experiment to directly measure the neutrino mass. HOLMES will perform a calorimetric measurement of the energy released in the decay of {sup 163}Ho. The calorimetric measurement eliminates systematic uncertainties arising from the use of external beta sources, as in experiments with beta spectrometers. This measurement was proposed in 1982 by A. De Rujula and M. Lusignoli, but only recently the detector technological progress allowed to design a sensitive experiment. HOLMES will deploy a large array of low temperature microcalorimeters with implanted {sup 163}Ho nuclei. The resulting mass sensitivity will be as low as 0.4 eV. HOLMES will be an important step forward in the direct neutrino mass measurement with a calorimetric approach as an alternative to spectrometry. It will also establish the potential of this approach to extend the sensitivity down to 0.1 eV. We outline here the project with its technical challenges and perspectives. (orig.)

  6. The scalable coherent interface, IEEE P1596

    International Nuclear Information System (INIS)

    Gustavson, D.B.

    1990-01-01

    IEEE P1596, the scalable coherent interface (formerly known as SuperBus) is based on experience gained while developing Fastbus (ANSI/IEEE 960--1986, IEC 935), Futurebus (IEEE P896.x) and other modern 32-bit buses. SCI goals include a minimum bandwidth of 1 GByte/sec per processor in multiprocessor systems with thousands of processors; efficient support of a coherent distributed-cache image of distributed shared memory; support for repeaters which interface to existing or future buses; and support for inexpensive small rings as well as for general switched interconnections like Banyan, Omega, or crossbar networks. This paper presents a summary of current directions, reports the status of the work in progress, and suggests some applications in data acquisition and physics

  7. Albedo distribution in Lutzow-Holm Bay and its neighborhood

    Directory of Open Access Journals (Sweden)

    Kiyotaka Nakagawa

    1997-03-01

    Full Text Available A method has been developed for estimating the filtered narrow band surface albedo with NOAA/AVHRR data, and has been applied to analysis of the surface albedo distribution in Lutzow-Holm Bay and its neighborhood, Antarctica, in 1990. As a result, 16 maps of the surface albedo distribution have been drawn. From a comparison of the albedos inferred from satellite data with those actually observed in Ongul Strait, it is clear that the satellite-inferred, filtered narrow band albedos agree well with the daily means of ground-observed, unfiltered broad band albedo, despite systematic errors of about -4%. It is also clear that there is a characteristic pattern of surface albedo distribution in this area; the open sea has very low albedo of less than 5%, whereas most of the compact pack ice and fast ice has a high albedo of more than 60%. The albedo is lower in the eastern part of Lutzow-Holm Bay than in the western part; especially off the Soya Coast it is less than 40%. The ice sheet of Antarctica has a remarkably high albedo of more than 80%.

  8. A Critical Analysis of The Holmes Group's Proposals for Reforming Teacher Education.

    Science.gov (United States)

    Hawley, Willis D.

    1986-01-01

    The Holmes Group proposals for reforming teacher education are evaluated by looking at the effects on teacher knowledge and competence, attraction and retention of talented teachers, organization of schools and the teaching profession, and cost effectiveness. (MT)

  9. Proceedings of IEEE Machine Learning for Signal Processing Workshop XV

    DEFF Research Database (Denmark)

    Larsen, Jan

    These proceedings contains refereed papers presented at the Fifteenth IEEE Workshop on Machine Learning for Signal Processing (MLSP’2005), held in Mystic, Connecticut, USA, September 28-30, 2005. This is a continuation of the IEEE Workshops on Neural Networks for Signal Processing (NNSP) organized...... by the NNSP Technical Committee of the IEEE Signal Processing Society. The name of the Technical Committee, hence of the Workshop, was changed to Machine Learning for Signal Processing in September 2003 to better reflect the areas represented by the Technical Committee. The conference is organized...... by the Machine Learning for Signal Processing Technical Committee with sponsorship of the IEEE Signal Processing Society. Following the practice started two years ago, the bound volume of the proceedings is going to be published by IEEE following the Workshop, and we are pleased to offer to conference attendees...

  10. Qualification test of Class 1E equipment based on IEEE323 Std 2003

    International Nuclear Information System (INIS)

    Kim, J. S.; Jung, S. C.; Kim, T. R.

    2004-01-01

    IEEE Standard for Qualifying Class 1E Equipment has been updated to 2003 edition since the issue of IEEE Std 323-1971, 1974, 1983. NRC approved the IEEE Std 323-1974 as Qualification standard of Class 1E Equipment in domestic nuclear power plant. IEEE Std 323-2003 was issued in September of 2003 and utility is waiting the approval of NRC. IEEE Std 323-2003 suggest a new qualification technique which adopts the condition monitoring. Performance of two transient during DBA test is no longer recommended in IEEE Std 323-2003. IEEE323 Std 2003 included a chapter of ''extension of Qualified life'' to make available the life extension of components during plant life extension. For the efficient control of preserving EQ in domestic nuclear power plant, IEEE323 Std 2003 is strongly recommended

  11. HOLMES: The electron capture decay of [Formula: see text]Ho to measure the electron neutrino mass with sub-eV sensitivity.

    Science.gov (United States)

    Alpert, B; Balata, M; Bennett, D; Biasotti, M; Boragno, C; Brofferio, C; Ceriale, V; Corsini, D; Day, P K; De Gerone, M; Dressler, R; Faverzani, M; Ferri, E; Fowler, J; Gatti, F; Giachero, A; Hays-Wehle, J; Heinitz, S; Hilton, G; Köster, U; Lusignoli, M; Maino, M; Mates, J; Nisi, S; Nizzolo, R; Nucciotti, A; Pessina, G; Pizzigoni, G; Puiu, A; Ragazzi, S; Reintsema, C; Gomes, M Ribeiro; Schmidt, D; Schumann, D; Sisti, M; Swetz, D; Terranova, F; Ullom, J

    The European Research Council has recently funded HOLMES, a new experiment to directly measure the neutrino mass. HOLMES will perform a calorimetric measurement of the energy released in the decay of [Formula: see text]Ho. The calorimetric measurement eliminates systematic uncertainties arising from the use of external beta sources, as in experiments with beta spectrometers. This measurement was proposed in 1982 by A. De Rujula and M. Lusignoli, but only recently the detector technological progress allowed to design a sensitive experiment. HOLMES will deploy a large array of low temperature microcalorimeters with implanted [Formula: see text]Ho nuclei. The resulting mass sensitivity will be as low as 0.4 eV. HOLMES will be an important step forward in the direct neutrino mass measurement with a calorimetric approach as an alternative to spectrometry. It will also establish the potential of this approach to extend the sensitivity down to 0.1 eV. We outline here the project with its technical challenges and perspectives.

  12. Podcasting in an Eighth-Grade American History Class

    Science.gov (United States)

    Davis, Patrick D.

    2011-01-01

    The purpose of this study was to see how students used podcasts in an eighth-grade American history unit and the value they placed on them as an educational tool. The 6-week study was conducted in a suburban middle school in a district that is part of a large metropolitan area in Texas. Participants included 29 students and 2 eighth-grade…

  13. IEEE Prize for Lucio Rossi

    CERN Multimedia

    IEEE Council on Superconductivity

    2007-01-01

    Lucio Rossi receives his prize from John Spargo, Chairman of the IEEE Council on Superconductivity (left), and Martin Nisenoff, Chairman of the Council on Superconductivity's Awards Committee (right).

  14. Review of Janet Holmes and Maria Stubbe: Power and Politeness in the Workplace: A Sociolinguistic Analysis of Talk at Work

    DEFF Research Database (Denmark)

    Lønsmann, Dorte

    2015-01-01

    Review of: Janet Holmes and Maria Stubbe: Power and Politeness in the Workplace. A Sociolinguistic Analysis of Talk at Work. Second edition. London: Routledge, 2015, xv + 200 pp.......Review of: Janet Holmes and Maria Stubbe: Power and Politeness in the Workplace. A Sociolinguistic Analysis of Talk at Work. Second edition. London: Routledge, 2015, xv + 200 pp....

  15. IEEE 802.11ah: A Technology to Face the IoT Challenge.

    Science.gov (United States)

    Baños-Gonzalez, Victor; Afaqui, M Shahwaiz; Lopez-Aguilera, Elena; Garcia-Villegas, Eduard

    2016-11-22

    Since the conception of the Internet of things (IoT), a large number of promising applications and technologies have been developed, which will change different aspects in our daily life. This paper explores the key characteristics of the forthcoming IEEE 802.11ah specification. This future IEEE 802.11 standard aims to amend the IEEE 802.11 legacy specification to support IoT requirements. We present a thorough evaluation of the foregoing amendment in comparison to the most notable IEEE 802.11 standards. In addition, we expose the capabilities of future IEEE 802.11ah in supporting different IoT applications. Also, we provide a brief overview of the technology contenders that are competing to cover the IoT communications framework. Numerical results are presented showing how the future IEEE 802.11ah specification offers the features required by IoT communications, thus putting forward IEEE 802.11ah as a technology to cater the needs of the Internet of Things paradigm.

  16. Proceedings IEEE Visualization Conference and IEEE Information Visualization Conference (VIS'07 and INFOVIS'07, Sacramento CA, USA, October 28-November 1, 2007)

    NARCIS (Netherlands)

    Chen, M.; Hansen, C.; North, C.; Pang, A.; Wijk, van J.J.

    2007-01-01

    These are the proceedings of the IEEE Visualization Conference 2007 (Vis 2007) and the IEEE Information Visualization Conference 2007 (InfoVis 2007) held during October 28 to November 1, 2007 in Sacramento, California. The power of using computing technology to create useful, effective imagery for

  17. Performance Analysis of IEEE 802.11e (EDCF) and IEEE 802.11(DCF) WLAN Incorporating Different Physical Layer Standards

    Science.gov (United States)

    Sharma, V.; Singh, H.; Malhotra, J.

    2012-12-01

    Medium access coordination function basically implements the distributed coordination function (DCF) which provides support to best effort services but limited to QoS services. Subsequently, a new standard, namely enhanced distributed channel access (EDCA) is reported. The IEEE 802.11e (EDCA) defines MAC procedures to support QoS requirements which specifies distributed contention based access scheme to access the shared wireless media. This paper evaluates the performance of EDCA based IEEE 802.11 WLAN for various access categories (ACs) using OPNET™ Modeller 14.5. Further, the computed results are compared with DCF protocols in terms of QoS parameters. Furthermore, the simulative observation is reported at data rate of 54 Mbps using different physical layer protocols such as IEEE 802.11a/b/g to stumble on the best one to be implemented with EDCF to achieve improved QoS.

  18. Prescott’s Microbiology, Eighth Edition

    OpenAIRE

    Dobbins, Joanne J.

    2010-01-01

    Review of: Prescott’s Microbiology, Eighth Edition. Joanne M. Willey, Linda M. Sherwood, and Christopher J. Woolverton. 2011. McGraw-Hill Higher Education, NewYork, NY. 1070 pages. ISBN- 978-0-07-337526-7.

  19. Stability of negative solitary waves for an integrable modified Camassa-Holm equation

    International Nuclear Information System (INIS)

    Yin Jiuli; Tian Lixin; Fan Xinghua

    2010-01-01

    In this paper, we prove that the modified Camassa-Holm equation is Painleve integrable. We also study the orbital stability problem of negative solitary waves for this integrable equation. It is shown that the negative solitary waves are stable for arbitrary wave speed of propagation.

  20. A study in white: medicine and crime according to Sherlock Holmes

    Directory of Open Access Journals (Sweden)

    Michele Lopez

    2012-01-01

    Full Text Available Sherlock Holmes is described by his biographer as being in possession of an “immense knowledge” of criminal history. He substantiates this claim by frequent casual references to particular criminal cases. Dr. William Palmer and Dr. Edward Pritchard, two infamous examples of “killer doctors”, are cited by the detective as typical specimens of what heights – or depths – a murderer can reach when he has the “nerve and knowledge” granted by a scientific medical training. We shall give a brief biographical sketch of these two illustrious gentlemen and we will show that Holmes’ fears are not without fundament – indeed, the medical profession has given more than its fair share of murderers. The scientific method of diagnostic medicine, which can be so useful in criminal detection, has proven to be very useful also to many a ruthless and cunning assassin. Holmes, who was ahead of his time in combining medical semeiotics and detective work, was also prophetic in pointing out how terrible a threat to society a criminal doctor can be.

  1. Research on same-gender grouping in eighth-grade science classrooms

    Science.gov (United States)

    Friend, Jennifer Ingrid

    This study examined two hypotheses related to same-gender grouping of eighth-grade science classes in a public middle-school setting in suburban Kansas City. The first hypothesis, male and female students enrolled in same-gender eighth-grade science classes demonstrate more positive science academic achievement than their male and female peers enrolled in mixed-gender science classes. The second hypothesis, same-gender grouping of students in eighth-grade science has a positive effect on classroom climate. The participants in this study were randomly assigned to class sections of eighth-grade science. The first experimental group was an eighth-grade science class of all-male students (n = 20) taught by a male science teacher. The control group used for comparison to the male same-gender class consisted of the male students (n = 42) in the coeducational eighth-grade science classes taught by the same male teacher. The second experimental group was an eighth-grade science class of all-female students (n = 23) taught by a female science teacher. The control group for the female same-gender class consisted of female students (n = 61) in the coeducational eighth-grade science classes taught by the same female teacher. The male teacher and the female teacher did not vary instruction for the same-gender and mixed-gender classes. Science academic achievement was measured for both groups through a quantitative analysis using grades on science classroom assessment and overall science course grades. Classroom climate was measured through qualitative observations and through qualitative and quantitative analysis of a twenty-question student survey administered at the end of each trimester grading period. The results of this study did not indicate support for either hypothesis. Data led to the conclusions that same-gender grouping did not produce significant differences in student science academic achievement, and that same-gender classes did not create a more positive

  2. Return of IEEE Std 627 and its Value to Equipment Qualification Programs

    International Nuclear Information System (INIS)

    Horvath, D.A.

    2012-01-01

    IEEE Std 627 ''Design Qualification of Safety Systems Equipment Used in Nuclear Power Generating Stations'' was issued to more generically establish qualification requirements in the form of a high level umbrella document. Efforts on this standard began in late 1975 at the request of the IEEE Nuclear Standards Management Board. In 1977 a joint ASME/IEEE agreement established responsibility for qualification and quality assurance standards preparation. ASME accepted responsibility for Quality Assurance and IEEE for qualification. In accordance with that agreement, IEEE completed the generic qualification standard in 1980. This document provided high level approaches, criteria, guidance, and principles for qualification of both electrical and mechanical equipment that at that time appeared in no other industry standard. IEEE Std 627-1980 was later reaffirmed in 1996. In 1986, ASME's Board on Nuclear Codes and Standards directed its Committee on Qualification of Mechanical Equipment (QME) to develop a standard for qualifying mechanical equipment. This task was completed in several parts during the time frame from 1992 to 1994. Partly in response to this activity, IEEE Std 627 was withdrawn in 2002. Later although withdrawn, it was found that IEEE Std 627 was continuing to be used and referenced by many entities both in the US and other countries including in ASME's QME-1-2002 ''Qualification of Active Mechanical Equipment Used in Nuclear Power Plants'', US NRC's NUREG-0800 Standard Review Plan Section 3.11, at least one reactor vendor's Design Certification Document (DCD), several international licensing documents, and elsewhere. As a result, in 2007, the IEEE Standards Board authorized Working Group 2.10 of Subcommittee 2 (Qualification) of the Power and Energy Society's Nuclear Power Engineering Committee to resurrect and update IEEE Std 627-1980 (Reaff 1996). The result was the culmination IEEE Std 627 in 2010. This paper will report on the eight improvements made

  3. CERN receives prestigious Milestone recognition from IEEE

    CERN Multimedia

    2005-01-01

    The Nobel prize winner Georges Charpak and W. Cleon Anderson, IEEE President, unveil the Milestone bronze plaques. At a ceremony on 26 September at the Globe of Science and Innovation, Mr W. Cleon Anderson, President of the Institute of Electrical and Electronics Engineers (IEEE) formally dedicated Milestone plaques recognising the invention of electronic particle detectors at CERN. The plaque were unveiled by Mr Anderson and Georges Charpak, the Nobel-prize winning inventor of wire chamber technology at CERN in 1968. The IEEE is the world's largest professional association dedicated to the advancement of technology with 365,000 individual members in over 150 countries. Established in 1983, there are currently over 60 Milestones around the world. They honour momentous achievements in the history of electrical and electronics engineering, such as the landing of the first transatlantic cable, code breaking at Bletchley Park during World War II, and the development of the Japanese Bullet train, the Tokaido Shin...

  4. Deltons, peakons and other traveling-wave solutions of a Camassa-Holm hierarchy

    International Nuclear Information System (INIS)

    Peng Xiaochun; Dai Huihui

    2009-01-01

    In this letter, we study an integrable Camassa-Holm hierarchy whose high-frequency limit is the Camassa-Holm equation. Phase plane analysis is employed to investigate bounded traveling wave solutions. An important feature is that there exists a singular line on the phase plane. By considering the properties of the equilibrium points and the relative position of the singular line, we find that there are in total three types of phase planes. Those paths in phase planes which represented bounded solutions are discussed one-by-one. Besides solitary, peaked and periodic waves, the equations are shown to admit a new type of traveling waves, which concentrate all their energy in one point, and we name them deltons as they can be expressed as some constant multiplied by a delta function. There also exists a type of traveling waves we name periodic deltons, which concentrate their energy in periodic points. The explicit expressions for them and all the other traveling waves are given.

  5. Peakons, solitary patterns and periodic solutions for generalized Camassa-Holm equations

    International Nuclear Information System (INIS)

    Zheng Yin; Lai Shaoyong

    2008-01-01

    This Letter deals with a generalized Camassa-Holm equation and a nonlinear dispersive equation by making use of a mathematical technique based on using integral factors for solving differential equations. The peakons, solitary patterns and periodic solutions are expressed analytically under various circumstances. The conditions that cause the qualitative change in the physical structures of the solutions are highlighted

  6. Blow-up, Global Existence and Persistence Properties for the Coupled Camassa–Holm equations

    International Nuclear Information System (INIS)

    Zhu Mingxuan

    2011-01-01

    In this paper, we consider the coupled Camassa–Holm equations. First, we present some new criteria on blow-up. Then global existence and blow-up rate of the solution are also established. Finally, we discuss persistence properties of this system.

  7. IEEE Std 535-1986: IEEE standard for qualification of Class 1E lead storage batteries for nuclear power generating stations

    International Nuclear Information System (INIS)

    Anon.

    1992-01-01

    This document describes qualification methods for Class 1E lead storage batteries and racks to be used in nuclear power generating stations outside of primary containment. Qualification required in ANSI/IEEE Std 308-1980 can be demonstrated by using the procedures provided in this standard in accordance with ANSI/IEEE Std 323-1983. Battery sizing, maintenance, capacity testing, installation, charging equipment, and consideration of other type batteries are beyond the scope of this standard

  8. The Mathematics Literacy Level of Eighth Grade Students

    OpenAIRE

    Esra UYSAL; Kürşat YENİLMEZ

    2011-01-01

    The purpose of this study is to determine the eighth grade student’s Mathematics Literacy level based on the PISA 2003 Mathematics exam questions and evaluations. Also relationships between distribution of Mathematics Literacy levels and some variables as students’ gender, pre-school education, family’s income and parent’s education level are investigated. Survey method was used in this study. The work group of the study consists of 1047 eighth grade students chosen randomly from 12 primary s...

  9. IEEE Std 535-1979: IEEE standard for qualification of Class 1E lead storage batteries for nuclear power generating stations

    International Nuclear Information System (INIS)

    Anon.

    1992-01-01

    This document describes qualification methods for Class 1E lead storage batteries and racks to be used in nuclear power generating stations outside of primary containment. Qualification required in ANSI/IEEE Std 279-1971 and IEE Std 308-1978, can be demonstrated by using the procedures provided in this standard in accordance with IEEE Std 323-1974. Battery sizing, maintenance, capacity testing, installation, charging equipment and consideration of other type batteries are beyond the scope of this standard

  10. Algebra for All: California's Eighth-Grade Algebra Initiative as Constrained Curricula.

    Science.gov (United States)

    Domina, Thurston; Penner, Andrew M; Penner, Emily K; Conley, Annemarie

    2014-08-01

    Across the United States, secondary school curricula are intensifying as a growing proportion of students enroll in high-level academic math courses. In many districts, this intensification process occurs as early as eighth grade, where schools are effectively constraining their mathematics curricula by restricting course offerings and placing more students into Algebra I. This paper provides a quantitative single-case research study of policy-driven curricular intensification in one California school district. (1a) What effect did 8th eighth grade curricular intensification have on mathematics course enrollment patterns in Towering Pines Unified schools? (2b) How did the distribution of prior achievement in Towering Pines math classrooms change as the district constrained the curriculum by universalizing 8th eighth grade Algebra? (3c) Did 8th eighth grade curricular intensification improve students' mathematics achievement? Towering Pines is an immigrant enclave in the inner-ring suburbs of a major metropolitan area. The district's 10 middle schools together enroll approximately 4,000 eighth graders each year. The districts' students are ethnically diverse and largely economically disadvantaged. The study draws upon administrative data describing 8th eighth graders in the district in the 2004-20-05 through 2007-20-08 school years. During the study period, Towering Pines dramatically intensified middle school students' math curricula: In the 2004-20-05 school year 32% of the district's 8th eighth graders enrolled in Algebra or a higher- level mathematics course; by the 2007-20-08 school year that proportion had increased to 84%. We use an interrupted time-series design, comparing students' 8th eighth grade math course enrollments, 10th grade math course enrollments, and 10th grade math test scores across the four cohorts, controlling for demographics and prior achievement. We find that students' odds of taking higher level mathematics courses increased as this

  11. Sherlock Holmes - esteedist härrasmees või kokaiinisõltlasest rusikakangelane? / Martin Saar

    Index Scriptorium Estoniae

    Saar, Martin

    2010-01-01

    Autor poleemiseerib Margit Adorfi kriitilise artikli "Härrast rusikakangelaseks" (Eesti Ekspress: TV Ekspress, 2010, 15.-21. jaan., lk. 3 ) teemadel. Võrdluses on Arthur Conan Doyle' poolt loodud tegelaskuju ja tema tõepärane kujutamine Guy Ritchie filmis "Sherlock Holmes" (Inglise-Austraalia-USA 2009)

  12. Detective Stories from Sherlock Holmes to Whitechapel

    Directory of Open Access Journals (Sweden)

    Feryal Çubukcu

    2015-12-01

    Full Text Available Detective Stories from Sherlock Holmes to Whitechapel Abstract The Victorian period in England was one of the most influential and important epochs in history. During Queen Victoria’s reign, England was arguably the most powerful nation in the world, setting standards for social, economic and industrial development. Among the rules of Victorian society were stringent codes pertaining to what was acceptable for men and women. Men were expected to hold decent jobs, marry respectable women, and create the next generation of proper British citizens. Women were raised to marry, breed virtuous English children, and live quietly in the confines of the household. As Elaine Showalter (1987 says Victorian households had different spheres for men and women. There were certain behavioral norms for men and women that were standard practice for asserting one’s proper gender codes. In his 1995 book Victorian Masculinities, Herbert Sussman identifies, within Victorian men’s writing, a method of constructing masculinity that opposes the dominant English model of manliness based on bourgeois domestic matrimony. During the first half of the Victorian period, normative masculinity required a man to master his psychic energy by establishing a bourgeois domestic identity founded on matrimony. However, this concept translates into the bachelordom plot, wherein male desire finds an appropriate outlet in a sidekick rather than a wife, thus, under the terms of popular middle-class belief, permanently affirming masculinity. When we come to 2010s a bestseller Whitechapel hinges on the same lone detective trying to pursue the killers and criminals. The purpose of this paper is to probe and grapple with the similarities and dissimilarities the detective genre from Sherlock Holmes to Whitechapel by focusing on the detective himself, the crime types, criminals- their motives and ethnic origins-, masculinity, and male-male bonding.

  13. IEEE Prize for Lucio Rossi

    CERN Multimedia

    2007-01-01

    Lucio Rossi receives his prize from John Spargo, Chairman of the IEEE Council on Superconductivity (left), and Martin Nisenoff, Chairman of the Council on Superconductivity’s Awards Committee (right). (Photo: IEEE Council on Superconductivity)With the magnets installed in the tunnel and work on the interconnections almost completed, Lucio Rossi has reaped the rewards of fifteen years of work. And yet, when the physicist from Milan arrived to take charge of the group responsible for the superconducting magnets in 2001, success seemed far from assured. Endowed with surprising levels of energy, Lucio Rossi, together with his team, ensured that production of these highly complex magnets got underway. Today, that achievement earns them the recognition not only of CERN but also of the international superconducting community. It is for this achievement that Lucio Rossi was awarded the prize by the IEEE’s (Institute of Electrical an...

  14. Authorship and authenticity in Sherlock Holmes pastiches

    Directory of Open Access Journals (Sweden)

    Sanna Nyqvist

    2017-03-01

    Full Text Available Rewritings and adaptations of the Sherlock Holmes stories are traditionally called pastiches among fandom. This article juxtaposes that established use with the literary critical notion of pastiche as imitation of style, and shows how stylistic affinity to the originals produces complex effects in the imitations. The article identifies two main strands in the pastiches: one that aims to correct the mistakes and fill in the gaps in the original stories, and one that supplements the canon with stories Watson left untold. Balancing among homage, criticism, and usurpation, the pastiches comment on the original story world and its cultural context, and engage in fictions of authorship to account for the apparent inauthenticity of the retellings.

  15. Fabrication of FORTIS

    Science.gov (United States)

    McCandliss, Stephan R.; Fleming, Brian; Kaiser, Mary Elizabeth; Kruk, Jeffrey; Feldman, Paul D.; Kutyrev, Alexander S.; Li, Mary J.; Goodwin, Phillip A.; Rapchun, David; Lyness, Eric; Brown, Ari D.; Moseley, Harvey; Siegmund, Oswald; Vallerga, John

    2010-07-01

    The Johns Hopkins University sounding rocket group is building the Far-ultraviolet Off Rowland-circle Telescope for Imaging and Spectroscopy (FORTIS), which is a Gregorian telescope with rulings on the secondary mirror. FORTIS will be launched on a sounding rocket from White Sand Missile Range to study the relationship between Lyman alpha escape and the local gas-to-dust ratio in star forming galaxies with non-zero redshifts. It is designed to acquire images of a 30' x 30' field and provide fully redundant "on-the-fly" spectral acquisition of 43 separate targets in the field with a bandpass of 900 - 1800 Angstroms. FORTIS is an enabling scientific and technical activity for future cutting edge far- and near-uv survey missions seeking to: search for Lyman continuum radiation leaking from star forming galaxies, determine the epoch of He II reionization and characterize baryon acoustic oscillations using the Lyman forest. In addition to the high efficiency "two bounce" dual-order spectro-telescope design, FORTIS incorporates a number of innovative technologies including: an image dissecting microshutter array developed by GSFC; a large area (~ 45 mm x 170 mm) microchannel plate detector with central imaging and "outrigger" spectral channels provided by Sensor Sciences; and an autonomous targeting microprocessor incorporating commercially available field programable gate arrays. We discuss progress to date in developing our pathfinder instrument.

  16. IEEE Conference Publications in Libraries.

    Science.gov (United States)

    Johnson, Karl E.

    1984-01-01

    Conclusions of surveys (63 libraries, OCLC database, University of Rhode Island users) assessing handling of Institute of Electrical and Electronics Engineers (IEEE) conference publications indicate that most libraries fully catalog these publications using LC cataloging, and library patrons frequently require series access to publications. Eight…

  17. IEEE International Workshop on Machine Learning for Signal Processing: Preface

    DEFF Research Database (Denmark)

    Tao, Jianhua

    The 21st IEEE International Workshop on Machine Learning for Signal Processing will be held in Beijing, China, on September 18–21, 2011. The workshop series is the major annual technical event of the IEEE Signal Processing Society's Technical Committee on Machine Learning for Signal Processing...

  18. IEEE guide for the analysis of human reliability

    International Nuclear Information System (INIS)

    Dougherty, E.M. Jr.

    1987-01-01

    The Institute of Electrical and Electronics Engineers (IEEE) working group 7.4 of the Human Factors and Control Facilities Subcommittee of the Nuclear Power Engineering Committee (NPEC) has released its fifth draft of a Guide for General Principles of Human Action Reliability Analysis for Nuclear Power Generating Stations, for approval of NPEC. A guide is the least mandating in the IEEE hierarchy of standards. The purpose is to enhance the performance of an human reliability analysis (HRA) as a part of a probabilistic risk assessment (PRA), to assure reproducible results, and to standardize documentation. The guide does not recommend or even discuss specific techniques, which are too rapidly evolving today. Considerable maturation in the analysis of human reliability in a PRA context has taken place in recent years. The IEEE guide on this subject is an initial step toward bringing HRA out of the research and development arena into the toolbox of standard engineering practices

  19. Implicit Block ACK Scheme for IEEE 802.11 WLANs

    Science.gov (United States)

    Sthapit, Pranesh; Pyun, Jae-Young

    2016-01-01

    The throughput of IEEE 802.11 standard is significantly bounded by the associated Medium Access Control (MAC) overhead. Because of the overhead, an upper limit exists for throughput, which is bounded, including situations where data rates are extremely high. Therefore, an overhead reduction is necessary to achieve higher throughput. The IEEE 802.11e amendment introduced the block ACK mechanism, to reduce the number of control messages in MAC. Although the block ACK scheme greatly reduces overhead, further improvements are possible. In this letter, we propose an implicit block ACK method that further reduces the overhead associated with IEEE 802.11e’s block ACK scheme. The mathematical analysis results are presented for both the original protocol and the proposed scheme. A performance improvement of greater than 10% was achieved with the proposed implementation.

  20. IEEE Std 650-1990: IEEE standard for qualification of Class 1E static battery chargers and inverters for nuclear power generating stations

    International Nuclear Information System (INIS)

    Anon.

    1992-01-01

    Methods for qualifying static battery chargers and inverters for Class 1E installations in a mild environment outside containment in nuclear power generating stations are described. The qualification methods set forth employ a combination of type testing and analysis, the latter including a justification of methods, theories, and assumptions used. These procedures meet the requirements of IEEE Std 323-1983, IEEE Standard for Qualifying Class 1E Equipment for Nuclear Power Generating Stations

  1. IEEE prize awarded to CERN PhD student

    CERN Multimedia

    2006-01-01

    Rafael Ballabriga Suñe is the recipient of the 2006 Institute of Electrical and Electronics Engineers, Inc. (IEEE) Nuclear and Plasma Sciences Society (NPSS)'s Student Paper Award. Ballabriga's winning paper reported on a prototype chip, which belongs to a new generation of single photon counting hybrid pixel detector readout chips - Medipix3. The award was presented by the deputy programme chair Vince Cianciolo (left) at the IEEE Nuclear Science Symposium held in San Diego on 29 October to 4 November.

  2. Degeneration of paramedian nuclei in the thalamus induces Holmes tremor in a case of artery of Percheron infarction.

    Science.gov (United States)

    Wei, Tz-Shiang; Hsu, Chun-Sheng; Lee, Yu-Chun; Chang, Shin-Tsu

    2017-11-01

    Holmes' tremor is an uncommon neurologic disorder following brain insults, and its pathogenesis is undefined. The interruption of the dento-rubro-thalamic tract and secondary deterioration of the nigrostriatal pathway are both required to initiate Holmes' tremor. We used nuclear medicine imaging tools to analyze a patient with concurrent infarction in different zones of each side of the thalamus. Finding whether the paramedian nuclear groups of the thalamus were injured was a decisive element for developing Holmes' tremor. A 36-year-old woman was admitted to our department due to a bilateral paramedian thalamic infarction. Seven months after the stroke, a unilaterally involuntary trembling with irregularly wavering motions occurring in both her left hand and forearm. Based on the distinct features of the unilateral coarse tremor and the locations of the lesions on the magnetic resonance imaging (MRI), the patient was diagnosed with bilateral paramedian thalamic infarction complicated with a unilateral Holmes' tremor. The patient refused our recommendation of pharmacological treatment with levodopa and other dopamine agonists based on personal reasons and was only willing to accept physical and occupational training programs at our outpatient clinic. We utilized serial anatomic and functional neuroimaging of the brain to survey the neurologic deficit. A brain magnetic resonance imaging showed unequal recovery on each side of the thalamus. The residual lesion appeared larger in the right-side thalamus and had gathered in the paramedian area. A brain perfusion single-photon emission computed tomography (SPECT) revealed that the post-stroke hypometabolic changes were not only in the right-side thalamus but also in the right basal ganglion, which was anatomically intact. Furthermore, the brain Technetium-99m-labeled tropanes as a dopamine transporter imaging agents scan ( Tc-TRODAT-1) displayed a secondary reduction of dopamine transporters in the right nigrostriatal

  3. MRI of the spinocerebellar degeneration (multiple system atrophy, Holmes type, and Menzel-Joseph type)

    International Nuclear Information System (INIS)

    Mukai, Eiichiro; Makino, Naoki.

    1991-01-01

    We have analyzed MRI in 33 patients with several forms of spinocerebellar degeneration; 17 with multiple system atrophy, 10 with Holmes type, and 6 with Menzel-Joseph type. The MRIs were obtained using a 1.5-T GEMR System. Patients with multiple system atrophy demonstrated: atrophy of the brain stem, particularly basis pontis; decreased signal intensity of the white matter of pons; atrophy of the white matter of cerebellum; atrophy and decreased signal intensity of the putamen, particularly along their lateral and posterior portions; and atrophy of the cerebrum. Patients with Holmes type showed: atrophy of the cerebellum; atrophy of the vermis more than hemispheres; and nuclei of the cerebellum with no decreased intensity on T 2 -weighted sequences. Patients with Menzel-Joseph type demonstrated moderate atrophy of the brain stem and mild atrophy of the white matter of cerebellum. MRI is a useful diagnostic tool in the management of the spinocerebellar degeneration. (author)

  4. IEEE Conference Record - Abstracts. 1997 IEEE International Conference on Plasma Science, 19 - 22 May 1997 San Diego, California

    National Research Council Canada - National Science Library

    Hyman, Julius

    1997-01-01

    This 360 page softbound publication includes the following major sections. An invitation to ICOPS'97, Catamaran Resort Hotel Floor Pinas, Officers of the IEEE Nuclear and Plasma Sciences Society, Conference Information...

  5. Lax Integrability and the Peakon Problem for the Modified Camassa-Holm Equation

    Science.gov (United States)

    Chang, Xiangke; Szmigielski, Jacek

    2018-02-01

    Peakons are special weak solutions of a class of nonlinear partial differential equations modelling non-linear phenomena such as the breakdown of regularity and the onset of shocks. We show that the natural concept of weak solutions in the case of the modified Camassa-Holm equation studied in this paper is dictated by the distributional compatibility of its Lax pair and, as a result, it differs from the one proposed and used in the literature based on the concept of weak solutions used for equations of the Burgers type. Subsequently, we give a complete construction of peakon solutions satisfying the modified Camassa-Holm equation in the sense of distributions; our approach is based on solving certain inverse boundary value problem, the solution of which hinges on a combination of classical techniques of analysis involving Stieltjes' continued fractions and multi-point Padé approximations. We propose sufficient conditions needed to ensure the global existence of peakon solutions and analyze the large time asymptotic behaviour whose special features include a formation of pairs of peakons that share asymptotic speeds, as well as Toda-like sorting property.

  6. EXTINCTION IN THE COMA OF COMET 17P/HOLMES

    International Nuclear Information System (INIS)

    Lacerda, Pedro; Jewitt, David

    2012-01-01

    On 2007 October 29, the outbursting comet 17P/Holmes passed within 0.''79 of a background star. We recorded the event using optical, narrowband photometry and detect a 3%-4% dip in stellar brightness bracketing the time of closest approach to the comet nucleus. The detected dimming implies an optical depth τ ≈ 0.04 at 1.''5 from the nucleus and an optical depth toward the nucleus center τ n d = 0.006 ± 0.002 at α = 16° phase angle. Our measurements place the most stringent constraints on the extinction optical depth of any cometary coma.

  7. Algebra for All: California’s Eighth-Grade Algebra Initiative as Constrained Curricula

    Science.gov (United States)

    Domina, Thurston; Penner, Andrew M.; Penner, Emily K.; Conley, Annemarie

    2015-01-01

    Background/Context Across the United States, secondary school curricula are intensifying as a growing proportion of students enroll in high-level academic math courses. In many districts, this intensification process occurs as early as eighth grade, where schools are effectively constraining their mathematics curricula by restricting course offerings and placing more students into Algebra I. This paper provides a quantitative single-case research study of policy-driven curricular intensification in one California school district. Research Questions (1a) What effect did 8th eighth grade curricular intensification have on mathematics course enrollment patterns in Towering Pines Unified schools? (2b) How did the distribution of prior achievement in Towering Pines math classrooms change as the district constrained the curriculum by universalizing 8th eighth grade Algebra? (3c) Did 8th eighth grade curricular intensification improve students’ mathematics achievement? Setting Towering Pines is an immigrant enclave in the inner-ring suburbs of a major metropolitan area. The district’s 10 middle schools together enroll approximately 4,000 eighth graders each year. The districts’ students are ethnically diverse and largely economically disadvantaged. The study draws upon administrative data describing 8th eighth graders in the district in the 2004–20-05 through 2007–20-08 school years. Intervention/Program/Practice During the study period, Towering Pines dramatically intensified middle school students’ math curricula: In the 2004–20-05 school year 32% of the district’s 8th eighth graders enrolled in Algebra or a higher- level mathematics course; by the 2007–20-08 school year that proportion had increased to 84%. Research Design We use an interrupted time-series design, comparing students’ 8th eighth grade math course enrollments, 10th grade math course enrollments, and 10th grade math test scores across the four cohorts, controlling for demographics and

  8. Mozart, Love and the Eighth Grade.

    Science.gov (United States)

    Thoms, Hollis

    1983-01-01

    A semester-long study of Mozart helped eighth-graders understand the composer's personality and appreciate his music. Students read a biography of his life, studied the forms of his music, danced the minuet, and performed one of his operas in a schoolwide Mozart Day celebration. (AM)

  9. Getting started with FortiGate

    CERN Document Server

    Fabbri, Rosato

    2013-01-01

    This book is a step-by-step tutorial that will teach you everything you need to know about the deployment and management of FortiGate, including high availability, complex routing, various kinds of VPN working, user authentication, security rules and controls on applications, and mail and Internet access.This book is intended for network administrators, security managers, and IT pros. It is a great starting point if you have to administer or configure a FortiGate unit, especially if you have no previous experience. For people that have never managed a FortiGate unit, the book helpfully walks t

  10. Decoding the industrial and digital city: visions of security in Holmes' and Sherlock’s London

    NARCIS (Netherlands)

    Kustritz, A.; Kohnen, M.E.S.; Stein, L.E.; Busse, K.

    2012-01-01

    Both the original and BBC Sherlock Holmes rely on the science of deduction to solve crimes and dazzle audiences. Emerging in times of cultural transformation, both characters offer reassurance about safety in the city by decoding people and places using contemporary technologies. In industrial

  11. Energy Harvesting - Wireless Sensor Networks for Indoors Applications Using IEEE 802.11

    DEFF Research Database (Denmark)

    Fafoutis, Xenofon; Sørensen, Thomas; Madsen, Jan

    2014-01-01

    The paper investigates the feasibility of using IEEE 802.11 in energy harvesting low-power sensing applications. The investigation is based on a prototype carbon dioxide sensor node that is powered by artificial indoors light. The wireless communication module of the sensor node is based on the RTX......4100 module. RTX4100 incorporates a wireless protocol that duty-cycles the radio while being compatible with IEEE 802.11 access points. The presented experiments demonstrate sustainable operation but indicate a trade-off between the benefits of using IEEE 802.11 in energy harvesting applications...

  12. The Chemical Adventures of Sherlock Holmes: The Brief Case of the Vile Humour

    Science.gov (United States)

    Shaw, Ken

    2012-01-01

    This story is a chemical mystery with an emphasis on qualitative analysis. It is, as well, part of a body of work that presents a scientific problem in mystery format in the context of the popular and beloved characters of 221B Baker Street. A break within the story allows readers to ponder and solve the mystery. Holmes and Watson provide the…

  13. School Breakfast Receipt and Obesity among American Fifth- and Eighth-Graders.

    Science.gov (United States)

    Sudharsanan, Nikkil; Romano, Sebastian; Cunningham, Solveig A

    2016-04-01

    School breakfast consumption can improve children's nutrition, but the implications of breakfast at school for children's weight remains unclear. The aim of this study was to determine whether receiving breakfast at school is related to changes in children's weight between the fifth and eighth grades, and whether the relationship between school breakfasts and obesity varies for children of different socioeconomic backgrounds. This was a longitudinal study of children observed in the fifth and eighth grades. Data are from the Early Childhood Longitudinal Study, Kindergarten Class of 1998-99, a nationally representative prospective cohort of children in the United States. The analytic sample consisted of 6,495 children interviewed in the fifth and eighth grades. Standard thresholds from the Centers for Disease Control and Prevention were used to classify children as not obese or obese based on direct-measured height and weight. Difference-in-difference propensity score matching and fixed-effect logistic regression models were used to estimate the relationship between receipt of school breakfast and change in obesity between the fifth and eighth grades, adjusting for child, household, and school characteristics. School breakfast receipt was not associated with a change in obesity status between the fifth and eighth grades for children overall (odds ratio=1.31; P=0.129). In the propensity score model, receiving school breakfasts more than doubled the odds of becoming obese (odds ratio=2.31; P=0.0108) for children from families below the federal poverty line compared with children of similar socioeconomic backgrounds who did not regularly receive school breakfasts. School breakfast receipt was not independently related to obesity for most children. Receiving school breakfasts in the fifth grade may be associated with weight gain between the fifth and eighth grades for children from families below the federal poverty line compared with children of similar socioeconomic

  14. Achievement of Serbian eighth grade students in science

    Directory of Open Access Journals (Sweden)

    Antonijević Radovan

    2006-01-01

    Full Text Available The paper considers the main results and some educational implications of the TIMSS 2003 assessment conducted in Serbia in the fields of the science achievement of Serbian eighth grade students and the science curriculum context of their achievement. There were 4264 students in the sample. It was confirmed that Serbian eighth graders had made average scale score of 468 points in the science, and with this achievement they are placed in the zone of the top of low international benchmarking level, very close to the point of intermediate benchmark. The average science achievement of the Serbian eighth graders is somewhat below the general international science achievement. The best results were achieved in the science content domain of "chemistry", and the lower results in the content domain of "environmental science". Across the defined science cognitive domains, it was confirmed that the Serbian students had achieved the best results in cognitive domain of "factual knowledge" and weaker results in "reasoning and analysis". The achieved results raise many questions about contents of the science curriculum in Serbia, its overall quality and basic characteristics of its implementation. These results can be eligibly used to improve the science curricula and teaching in Serbian primary school. .

  15. Igor Maslennikov : Kogda snimalsja nash Holms, prihhodili pisma - trebovali prodolzhenija, ugrozhali dazhe / Igor Maslennikov ; interv. Nina Kovalenko

    Index Scriptorium Estoniae

    Maslennikov, Igor

    2006-01-01

    Tuntud vene filmirežissöör tähistas 26. oktoobril oma 75. aastast juubelit. Teleseriaalist "Sherlock Holmes'i ja doktor Watsoni seiklused", filmist "Talvised kirsid" (1985), teistest tema filmidest ja seriaalidest

  16. CERN receives prestigious Milestone recognition from IEEE

    CERN Multimedia

    2005-01-01

    At a ceremony at CERN, Mr W. Cleon Anderson, President of the Institute of Electrical and Electronics Engineers (IEEE) formally a Milestone plaque in recognition of the invention of electronic particle detectors at CERN

  17. 0011-0030.How to make an abstract in IEEE Format for ...

    Indian Academy of Sciences (India)

    Home; public; Volumes; reso; 021; 01; 0011-0030.How to make an abstract in IEEE Format for AvishkarMulticultural Night in IEEE R10 Student Congress 2009Performances.pdf. 404! error. The page your are looking for can not be found! Please check the link or use the navigation bar at the top. YouTube; Twitter; Facebook ...

  18. IEEE 1451.2 based Smart sensor system using ADuc847

    Science.gov (United States)

    Sreejithlal, A.; Ajith, Jose

    IEEE 1451 standard defines a standard interface for connecting transducers to microprocessor based data acquisition systems, instrumentation systems, control and field networks. Smart transducer interface module (STIM) acts as a unit which provides signal conditioning, digitization and data packet generation functions to the transducers connected to it. This paper describes the implementation of a microcontroller based smart transducer interface module based on IEEE 1451.2 standard. The module, implemented using ADuc847 microcontroller has 2 transducer channels and is programmed using Embedded C language. The Sensor system consists of a Network Controlled Application Processor (NCAP) module which controls the Smart transducer interface module (STIM) over an IEEE1451.2-RS232 bus. The NCAP module is implemented as a software module in C# language. The hardware details, control principles involved and the software implementation for the STIM are described in detail.

  19. Sherlock Holmes and the Curious Case of the Human Locomotor Central Pattern Generator.

    Science.gov (United States)

    Klarner, Taryn; Zehr, E Paul

    2018-03-14

    Evidence first described in reduced animal models over 100 years ago led to deductions about the control of locomotion through spinal locomotor central pattern generating (CPG) networks. These discoveries in nature were contemporaneous with another form of deductive reasoning found in popular culture-that of Arthur Conan Doyle's detective "Sherlock Holmes". Since the invasive methods used in reduced non-human animal preparations are not amenable to study in humans, we are left instead with deducing from other measures and observations. Using the deductive reasoning approach of Sherlock Holmes as a metaphor for framing research into human CPGs, we speculate and weigh the evidence that should be observable in humans based on knowledge from other species. This review summarizes indirect inference to assess "observable evidence" of pattern generating activity which leads to the logical deduction of CPG contributions to arm and leg activity during locomotion in humans. The question of where a CPG may be housed in the human nervous system remains incompletely resolved at this time. Ongoing understanding, elaboration and application of functioning locomotor CPGs in humans is important for gait rehabilitation strategies in those with neurological injuries.

  20. Eighth Grade Algebra Course Placement and Student Motivation for Mathematics

    Science.gov (United States)

    Simzar, Rahila M.; Domina, Thurston; Tran, Cathy

    2016-01-01

    This study uses student panel data to examine the association between Algebra placement and student motivation for mathematics. Changes in achievement goals, expectancy, and task value for students in eighth grade Algebra are compared with those of peers placed in lower-level mathematics courses (N = 3,306). In our sample, students placed in Algebra reported an increase in performance-avoidance goals as well as decreases in academic self-efficacy and task value. These relations were attenuated for students who had high mathematics achievement prior to Algebra placement. Whereas all students reported an overall decline in performance-approach goals over the course of eighth grade, previously high-achieving students reported an increase in these goals. Lastly, previously high-achieving students reported an increase in mastery goals. These findings suggest that while previously high-achieving students may benefit motivationally from eighth grade Algebra placement, placing previously average- and low-performing students in Algebra can potentially undermine their motivation for mathematics. PMID:26942210

  1. Eighth Grade Algebra Course Placement and Student Motivation for Mathematics.

    Science.gov (United States)

    Simzar, Rahila M; Domina, Thurston; Tran, Cathy

    2016-01-01

    This study uses student panel data to examine the association between Algebra placement and student motivation for mathematics. Changes in achievement goals, expectancy, and task value for students in eighth grade Algebra are compared with those of peers placed in lower-level mathematics courses (N = 3,306). In our sample, students placed in Algebra reported an increase in performance-avoidance goals as well as decreases in academic self-efficacy and task value. These relations were attenuated for students who had high mathematics achievement prior to Algebra placement. Whereas all students reported an overall decline in performance-approach goals over the course of eighth grade, previously high-achieving students reported an increase in these goals. Lastly, previously high-achieving students reported an increase in mastery goals. These findings suggest that while previously high-achieving students may benefit motivationally from eighth grade Algebra placement, placing previously average- and low-performing students in Algebra can potentially undermine their motivation for mathematics.

  2. IEEE No. 323, IEEE trial-use standard: General guide for qualifying Class I electric equipment for nuclear power generating stations

    International Nuclear Information System (INIS)

    Anon.

    1992-01-01

    This document describes the basic requirements for the qualification of Class I electric equipment. This is equipment which is essential to the safe shutdown and isolation of the reactor or whose failure or damage could result in significant release of radioactive material. The purpose of this document is to provide guidance for demonstrating the qualifications of electrical equipment as required in the IEEE Std 279 -- Criteria for Nuclear Power Generating Station Protection Systems, and IEEE Std 308 -- Criteria for Class 1E Electric Systems for Nuclear Power Generating Stations. The qualification methods described may be used in conjunction with the Guides for qualifying specific types of equipment, (see Foreword), for updating qualification following modifications or for qualifying equipment for which no applicable Guide exists

  3. Applicability of "MEGA"[Eighth Note] to Sexually Abusive Youth with Low Intellectual Functioning

    Science.gov (United States)

    Miccio-Fonseca, L. C.; Rasmussen, Lucinda A.

    2013-01-01

    The study explored the predictive validity of "Multiplex Empirically Guided Inventory of Ecological Aggregates for Assessing Sexually Abusive Children and Adolescents (Ages 4 to 19)" ("MEGA"[eighth note]; Miccio-Fonseca, 2006b), a comprehensive developmentally sensitive risk assessment outcome tool. "MEGA"[eighth note] assesses risk for coarse…

  4. The IEEE 802.11a standards

    Indian Academy of Sciences (India)

    First page Back Continue Last page Overview Graphics. The IEEE 802.11a standards. Provides higher data rate and system capacities and uses OFDM in Physical Layer to mitigate the multi path effects;. Supports multiple 20Mhz channel. Each channel being an OFDM Modulated;; 52 Carriers. 48 data carrier; 4 Carry pilot ...

  5. IEEE 802.11 Wireless LANs: Performance Analysis and Protocol Refinement

    Directory of Open Access Journals (Sweden)

    Chatzimisios P.

    2005-01-01

    Full Text Available The IEEE 802.11 protocol is emerging as a widely used standard and has become the most mature technology for wireless local area networks (WLANs. In this paper, we focus on the tuning of the IEEE 802.11 protocol parameters taking into consideration, in addition to throughput efficiency, performance metrics such as the average packet delay, the probability of a packet being discarded when it reaches the maximum retransmission limit, the average time to drop a packet, and the packet interarrival time. We present an analysis, which has been validated by simulation that is based on a Markov chain model commonly used in the literature. We further study the improvement on these performance metrics by employing suitable protocol parameters according to the specific communication needs of the IEEE 802.11 protocol for both basic access and RTS/CTS access schemes. We show that the use of a higher initial contention window size does not considerably degrade performance in small networks and performs significantly better in any other scenario. Moreover, we conclude that the combination of a lower maximum contention window size and a higher retry limit considerably improves performance. Results indicate that the appropriate adjustment of the protocol parameters enhances performance and improves the services that the IEEE 802.11 protocol provides to various communication applications.

  6. Introduction to IEEE Std. 7-4.3.2 Annex D -- ''Qualification of existing commercial computers''

    International Nuclear Information System (INIS)

    Holmstrom, K.J.

    1995-01-01

    On September 15th of 1993 the IEEE standards board approved IEEE Std. 7-4.3.2-1993, IEEE Standard for Digital Computers in Safety Systems of Nuclear Power Generating Stations. This paper is an introduction to Annex D of this document which concerns the commercial grade dedication of existing computers or new non-1E computers

  7. Integrable discretizations for the short-wave model of the Camassa-Holm equation

    International Nuclear Information System (INIS)

    Feng Baofeng; Maruno, Ken-ichi; Ohta, Yasuhiro

    2010-01-01

    The link between the short-wave model of the Camassa-Holm equation (SCHE) and bilinear equations of the two-dimensional Toda lattice equation is clarified. The parametric form of the N-cuspon solution of the SCHE in Casorati determinant is then given. Based on the above finding, integrable semi-discrete and full-discrete analogues of the SCHE are constructed. The determinant solutions of both semi-discrete and fully discrete analogues of the SCHE are also presented.

  8. Osteoporosis Risk Factors in Eighth Grade Students.

    Science.gov (United States)

    Lysen, Victoria C.; Walker, Robert

    1997-01-01

    Presents findings from food frequency questionnaires and surveys of 138 Midwestern eighth-grade student-parent pairs. The study examined the incidence of modifiable and nonmodifiable osteoporosis risk factors and compared gender differences. Data analysis indicated that many adolescents possessed several modifiable and nonmodifiable risk factors…

  9. Existence of weak solutions in lower order Sobolev space for a Camassa-Holm-type equation

    International Nuclear Information System (INIS)

    Lai Shaoyong; Wu Yonghong

    2010-01-01

    A generalized Camassa-Holm equation containing a nonlinear dissipative effect is investigated. The existence of the weak solution of the equation in lower order Sobolev space H s with 1

  10. Was the real Sherlock Holmes a pediatric surgeon?

    Science.gov (United States)

    Raffensperger, John

    2010-07-01

    This article reviews the pioneering efforts of Joseph Bell, the model for Sherlock Holmes, in the surgical care of children during the antiseptic era. I reviewed biographies of Sir Arthur Conan Doyle; the biography of Joseph Bell; his surgical textbook, Edinburgh Medical Journals; and the history of the Royal Edinburgh Hospital for Sick Children. Dr Bell was a colleague of Joseph Lister and one of the first surgeons to apply antiseptic methods to operations involving children. He was the surgeon appointed to the first surgical ward of the Royal Edinburgh Hospital for Sick Children; in that role, he cared for many children with surgical diseases. Dr Joseph Bell, by his compassion for children and his surgical skill, was indeed a pioneer pediatric surgeon. Copyright 2010 Elsevier Inc. All rights reserved.

  11. Sixth- and eighth-order Hermite integrator for N-body simulations

    Science.gov (United States)

    Nitadori, Keigo; Makino, Junichiro

    2008-10-01

    We present sixth- and eighth-order Hermite integrators for astrophysical N-body simulations, which use the derivatives of accelerations up to second-order ( snap) and third-order ( crackle). These schemes do not require previous values for the corrector, and require only one previous value to construct the predictor. Thus, they are fairly easy to implement. The additional cost of the calculation of the higher-order derivatives is not very high. Even for the eighth-order scheme, the number of floating-point operations for force calculation is only about two times larger than that for traditional fourth-order Hermite scheme. The sixth-order scheme is better than the traditional fourth-order scheme for most cases. When the required accuracy is very high, the eighth-order one is the best. These high-order schemes have several practical advantages. For example, they allow a larger number of particles to be integrated in parallel than the fourth-order scheme does, resulting in higher execution efficiency in both general-purpose parallel computers and GRAPE systems.

  12. Isolan - A Fibre Optic Network Conforming To IEEE 802.3 Standards

    Science.gov (United States)

    Roworth, D. A. A.; Howe, N.

    1986-10-01

    The progress of the IEEE 802.3 standard for fibre optic LANs is indicated with reference to both mixed media networks and full fibre networks. For a fibre optic network the most suitable layout is a "snowflake" topology composed of multiport repeaters and active fibre hubs. A range of components is described which enables the realisation of such a topology in conformance with the IEEE 802.3 standard.

  13. 0011-0030.What is IEEE 754 StandardHow to convert real number ...

    Indian Academy of Sciences (India)

    Home; public; Volumes; reso; 021; 01; 0011-0030.What is IEEE 754 StandardHow to convert real number in binary format using IEEE 754 StandardAn.pdf. 404! error. The page your are looking for can not be found! Please check the link or use the navigation bar at the top. YouTube; Twitter; Facebook; Blog. Academy News.

  14. 48 CFR 52.223-16 - IEEE 1680 Standard for the Environmental Assessment of Personal Computer Products.

    Science.gov (United States)

    2010-10-01

    ... 48 Federal Acquisition Regulations System 2 2010-10-01 2010-10-01 false IEEE 1680 Standard for the... CONTRACT CLAUSES Text of Provisions and Clauses 52.223-16 IEEE 1680 Standard for the Environmental Assessment of Personal Computer Products. As prescribed in 23.706(b)(1), insert the following clause: IEEE...

  15. A Comprehensive Taxonomy and Analysis of IEEE 802.15.4 Attacks

    Directory of Open Access Journals (Sweden)

    Yasmin M. Amin

    2016-01-01

    Full Text Available The IEEE 802.15.4 standard has been established as the dominant enabling technology for Wireless Sensor Networks (WSNs. With the proliferation of security-sensitive applications involving WSNs, WSN security has become a topic of great significance. In comparison with traditional wired and wireless networks, WSNs possess additional vulnerabilities which present opportunities for attackers to launch novel and more complicated attacks against such networks. For this reason, a thorough investigation of attacks against WSNs is required. This paper provides a single unified survey that dissects all IEEE 802.15.4 PHY and MAC layer attacks known to date. While the majority of existing references investigate the motive and behavior of each attack separately, this survey classifies the attacks according to clear metrics within the paper and addresses the interrelationships and differences between the attacks following their classification. The authors’ opinions and comments regarding the placement of the attacks within the defined classifications are also provided. A comparative analysis between the classified attacks is then performed with respect to a set of defined evaluation criteria. The first half of this paper addresses attacks on the IEEE 802.15.4 PHY layer, whereas the second half of the paper addresses IEEE 802.15.4 MAC layer attacks.

  16. Performance Analysis of the IEEE 802.11p Multichannel MAC Protocol in Vehicular Ad Hoc Networks.

    Science.gov (United States)

    Song, Caixia

    2017-12-12

    Vehicular Ad Hoc Networks (VANETs) employ multichannel to provide a variety of safety and non-safety applications, based on the IEEE 802.11p and IEEE 1609.4 protocols. The safety applications require timely and reliable transmissions, while the non-safety applications require efficient and high throughput. In the IEEE 1609.4 protocol, operating interval is divided into alternating Control Channel (CCH) interval and Service Channel (SCH) interval with an identical length. During the CCH interval, nodes transmit safety-related messages and control messages, and Enhanced Distributed Channel Access (EDCA) mechanism is employed to allow four Access Categories (ACs) within a station with different priorities according to their criticality for the vehicle's safety. During the SCH interval, the non-safety massages are transmitted. An analytical model is proposed in this paper to evaluate performance, reliability and efficiency of the IEEE 802.11p and IEEE 1609.4 protocols. The proposed model improves the existing work by taking serval aspects and the character of multichannel switching into design consideration. Extensive performance evaluations based on analysis and simulation help to validate the accuracy of the proposed model and analyze the capabilities and limitations of the IEEE 802.11p and IEEE 1609.4 protocols, and enhancement suggestions are given.

  17. Defending IEEE 802.11-Based Networks Against Denial Of Service Attacks

    National Research Council Canada - National Science Library

    Tan, Boon

    2003-01-01

    ...) attacks targeting its management and media access protocols Computer simulation models have proven to be effective tools in the study of cause and effect in numerous fields This thesis involved the design and implementation of a IEEE 8O2.11-based simulation model using OMNeT++, to investigate the effects of different types of DoS attacks on a IEEE 8O2.11 network, and the effectiveness of corresponding countermeasures.

  18. Neurovascular compression syndrome of the eighth cranial nerve

    International Nuclear Information System (INIS)

    Itoh, Akinori

    2010-01-01

    Neurovascular compression syndrome (NVCS) involves neuropathy due to intracranial blood vessels compressing the cranial nerves. NVCS of the eighth cranial nerve is less reportedly established as a clinical entity than that of the fifth and seventh cranial nerves. We report 17 cases of NVCS of the eighth cranial nerve and their clinical features. Clinical symptoms and test findings among our subjects indicated that most were aged more than 65 years, were unilateral, had intermittent tinnitus, suffered attacks lasting a few seconds dozens of times a day, experienced dizziness concomitantly with tinnitus, aggravated tinnitus and dizziness when tilting the head toward the affected side and looking downward (positional tinnitus, positional dizziness), heard specific tinnitus sounds such as crackling differing from those in cochlear tinnitus, had mild or no hearing loss, were diagnosed with retrocochlear hearing disturbance due to an interpeak latency delay between waves I and III of the auditory brainstem response (ABR), often had no nystagmus or canal paresis (CP), were found in constructive interference steady state magnetic resonance imaging (CISS MRI) to have compression of the eighth cranial nerve by the vertebral artery (VA) or the anterior inferior cerebellar artery (AICA), rarely had concomitant facial spasms, and had tinnitus and dizziness markedly suppressed by carbamazepine. With the number of elderly individuals continuing to increase, cases of NVCS due to arteriosclerotic changes in cerebral blood vessels are expected to increase, making it necessary to consider NVCS in elderly subjects with dizziness, tinnitus, and hearing loss. (author)

  19. Neurovascular compression syndrome of the eighth cranial nerve

    Energy Technology Data Exchange (ETDEWEB)

    Itoh, Akinori [Saitama Medical Univ., Faculty of Medicine, Moroyama, Saitama (Japan)

    2010-04-15

    Neurovascular compression syndrome (NVCS) involves neuropathy due to intracranial blood vessels compressing the cranial nerves. NVCS of the eighth cranial nerve is less reportedly established as a clinical entity than that of the fifth and seventh cranial nerves. We report 17 cases of NVCS of the eighth cranial nerve and their clinical features. Clinical symptoms and test findings among our subjects indicated that most were aged more than 65 years, were unilateral, had intermittent tinnitus, suffered attacks lasting a few seconds dozens of times a day, experienced dizziness concomitantly with tinnitus, aggravated tinnitus and dizziness when tilting the head toward the affected side and looking downward (positional tinnitus, positional dizziness), heard specific tinnitus sounds such as crackling differing from those in cochlear tinnitus, had mild or no hearing loss, were diagnosed with retrocochlear hearing disturbance due to an interpeak latency delay between waves I and III of the auditory brainstem response (ABR), often had no nystagmus or canal paresis (CP), were found in constructive interference steady state magnetic resonance imaging (CISS MRI) to have compression of the eighth cranial nerve by the vertebral artery (VA) or the anterior inferior cerebellar artery (AICA), rarely had concomitant facial spasms, and had tinnitus and dizziness markedly suppressed by carbamazepine. With the number of elderly individuals continuing to increase, cases of NVCS due to arteriosclerotic changes in cerebral blood vessels are expected to increase, making it necessary to consider NVCS in elderly subjects with dizziness, tinnitus, and hearing loss. (author)

  20. Editorial for IEEE Transactions on Power Electronics

    DEFF Research Database (Denmark)

    Blaabjerg, Frede

    2007-01-01

    Our IEEE transactions on power electronics has had some very positive progress these past years under the leadership of Dr. Daan van Wyk. Papers have been processed efficiently both in review time and publication time. This success has spread throughout the whole power electronics community which...

  1. IEEE Std 730 Software Quality Assurance: Supporting CMMI-DEV v1.3, Product and Process Quality Assurance

    Science.gov (United States)

    2011-05-27

    frameworks 4 CMMI-DEV IEEE / ISO / IEC 15288 / 12207 Quality Assurance ©2011 Walz IEEE Life Cycle Processes & Artifacts • Systems Life Cycle Processes...TAG to ISO TC 176 Quality Management • Quality: ASQ, work experience • Software: three books, consulting, work experience • Systems: Telecom & DoD...and IEEE 730 SQA need to align. The P730 IEEE standards working group has expanded the scope of the SQA process standard to align with IS 12207

  2. Augmenting the Energy-Saving Impact of IEEE 802.3az via the Control Plane

    OpenAIRE

    Thaenchaikun , Chakadkit; Jakllari , Gentian; Paillassa , Béatrice

    2015-01-01

    International audience; IEEE 802.3az, the recent standard for Energy Efficient Ethernet, is one of the main contributions of the ICT industry to the global quest for energy efficiency. Energy consumption reduction is accomplished by essentially replacing the continuous IDLE of legacy IEEE 802.3 cards with a Low Power Idle. While this is an important step in the right direction, studies have shown that the energy saving with IEEE 802.3az highly depends on the traffic load and stops for link ut...

  3. Radio Frequency Fingerprinting Techniques Through Preamble Modification in IEEE 802.11B

    Science.gov (United States)

    2014-06-30

    4.2.1 Wald–Wolfowitz Runs Test . . . . . . . . . . . . . . . . . . . . . . 41 4.2.2 Wald–Wolfowitz Application to SXS System . . . . . . . . . . . . 42...Station SXS Signals eXploitation System USB Universal Serial Bus xiv Acronym Definition USRP Universal Software Radio Peripheral WLAN Wireless Local...Electronics Engineers (IEEE) defines standards applicable to the IEEE 802.11 protocol, however the standard does not reach the level of specificity to dictate

  4. Eighth international congress on nitrogen fixation

    Energy Technology Data Exchange (ETDEWEB)

    1990-01-01

    This volume contains the proceedings of the Eighth International Congress on Nitrogen Fixation held May 20--26, 1990 in Knoxville, Tennessee. The volume contains abstracts of individual presentations. Sessions were entitled Recent Advances in the Chemistry of Nitrogen Fixation, Plant-microbe Interactions, Limiting Factors of Nitrogen Fixation, Nitrogen Fixation and the Environment, Bacterial Systems, Nitrogen Fixation in Agriculture and Industry, Plant Function, and Nitrogen Fixation and Evolution.

  5. Harmonization of IEEE323 and IEC60780 standards For Environmental Qualificaiton of Electric Equipment

    International Nuclear Information System (INIS)

    Kim, Jong Seog

    2009-01-01

    IEEE323 standard has been widely used for the qualification of electric equipment in Asian pacific area while IEC6070 has been mostly used in European area. Since each plant use different standard for environmental qualification, manufacturer has to perform the qualification test twice in accordance with each standard. Problem also can be happened in the plant site when they are going to purchase equipment qualified by different qualification standard which are not used in his plant. The need of harmonization of each standard has been raised several years and it is known that some studies are in progress by IEEE committee. KEPRI has a plan of comparing EQ relative standards of IEEE, IEC and RCC in 2009. In this paper, brief comparing result between IEEE323 and IEC60780 and the proper harmonization method is introduced

  6. Stumpons and fractal-like wave solutions to the Dullin-Gottwald-Holm equation

    International Nuclear Information System (INIS)

    Yin Jiuli; Tian Lixin

    2009-01-01

    The traveling wave solutions to the Dullin-Gottwald-Holm equation (called DGH equation) are classified by an improved qualitative analysis method. Meanwhile, the influence of the parameters on the traveling wave forms is specifically considered. The equation is shown to admit more traveling wave forms solutions, especially new solutions such as stumpons and fractal-like waves are first given. We also point out that the smooth solutions can converge to non-smooth ones under certain conditions. Furthermore, the new explicit forms of peakons with period are obtained.

  7. Sherlock Holmes and the Case of the Raven and the Ambassador's Wife: An Inquiry-Based Murder Mystery

    Science.gov (United States)

    Grove, Nathaniel; Bretz, Stacey Lowery

    2005-01-01

    An inquiry-based experiment on Sherlock Holmes adventure stories used to actively involve students in a series of laboratory experiments to prove the guilt of the accused murderer is presented. The result from such experiments showed that students were able to distinguish between sugar and possible poison.

  8. Effects of soil pollutants, biogeochemistry and microbiology on the distribution and composition of enchytraeid communities in urban and suburban holm oak stands

    International Nuclear Information System (INIS)

    Rota, Emilia; Caruso, Tancredi; Monaci, Fabrizio; Baldantoni, Daniela; De Nicola, Flavia; Iovieno, Paola; Bargagli, Roberto

    2013-01-01

    Holm oaks form typical urban woodlands in the Mediterranean region. We aimed at characterizing the enchytraeid communities in these environments and searching for possible correlations with soil parameters, including the traffic contamination. Samples of litter and topsoil were collected at different spatial scales and seasons in Naples and Siena cities and in two suburban stands. Only the co-variation between pollution and other soil chemico-physical factors showed significant effects, whereas no direct effect of soil microbiology was detected. Some thermophilous Fridericia and Achaeta tolerate high concentrations of heavy metals and PAHs and their abundance was mainly determined by Ca bioavailability. Central-European mesophilous species increased significantly under more temperate environmental conditions. Different combinations of soil cohesiveness, grain size composition and moisture regime seem to select species of certain body sizes. -- Highlights: •We examined the enchytraeid assemblages of urban holm oak stands in relation to pollution gradients. •Only the co-variation between pollution and other soil chemico-physical factors showed significant effects. •Thermophilous species in Fridericia and Achaeta are mainly affected by Ca bioavailability. -- The co-variation between pollution and other soil chemico-physical factors affects significantly the enchytraeid communities in Mediterranean urban holm oak stands

  9. An eighth of the LHC in the can!

    CERN Multimedia

    2003-01-01

    An important milestone has just been passed in the manufacture of the LHC magnets, with the production of one eighth of the total number of collared coils. The completion of this first octant shows that large-scale series production is now under way.

  10. [Sherlock Holmes, Watson and cocaine. A literary contribution to the history of drug addiction].

    Science.gov (United States)

    Fouassier, E

    1994-01-01

    From 1887 to 1927, Conan Doyle devoted fifty-six short stories and four novels to the extraordinary investigations of Sherlock Holmes. Special passages from these works, gathered here in the form of long extracts, evoke the passion of the celebrated detective for cocaine and constitute rather generally an original sort of evidence on the emergence of drug addicts in Europe at the end of the 19th century.

  11. Spectrum Hole Identification in IEEE 802.22 WRAN using Unsupervised Learning

    OpenAIRE

    V. Balaji; S. Anand; C.R. Hota; G. Raghurama

    2016-01-01

    In this paper we present a Cooperative Spectrum Sensing (CSS) algorithm for Cognitive Radios (CR) based on IEEE 802.22Wireless Regional Area Network (WRAN) standard. The core objective is to improve cooperative sensing efficiency which specifies how fast a decision can be reached in each round of cooperation (iteration) to sense an appropriate number of channels/bands (i.e. 86 channels of 7MHz bandwidth as per IEEE 802.22) within a time constraint (channel sensing time). To meet this objectiv...

  12. A formal analysis of ISO/IEEE P11073-20601 standard of medical device communication

    NARCIS (Netherlands)

    Goga, Nicolae; Costache, Stefania; Moldoveanu, Florica

    2009-01-01

    This article presents the formal work done for the ISO/IEEE P11073-20601 Draft Standard for Health informatics - Personal health device communication - Application profile Optimized exchange protocol. ISO/IEEE 11073 family defines standards for device communication between agents (e.g. blood

  13. THE SEARCH FOR THE DIFFUSE INTERSTELLAR BANDS AND OTHER MOLECULES IN COMETS 17P (HOLMES) AND C/2007 W1 (BOATTINI)

    International Nuclear Information System (INIS)

    O'Malia, K. K. J.; Snow, T. P.; Thorburn, J. A.; Hammergren, M.; Dembicky, J.; Hobbs, L. M.; York, D. G.

    2010-01-01

    We present the search for both diffuse interstellar bands (DIBs) and molecules in Comet 17P (Holmes) and Comet C/2007 W1 (Boattini) occultation observations. Absorption spectra were taken during stellar occultations by Comet Holmes of 31 and β Persei, and the occultation of BD+22 216 by Comet Boattini. While no signature of the comets was detected, we present upper limits for some common cometary molecules such as C 2 , C 3 , CH, CN and for the most common DIBs. We did not detect either comet in absorption, most likely because of the large distance between the line of sight to the star and the nucleus of the comet. Interstellar sight lines with comparable reddening to what was measured in Comet Holmes have DIB equivalent widths between 5 and 50 mA. However, future observations with closer approaches to a background star have great potential for spatially mapping molecule distributions in comets, and in discovering DIBs, if they are present, in comets. Future observations could detect DIBs and molecules if they are done: (1) less than ∼10 4 -10 3 km from the nucleus (2) with a signal to noise in the background star of ∼300 and (3) with a resolving power of at least 38,000.

  14. IEEE standard for qualification of class 1E lead storage batteries for nuclear power generating stations

    International Nuclear Information System (INIS)

    Anon.

    1979-01-01

    IEEE Std 323-1974, Standard for Qualifying Class 1E Equipment for Nuclear Power Generating Stations, was developed to provide guidance for demonstrating and documenting the adequacy of electrical equipment used in all Class 1E and interface systems. This standard, IEEE Std 535-1979, was developed to provide specific methods and type test procedures for lead storage batteries in reference to IEEE Std 323-1974

  15. A versatile electrical penetration design qualified to IEEE Std. 317-1983

    International Nuclear Information System (INIS)

    Lankenau, W.; Wetherill, T.M.

    1994-01-01

    Although worldwide demand for new construction of nuclear power stations has been on a decline, the available opportunities for the design and construction of qualified electrical penetrations continues to offer challenges, requiring a highly versatile design. Versatility is necessary in order to meet unique customer requirements within the constraints of a design basis qualified to IEEE Std. 317-1983. This paper summarizes such a versatile electrical penetration designed, built and tested to IEEE Std. 317-1983. The principal features are described including major materials of construction. Some of the design constraints such as sealing requirements, and conductor density (including numerical example) are discussed. The requirements for qualification testing of the penetration assembly to IEEE Std. 317-1983 are delineated in a general sense, and some typical test ranges for preconditioning, radiation exposure, and LOCA are provided. The paper concludes by describing ways in which this versatile design has been adapted to meet unique customer requirements in a variety of nuclear power plants

  16. Spectrum Hole Identification in IEEE 802.22 WRAN using Unsupervised Learning

    Directory of Open Access Journals (Sweden)

    V. Balaji

    2016-01-01

    Full Text Available In this paper we present a Cooperative Spectrum Sensing (CSS algorithm for Cognitive Radios (CR based on IEEE 802.22Wireless Regional Area Network (WRAN standard. The core objective is to improve cooperative sensing efficiency which specifies how fast a decision can be reached in each round of cooperation (iteration to sense an appropriate number of channels/bands (i.e. 86 channels of 7MHz bandwidth as per IEEE 802.22 within a time constraint (channel sensing time. To meet this objective, we have developed CSS algorithm using unsupervised K-means clustering classification approach. The received energy level of each Secondary User (SU is considered as the parameter for determining channel availability. The performance of proposed algorithm is quantified in terms of detection accuracy, training and classification delay time. Further, the detection accuracy of our proposed scheme meets the requirement of IEEE 802.22 WRAN with the target probability of falsealrm as 0.1. All the simulations are carried out using Matlab tool.

  17. An Extended IEEE 118-Bus Test System With High Renewable Penetration

    Energy Technology Data Exchange (ETDEWEB)

    Pena, Ivonne; Martinez-Anido, Carlo Brancucci; Hodge, Bri-Mathias

    2018-01-01

    This article describes a new publicly available version of the IEEE 118-bus test system, named NREL-118. The database is based on the transmission representation (buses and lines) of the IEEE 118-bus test system, with a reconfigured generation representation using three regions of the US Western Interconnection from the latest Western Electricity Coordination Council (WECC) 2024 Common Case [1]. Time-synchronous hourly load, wind, and solar time series are provided for over one year (8784 hours). The public database presented and described in this manuscript will allow researchers to model a test power system using detailed transmission, generation, load, wind, and solar data. This database includes key additional features that add to the current IEEE 118-bus test model, such as: the inclusion of 10 generation technologies with different heat rate functions, minimum stable levels and ramping rates, GHG emissions rates, regulation and contingency reserves, and hourly time series data for one full year for load, wind and solar generation.

  18. A method to quantify infection and colonization of holm oak (Quercus ilex roots by Phytophthora cinnamomi

    Directory of Open Access Journals (Sweden)

    Ruiz-Gómez Francisco J

    2012-09-01

    Full Text Available Abstract Phytophthora cinnamomi Rands. is an important root rot pathogen widely distributed in the north hemisphere, with a large host range. Among others diseases, it is known to be a principal factor in the decline of holm oak and cork oak, the most important tree species in the “dehesa” ecosystem of south-western Spain. Previously, the focus of studies on P. cinnamomi and holm oak have been on molecular tools for identification, functional responses of the host, together with other physiological and morphological host variables. However, a microscopic index to describe the degree of infection and colonization in the plant tissues has not yet been developed. A colonization or infection index would be a useful tool for studies that examine differences between individuals subjected to different treatments or to individuals belonging to different breeding accessions, together with their specific responses to the pathogen. This work presents a methodology based on the capture and digital treatment of microscopic images, using simple and accessible software, together with a range of variables that quantify the infection and colonization process.

  19. Throughput and delay analysis of IEEE 802.15.6-based CSMA/CA protocol.

    Science.gov (United States)

    Ullah, Sana; Chen, Min; Kwak, Kyung Sup

    2012-12-01

    The IEEE 802.15.6 is a new communication standard on Wireless Body Area Network (WBAN) that focuses on a variety of medical, Consumer Electronics (CE) and entertainment applications. In this paper, the throughput and delay performance of the IEEE 802.15.6 is presented. Numerical formulas are derived to determine the maximum throughput and minimum delay limits of the IEEE 802.15.6 for an ideal channel with no transmission errors. These limits are derived for different frequency bands and data rates. Our analysis is validated by extensive simulations using a custom C+ + simulator. Based on analytical and simulation results, useful conclusions are derived for network provisioning and packet size optimization for different applications.

  20. IEEE C37.105-1987: IEEE standard for qualifying Class 1E protective relays and auxiliaries for nuclear power generating stations

    International Nuclear Information System (INIS)

    Anon.

    1992-01-01

    This standard describes the basic principles, requirements, and methods for qualifying Class 1E protective relays and auxiliaries such as test and control switches, terminal blocks, and indicating lamps for applications in nuclear power generating stations. When properly employed it can be used to demonstrate the design adequacy of such equipment under normal, abnormal, design basis event and post design basis event conditions in accordance with ANSI/IEEE Std 323-1983. When protective relays and auxiliaries are located in areas not subject to harsh environments, environmental qualification is not required. Protective relays and auxiliaries located inside primary containment in a nuclear power generating station present special conditions beyond the scope of this document. The qualification procedure presented is generic in nature. Other methods may be used at the discretion of the qualifier, provided the basic precepts of ANSI/IEEE Std 32301983 are satisfied

  1. Guest editors' introduction : Highlights from IEEE Pacific Visualization

    NARCIS (Netherlands)

    Wijk, van J.J.; North, S.; Shen, H.-W.

    2010-01-01

    This article looks briefly at four articles based on papers from the 2010 IEEE Pacific Visualization Symposium. These articles, which strongly focus on visual design and applications, cover a range of applications in scientific visualization, information visualization, and graph visualization,

  2. Comparison Of Several Methods Of Implementing A Fiber Optic IEEE 802.3 Ethernet

    Science.gov (United States)

    Thompson, Geoffrey O.

    1987-01-01

    Several different methods of implementing a fiber optic version of IEEE 802.3 10BASE LANs have been proposed as a candidate for standardization by IEEE. There have been extensive discussions as to the relative merits and features of the several systems. This paper will discuss the merits of each for this particular application on a comparative basis.

  3. Implementation of DoS attack and mitigation strategies in IEEE 802.11b/g WLAN

    Science.gov (United States)

    Deng, Julia; Meng, Ke; Xiao, Yang; Xu, Roger

    2010-04-01

    IEEE 802.11 wireless Local Area Network (WLAN) becomes very prevalent nowadays. Either as a simple range extender for a home wired Ethernet interface, or as a wireless deployment throughout an enterprise, WLAN provides mobility, convenience, and low cost. However, an IEEE 802.11b/g wireless network uses the frequency of unlicensed 2.4GHz, which makes the network unsafe and more vulnerable than traditional Ethernet networks. As a result, anyone who is familiar with wireless network may initiate a Denial of Service (DoS) attack to influence the common communication of the network or even make it crash. In this paper, we present our studies on the DoS attacks and mitigation strategies for IEEE 802.11b/g WLANs and describe some initial implementations using IEEE 802.11b/g wireless devices.

  4. Evaluation of H.264/AVC over IEEE 802.11p vehicular networks

    Science.gov (United States)

    Rozas-Ramallal, Ismael; Fernández-Caramés, Tiago M.; Dapena, Adriana; García-Naya, José Antonio

    2013-12-01

    The capacity of vehicular networks to offer non-safety services, like infotainment applications or the exchange of multimedia information between vehicles, have attracted a great deal of attention to the field of Intelligent Transport Systems (ITS). In particular, in this article we focus our attention on IEEE 802.11p which defines enhancements to IEEE 802.11 required to support ITS applications. We present an FPGA-based testbed developed to evaluate H.264/AVC (Advanced Video Coding) video transmission over vehicular networks. The testbed covers some of the most common situations in vehicle-to-vehicle and roadside-to-vehicle communications and it is highly flexible, allowing the performance evaluation of different vehicular standard configurations. We also show several experimental results to illustrate the quality obtained when H.264/AVC encoded video is transmitted over IEEE 802.11p networks. The quality is measured considering two important parameters: the percentage of recovered group of pictures and the frame quality. In order to improve performance, we propose to substitute the convolutional channel encoder used in IEEE 802.11p for a low-density parity-check code encoder. In addition, we suggest a simple strategy to decide the optimum number of iterations needed to decode each packet received.

  5. Solitary wave solutions to the modified form of Camassa-Holm equation by means of the homotopy analysis method

    International Nuclear Information System (INIS)

    Abbasbandy, S.

    2009-01-01

    Solitary wave solutions to the modified form of Camassa-Holm (CH) equation are sought. In this work, the homotopy analysis method (HAM), one of the most effective method, is applied to obtain the soliton wave solutions with and without continuity of first derivatives at crest

  6. Enhancing MAC performance of DCF protocol for IEEE 802.11 wireless LANs

    Science.gov (United States)

    Choi, Woo-Yong

    2017-01-01

    The DCF (Distributed Coordination Function) is the basic MAC (Medium Access Control) protocol of IEEE 802.11 wireless LANs and compatible with various IEEE 802.11 PHY extensions. The performance of the DCF degrades exponentially as the number of nodes participating in the DCF transmission procedure increases. To deal with this problem, we propose a simple, however efficient modification of the DCF by which the performance of the DCF is greatly enhanced.

  7. A gramática estadunidense como alteridade para a gramatização brasileira do português no século XIX : análise da composição da gramática Holmes Brazileiro ou Grammatica da Puericia de Júlio Ribeiro (1886 a partir do modelo do compêndio A Grammar of the English Language de George Frederick Holmes (1878

    Directory of Open Access Journals (Sweden)

    José Edicarlos de Aquino

    2018-03-01

    Full Text Available Resumo: Este artigo analisa os procedimentos de Júlio Ribeiro para compor a sua gramática Holmes Brazileiro Grammatica da Puericia, em 1886, com base no modelo do compêndio A Grammar of the English Language, lançada por George Frederick Holmes em 1878. Ilustrando em detalhes o mecanismo de transferência de tecnologia entre línguas segundo o conceito de gramatização de Auroux (1992, essa análise nos permite trazer à luz um elemento pouco observado na história das ideias linguísticas no Brasil, isto é, a alteridade que a gramática estadunidense representa para a gramatização brasileira do português no século XIX. Dessa forma, detalhamos as várias modificações que Júlio Ribeiro opera no texto de Holmes ao traduzi-lo e adaptá-lo para a escrita de uma gramática do português, mostrando como elas se realizam por exigência das especificidades da ordem da própria língua, mas também como significam um gesto de autoria do gramático brasileiro sobre o conhecimento linguístico, inserindo, inclusive, referências ao Brasil no discurso gramatical. Palavras-chave: gramatização brasileira; século XIX; Júlio Ribeiro; George Frederick Holmes; gramática brasileira, gramática estadunidense; gramática latina extensa. Abstract: This article analyzes the procedures of Júlio Ribeiro to compose his grammar Holmes Brazileiro Grammatica da Puericia, in 1886, from the model of the compendium A Grammar of the English Language, released by George Frederick Holmes in 1878. Illustrating in detail the technology transfer mechanism between languages according to Auroux’s concept of grammatization (1992, this analysis allows us to bring to light an unobserved element observed in the history of linguistic ideas in Brazil, that is, the alterity that the American grammar represents for the Brazilian grammatization of Portuguese in the nineteenth century. In this way, we detail the various modifications that Júlio Ribeiro operates in Holmes

  8. Bayard Holmes (1852-1924) and Henry Cotton (1869-1933): Surgeon-psychiatrists and their tragic quest to cure schizophrenia.

    Science.gov (United States)

    Davidson, Jonathan

    2016-11-01

    Early 20th-century medicine was dominated by the infectious theory of disease. Some leading physicians believed that infection or the accumulation of toxic substances from bacterial stasis caused a wide range of diseases, including schizophrenia. In the case of schizophrenia, one theory held that intestinal stasis lead to the bacterial production of toxins that affected brain function, resulting in psychotic illness. This theory predicted that clearing the stasis by drainage or by removal of the offending organ would be curative. Bayard Holmes and Henry Cotton, surgeon-psychiatrists, achieved notoriety for their efforts to cure schizophrenia surgically. Their endeavours were not only a failure but resulted in tragedy to their families and to a wider population. Treatment of their own sons also represented a violation of the ethics of their time. This account describes the life and career of Holmes and Cotton and reappraises their work in the light of recent developments. © IMechE 2014.

  9. Performance Evaluations for IEEE 802.15.4-based IoT Smart Home Solution

    Directory of Open Access Journals (Sweden)

    Nga Dinh

    2016-09-01

    Full Text Available The Internet of Things (IoT is going to be a market-changing force for a variety of real-time applications such as e-healthcare, home automation, environmental monitoring, and industrial automation. Low power wireless communication protocols offering long lifetime and high reliability such as the IEEE 802.15.4 standard have been a key enabling technology for IoT deployments and are deployed for home automation recently. The issues of the IEEE 802.15.4 networks have moved from theory to real world deployments. The work presented herein intends to demonstrate the use of the IEEE 802.15.4 standard in recent IoT commercial products for smart home applications: the Smart Home Starter Kit. The contributions of the paper are twofold. First, the paper presents how the IEEE 802.15.4 standard is employed in Smart Home Starter Kit. In particular, network topology, network operations, and data transfer mode are investigated. Second, network performance metrics such as end-to-end (E2E delay and frame reception ratio (FRR are evaluated by experiments. In addition, the paper discusses several directions for future improvements of home automation commercial products.

  10. IEEE Standard for qualification of Class 1E lead storage batteries for nuclear power generating stations

    International Nuclear Information System (INIS)

    Anon.

    1980-01-01

    This document describes qualification methods for Class 1E lead storage batteries and racks to be used in nuclear power generating stations outside of primary containment. Qualification required in ANSI/IEEE Std 279-1979 and IEEE Std 308-1978, can be demonstrated by using the procedures provided in this Standard in accordance with IEEE Std 323-1974. Battery sizing, maintenance, capacity testing, installation, charging equipment and consideration of other types batteries are beyond the scope of this Standard

  11. IEEE 693 seismic qualification of composites for substation high-voltage equipment

    Energy Technology Data Exchange (ETDEWEB)

    Schiff, A.J. [Precision Measurement Instruments, Los Altos Hills, CA (United States); Kempner, L.Jr. [Bonneville Power Administration, Vancouver, BC (Canada)

    2004-07-01

    Standard 693-1997 of the Institute of Electrical and Electronic Engineers (IEEE) is the recommended practice for seismic design of substations. It represents a significant improvement in the way the power industry seismically qualifies substation high-voltage equipment. This paper described the use of IEEE Standard 693 for hollow-core composite insulators that are used on high-voltage transformers and demonstrated that changes are warranted. The following four failure modes associated with the composite insulator were discussed: bond degradation, bond failure, tube degradation and tube layer delamination. The authors evaluated the IEEE 693 qualification procedure of time history shake-table and static-pull tests and were concerned about acceptance criteria. It was shown that acceptance criteria are not valid for qualifying hollow-core composites and that static-pull tests are needed after the vibration qualification tests are completed. It was suggested that more research is warranted to determine if bonding at the top part of the flange can be eliminated, thereby eliminating bond degradation. The resulting increase in system damping would improve the dynamic response of the unit. 1 ref., 10 figs.

  12. The Impact of Early Exposure of Eighth Grade Math Standards on End of Grade Assessments

    Science.gov (United States)

    Robertson, Tonjai E.

    2016-01-01

    The purpose of this study was to examine the Cumberland County Schools district-wide issue surrounding the disproportional performance of eighth grade Math I students' proficiency scores on standardized end-of-grade and end-of-course assessments. The study focused on the impact of the school district incorporating eighth grade math standards in…

  13. The Impact of Computer-Assisted Writing on Improving Writing Scores for Urban Eighth-Grade Students

    Science.gov (United States)

    Williams-Butler, LaTilya

    2016-01-01

    The purpose of this study was to investigate the impact standards-based aligned computer-assisted writing instruction had on improving writing scores for eighth-grade students that attend an urban middle school. The researcher wanted to remedy the problem of low writing achievement of eighth-grade students and determine if writing across the…

  14. 2011 IEEE Vehicular Networking Conference (VNC): Demo Summaries

    NARCIS (Netherlands)

    Altintas, O.; Chen, W.; Heijenk, Geert; Dressler, F.; Ekici, E.; Kargl, Frank; Shigeno, H.; Dietzel, Stefan

    2011-01-01

    Foreword For the first time in its history, IEEE VNC has included this year’s demonstrations in its program. Demonstrations play an important role to expose the research community to practical aspects of research and to foster cross-fertilization among researchers both in academia and in industry.

  15. IEEE prize awarded to CERN PhD student

    CERN Multimedia

    2006-01-01

    Rafael Ballabriga Suñe (right) receives the Student Paper Award. Rafael Ballabriga Suñe is the recipient of the 2006 Institute of Electrical and Electronics Engineers, Inc. (IEEE) Nuclear and Plasma Sciences Society (NPSS)'s Student Paper Award. Ballabriga's winning paper reported on a prototype chip, which belongs to a new generation of single photon counting hybrid pixel detector readout chips - Medipix3. The NPSS established this award in 2005 to encourage outstanding student contributions and greater student participation as principle or sole authors of papers. The prizes were presented at the IEEE Nuclear Science Symposium held in San Diego on 29 October to 4 November. The prototype chip was designed by Ballabriga based on ideas generated within the CERN Medipix team - part of the PH Microelectronics group. It could be used in various fields in the future, including medical imaging, neutron imaging, electron microscopy, radiation monitoring and other applications in high-energy physics. The novel aspe...

  16. Planning of Efficient Wireless Access with IEEE 802.16 for Connecting Home Network to the Internet

    Directory of Open Access Journals (Sweden)

    Pichet Ritthisoonthorn

    2010-01-01

    Full Text Available The emergence of IEEE802.16 wireless standard technology (WiMAX has significantly increased the choice to operators for the provisioning of wireless broadband access network. WiMAX is being deployed to compliment with xDSL in underserved or lack of the broadband network area, in both developed and developing countries. Many incumbent operators in developing countries are considering the deployment of WiMAX as part of their broadband access strategy. This paper presents an efficient and simple method for planning of broadband fixed wireless access (BFWA with IEEE802.16 standard to support home connection to Internet. The study formulates the framework for planning both coverage and capacity designs. The relationship between coverage area and access rate from subscriber in each environment area is presented. The study also presents the throughput and channel capacity of IEEE802.16 in different access rates. An extensive analysis is performed and the results are applied to the real case study to demonstrate the practicality of using IEEE 802.16 for connecting home to Internet. Using empirical data and original subscriber traffic from measurement, it is shown that the BFWA with IEEE802.16 standard is a capacity limited system. The capacity of IEEE802.16 is related to different factors including frequency bandwidth, spectrum allocation, estimation of traffic per subscriber, and choice of adaptive modulation from subscriber terminal. The wireless access methods and procedures evolved in this research work and set out in this paper are shown to be well suited for planning BFWA system based on IEEE802.16 which supports broadband home to Internet connections.

  17. Eliminare l’impossibile: Darwin, Winwood Reade e l’adagio di Sherlock Holmes

    Directory of Open Access Journals (Sweden)

    Jan Marten Ivo Klaver

    2012-11-01

    Full Text Available This essay looks at the origin and success of Sherlock Holmes’s most famous maxim: “when you have eliminated the impossible, whatever remains, however improbable, must be the truth”. Arthur Conan Doyle’s repeated use of the phrase in numerous Sherlock Holmes stories published between 1892 and 1927 shows that the author was fully aware of the rhetorical power of the expression. But what ended up as a motto for the detective’s methods of investigation was initially the expression of a Darwinian discourse in The Sign of Four, the novel in which the adage was first formulated.

  18. Performance of the IEEE 802.3 EPON registration scheme under high load

    Science.gov (United States)

    Bhatia, Swapnil P.; Bartos, Radim

    2004-09-01

    The proposed standard for the IEEE 802.3 Ethernet Passive Optical Network includes a random delayed transmission scheme for registration of new nodes. Although the scheme performs well on low loads, our simulation demonstrates the degraded and undesirable performance of the scheme at higher loads. We propose a simple modification to the current scheme that increases its range of operation and is compatible with the IEEE draft standard. We demonstrate the improvement in performance gained without any significant increase in registration delay.

  19. Fabrication and calibration of FORTIS

    Science.gov (United States)

    Fleming, Brian T.; McCandliss, Stephan R.; Kaiser, Mary Elizabeth; Kruk, Jeffery; Feldman, Paul D.; Kutyrev, Alexander S.; Li, Mary J.; Rapchun, David A.; Lyness, Eric; Moseley, S. H.; Siegmund, Oswald; Vallerga, John; Martin, Adrian

    2011-09-01

    The Johns Hopkins University sounding rocket group is entering the final fabrication phase of the Far-ultraviolet Off Rowland-circle Telescope for Imaging and Spectroscopy (FORTIS); a sounding rocket borne multi-object spectro-telescope designed to provide spectral coverage of 43 separate targets in the 900 - 1800 Angstrom bandpass over a 30' x 30' field-of- view. Using "on-the-fly" target acquisition and spectral multiplexing enabled by a GSFC microshutter array, FORTIS will be capable of observing the brightest regions in the far-UV of nearby low redshift (z ~ 0.002 - 0.02) star forming galaxies to search for Lyman alpha escape, and to measure the local gas-to-dust ratio. A large area (~ 45 mm x 170 mm) microchannel plate detector built by Sensor Sciences provides an imaging channel for targeting flanked by two redundant spectral outrigger channels. The grating is ruled directly onto the secondary mirror to increase efficiency. In this paper, we discuss the recent progress made in the development and fabrication of FORTIS, as well as the results of early calibration and characterization of our hardware, including mirror/grating measurements, detector performance, and early operational tests of the microshutter arrays.

  20. VARNOST BREZŽIČNIH OMREŽIJ PO STANDARDU IEEE 802.11

    OpenAIRE

    Štumberger, Matej

    2013-01-01

    Diplomska naloga se osredotoča na problem varovanja brezžičnih omrežij, zasnovanih po standardu IEEE 802.11. Opisano je združenje IEEE in njihova specifikacija standardov z oznako 802, prav tako pa so opisani tudi standardi, protokoli in tehnike varovanja in zaščite omrežij, ki delujejo po tej specifikaciji. Predstavljeno je tudi trenutno stanje varnosti brezžičnih omrežij na področju mesta Ptuj, opisani in prikazani pa so tudi različni pristopi za zlorabo brezžičnih omrežij, skupaj s program...

  1. International Conference on Grey Systems and intelligent Services (IEEE GSIS 2009)

    CERN Document Server

    Liu, Sifeng; Advances in Grey Systems Research

    2010-01-01

    This book contains contributions by some of the leading researchers in the area of grey systems theory and applications. All the papers included in this volume are selected from the contributions physically presented at the 2009 IEEE International Conference on Grey Systems and Intelligent Services, November 11 – 12, 2009, Nanjing, Jiangsu, People’s Republic of China. This event was jointly sponsored by IEEE Systems, Man, and Cybernetics Society, Natural Science Foundation of China, and Grey Systems Society of China. Additionally, Nanjing University of Aeronautics and Astronautics also invested heavily in this event with its direct and indirect financial and administrative supports.

  2. Segmentized Clear Channel Assessment for IEEE 802.15.4 Networks.

    Science.gov (United States)

    Son, Kyou Jung; Hong, Sung Hyeuck; Moon, Seong-Pil; Chang, Tae Gyu; Cho, Hanjin

    2016-06-03

    This paper proposed segmentized clear channel assessment (CCA) which increases the performance of IEEE 802.15.4 networks by improving carrier sense multiple access with collision avoidance (CSMA/CA). Improving CSMA/CA is important because the low-power consumption feature and throughput performance of IEEE 802.15.4 are greatly affected by CSMA/CA behavior. To improve the performance of CSMA/CA, this paper focused on increasing the chance to transmit a packet by assessing precise channel status. The previous method used in CCA, which is employed by CSMA/CA, assesses the channel by measuring the energy level of the channel. However, this method shows limited channel assessing behavior, which comes from simple threshold dependent channel busy evaluation. The proposed method solves this limited channel decision problem by dividing CCA into two groups. Two groups of CCA compare their energy levels to get precise channel status. To evaluate the performance of the segmentized CCA method, a Markov chain model has been developed. The validation of analytic results is confirmed by comparing them with simulation results. Additionally, simulation results show the proposed method is improving a maximum 8.76% of throughput and decreasing a maximum 3.9% of the average number of CCAs per packet transmission than the IEEE 802.15.4 CCA method.

  3. Real-time-service-based Distributed Scheduling Scheme for IEEE 802.16j Networks

    OpenAIRE

    Kuo-Feng Huang; Shih-Jung Wu

    2013-01-01

    Supporting Quality of Service (QoS) guarantees for diverse multimedia services is the primary concern for IEEE802.16j networks. A scheduling scheme that satisfies the QoS requirements has become more important for wireless communications. We proposed an adaptive nontransparent-based distributed scheduling scheme (ANDS) for IEEE 802.16j networks. ANDS comprises three major components: Priority Assignment, Resource Allocation, Preserved Bandwidth Adjustment. Different service-type connections p...

  4. Application of IEEE 1588 to the real-time control system of accelerator

    International Nuclear Information System (INIS)

    Ma Mingchao; Chen Jianfeng; Shen Liren; Jiang Geyang

    2014-01-01

    Background: Time synchronization is one of the core technology of realizing the real-time control of accelerator under the distributed control system architecture. The ordinary crystal frequency deviation of IEEE 1588 causes low synchronous accuracy, which doesn't meet the needs of high precision synchronization. Purpose: This paper proposes an algorithm to improve the synchronization precision caused by the crystal frequency deviation. Methods: According to the basic principle of IEEE 1588 time synchronization, a dynamic frequency compensation (DFC) algorithm module was designed and a test platform was built to verify the feasibility and practicability of the algorithm. The influence of the synchronous cycle and delay jitter of the switch on the synchronization accuracy were analyzed. Results: Experimental results showed the great precision improvement of synchronization after using DFC algorithm. Conclusion: Low synchronous accuracy caused by the crystal frequency deviation can be improved by using DFC algorithm implemented for precision time protocol (PTP) of IEEE 1588. (authors)

  5. Calibration and flight qualification of FORTIS

    Science.gov (United States)

    Fleming, Brian T.; McCandliss, Stephan R.; Redwine, Keith; Kaiser, Mary Elizabeth; Kruk, Jeffery; Feldman, Paul D.; Kutyrev, Alexander S.; Li, Mary J.; Moseley, S. H.; Siegmund, Oswald; Vallerga, John; Martin, Adrian

    2013-09-01

    The Johns Hopkins University sounding rocket group has completed the assembly and calibration of the Far-ultraviolet Off Rowland-circle Telescope for Imaging and Spectroscopy (FORTIS); a sounding rocket borne multi-object spectro-telescope designed to provide spectral coverage of up to 43 separate targets in the 900 - 1800 Angstrom bandpass over a 30' x 30' field-of-view. FORTIS is capable of selecting the far-UV brightest regions of the target area by utilizing an autonomous targeting system. Medium resolution (R ~ 400) spectra are recorded in redundant dual-order spectroscopic channels with ~40 cm2 of effective area at 1216 Å. The maiden launch of FORTIS occurred on May 10, 2013 out of the White Sands Missile Range, targeting the extended spiral galaxy M61 and nearby companion NGC 4301. We report on the final flight calibrations of the instrument, as well as the flight results.

  6. IEEE 1547 and 2030 Standards for Distributed Energy Resources Interconnection and Interoperability with the Electricity Grid

    Energy Technology Data Exchange (ETDEWEB)

    Basso, T.

    2014-12-01

    Public-private partnerships have been a mainstay of the U.S. Department of Energy and the National Renewable Energy Laboratory (DOE/NREL) approach to research and development. These partnerships also include technology development that enables grid modernization and distributed energy resources (DER) advancement, especially renewable energy systems integration with the grid. Through DOE/NREL and industry support of Institute of Electrical and Electronics Engineers (IEEE) standards development, the IEEE 1547 series of standards has helped shape the way utilities and other businesses have worked together to realize increasing amounts of DER interconnected with the distribution grid. And more recently, the IEEE 2030 series of standards is helping to further realize greater implementation of communications and information technologies that provide interoperability solutions for enhanced integration of DER and loads with the grid. For these standards development partnerships, for approximately $1 of federal funding, industry partnering has contributed $5. In this report, the status update is presented for the American National Standards IEEE 1547 and IEEE 2030 series of standards. A short synopsis of the history of the 1547 standards is first presented, then the current status and future direction of the ongoing standards development activities are discussed.

  7. An Authentication and Key Management Mechanism for Resource Constrained Devices in IEEE 802.11-based IoT Access Networks

    OpenAIRE

    Kim, Ki-Wook; Han, Youn-Hee; Min, Sung-Gi

    2017-01-01

    Many Internet of Things (IoT) services utilize an IoT access network to connect small devices with remote servers. They can share an access network with standard communication technology, such as IEEE 802.11ah. However, an authentication and key management (AKM) mechanism for resource constrained IoT devices using IEEE 802.11ah has not been proposed as yet. We therefore propose a new AKM mechanism for an IoT access network, which is based on IEEE 802.11 key management with the IEEE 802.1X aut...

  8. EXTINCTION IN THE COMA OF COMET 17P/HOLMES

    Energy Technology Data Exchange (ETDEWEB)

    Lacerda, Pedro [Astrophysics Research Centre, Queen' s University Belfast, Belfast BT7 1NN (United Kingdom); Jewitt, David, E-mail: lacerda.pedro@gmail.com [Department of Earth and Space Sciences, University of California Los Angeles (UCLA), 595 Charles Young Drive, Los Angeles, CA 90095-1567 (United States)

    2012-11-20

    On 2007 October 29, the outbursting comet 17P/Holmes passed within 0.''79 of a background star. We recorded the event using optical, narrowband photometry and detect a 3%-4% dip in stellar brightness bracketing the time of closest approach to the comet nucleus. The detected dimming implies an optical depth {tau} Almost-Equal-To 0.04 at 1.''5 from the nucleus and an optical depth toward the nucleus center {tau}{sub n} < 13.3. At the time of our observations, the coma was optically thick only within {rho} {approx}< 0.''01 from the nucleus. By combining the measured extinction and the scattered light from the coma, we estimate a dust red albedo p{sub d} = 0.006 {+-} 0.002 at {alpha} = 16 Degree-Sign phase angle. Our measurements place the most stringent constraints on the extinction optical depth of any cometary coma.

  9. Design of handoff procedures for broadband wireless access IEEE 802.16 based networks

    Directory of Open Access Journals (Sweden)

    V. Rangel–Licea

    2008-01-01

    Full Text Available IEEE 802.16 is a protocol for fixed broad band wire less access that is currently trying to add mobility among mobile users in the standard. However, mobility adds some technical barriers that should be solved first, this is the case of HO "handoff" (change of connection between two base stations "BS" by a mobile user. In this paper, the problem of HO in IEEE 802.16 is approached try ing to maintain the quality of service (QoS of mobile users. A mechanism for changing connection during HO is pre sented. A simulation model based on OPNET MODELER1 was developed to evaluate the performance of the proposed HO mechanism. Finally, this paper demonstrates that it is possible to implement a seam less HO mech a nism over IEEE 802.16 even for users with de manding applications such as voice over IP.

  10. Study of Allocation Guaranteed Time Slot Wireless Body Area Networks Based on IEEE 802.15.4

    Science.gov (United States)

    Yundra, E.; Harsono, G. D.

    2018-04-01

    This paper aims to determine the size of the Guaranteed Time Slot (GTS) on the super frame structure required for each sensor as well as to know the performance of the GTS resized system compared to the GTS standard on IEEE 802.15.4. This article proposes a scheme to improve IEEE 802.15.4 medium access control, called allocation Guaranteed Time Slot (ALGATIS). ALGATIS is expected to effectively allocate guaranteed time slot to the requested sensors, it adjusts the length of the slot in super frame duration based on the length of the packet data. This article presents a simulation experiment of IEEE 802.15.4, especially for star network, to predict the throughput of networks and average energy consumption. The simulation experiments show that the performance of ALGATIS is better than that of IEEE 802.15.4 standard in term of the throughput of networks and average energy consumption

  11. A versatile trigger and synchronization module with IEEE1588 capabilities and EPICS support

    International Nuclear Information System (INIS)

    Lopez, J.M.; Ruiz, M.; Borrego, J.; Arcas, G. de; Barrera, E.; Vega, J.

    2010-01-01

    Event timing and synchronization are two key aspects to improve in the implementation of distributed data acquisition (dDAQ) systems such as the ones used in fusion experiments. It is also of great importance the integration of dDAQ in control and measurement networks. This paper analyzes the applicability of the IEEE1588 and EPICS standards to solve these problems, and presents a hardware module implementation based in both of them that allow adding these functionalities to any DAQ. The IEEE1588 standard facilitates the integration of event timing and synchronization mechanisms in distributed data acquisition systems based on IEEE 803.3 (Ethernet). An optimal implementation of such system requires the use of network interface devices which include specific hardware resources devoted to the IEE1588 functionalities. Unfortunately, this is not the approach followed in most of the large number of applications available nowadays. Therefore, most solutions are based in software and use standard hardware network interfaces. This paper presents the development of a hardware module (GI2E) with IEEE1588 capabilities which includes USB, RS232, RS485 and CAN interfaces. This permits to integrate any DAQ element that uses these interfaces in dDAQ systems in an efficient and simple way. The module has been developed with Motorola's Coldfire MCF5234 processor and National Semiconductors's PHY DP83640T, providing it with the possibility to implement the PTP protocol of IEEE1588 by hardware, and therefore increasing its performance over other implementations based in software. To facilitate the integration of the dDAQ system in control and measurement networks the module includes a basic Input/Output Controller (IOC) functionality of the Experimental Physics and Industrial Control System (EPICS) architecture. The paper discusses the implementation details of this module and presents its applications in advanced dDAQ applications in the fusion community.

  12. Proceedings of IEEE Machine Learning for Signal Processing Workshop XVI

    DEFF Research Database (Denmark)

    Larsen, Jan

    These proceedings contains refereed papers presented at the sixteenth IEEE Workshop on Machine Learning for Signal Processing (MLSP'2006), held in Maynooth, Co. Kildare, Ireland, September 6-8, 2006. This is a continuation of the IEEE Workshops on Neural Networks for Signal Processing (NNSP......). The name of the Technical Committee, hence of the Workshop, was changed to Machine Learning for Signal Processing in September 2003 to better reflect the areas represented by the Technical Committee. The conference is organized by the Machine Learning for Signal Processing Technical Committee...... the same standard as the printed version and facilitates the reading and searching of the papers. The field of machine learning has matured considerably in both methodology and real-world application domains and has become particularly important for solution of problems in signal processing. As reflected...

  13. Capacity Evaluation for IEEE 802.16e Mobile WiMAX

    Directory of Open Access Journals (Sweden)

    Chakchai So-In

    2010-01-01

    Full Text Available We present a simple analytical method for capacity evaluation of IEEE 802.16e Mobile WiMAX networks. Various overheads that impact the capacity are explained and methods to reduce these overheads are also presented. The advantage of a simple model is that the effect of each decision and sensitivity to various parameters can be seen easily. We illustrate the model by estimating the capacity for three sample applications—Mobile TV, VoIP, and data. The analysis process helps explain various features of IEEE 802.16e Mobile WiMAX. It is shown that proper use of overhead reducing mechanisms and proper scheduling can make an order of magnitude difference in performance. This capacity evaluation method can also be used for validation of simulation models.

  14. Self-Coexistence among IEEE 802.22 Networks: Distributed Allocation of Power and Channel

    OpenAIRE

    Sayef Azad Sakin; Md. Abdur Razzaque; Mohammad Mehedi Hassan; Atif Alamri; Nguyen H. Tran; Giancarlo Fortino

    2017-01-01

    Ensuring self-coexistence among IEEE 802.22 networks is a challenging problem owing to opportunistic access of incumbent-free radio resources by users in co-located networks. In this study, we propose a fully-distributed non-cooperative approach to ensure self-coexistence in downlink channels of IEEE 802.22 networks. We formulate the self-coexistence problem as a mixed-integer non-linear optimization problem for maximizing the network data rate, which is an NP-hard one. This work explores a s...

  15. The Years of Uncertainty: Eighth Grade Family Life Education.

    Science.gov (United States)

    Carson, Mary, Ed.; And Others

    The family life sex education unit for eighth graders, "The Years of Uncertainty," consists of a series of daily lesson plans that span a 29-day period of one-hour class sessions. Topics covered are: problem solving, knowledge and attitudes, male and female reproductive systems, conception, pregnancy, birth, birth defects, venereal…

  16. PERFORMANCE STUDY OF DISTRIBUTED COORDINATION FUNCTION OVER IEEE 802.11A PHYSICAL LAYER

    Directory of Open Access Journals (Sweden)

    S. SELVAKENEDDY

    2006-06-01

    Full Text Available IEEE 802.11a is one of the latest standards to be released by the IEEE Project 802 for wireless LANs. It has specified an additional physical layer (PHY to support higher data rates, and is termed as the orthogonal frequency division multiplexing (OFDM. In order to exploit its benefits, one of the medium access control (MAC protocols specified in the IEEE 802.11 specification is called distributed coordination function (DCF. DCF is a carrier sense multiple access with collision avoidance (CSMA/CA scheme with slotted binary exponential backoff. The frames can be transmitted using the basic access scheme or the RTS/CTS scheme in DCF. It was demonstrated previously that the RTS/CTS mechanism works well in most scenarios for the previously specified PHYs. In this work, a simple simulator is developed to verify the scalability of the RTS/CTS mechanism over OFDM PHY, which supports much higher data rates.

  17. IEEE 802.11e (EDCA analysis in the presence of hidden stations

    Directory of Open Access Journals (Sweden)

    Xijie Liu

    2011-07-01

    Full Text Available The key contribution of this paper is the combined analytical analysis of both saturated and non-saturated throughput of IEEE 802.11e networks in the presence of hidden stations. This approach is an extension to earlier works by other authors which provided Markov chain analysis to the IEEE 802.11 family under various assumptions. Our approach also modifies earlier expressions for the probability that a station transmits a packet in a vulnerable period. The numerical results provide the impact of the access categories on the channel throughput. Various throughput results under different mechanisms are presented.

  18. Holmes' tremor as a delayed complication of thalamic stroke.

    Science.gov (United States)

    Martins, William Alves; Marrone, Luiz Carlos Porcello; Fussiger, Helena; Vedana, Viviane Maria; Cristovam, Rafael do Amaral; Taietti, Marjorye Z; Marrone, Antonio Carlos Huf

    2016-04-01

    Movement disorders are not commonly associated with stroke. Accordingly, thalamic strokes have rarely been associated with tremor, pseudo-athetosis and dystonic postures. We present a 75-year-old man who developed a disabling tremor 1 year after a posterolateral thalamic stroke. This tremor had low frequency (3-4 Hz), did not disappear on focus and was exacerbated by maintaining a static posture and on target pursuit, which made it very difficult to perform basic functions. MRI demonstrated an old ischemic lesion at the left posterolateral thalamus. Treatment with levodopa led to symptom control. Lesions in the midbrain, cerebellum and thalamus may cause Holmes' tremor. Delayed onset of symptoms is usually seen, sometimes appearing 2 years after the original injury. This may be due to maturation of a complex neuronal network, leading to slow dopaminergic denervation. Further studies are needed to improve our understanding of this unique disconnection syndrome. Copyright © 2015 Elsevier Ltd. All rights reserved.

  19. [Sir Arthur Conan Doyle, Sherlock Holmes and infectious diseases].

    Science.gov (United States)

    Ledermann D, Walter

    2010-10-01

    Besides a pleasant author of best sellers, Sir Arthur Conan Doyle was a medical doctor, writing excellent short stories about the exercise of his profession in England. However, even he mentions The British Medical Journal and The Lancet in the Sherlock Holmes's stories, when in the plot introduces infectious diseases, Conan Doyle ignores important discoveries in the field of tetanus. Anyway, the appearing of infectious diseases in the adventures of the detective are rare: one mention of tetanus, another of leprosy and- the most analyzed in medical literature a case of murder by inoculation of bacteria, probably the agent of melioidosis. Also he makes his hero discovers the toxic actions of a medusa and a transplant of solid organ. Little for a physician and less for an author who also wrote science fiction: it seems that the history of the great medical discoveries at the end of nineteenth century and beginning of the twentieth has passed by his side.., and he just couldn't see it.

  20. Reactive GTS Allocation Protocol for Sporadic Events Using the IEEE 802.15.4

    Directory of Open Access Journals (Sweden)

    Mukhtar Azeem

    2014-01-01

    by the IEEE 802.15.4 standard. The proposed control protocol ensures that a given offline sporadic schedule can be adapted online in a timely manner such that the static periodic schedule has not been disturbed and the IEEE 802.15.4 standard compliance remains intact. The proposed protocol is simulated in OPNET. The simulation results are analyzed and presented in this paper to prove the correctness of the proposed protocol regarding the efficient real-time sporadic event delivery along with the periodic event propagation.

  1. Proceedings of the Twenty-Eighth General Assembly Beijing 2012

    Science.gov (United States)

    Montmerle, Thierry

    2015-09-01

    Preface; 1. Inaugural ceremony; 2. Twenty-eighth General Assembly business sessions; 3. Closing ceremony; 4. Resolutions; 5. Report of Executive Committee, 2009-2012; 6. Reports on Division, Commission, and Working Group meetings; 7. Statutes, bye-laws, and working rules; 8. New members admitted at the General Assembly; 9. Divisions and their Commissions.

  2. Eighth international congress on nitrogen fixation. Final program

    Energy Technology Data Exchange (ETDEWEB)

    1990-12-31

    This volume contains the proceedings of the Eighth International Congress on Nitrogen Fixation held May 20--26, 1990 in Knoxville, Tennessee. The volume contains abstracts of individual presentations. Sessions were entitled Recent Advances in the Chemistry of Nitrogen Fixation, Plant-microbe Interactions, Limiting Factors of Nitrogen Fixation, Nitrogen Fixation and the Environment, Bacterial Systems, Nitrogen Fixation in Agriculture and Industry, Plant Function, and Nitrogen Fixation and Evolution.

  3. Eleanor McElwee and the Formation of IEEE PCS

    Science.gov (United States)

    Malone, Edward A.

    2015-01-01

    This article examines the historical professional project that created the Institute of Radio Engineers' Professional Group on Engineering Writing an Speech (IRE PGEWS)--now called the Institute of Electrical and Electronics Engineers' Professional Communication Society (IEEE PCS)--and recounts the group's early history in detail. It also traces…

  4. Using a ceptometer to validate a visual evaluation of the degree of defoliation of holm and cork oak trees

    Science.gov (United States)

    Margarida Tome; Maria Vasconcelos

    2000-01-01

    The study presented in this paper is part of a project to monitor the defoliation degree of cork and holm oak trees in stands with signs of "decline," alter application of different amounts of Aliette, a product specific for Phytophotora cinnamonii, one of the possible causes of the "decline". The specific objective was to...

  5. Finding Our Way: Eighth Graders Explore Social Networking Sites

    Science.gov (United States)

    Leland, Chris; Ociepka, Anne; Kuonen, Kate

    2012-01-01

    As adolescents spend more and more time engaging in various on line activities, teachers are questioning the role that language arts curricula might play in helping them become savvy technology users. In this study, an eighth-grade teacher responded to her students' unauthorized participation on MySpace[TM] by initiating an inquiry into social…

  6. Proceedings of the Eighth International Workshop on Advances in Electrocorticography

    NARCIS (Netherlands)

    Ritaccio, Anthony L.; Williams, Justin; Denison, Tim; Foster, Brett L.; Starr, Philip A.; Gunduz, Aysegul; Zijlmans, Maeike; Schalk, Gerwin

    2016-01-01

    Excerpted proceedings of the Eighth International Workshop on Advances in Electrocorticography (ECoG), which convened October 15–16, 2015 in Chicago, IL, are presented. The workshop series has become the foremost gathering to present current basic and clinical research in subdural brain signal

  7. On IEEE 802.15.6 IR-UWB receivers - simulations for DBPSK modulation.

    Science.gov (United States)

    Niemelä, Ville; Hämäläinen, Matti; Iinatti, Jari

    2013-01-01

    In 2002, Federal Communications Commission (FCC) was the first in defining regulations for ultra wideband (UWB) communications followed by Europe and Japan some years later. Focusing on impulse radio (IR) UWB, in 2007 was the time for the first published standard targeting in personal area networks, released by the IEEE. The second IEEE released standard including UWB definitions is targeted for wireless body area networks (WBAN) and was published in 2012. As the wireless communications has been and will be passing through almost any levels in society, the natural step with WBAN is using it in different medical, healthcare and wellbeing applications. The arguments for these are related to the modern lifestyle, in which people have increasingly more free time and are more interested in taking care of their health and wellbeing. Another challenge is the population composition, i.e., aging in developed countries which call for new solutions and procedures, particularly from cost wise. In this paper, we are evaluating UWB receivers based on the IEEE 802.15.6 physical layer definitions and capable of detecting differentially encoded modulation. The evaluation is performed using two different WBAN channel models.

  8. Mathematics achievement of Serbian eighth grade students and characteristics of mathematics curriculum

    Directory of Open Access Journals (Sweden)

    Antonijević Radovan M.

    2006-01-01

    Full Text Available This paper considers the main results and some educational implications of the TIMSS 2003 assessment conducted in Serbia, in the fields of mathematics achievement of Serbian eighth grade students and the mathematics curriculum context of their achievement. It was confirmed that Serbian eighth graders have made average scale score of 477 points, and with this achievement they are placed in the zone of intermediate international benchmarking level. The average mathematics achievement of the Serbian eighth graders is somewhat above the average international mathematics achievement. The best result was achieved in the content domain of "algebra", and the lower result in the content domains of "measurement" and "data". In the defined cognitive domains the Serbian students have achieved the best results in "solving routine problems" and "knowing facts and procedures", and the weaker result in "reasoning". Statistically significant difference was found in the mathematics achievement between girls and boys in the Serbian TIMSS 2003 sample, so the girls’ average scale score was 480 points and the same value for the boys was 473 points. The achieved results raise many questions about the contents of mathematics curriculum in Serbia, its quality and basic characteristics of its implementation. These results can be eligibly used to improve the mathematics curriculum and teaching in Serbian primary school.

  9. Singular solitons of generalized Camassa-Holm models

    International Nuclear Information System (INIS)

    Tian Lixin; Sun Lu

    2007-01-01

    Two generalizations of the Camassa-Holm system associated with the singular analysis are proposed for Painleve integrability properties and the extensions of already known analytic solitons. A remarkable feature of the physical model is that it has peakon solution which has peak form. An alternative WTC test which allowed the identifying of such models directly if formulated in terms of inserting a formed ansatz into these models. For the two models have Painleve property, Painleve-Baecklund systems can be constructed through the expansion of solitons about the singularity manifold. By the implementations of Maple, plentiful new type solitonic structures and some kink waves, which are affected by the variation of energy, are explored. If the energy is infinite in finite time, there will be a collapse in soliton systems by direct numerical simulations. Particularly, there are two collapses coexisting in our regular solitons, which occurred around its central regions. Simulation shows that in the bottom of periodic waves arises the non-zero parts of compactons and anti-compactons. We also get floating solitary waves whose amplitude is infinite. In contrary to which a finite-amplitude blow-up soliton is obtained. Periodic blow-ups are found too. Special kinks which have periodic cuspons are derived

  10. Luke May of Seattle--"America's Sherlock Holmes".

    Science.gov (United States)

    Beck, J

    1992-01-01

    This paper provides a brief biography of Luke S. May (1886-1965), whose pioneering work in forensic science in the United States has not received full recognition. May began as a private detective in Salt Lake City, Utah, shortly after the turn of the century and later established his own agency, the Revelare International Secret Service, which he moved to Seattle, Washington, in 1919. Although basically self-taught in scientific matters, May built a solid reputation among police agencies and attorneys in the Pacific Northwest and Western Canada as a serious and effective scientific investigator in the era before public crime laboratories. This reputation as "America's Sherlock Holmes" also led to his being consulted on the establishment of the first American crime laboratory at Northwestern University in Chicago, Illinois, and on a laboratory for the Royal Canadian Mounted Police at Regina, in Saskatchewan, Canada. He contributed to a landmark case of court acceptance of toolmark identification, invented specialized instruments, and founded an institute to teach scientific criminal investigation to police officers. His earliest associates were John L. Harris and J. Clark Sellers, both of whom became recognized document examiners on the West Coast and were followed by a second and a third generation of practitioners.

  11. An Authentication and Key Management Mechanism for Resource Constrained Devices in IEEE 802.11-based IoT Access Networks

    Directory of Open Access Journals (Sweden)

    Ki-Wook Kim

    2017-09-01

    Full Text Available Many Internet of Things (IoT services utilize an IoT access network to connect small devices with remote servers. They can share an access network with standard communication technology, such as IEEE 802.11ah. However, an authentication and key management (AKM mechanism for resource constrained IoT devices using IEEE 802.11ah has not been proposed as yet. We therefore propose a new AKM mechanism for an IoT access network, which is based on IEEE 802.11 key management with the IEEE 802.1X authentication mechanism. The proposed AKM mechanism does not require any pre-configured security information between the access network domain and the IoT service domain. It considers the resource constraints of IoT devices, allowing IoT devices to delegate the burden of AKM processes to a powerful agent. The agent has sufficient power to support various authentication methods for the access point, and it performs cryptographic functions for the IoT devices. Performance analysis shows that the proposed mechanism greatly reduces computation costs, network costs, and memory usage of the resource-constrained IoT device as compared to the existing IEEE 802.11 Key Management with the IEEE 802.1X authentication mechanism.

  12. An Authentication and Key Management Mechanism for Resource Constrained Devices in IEEE 802.11-based IoT Access Networks.

    Science.gov (United States)

    Kim, Ki-Wook; Han, Youn-Hee; Min, Sung-Gi

    2017-09-21

    Many Internet of Things (IoT) services utilize an IoT access network to connect small devices with remote servers. They can share an access network with standard communication technology, such as IEEE 802.11ah. However, an authentication and key management (AKM) mechanism for resource constrained IoT devices using IEEE 802.11ah has not been proposed as yet. We therefore propose a new AKM mechanism for an IoT access network, which is based on IEEE 802.11 key management with the IEEE 802.1X authentication mechanism. The proposed AKM mechanism does not require any pre-configured security information between the access network domain and the IoT service domain. It considers the resource constraints of IoT devices, allowing IoT devices to delegate the burden of AKM processes to a powerful agent. The agent has sufficient power to support various authentication methods for the access point, and it performs cryptographic functions for the IoT devices. Performance analysis shows that the proposed mechanism greatly reduces computation costs, network costs, and memory usage of the resource-constrained IoT device as compared to the existing IEEE 802.11 Key Management with the IEEE 802.1X authentication mechanism.

  13. The Mysterious Case of the Detective as Child Hero: Sherlock Holmes, Encyclopedia Brown and Nancy Drew as Role Models?

    Science.gov (United States)

    Sugarman, Sally

    In the mystery genre, the one characteristic that the enduring figures of Sherlock Holmes, Nancy Drew, and Encyclopedia Brown have in common is a rational mind. The source of their strength is their ability to think and think well. A study examined some typical examples of the mystery genre in young adult literature and surveyed children and…

  14. An analytical model for the performance analysis of concurrent transmission in IEEE 802.15.4.

    Science.gov (United States)

    Gezer, Cengiz; Zanella, Alberto; Verdone, Roberto

    2014-03-20

    Interference is a serious cause of performance degradation for IEEE802.15.4 devices. The effect of concurrent transmissions in IEEE 802.15.4 has been generally investigated by means of simulation or experimental activities. In this paper, a mathematical framework for the derivation of chip, symbol and packet error probability of a typical IEEE 802.15.4 receiver in the presence of interference is proposed. Both non-coherent and coherent demodulation schemes are considered by our model under the assumption of the absence of thermal noise. Simulation results are also added to assess the validity of the mathematical framework when the effect of thermal noise cannot be neglected. Numerical results show that the proposed analysis is in agreement with the measurement results on the literature under realistic working conditions.

  15. 0011-0030.Data Representation amp Computer Arithmetic6 IEEE ...

    Indian Academy of Sciences (India)

    Home; public; Volumes; reso; 021; 01; 0011-0030.Data Representation amp Computer Arithmetic6 IEEE Standard Double Precision FormatIn.pdf. 404! error. The page your are looking for can not be found! Please check the link or use the navigation bar at the top. YouTube; Twitter; Facebook; Blog. Academy News.

  16. African American eighth-grade female students' perceptions and experiences as learners of science literacy

    Science.gov (United States)

    Crim, Sharan R.

    The National Assessment of Educational Progress (2000) reports an achievement gap between male and female students and majority and minority students in science literacy. Rutherford and Algren (2000) describe a scientifically literate person as one who is aware that science, mathematics, and technology are interdependent human enterprises with strengths and limitations; understands key concepts and principles of science; is familiar with the natural world and recognizes both its diversity and unity; and uses scientific knowledge and scientific ways of thinking for individual and social purposes. The purpose of this qualitative case study research was to investigate African American eighth grade female students' perceptions and experiences as learners of science literacy. A social learning theory (Bandura, 1986) and constructivist theory (Vygotsky, 1977) served as a guide for the researcher. Two questions were explored: (1) What are African American eighth grade female students' perceptions and experiences as learners of science literacy? (2) In what ways do the perceptions and experiences of African American eighth grade female students influence their learning of science literacy? Purposeful sampling (Merriam, 1998) was used with four African American eighth grade female students selected as participants for the study. Data collection and analysis occurred between February and August in a single year. Data sources included an open-ended questionnaire, two in-depth interviews with each participant (Seidman, 1991); classroom observations, participant reflective journals, student artifacts, and a researcher's log. Data were analyzed through the constant comparative method (Glaser & Strauss, 1967), and richly descriptive participant portraits and qualitative case studies (Merriam, 1998) were used to report the findings. Three themes emerged from the study that positively affected the perceptions and experiences of African American eighth grade female students as

  17. Study on Additional Carrier Sensing for IEEE 802.15.4 Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Bih-Hwang Lee

    2010-06-01

    Full Text Available Wireless sensor networks based on the IEEE 802.15.4 standard are able to achieve low-power transmissions in the guise of low-rate and short-distance wireless personal area networks (WPANs. The slotted carrier sense multiple access with collision avoidance (CSMA/CA is used for contention mechanism. Sensor nodes perform a backoff process as soon as the clear channel assessment (CCA detects a busy channel. In doing so they may neglect the implicit information of the failed CCA detection and further cause the redundant sensing. The blind backoff process in the slotted CSMA/CA will cause lower channel utilization. This paper proposes an additional carrier sensing (ACS algorithm based on IEEE 802.15.4 to enhance the carrier sensing mechanism for the original slotted CSMA/CA. An analytical Markov chain model is developed to evaluate the performance of the ACS algorithm. Both analytical and simulation results show that the proposed algorithm performs better than IEEE 802.15.4, which in turn significantly improves throughput, average medium access control (MAC delay and power consumption of CCA detection.

  18. Study on additional carrier sensing for IEEE 802.15.4 wireless sensor networks.

    Science.gov (United States)

    Lee, Bih-Hwang; Lai, Ruei-Lung; Wu, Huai-Kuei; Wong, Chi-Ming

    2010-01-01

    Wireless sensor networks based on the IEEE 802.15.4 standard are able to achieve low-power transmissions in the guise of low-rate and short-distance wireless personal area networks (WPANs). The slotted carrier sense multiple access with collision avoidance (CSMA/CA) is used for contention mechanism. Sensor nodes perform a backoff process as soon as the clear channel assessment (CCA) detects a busy channel. In doing so they may neglect the implicit information of the failed CCA detection and further cause the redundant sensing. The blind backoff process in the slotted CSMA/CA will cause lower channel utilization. This paper proposes an additional carrier sensing (ACS) algorithm based on IEEE 802.15.4 to enhance the carrier sensing mechanism for the original slotted CSMA/CA. An analytical Markov chain model is developed to evaluate the performance of the ACS algorithm. Both analytical and simulation results show that the proposed algorithm performs better than IEEE 802.15.4, which in turn significantly improves throughput, average medium access control (MAC) delay and power consumption of CCA detection.

  19. IEEE P1596, a scalable coherent interface for GigaByte/sec multiprocessor applications

    International Nuclear Information System (INIS)

    Gustavson, D.B.

    1988-11-01

    IEEE P1596, the Scalable Coherent Interface (formerly known as SuperBus) is based on experience gained during the development of Fastbus (IEEE 960), Futurebus (IEEE 896.1) and other modern 32-bit buses. SCI goals include a minimum bandwidth of 1 GByte/sec per processor; efficient support of a coherent distributed-cache image of shared memory; and support for segmentation, bus repeaters and general switched interconnections like Banyan, Omega, or full crossbar networks. To achieve these ambitious goals, SCI must sacrifice the immediate handshake characteristic of the present generation of buses in favor of a packet-like split-cycle protocol. Wire-ORs, broadcasts, and even ordinary passive bus structures are to be avoided. However, a lower performance (1 GByte/sec per backplane instead of per processor) implementation using a register insertion ring architecture on a passive ''backplane'' appears to be possible using the same interface as for the more costly switch networks. This paper presents a summary of current directions, and reports the status of the work in progress

  20. Proceedings of the eighth Kerala Science Congress

    International Nuclear Information System (INIS)

    Iyengar, P.K.

    1996-01-01

    The Eighth Kerala Science Congress organised by the State Committee on Science, Technology and Environment, Government of Kerala was held at Kochi from 27-29 January 1996. The aim of this Science Congress is to support and catalyse scientific activity in different centres in the Kerala State. The topics covered in the proceedings are natural resources utilisation, ecology and environment, agriculture and allied areas, health care, technology, physical sciences, life sciences, engineering and biotechnology for development. Papers relevant to INIS are indexed separately. refs., figs., tabs

  1. The Exploration of Network Coding in IEEE 802.15.4 Networks

    Directory of Open Access Journals (Sweden)

    Deze Zeng

    2011-01-01

    communication protocol should be energy efficient. The IEEE 802.15.4 is designed as a standard protocol for low power, low data rate, low complexity, and short range connections in WPANs. The standard supports allocating several numbers of collision-free guarantee time slots (GTSs within a superframe for some time-critical transmissions. Recently, COPE was proposed as a promising network coding architecture to essentially improve the throughput of wireless networks. In this paper, we exploit the network coding technique at coordinators to improve energy efficiency of the WPAN. Some related practical issues, such as GTS allocation and multicast, are also discussed in order to exploit the network coding opportunities efficiently. Since the coding opportunities are mostly exploited, our proposal achieves both higher energy efficiency and throughput performance than the original IEEE 802.15.4.

  2. Qualification of cables to IEEE standards 323-1974 and 383-1974

    International Nuclear Information System (INIS)

    Hosticka, C.; Kingsbury, E.R.; Bruhin, A.C.

    1980-01-01

    Wire and Cable manufacturers generally qualify products for class IE application by envelope type testing to user specifications and environmental conditions recommended by IEEE Standards 323-1974 and 383-1974. The General Electric Wire and Cable Business Department recently completed two such qualification programs. Cable constructions tested were 600V control cables and 600 V, 2kV, and 15kV power cables insulated with flame resistant mineral filled crosslinked polyethylene. The 15kV samples included taped field splices. In the second test program, the steam pressure-temperature profile included a simulated main steam line break. Test specimens were wrapped on grounded mandrels and were electrically loaded throughout the simulated LOCA tests. After completion of environmental testing, samples were subjected to the IEEE 383 simulated post-LOCA test. 6 refs

  3. Qualification of cables to IEEE standards 323-1974 and 383-1974

    International Nuclear Information System (INIS)

    Hosticka, C.; Kingsbury, E.R.; Bruhin, A.C.

    1980-01-01

    Wire and Cable manufacturers generally qualify products for class IE application by envelope type testing to user specifications and environmental conditions recommended by IEEE Standards 323-1974 and 383-1974. The General Electric Wire and Cable Business Department recently completed two such qualification programs. Cable constructions tested were 600V control cables and 600 V, 2KV, and 15KV power cables insulated with flame resistant mineral filled crosslinked polyethylene. The 15KV samples included taped field splices. In the second test program, the steam pressure-temperature profile included a simulated main steam line break. Test specimens were wrapped on grounded mandrels and were electrically loaded throughout the simulated LOCA tests. After completion of environmental testing, samples were subjected to the IEEE 383 simulated post-LOCA test. 6 refs

  4. Impact of straw and rock-fragment mulches on soil moisture and early growth of holm oaks in a semiarid area

    Science.gov (United States)

    M. N. Jimenez; J. R. Pinto; M. A. Ripoll; A. Sanchez-Miranda; F. B. Navarro

    2017-01-01

    Planted seedlings and saplings usually exhibit low survival and growth rates under dry Mediterranean environments, especially late-successional species such as Quercus. In this work, we studied the effects of straw and rock fragment mulches on the establishment conditions of holm oak (Quercus ilex L. subsp. ballota (Def.) Samp.) in SE Spain. Soil moisture was...

  5. The scalable coherent interface, IEEE P1596, status and possible applications to data acquisition and physics

    International Nuclear Information System (INIS)

    Gustavson, D.B.

    1990-01-01

    IEEE P1596, the Scalable Coherent Interface (formerly known as SuperBus) is based on experience gained while developing Fastbus (ANSI/IEEE 960-1986, IEC 935), Futurebus (IEEE P896.x) and other modern 32-bit buses. SCI goals include a minimum bandwidth of 1 GByte/sec per processor in multiprocessor systems with thousands of processors; efficient support of a coherent distributed-cache image of distributed shared memory; support for repeaters which interface to existing or future buses; and support for inexpensive small rings as well as for general switched interconnections like Banyan, Omega, or crossbar networks. This paper presents a summary of current directions, reports the status of the work in progress, and suggests some applications in data acquisition and physics. 7 refs

  6. Defending IEEE 802.11-Based Networks Against Denial Of Service Attacks

    National Research Council Canada - National Science Library

    Tan, Boon

    2003-01-01

    The convenience of IEEE 8O2.11-based wireless access networks has led to widespread deployment in the consumer, industrial and military sectors However, this use is predicated on an implicit assumption of confidentiality...

  7. IEEE Std 101-1987: IEEE guide for the statistical analysis of thermal life test data

    International Nuclear Information System (INIS)

    Anon.

    1992-01-01

    This revision of IEEE Std 101-1972 describes statistical analyses for data from thermally accelerated aging tests. It explains the basis and use of statistical calculations for an engineer or scientist. Accelerated test procedures usually call for a number of specimens to be aged at each of several temperatures appreciably above normal operating temperatures. High temperatures are chosen to produce specimen failures (according to specified failure criteria) in typically one week to one year. The test objective is to determine the dependence of median life on temperature from the data, and to estimate, by extrapolation, the median life to be expected at service temperature. This guide presents methods for analyzing such data and for comparing test data on different materials

  8. Collaboration, Competition and Violence in Eighth-Grade Students' Classroom Writing.

    Science.gov (United States)

    Peterson, Shelley; Ladky, Mary

    2001-01-01

    Examines gender features in eighth-grade students' writing in terms of the relationships among characters and the use of violence, comparing the analyses to perspectives offered by the students in small group conversations. Finds evidence of competitive relationships within sports and romance stories, as well as elements of violence and metaphors…

  9. The tree identify protocol of IEEE 1394 in uCRL

    NARCIS (Netherlands)

    C. Shankland; M.B. van der Zwaag

    1998-01-01

    textabstractWe specify the tree identify protocol of the IEEE 1394 high performance serial multimedia bus at three different levels of detail using $mu$CRL. We use the cones and foci verification technique of Groote and Springintveld to show that the descriptions are equivalent under branching

  10. IEEE Std 649-1991: IEEE standard for qualifying Class 1E motor control centers for nuclear power generating stations

    International Nuclear Information System (INIS)

    Anon.

    1993-01-01

    The basic principles, requirements, and methods for qualifying Class 1E motor control centers for both harsh and mild environment applications in nuclear power generating stations are described. In addition to defining specific qualification requirements for Class 1E motor control centers and their components in accordance with the more general qualification requirements of IEEE Std 323-1983, this standard is intended to provide guidance in establishing a qualification program for demonstrating the adequacy of Class 1E motor control centers in nuclear power generating station applications

  11. The Influence of Mind Mapping on Eighth Graders' Science Achievement

    Science.gov (United States)

    Abi-El-Mona, Issam; Adb-El-Khalick, Fouad

    2008-01-01

    This study assessed the influence of using mind maps as a learning tool on eighth graders' science achievement, whether such influence was mediated by students' prior scholastic achievement, and the relationship between students' mind maps and their conceptual understandings. Sixty-two students enrolled in four intact sections of a grade 8 science…

  12. IEEE 802.3 Fiber Optic Inter-Repeater Link

    Science.gov (United States)

    Tarrant, Peter J.

    1987-01-01

    This paper describes the implementation of a fiber optic inter-repeater link (FOIRL), used for connecting two remote copper segments of an IEEE 802.3 local area network. The rationale for the design, the signalling used and the collision detection mechanism is discussed. The evolution of the draft international standard for the FOIRL and the concurrence amongst various manufacturers is also presented. Finally some examples of typical applications, highlighting the ease of installation, are given.

  13. Soda-anthraquinone, kraft and organosolv pulping of holm oak trimmings.

    Science.gov (United States)

    Alaejos, J; López, F; Eugenio, M E; Tapias, R

    2006-11-01

    The operating conditions for an organosolv (ethyleneglycol) and two alkaline (soda-anthraquinone and kraft) processes for obtaining cellulose pulp and paper from holm oak (Quercus ilex) wood trimmings were optimized. A range of variation for each process variable (viz. temperature, cooking time and soda or ethyleneglycol concentration) was established and a central composite experimental design involving three independent variables at three different variation levels was applied. The results obtained with the three cooking processes used were compared and those provided by the kraft process were found to be the best. Thus, the tensile index values it provided (5.9-16.3 N m/g) were 23.7% and 41.5% better than those obtained with the soda-AQ and ethyleneglycol processes, respectively. Also, the kraft process provided the best burst index, brightness and kappa number values. Based on the optimum working ranges, the temperature and cooking time were the variables resulting in the most and least marked changes, respectively, in pulp properties.

  14. ARC Researchers at IEEE 2015 Vehicle Power and Propulsion Conference

    Science.gov (United States)

    Contacts Researchers News & Events Event Calendar Annual Program Review Research Seminars Press Room Event Archives ARC Researchers at the IEEE 2015 Vehicle Power and Propulsion Conference (October 19-22 Ballroom B P-SS4-2 Comparison of SOFC and PEM Fuel Cell Hybrid Power Management Strategies for Mobile

  15. Analysis and Enhancement of IEEE 802.15.4e DSME Beacon Scheduling Model

    Directory of Open Access Journals (Sweden)

    Kwang-il Hwang

    2014-01-01

    Full Text Available In order to construct a successful Internet of things (IoT, reliable network construction and maintenance in a sensor domain should be supported. However, IEEE 802.15.4, which is the most representative wireless standard for IoT, still has problems in constructing a large-scale sensor network, such as beacon collision. To overcome some problems in IEEE 802.15.4, the 15.4e task group proposed various different modes of operation. Particularly, the IEEE 802.15.4e deterministic and synchronous multichannel extension (DSME mode presents a novel scheduling model to solve beacon collision problems. However, the DSME model specified in the 15.4e draft does not present a concrete design model but a conceptual abstract model. Therefore, in this paper we introduce a DSME beacon scheduling model and present a concrete design model. Furthermore, validity and performance of DSME are evaluated through experiments. Based on experiment results, we analyze the problems and limitations of DSME, present solutions step by step, and finally propose an enhanced DSME beacon scheduling model. Through additional experiments, we prove the performance superiority of enhanced DSME.

  16. Hélène Machinal. Conan Doyle, de Sherlock Holmes au Professeur Challenger

    Directory of Open Access Journals (Sweden)

    Max DUPERRAY

    2006-06-01

    Full Text Available Hélène Machinal a publié sa thèse sur Conan Doyle en un ouvrage des Presses Universitaires de Rennes qui comblera un vide relatif en balayant la totalité de l’œuvre du père de Sherlock Holmes. Les différentes facettes de l’œuvre monumentale sont systématiquement explorées pour mettre en relief l’ultime cohérence de son traitement de l’imaginaire contextualisé dans une période de forte intensité spéculative. À l’instar de Stevenson ou d’H. G. Wells, en écho à Chesterton parfois, entre autres, ...

  17. A Fast MAC-Layer Handover for an IEEE 802.16e-Based WMAN

    Science.gov (United States)

    Ray, Sayan K.; Pawlikowski, Krzysztof; Sirisena, Harsha

    We propose a modification of the IEEE 802.16e hard handover (HHO) procedure, which significantly reduces the handover latency constraint of the original HHO procedure in IEEE 802.16e networks. It allows a better handling of the delay-sensitive traffic by avoiding unnecessary time-consuming scanning and synchronization activity as well as simplifies the network re-entry procedure. With the help of the backhaul network, it reduces the number of control messages in the original handover policy, making the handover latency acceptable also for real-time streaming traffic. Preliminary performance evaluation studies show that the modified handover procedure is able to reduce the total handover latency by about 50%.

  18. Comet 17P/Holmes: contrast in activity between before and after the 2007 outburst

    Energy Technology Data Exchange (ETDEWEB)

    Ishiguro, Masateru; Kim, Yoonyoung; Warjurkar, Dhanraj S.; Ham, Ji-Beom [Department of Physics and Astronomy, Seoul National University, Gwanak, Seoul 151-742 (Korea, Republic of); Kim, Junhan [Department of Astronomy and Steward Observatory, University of Arizona, 933 North Cherry Avenue, Tucson, AZ 85721 (United States); Usui, Fumihiko [Department of Astronomy, Graduate School of Science, The University of Tokyo, 7-3-1 Hongo, Bunkyo-ku, Tokyo 113-0033 (Japan); Vaubaillon, Jeremie J. [Observatoire de Paris, I.M.C.C.E., Denfert Rochereau, Bat. A., F-75014 Paris (France); Ishihara, Daisuke [Department of Physics, School of Science, Nagoya University, Furo-cho, Chikusa-ku, Nagoya, Aichi 464-8602 (Japan); Hanayama, Hidekazu [Ishigakijima Astronomical Observatory, National Astronomical Observatory of Japan, Ishigaki, Okinawa 907-0024 (Japan); Sarugaku, Yuki; Hasegawa, Sunao [Institute of Space and Astronautical Science, Japan Aerospace Exploration Agency, 3-1-1 Yoshinodai, Chuo-ku, Sagamihara, Kanagawa 252-5210 (Japan); Kasuga, Toshihiro; Watanabe, Jun-ichi [National Astronomical Observatory, 2-21-1 Osawa, Mitaka, Tokyo 181-8588 (Japan); Pyo, Jeonghyun [Korea Astronomy and Space Science Institute, Daejeon 305-348 (Korea, Republic of); Kuroda, Daisuke [National Institutes of Natural Sciences, Okayama Astrophysical Observatory, Kamogata-cho, Okayama 719-0232 (Japan); Ootsubo, Takafumi [Astronomical Institute, Tohoku University, Aramaki, Aoba-ku, Sendai 980-8578 (Japan); Sakamoto, Makoto; Narusawa, Shin-ya; Takahashi, Jun [Nishi-Harima Astronomical Observatory, Center for Astronomy, University of Hyogo, Sayo, Hyogo 679-5313 (Japan); Akisawa, Hiroki, E-mail: ishiguro@astro.snu.ac.kr [Himeji City Science Museum, Himeji, Hyogo 671-2222 (Japan)

    2013-11-20

    A Jupiter-family comet, 17P/Holmes, underwent outbursts in 1892 and 2007. In particular, the 2007 outburst is known as the greatest outburst over the past century. However, little is known about the activity before the outburst because it was unpredicted. In addition, the time evolution of the nuclear physical status has not been systematically studied. Here, we study the activity of 17P/Holmes before and after the 2007 outburst through optical and mid-infrared observations. We found that the nucleus was highly depleted in its near-surface icy component before the outburst but that it became activated after the 2007 outburst. Assuming a conventional 1 μm sized grain model, we derived a surface fractional active area of 0.58% ± 0.14% before the outburst whereas the area was enlarged by a factor of ∼50 after the 2007 outburst. We also found that large (≥1 mm) particles could be dominant in the dust tail observed around aphelion. Based on the size of the particles, the dust production rate was ≳170 kg s{sup –1} at a heliocentric distance of r{sub h} = 4.1 AU, suggesting that the nucleus was still active around the aphelion passage. The nucleus color was similar to that of the dust particles and average for a Jupiter-family comet but different from that of most Kuiper Belt objects, implying that color may be inherent to icy bodies in the solar system. On the basis of these results, we concluded that more than 76 m of surface material was blown off by the 2007 outburst.

  19. Flouting maxim by sherlock holmes and dr. Watson in tv series Of sherlock season

    Directory of Open Access Journals (Sweden)

    Lina Affifatusholihah

    2017-04-01

    In running daily activities, people will always meet and interact with other people, and language is a medium that is used by humans to interact with each other. In a conversation or discussion, everyone should pay attention to the four maxims in order that there are no errors in communication. However, it is not uncommon that the four rules above are breached by the speakers. This is called non-observance of the maxims, and one of a non-observance of the maxims that often occurs in is flouting maxim. The aims of this paper are to describe types of maxims that are flouted by Sherlock Holmes and dr. Watson as well as to describe how the maxims are flouted in Sherlock TV series season 1. This research used qualitative descriptive method. The researcher classifies the utterances to know what kind of maxim which are flouted, categorizes those into the category based on the Grice’s theory of Cooperative Principle, namely: maxim of quantity, quality, relation and manner. The research procedure begin by searching the script in the internet, matching the utterances in the script and in film and sorting the utterances between Sherlock Holmes and dr. Watson as well observing every word or sentence which are flouted by the main characters. The findings find that all kinds of maxims are flouted by Sherlock and dr. Watson. The result of analysis shows that the maxim flouted when the speakers say something irrelevant; something roguishness or lied to hide the truth in the form of rhetorical question; the information becomes more or too informative than what is required; and something obscurity of expression, ambiguity, or unnecessary prolixity.

  20. Comet 17P/Holmes: contrast in activity between before and after the 2007 outburst

    International Nuclear Information System (INIS)

    Ishiguro, Masateru; Kim, Yoonyoung; Warjurkar, Dhanraj S.; Ham, Ji-Beom; Kim, Junhan; Usui, Fumihiko; Vaubaillon, Jeremie J.; Ishihara, Daisuke; Hanayama, Hidekazu; Sarugaku, Yuki; Hasegawa, Sunao; Kasuga, Toshihiro; Watanabe, Jun-ichi; Pyo, Jeonghyun; Kuroda, Daisuke; Ootsubo, Takafumi; Sakamoto, Makoto; Narusawa, Shin-ya; Takahashi, Jun; Akisawa, Hiroki

    2013-01-01

    A Jupiter-family comet, 17P/Holmes, underwent outbursts in 1892 and 2007. In particular, the 2007 outburst is known as the greatest outburst over the past century. However, little is known about the activity before the outburst because it was unpredicted. In addition, the time evolution of the nuclear physical status has not been systematically studied. Here, we study the activity of 17P/Holmes before and after the 2007 outburst through optical and mid-infrared observations. We found that the nucleus was highly depleted in its near-surface icy component before the outburst but that it became activated after the 2007 outburst. Assuming a conventional 1 μm sized grain model, we derived a surface fractional active area of 0.58% ± 0.14% before the outburst whereas the area was enlarged by a factor of ∼50 after the 2007 outburst. We also found that large (≥1 mm) particles could be dominant in the dust tail observed around aphelion. Based on the size of the particles, the dust production rate was ≳170 kg s –1 at a heliocentric distance of r h = 4.1 AU, suggesting that the nucleus was still active around the aphelion passage. The nucleus color was similar to that of the dust particles and average for a Jupiter-family comet but different from that of most Kuiper Belt objects, implying that color may be inherent to icy bodies in the solar system. On the basis of these results, we concluded that more than 76 m of surface material was blown off by the 2007 outburst.

  1. The IEEE 1355 Standard. Developments, performance and application in high energy physics

    International Nuclear Information System (INIS)

    Haas, S.

    1998-12-01

    The data acquisition systems of the next generation High Energy Physics experiments at the Large Hadron Collider (LHC) at CERN will rely on high-speed point-to-point links and switching networks for their higher level trigger and event building systems. This thesis provides a detailed evaluation of the DS-Link and switch technology, which is based on the IEEE 1355 standard for Heterogeneous Interconnect (HIC). The DS-Link is a bidirectional point-to-point serial interconnect, operating at speeds up to 200 MBaud. The objective of this thesis was to study the performance of the IEEE 1355 link and switch technology and to demonstrate that switching networks using this technology would scale to meet the requirements of the High Energy Physics applications

  2. A PROPOSED NOVEL ARCHITECTURE OF EC CONTROL SYSTEM USING IEEE 802.11n NETWORK AT ITER-INDIA GYROTRON TEST FACILITY

    Directory of Open Access Journals (Sweden)

    Deepak Mandge

    2017-06-01

    Full Text Available IEEE 802.11 Wi-Fi networks are increasingly becoming popular for its use in industrial applications. With the availability of recent amendments to IEEE 802.11 series of standards, particularly IEEE 802.11n, the adoption of Wi-Fi networks for process automation is gaining more focus and importance. The installation of Wireless networks naturally provides reduction in cable and its maintenance related costs, provides increased flexibility and mobility to enhance performance of industrial control system. The IEEE 802.11n supports parameterization that can be set for particular industrial applications and hence it has addressed to the aspects of timeliness and criticality to some extent. This paper proposes the use of IEEE 802.11n network to interconnect field instruments with Siemens PLC controller in harsh EMI/EMC environment. An application example is shown where the alternate control system architecture is developed in which non-critical and non-safety signals are communicated over Wi-Fi. While, for critical and safety signals, traditional hardwired signals methods can be implemented.

  3. Homeland Security Affairs Journal, Supplement - 2012: IEEE 2011 Conference on Technology for Homeland Security: Best Papers

    OpenAIRE

    2012-01-01

    Homeland Security Affairs is the peer-reviewed online journal of the Naval Postgraduate School Center for Homeland Defense and Security (CHDS), providing a forum to propose and debate strategies, policies, and organizational arrangements to strengthen U.S. homeland security. The instructors, participants, alumni, and partners of CHDS represent the leading subject matter experts and practitioners in the field of homeland security. IEEE Supplement 2012. Supplement: IEEE 2011 Conference on Te...

  4. FPGA implementation cost and performance evaluation of IEEE 802.11 protocol encryption security schemes

    Science.gov (United States)

    Sklavos, N.; Selimis, G.; Koufopavlou, O.

    2005-01-01

    The explosive growth of internet and consumer demand for mobility has fuelled the exponential growth of wireless communications and networks. Mobile users want access to services and information, from both internet and personal devices, from a range of locations without the use of a cable medium. IEEE 802.11 is one of the most widely used wireless standards of our days. The amount of access and mobility into wireless networks requires a security infrastructure that protects communication within that network. The security of this protocol is based on the wired equivalent privacy (WEP) scheme. Currently, all the IEEE 802.11 market products support WEP. But recently, the 802.11i working group introduced the advanced encryption standard (AES), as the security scheme for the future IEEE 802.11 applications. In this paper, the hardware integrations of WEP and AES are studied. A field programmable gate array (FPGA) device has been used as the hardware implementation platform, for a fair comparison between the two security schemes. Measurements for the FPGA implementation cost, operating frequency, power consumption and performance are given.

  5. Performance Evaluation of Beacon-Enabled Mode for IEEE 802.15.4 Wireless Sensor Network

    Directory of Open Access Journals (Sweden)

    M. Udin Harun Al Rasyid

    2013-12-01

    Full Text Available IEEE 802.15.5 standard support structure of star and peer-to-peer network formation. Strating from these, the cluster tree network can be built as a special case of peer-to-peer network to increse coverage area. In this paper, we provide an performance evaluation of beacon- enabled mode for IEEE 802.15.4 wireless sensor network on star and cluster topology in order to get the maximum result to apply the appropriate topology model as needed. We conduct analysis on each topology model by using the numbers of nodes from 10 nodes to 100 nodes to analyze throughput, delay, energy consumption, and probability success packet by using NS2 simulator. The simulation results show that the throughput and the probability of success packet of cluster topology are higher than that of star topology, and the energy consumption of cluster topology is lesser than that of star topology. However, cluster topology increases the delay more than star topology. Keywords: IEEE 802.15.4, wireless sensor network, beacon-enabled mode, topology, csma/ca

  6. FPGA implementation cost and performance evaluation of IEEE 802.11 protocol encryption security schemes

    International Nuclear Information System (INIS)

    Sklavos, N; Selimis, G; Koufopavlou, O

    2005-01-01

    The explosive growth of internet and consumer demand for mobility has fuelled the exponential growth of wireless communications and networks. Mobile users want access to services and information, from both internet and personal devices, from a range of locations without the use of a cable medium. IEEE 802.11 is one of the most widely used wireless standards of our days. The amount of access and mobility into wireless networks requires a security infrastructure that protects communication within that network. The security of this protocol is based on the wired equivalent privacy (WEP) scheme. Currently, all the IEEE 802.11 market products support WEP. But recently, the 802.11i working group introduced the advanced encryption standard (AES), as the security scheme for the future IEEE 802.11 applications. In this paper, the hardware integrations of WEP and AES are studied. A field programmable gate array (FPGA) device has been used as the hardware implementation platform, for a fair comparison between the two security schemes. Measurements for the FPGA implementation cost, operating frequency, power consumption and performance are given

  7. Validation of IEEE P1547.1 Interconnection Test Procedures: ASCO 7000 Soft Load Transfer System

    Energy Technology Data Exchange (ETDEWEB)

    Kroposki, B.; Englebretson, S.; Pink, C.; Daley, J.; Siciliano, R.; Hinton, D.

    2003-09-01

    This report presents the preliminary results of testing the ASCO 7000 Soft Load Transfer System according to IEEE P1547.1 procedures. The ASCO system interconnects synchronous generators with the electric power system and provides monitoring and control for the generator and grid connection through extensive protective functions. The purpose of this testing is to evaluate and give feedback on the contents of IEEE Draft Standard P1547.1 Conformance Tests Procedures for Equipment Interconnecting Distributed Resources With Electric Power Systems.

  8. Middle School Math Acceleration and Equitable Access to Eighth-Grade Algebra: Evidence from the Wake County Public School System

    Science.gov (United States)

    Dougherty, Shaun M.; Goodman, Joshua S.; Hill, Darryl V.; Litke, Erica G.; Page, Lindsay C.

    2015-01-01

    Taking algebra by eighth grade is considered an important milestone on the pathway to college readiness. We highlight a collaboration to investigate one district's effort to increase middle school algebra course-taking. In 2010, the Wake County Public Schools began assigning middle school students to accelerated math and eighth-grade algebra based…

  9. Eighth ITER negotiations meeting (N-8)

    International Nuclear Information System (INIS)

    Korzhavin, V.

    2003-01-01

    The eighth ITER Negotiations meeting was held on 18-19 February, 2003 in St. Petersburg, Russia. The delegations of People's Republic of China and the USA joined those from Canada, The European Union, Japan and the Russian federation in their efforts to reach agreement on the implementation of the ITER project. The delegations took note of the progress of discussions on procurement allocations, ITER decommissioning issues, management structure and intellectual property rights. The Negotiators approved the report on the Joint Assessment of Specific Sites and noted the report on the start of the ITER Transitional Arrangements (ITA). The delegations also noted that China has stated its willingness to participate in ITA and that the USA is considering participation

  10. Eighth International Chorea-Acanthocytosis Symposium : Summary of Workshop Discussion and Action Points

    NARCIS (Netherlands)

    Pappas, Samuel S; Bonifacino, Juan; Danek, Adrian; Dauer, William T; De, Mithu; De Franceschi, Lucia; DiPaolo, Gilbert; Fuller, Robert; Haucke, Volker; Hermann, Andreas; Kornmann, Benoit; Landwehrmeyer, Bernhard; Levin, Johannes; Neiman, Aaron M; Rudnicki, Dobrila D; Sibon, Ody; Velayos-Baeza, Antonio; Vonk, Jan J; Walker, Ruth H; Weisman, Lois S; Albin, Roger L

    2017-01-01

    Chorea-Acanthocytosis (ChAc) is a rare hereditary neurological disorder characterized by abnormal movements, red blood cell pathology, and progressive neurodegeneration. Little is understood of the pathogenesis of ChAc and related disorders (collectively Neuroacanthocytosis). The Eighth

  11. Joint Coal Board. Thirty-eighth annual report 1984/1985. [New South Wales

    Energy Technology Data Exchange (ETDEWEB)

    1986-01-01

    The thirty-eighth annual report of the Joint Coal Board is presented. Included are the major activities of the Board, general statistics of the New South Wales coal industry, an industry review and the Board's financial statements.

  12. Editorial for the IEEE Transactions on Power Electronics, January 2009

    DEFF Research Database (Denmark)

    Blaabjerg, Frede

    2009-01-01

    I am entering the fourth year as the Editor in Chief of the IEEE TRANSACTIONS ON POWER ELECTRONICS. A position like this becomes more and more important for the technical field as publishing in a peer-reviewed highly ranked journal has influence on the industrial and academic career. It is a way...

  13. The eighth NASA total quality management accomplishments report, 1990

    Science.gov (United States)

    1990-01-01

    The eighth annual accomplishments report provides numerous examples of quality strategies that have proven effective and efficient in a time when cost reduction is critical. NASA's continuous improvement efforts can provide insight for others to succeed in their own endeavors. The report covers: top management leadership and support, strategic planning, focus on the customer, employee training and recognition, employee empowerment and teamwork, measurement and analysis, and quality assurance.

  14. An IEEE 802.11 EDCA Model with Support for Analysing Networks with Misbehaving Nodes

    Directory of Open Access Journals (Sweden)

    Szott Szymon

    2010-01-01

    Full Text Available We present a novel model of IEEE 802.11 EDCA with support for analysing networks with misbehaving nodes. In particular, we consider backoff misbehaviour. Firstly, we verify the model by extensive simulation analysis and by comparing it to three other IEEE 802.11 models. The results show that our model behaves satisfactorily and outperforms other widely acknowledged models. Secondly, a comparison with simulation results in several scenarios with misbehaving nodes proves that our model performs correctly for these scenarios. The proposed model can, therefore, be considered as an original contribution to the area of EDCA models and backoff misbehaviour.

  15. The Predictive Validity of CBM Writing Indices for Eighth-Grade Students

    Science.gov (United States)

    Amato, Janelle M.; Watkins, Marley W.

    2011-01-01

    Curriculum-based measurement (CBM) is an alternative to traditional assessment techniques. Technical work has begun to identify CBM writing indices that are psychometrically sound for monitoring older students' writing proficiency. This study examined the predictive validity of CBM writing indices in a sample of 447 eighth-grade students.…

  16. Transient Stability Improvement of IEEE 9 Bus System Using Power World Simulator

    Directory of Open Access Journals (Sweden)

    Kaur Ramandeep

    2016-01-01

    Full Text Available The improvement of transient stability of power system was one of the most challenging research areas in power engineer.The main aim of this paper was transient stability analysis and improvement of IEEE 9 bus system. These studies were computed using POWER WORLD SIMULATOR. The IEEE 9 bus system was modelled in power world simulator and load flow studies were performed to determine pre-fault conditions in the system using Newton-Raphson method. The transient stability analysis was carried out using Runga method during three-phase balanced fault. For the improvement transient stability, the general methods adopted were fast acting exciters, FACT devices and addition of parallel transmission line. These techniques play an important role in improving the transient stability, increasing transmission capacity and damping low frequency oscillations.

  17. Evaluation of the Effects of Hidden Node Problems in IEEE 802.15.7 Uplink Performance.

    Science.gov (United States)

    Ley-Bosch, Carlos; Alonso-González, Itziar; Sánchez-Rodríguez, David; Ramírez-Casañas, Carlos

    2016-02-06

    In the last few years, the increasing use of LEDs in illumination systems has been conducted due to the emergence of Visible Light Communication (VLC) technologies, in which data communication is performed by transmitting through the visible band of the electromagnetic spectrum. In 2011, the Institute of Electrical and Electronics Engineers (IEEE) published the IEEE 802.15.7 standard for Wireless Personal Area Networks based on VLC. Due to limitations in the coverage of the transmitted signal, wireless networks can suffer from the hidden node problems, when there are nodes in the network whose transmissions are not detected by other nodes. This problem can cause an important degradation in communications when they are made by means of the Carrier Sense Multiple Access with Collision Avoidance (CSMA/CA) access control method, which is used in IEEE 802.15.7 This research work evaluates the effects of the hidden node problem in the performance of the IEEE 802.15.7 standard We implement a simulator and analyze VLC performance in terms of parameters like end-to-end goodput and message loss rate. As part of this research work, a solution to the hidden node problem is proposed, based on the use of idle patterns defined in the standard. Idle patterns are sent by the network coordinator node to communicate to the other nodes that there is an ongoing transmission. The validity of the proposed solution is demonstrated with simulation results.

  18. Simultaneous transmission of the IEEE 802.11 radio signal and optical Gbit Ethernet over the multimode fiber link

    Science.gov (United States)

    Maksymiuk, L.; Podziewski, A.

    2015-09-01

    In the paper we present a successful joint transmission of the IEEE 802.11 signal and an optical Gbit Ethernet over a multimode fiber based link. Most importantly, the multiplexation of both signals was performed in the optical domain. Due to the utilization of the multimode fiber the OBI noise was avoided and both channels were able to operate at the same wavelength. We prove that potential RoF link for IEEE 802.11 signal distribution may be used to additionally transmit other signals as Gbit Ethernet and therefore utilize the fiber infrastructure installed more effectively. The qualities of both the IEEE 802.11 and Ethernet transmissions fulfilled the requirements imposed by appropriate standards.

  19. Proceedings of the eighth national conference on research in physics

    International Nuclear Information System (INIS)

    2005-01-01

    This is a book of abstracts of the oral presentations that were presented during the eighth national conference on research in physics that was held from 20 to 23 deecember 2005 in Tunisia (Elkantaoui- Sousse). The following themes were covered : Nuclear and theoretical physics; Optical, molecular and atomic physics; Condensed matter physics; Soft matter physics; Mechanis; Thermal transfert; Electronics; physics engineering

  20. Sentenced to Die: Capital Punishment and the Eighth Amendment. Teacher's Guide.

    Science.gov (United States)

    Madden, Mary

    This teacher's guide is designed to accompany the three-part videotape "Sentenced to Die." The videotape and teacher's guide should help students to: (1) understand the history of the Eighth Amendment; (2) examine the controversy surrounding the death penalty; (3) compare and contrast differing viewpoints on capital punishment; and (4)…

  1. Course Placement Series: Spotlight on Eighth Grade Algebra I. Policy Brief

    Science.gov (United States)

    Tennessee Department of Education, 2015

    2015-01-01

    The Tennessee Department of Education explored course enrollment patterns in an effort to better understand in which courses students are enrolling and whether course enrollment policies and procedures are promoting students' interests. This report focuses on eighth grade Algebra I enrollment, which can propel students to take more rigorous math…

  2. Implementation of IEEE-1588 timing and synchronization for ATCA control and data acquisition systems

    International Nuclear Information System (INIS)

    Correia, Miguel; Sousa, Jorge; Combo, Álvaro; Rodrigues, António P.; Carvalho, Bernardo B.; Batista, António J.N.; Gonçalves, Bruno; Correia, Carlos M.B.A.; Varandas, Carlos A.F.

    2012-01-01

    Highlights: ► IEEE-1588 over Ethernet protocol is implemented for the synchronization of all clock signals of an ATCA AMC carrier module. ► The ATCA hardware consists of an AMC quad-carrier main-board with PCI Express switching. ► IEEE-1588 is to be implemented on a Virtex-6 FPGA. ► Timing signals on the ATX-AMC4-PTP are managed and routed by a crosspoint-switch implemented on a Virtex-6 FPGA. ► Each clock signal source may be independently located (on each of the AMC cards, RTM or ATCA backplane). - Abstract: Control and data acquisition (C and DA) systems for Fusion experiments are required to provide accurate timing and synchronization (T and S) signals to all of its components. IPFN adopted PICMG's Advanced Telecommunications Computing Architecture (ATCA) industry standard to develop C and DA instrumentation. ATCA was chosen not only for its high throughput characteristics but also for its high availability (HA) features which become of greater importance in steady-state operation scenarios. However, the specified ATCA clock and synchronization interface may be too limited for the timing and synchronization needs in advanced Physics experiments. Upcoming specification extensions, developed by the “xTCA for Physics” workgroups, will contemplate, among others, a complementary timing specification, developed by the PICMG xTCA for Physics IO, Timing and Synchronization Technical Committee. The IEEE-1588 Precision Time Protocol (PTP) over Ethernet is one of the protocols, proposed by the Committee, aiming for precise synchronization of clocks in measurement and control systems, based on low jitter and slave-to-slave skew criteria. The paper presents an implementation of IEEE-1588 over Ethernet, in an ATCA hardware platform. The ATCA hardware consists of an Advanced Mezzanine Card (AMC) quad-carrier front board with PCI Express switching. IEEE-1588 is to be implemented on a Virtex-6 FPGA. Ethernet connectivity with the remote master clock is located on

  3. The rhizosphere microbiome of burned holm-oak: potential role of the genus Arthrobacter in the recovery of burned soils.

    Science.gov (United States)

    Fernández-González, Antonio J; Martínez-Hidalgo, Pilar; Cobo-Díaz, José F; Villadas, Pablo J; Martínez-Molina, Eustoquio; Toro, Nicolás; Tringe, Susannah G; Fernández-López, Manuel

    2017-07-20

    After a forest wildfire, the microbial communities have a transient alteration in their composition. The role of the soil microbial community in the recovery of an ecosystem following such an event remains poorly understood. Thus, it is necessary to understand the plant-microbe interactions that occur in burned soils. By high-throughput sequencing, we identified the main bacterial taxa of burnt holm-oak rhizosphere, then we obtained an isolate collection of the most abundant genus and its growth promoting activities were characterised. 16S rRNA amplicon sequencing showed that the genus Arthrobacter comprised more than 21% of the total community. 55 Arthrobacter strains were isolated and characterized using RAPDs and sequencing of the almost complete 16S rRNA gene. Our results indicate that isolated Arthrobacter strains present a very high genetic diversity, and they could play an important ecological role in interaction with the host plant by enhancing aerial growth. Most of the selected strains exhibited a great ability to degrade organic polymers in vitro as well as possibly presenting a direct mechanism for plant growth promotion. All the above data suggests that Arthrobacter can be considered as an excellent PGP rhizobacterium that may play an important role in the recovery of burned holm-oak forests.

  4. Comparison of IEEE383-2003 and IEC60505-2004 standards for harmonization of environmental qualification procedure of electric cable

    International Nuclear Information System (INIS)

    Kim, Jong Seog; Jeong, Sun Chul; Park, Kyung Heum; Jang, Kyung Nam

    2010-01-01

    Needs for harmonization of international equipment qualification(EQ) standards have been raised several years due to purchasing problem of nuclear equipment supplied from abroad country. To meet the regulatory requirement of domestic nuclear power plant, manufacturers have to qualify their equipment in accordance with each standard such as IEEE, IEC and RCC-E. Double qualification increase the equipment cost, which result in high construction cost. Even the unification of each standard have been discussed several years, we have got the long way to go yet. Comparison and harmonization of each international standard will give help to purchase the equipment qualified by not endorsed standard. Environmental qualification, seismic qualification and EMI/EMC qualification are major targets for harmonization. Since concern about cable qualification of 60 years life has been raised recently, harmonization of cable qualification standard also needs to be discussed. KEPRI launched a project for harmonization of EQ relative standards such as IEEE, IEC and RCC-E. A study for harmonization of IEEE323 and IEC60780 is known in progress by IEEE committee. In this paper, harmonization of international standards for cable qualification will be discussed. IEEE383 standard is qualification standard for electric cable broadly used in Asian pacific area while IEC60505 is mostly used in European area. Since these two standards have different requirements for environmental qualification of cable, problem can be happened in the plant site when they purchase cable qualified by not endorsed standard. IEEE383-2003 and IEC60505-2004 is the latest version of each standard. Comparison results and recommendations for harmonization of these two standards are introduced herein

  5. An Improved Cross-Layering Design for IPv6 Fast Handover with IEEE 802.16m Entry Before Break Handover

    Science.gov (United States)

    Kim, Ronny Yongho; Jung, Inuk; Kim, Young Yong

    IEEE 802.16m is an advanced air interface standard which is under development for IMT-Advanced systems, known as 4G systems. IEEE 802.16m is designed to provide a high data rate and a Quality of Service (QoS) level in order to meet user service requirements, and is especially suitable for mobilized environments. There are several factors that have great impact on such requirements. As one of the major factors, we mainly focus on latency issues. In IEEE 802.16m, an enhanced layer 2 handover scheme, described as Entry Before Break (EBB) was proposed and adopted to reduce handover latency. EBB provides significant handover interruption time reduction with respect to the legacy IEEE 802.16 handover scheme. Fast handovers for mobile IPv6 (FMIPv6) was standardized by Internet Engineering Task Force (IETF) in order to provide reduced handover interruption time from IP layer perspective. Since FMIPv6 utilizes link layer triggers to reduce handover latency, it is very critical to jointly design FMIPv6 with its underlying link layer protocol. However, FMIPv6 based on new handover scheme, EBB has not been proposed. In this paper, we propose an improved cross-layering design for FMIPv6 based on the IEEE 802.16m EBB handover. In comparison with the conventional FMIPv6 based on the legacy IEEE 802.16 network, the overall handover interruption time can be significantly reduced by employing the proposed design. Benefits of this improvement on latency reduction for mobile user applications are thoroughly investigated with both numerical analysis and simulation on various IP applications.

  6. Sherlock Holmes and the case of the plagiarised paper.

    Science.gov (United States)

    Kennedy, David

    2011-07-01

    Narrative pedagogy has the power to explore issues in a way that expository teaching cannot match. Moon and Fowler (2008, p.236), for example, point out that fiction has much to offer in focusing creatively on issues, exploring subtleties and discussing related emotional dynamics. But they comment that in nurse education fiction is 'a relatively untapped' (though valuable) resource for teaching. 'Sherlock Holmes and the Case of the Plagiarised Paper' is a fictional account that responds to Moon and Fowler's challenge. It explores a controversial issue--student plagiarism. The narrative sets the discussion in a fictional context--an interaction between fictional characters and a real character. It explores difficulties that novice writers have in avoiding plagiarism. It debates how teachers may respond to student plagiarism. It contextualises student plagiarism in the wider world of academic plagiarism. Its purpose is to enable the reader to identify and act on these issues in a way that an expository examination of student plagiarism could not achieve. In response to suggestions from reviewers, the article has an Appendix which outlines some of the issues and techniques associated with the use of fiction in nursing education. Copyright © 2010 Elsevier Ltd. All rights reserved.

  7. Attacks on IEEE 802.11 wireless networks

    Directory of Open Access Journals (Sweden)

    Dejan Milan Tepšić

    2013-06-01

    Full Text Available Security of wireless computer networks was initially secured with the WEP security protocol, which relies on the RC4 encryption algorithm and the CRC algorithm to check the integrity. The basic problems of the WEP are a short initialization vector, unsafe data integrity checking, using a common key, the lack of mechanisms for management and exchange of keys, the lack of protection from the endless insertion of the same package into the network, the lack of authentication of access points and the like. The consequences of these failures are easy attacks against the WEP network, namely their complete insecurity. Therefore, the work began on the IEEE 802.11i protocol, which should radically improve the security of wireless networks. Since the development of a protocol lasted, the WPA standard was released to offset the security gap caused by the WEP. The WPA also relies on RC4 and CRC algorithms, but brings temporary keys and the MIC algorithm for data integrity. The 802.1X authentication was introduced and common keys are no longer needed, since it is possible to use an authentication server. The length of the initialization vector was increased and the vector is obtained based on the packet serial number, in order to prevent the insertion of the same packet into the network. The weakness of the WPA security mechanism is the use of a common key. WPA2 (802.11i later appeared. Unlike the WPA mechanism that worked on old devices with the replacement of software, WPA2 requires new network devices that can perform AES encryption. AES replaces the RC4 algorithm and delivers much greater security. Data integrity is protected by encryption. Despite progress, there are still weaknesses in wireless networks. Attacks for denial of service are possible as well as spoofing package headers attacks. For now, it is not advisable to use wireless networks in environments where unreliability and unavailability are not tolerated. Introduction In the entire history of

  8. Effective intravenous immunoglobulin therapy for Churg-Strauss syndrome (allergic granulomatous angiitis complicated by neuropathy of the eighth cranial nerve: a case report

    Directory of Open Access Journals (Sweden)

    Ozaki Yoshio

    2012-09-01

    Full Text Available Abstract Introduction We report the case of a patient with Churg-Strauss syndrome with eighth cranial nerve palsy. Vestibulocochlear nerve palsy is extremely rare in Churg-Strauss syndrome. To the best of our knowledge, only one case of complicated neuropathy of the eighth cranial nerve has been described in a previous report presenting an aggregate calculation, but no differentiation between polyarteritis nodosa and Churg-Strauss syndrome was made. High-dose immunoglobulin was administered to our patient, and her neuropathy of the eighth cranial nerve showed improvement. Case presentation At the age of 46, a Japanese woman developed Churg-Strauss syndrome that later became stable with low-dose prednisolone treatment. At the age of 52, she developed sudden difficulty of hearing in her left ear, persistent severe rotary vertigo, and mononeuritis multiplex. At admission, bilateral perceptive deafness of about 80dB and eosinophilia of 4123/μL in peripheral blood were found. A diagnosis of cranial neuropathy of the eighth cranial nerve associated with exacerbated Churg-Strauss syndrome was made. Although high doses of steroid therapy alleviated the inflammatory symptoms and markers, the vertigo and bilateral hearing loss remained. Addition of a high-dose immunoglobulin finally resulted in marked alleviation of the symptoms associated with neuropathy of the eighth cranial nerve. Conclusions A high dose of immunoglobulin therapy shows favorable effects in neuropathy of the eighth cranial nerve, but no reports regarding its efficacy in cranial neuropathy have been published.

  9. Spectrum-efficient multi-channel design for coexisting IEEE 802.15.4 networks: A stochastic geometry approach

    KAUST Repository

    Elsawy, Hesham

    2014-07-01

    For networks with random topologies (e.g., wireless ad-hoc and sensor networks) and dynamically varying channel gains, choosing the long term operating parameters that optimize the network performance metrics is very challenging. In this paper, we use stochastic geometry analysis to develop a novel framework to design spectrum-efficient multi-channel random wireless networks based on the IEEE 802.15.4 standard. The proposed framework maximizes both spatial and time domain frequency utilization under channel gain uncertainties to minimize the number of frequency channels required to accommodate a certain population of coexisting IEEE 802.15.4 networks. The performance metrics are the outage probability and the self admission failure probability. We relax the single channel assumption that has been used traditionally in the stochastic geometry analysis. We show that the intensity of the admitted networks does not increase linearly with the number of channels and the rate of increase of the intensity of the admitted networks decreases with the number of channels. By using graph theory, we obtain the minimum required number of channels to accommodate a certain intensity of coexisting networks under a self admission failure probability constraint. To this end, we design a superframe structure for the coexisting IEEE 802.15.4 networks and a method for time-domain interference alignment. © 2002-2012 IEEE.

  10. Analysis Of Impact Of Various Parameters On BER Performance For IEEE 802.11b

    Directory of Open Access Journals (Sweden)

    Nilesh B. Kalani

    2015-08-01

    Full Text Available Abstract This paper discusses about IEEE 802.11b simulation model implemented using LabVIEW software and its analyses for impact on bit error rate BER for different parameters as channel type channel number data transmission rate and packet size. Audio file is being transmitted processed and analyzed using the model for various parameters. This paper gives analysis of BER verses ESN0 for various parameter like data rate packet size and communication channel for the IEEE 802.11b simulation model generated using LabVIEW. It is proved that BER can be optimized by tweaking different parameters of wireless communication system.

  11. Diseño y verificación de un amplificador para IEEE802.16

    OpenAIRE

    Lloret Arjona, Patricia

    2005-01-01

    Hace más de 6 años se empezó a gestar el IEEE802.16, un estándar para una nueva tecnología inalámbrica de banda ancha. El primer capítulo consiste en una introducción sobre este estándar, su evolución, las diferentes versiones que han ido apareciendo y las características principales de cada una de ellas, seguido de un pequeño comentario sobre su faceta comercial, WiMAX. El IEEE802.16 está empezando a tener relevancia, de modo que se decidió realizar un amplificador capaz de...

  12. Eighth ITER technical meeting on safety and environment

    International Nuclear Information System (INIS)

    Gordon, C.; Raeder, J.

    2000-01-01

    From November 27 to 30, 2000 the Eighth ITER Technical Meeting on Safety and Environment was held by the ITER Joint Central Team (JCT) at the Garching Joint Work Site, which also hosts the ITER Safety, Environment and Health Group (SEHG). At this meeting, safety experts from the Home Teams (HT) worked together with the SEHG members towards the following main objectives: review of Generic Site Safety Report (GSSR) results and drafts; review of the Plant Design Description (PDD) summary of safety; update on the status of the R and D tasks contributing to GSSR

  13. Service differentiated and adaptive CSMA/CA over IEEE 802.15.4 for Cyber-Physical Systems.

    Science.gov (United States)

    Xia, Feng; Li, Jie; Hao, Ruonan; Kong, Xiangjie; Gao, Ruixia

    2013-01-01

    Cyber-Physical Systems (CPS) that collect, exchange, manage information, and coordinate actions are an integral part of the Smart Grid. In addition, Quality of Service (QoS) provisioning in CPS, especially in the wireless sensor/actuator networks, plays an essential role in Smart Grid applications. IEEE 802.15.4, which is one of the most widely used communication protocols in this area, still needs to be improved to meet multiple QoS requirements. This is because IEEE 802.15.4 slotted Carrier Sense Multiple Access/Collision Avoidance (CSMA/CA) employs static parameter configuration without supporting differentiated services and network self-adaptivity. To address this issue, this paper proposes a priority-based Service Differentiated and Adaptive CSMA/CA (SDA-CSMA/CA) algorithm to provide differentiated QoS for various Smart Grid applications as well as dynamically initialize backoff exponent according to traffic conditions. Simulation results demonstrate that the proposed SDA-CSMA/CA scheme significantly outperforms the IEEE 802.15.4 slotted CSMA/CA in terms of effective data rate, packet loss rate, and average delay.

  14. Outdoor Long-Range WLANs : A Lesson for IEEE 802.11ah

    NARCIS (Netherlands)

    Aust, Stefan; Venkatesha Prasad, R.; Niemegeers, Ignas G M M

    2015-01-01

    Several service applications have been reported by many who proposed the use of wireless LANs (WLANs) over a wide variety of outdoor deployments. In particular, the upcoming IEEE 802.11ah WLAN protocol will enable a longer transmission range between WLAN access points (APs) and stations (STAs) up to

  15. Decline in holm oak coppices (Quercus ilex L. subsp. ballota (Desf.) Samp.): biometric and physiological interpretations

    Energy Technology Data Exchange (ETDEWEB)

    Serrada, R.; Gómez-Sanz, V.; Aroca, M.J.; Otero, J.; Bravo-Fernández, J.A.; Roig, S.

    2017-11-01

    Aim of the study: To analyse the decline in aged holm oak coppice forests as regards above-ground and below-ground fractions and physiological features. Area of study: Centre of the Iberian Peninsula (Guadalajara province). Material and methods: 26 pairs of holm oak stools with different vigour but with similar site and structural characteristics within each pair were selected. Morphological (basal area, number of stools, maximum height) and physiological traits (leaf water potential, stomatal conductance) of the standing stools were assessed. Their aerial and underground parts were extracted and different size fractions of both their above and below-ground biomass were quantified. Linear mixed models were built to test the effect of ’Stool vigour’ on the mean behaviour of the measured variables. Additionally, for the aerial part, linear regressions between the weights of the different size fractions and the basal area at breast height were performed using ‘Stool vigour’ as a fixed factor. Main results: For the same site, root depth, and number and diameter of shoots than good vigour stools, poor vigour stools displayed: lower predawn water potential, greater leaf mass per unit of area; lower total leaf area; lower above-ground biomass (in total as well as per fractions); lower fine roots biomass; lower proportion of leaf biomass and a greater proportion of biomass of both all roots and those with diameter 2-7 cm. Research highlights: The above-ground physiological and morphological characteristics of declined stools are interpreted as poorer adaptation to site conditions. Root system architecture was found to be relevant to explain this behaviour.

  16. Decline in holm oak coppices (Quercus ilex L. subsp. ballota (Desf.) Samp.): biometric and physiological interpretations

    International Nuclear Information System (INIS)

    Serrada, R.; Gómez-Sanz, V.; Aroca, M.J.; Otero, J.; Bravo-Fernández, J.A.; Roig, S.

    2017-01-01

    Aim of the study: To analyse the decline in aged holm oak coppice forests as regards above-ground and below-ground fractions and physiological features. Area of study: Centre of the Iberian Peninsula (Guadalajara province). Material and methods: 26 pairs of holm oak stools with different vigour but with similar site and structural characteristics within each pair were selected. Morphological (basal area, number of stools, maximum height) and physiological traits (leaf water potential, stomatal conductance) of the standing stools were assessed. Their aerial and underground parts were extracted and different size fractions of both their above and below-ground biomass were quantified. Linear mixed models were built to test the effect of ’Stool vigour’ on the mean behaviour of the measured variables. Additionally, for the aerial part, linear regressions between the weights of the different size fractions and the basal area at breast height were performed using ‘Stool vigour’ as a fixed factor. Main results: For the same site, root depth, and number and diameter of shoots than good vigour stools, poor vigour stools displayed: lower predawn water potential, greater leaf mass per unit of area; lower total leaf area; lower above-ground biomass (in total as well as per fractions); lower fine roots biomass; lower proportion of leaf biomass and a greater proportion of biomass of both all roots and those with diameter 2-7 cm. Research highlights: The above-ground physiological and morphological characteristics of declined stools are interpreted as poorer adaptation to site conditions. Root system architecture was found to be relevant to explain this behaviour.

  17. Commentary on Holmes et al. (2007): resolving the debate on when extinction risk is predictable.

    Science.gov (United States)

    Ellner, Stephen P; Holmes, Elizabeth E

    2008-08-01

    We reconcile the findings of Holmes et al. (Ecology Letters, 10, 2007, 1182) that 95% confidence intervals for quasi-extinction risk were narrow for many vertebrates of conservation concern, with previous theory predicting wide confidence intervals. We extend previous theory, concerning the precision of quasi-extinction estimates as a function of population dynamic parameters, prediction intervals and quasi-extinction thresholds, and provide an approximation that specifies the prediction interval and threshold combinations where quasi-extinction estimates are precise (vs. imprecise). This allows PVA practitioners to define the prediction interval and threshold regions of safety (low risk with high confidence), danger (high risk with high confidence), and uncertainty.

  18. Performance Analysis of Non-saturated IEEE 802.11 DCF Networks

    Science.gov (United States)

    Zhai, Linbo; Zhang, Xiaomin; Xie, Gang

    This letter presents a model with queueing theory to analyze the performance of non-saturated IEEE 802.11 DCF networks. We use the closed queueing network model and derive an approximate representation of throughput which can reveal the relationship between the throughput and the total offered load under finite traffic load conditions. The accuracy of the model is verified by extensive simulations.

  19. The Aftermath of the Largest Cometary Outburst in Recorded History - An In-Depth Study of Comet 17P/Holmes

    Science.gov (United States)

    Stevenson, Rachel Ann

    On UT 2007 Oct. 23, Jupiter Family comet 17P/Holmes underwent the largest cometary outburst in recorded history when it brightened by a factor of nearly a million in less than 2 days. This unprecedented event prompted a four-month observing campaign to observe the aftermath of the outburst. The wide field imager, MegaCam mounted on the Canada-France-Hawaii telescope was used to obtain r' images of the nucleus and the rapidly expanding dust coma. These images are unequaled in their quality and scope, and form a unique dataset with which to study the outburst aftermath. This original work examines the morphology of the outburst, and constrains the characteristics of the ejected material. Spatial filtering of images obtained in 2007 Nov. revealed numerous fragments moving away from the nucleus. The fragments were too bright to have been inactive, monolithic blocks and must have been acting as mini-comets with their own sources of sublimating volatiles and dust comae. They represented a significant (~ 10%) of the total ejected mass. The fragments had unusually high velocities relative to the nucleus, suggesting that they were accelerated by high gas pressure inside the nucleus prior to ejection. This work presents the first detection of such large, rapidly moving cometary fragments. The scarcity of similar ejecta around other fragmenting comets may be due to observational biases, rather than being unique to 17P/Holmes. Aperture photometry was used to study the evolution of the inner coma, which faded rapidly in the weeks and months following the initial outburst. Despite the observed fading, the nucleus must have remained active, continuing to supply fresh material to the inner coma. A second, much smaller outburst was detected on UT 2007 Nov. 12, which released an estimated 106 kg of dust into the inner coma. The secondary outburst showed that the nucleus remained unstable for several weeks after the initial event. Surface brightness profiles of the inner coma were

  20. OUTBURST OF COMET 17P/HOLMES OBSERVED WITH THE SOLAR MASS EJECTION IMAGER

    International Nuclear Information System (INIS)

    Li Jing; Jewitt, David; Clover, John M.; Jackson, Bernard V.

    2011-01-01

    We present time-resolved photometric observations of the Jupiter family comet 17P/Holmes during its dramatic 2007 outburst. The observations, from the orbiting Solar Mass Ejection Imager (SMEI), provide the most complete measure of the whole-coma brightness, free from the effects of instrumental saturation and with a time resolution well matched to the rapid brightening of the comet. The light curve is divided into two distinct parts. A rapid rise between the first SMEI observation on UT 2007 October 24 06h 37m (mid-integration) and UT 2007 October 25 is followed by a slow decline until the last SMEI observation on UT 2008 April 6 22h 16m (mid-integration). We find that the rate of change of the brightness is reasonably well described by a Gaussian function having a central time of UT 2007 October 24.54 ± 0.01 and a full width at half-maximum of 0.44 ± 0.02 days. The maximum rate of brightening occurs some 1.2 days after the onset of activity. At the peak, the scattering cross-section grows at 1070 ± 40 km 2 s -1 while the (model-dependent) mass loss rates inferred from the light curve reach a maximum at 3 x 10 5 kg s -1 . The integrated mass in the coma lies in the range (2-90) x 10 10 kg, corresponding to 0.2%-10% of the nucleus mass, while the kinetic energy of the ejecta is (0.7-30) megatonnes TNT. The particulate coma mass could be contained within a shell on the nucleus of thickness 1-60 m. This is also the approximate distance traveled by conducted heat in the century since the previous outburst of 17P/Holmes. This coincidence is consistent with, but does not prove, the idea that the outburst was triggered by the action of conducted heat, possibly through the crystallization of buried amorphous ice.

  1. IEEE Std 381-1977: IEEE standard criteria for type tests of Class 1E modules used in nuclear power generating stations

    International Nuclear Information System (INIS)

    Anon.

    1992-01-01

    This document describes the basic requirements of a type test program with the objective of verifying that a module used as Class 1E equipment in a nuclear power generating station meets or exceeds its design specifications. This document is limited to class 1E modules from and including the sensor through the logic circuitry of the final actuation devices. Except for those that are part of a module, switchgear, cables, connections, motors, valve actuators, station batteries, and penetrations are not included and are covered by other IEEE documents. The purpose of this document is to supplement the procedures and requirements given in IEEE Std 323-1974 [24] for type testing Class 1E modules, thereby providing directions for establishment of a type test program which will obtain the required test data and yield the required documentation of test methods and results. This standard is structured to present to the user the principal performance characteristics and environmental parameters which must be considered in designing a type test program for any give Class 1E module. These modules range from tiny sensors to complete racks or cabinets full of equipment that may be located inside or outside containment. The Class 1E modules are required to perform their function before, during, or after, or all, any design basis event specified for the module. The vast variety of modules covered by this document precludes the listing here of specific requirements for each type test

  2. An Investigation of Eighth Grade Students' Problem Posing Skills (Turkey Sample)

    Science.gov (United States)

    Arikan, Elif Esra; Ünal, Hasan

    2015-01-01

    To pose a problem refers to the creative activity for mathematics education. The purpose of the study was to explore the eighth grade students' problem posing ability. Three learning domains such as requiring four operations, fractions and geometry were chosen for this reason. There were two classes which were coded as class A and class B. Class A…

  3. Eighth Semiannual Report of the Commission to the Congress, July 1950

    Energy Technology Data Exchange (ETDEWEB)

    Dean, Gordon; Murray, Thomas E.; Pike, Sumner T.; Smyth, H. D.

    1950-07-01

    The document represents the eighth semiannual Atomic Energy Commission (AEC) report to Congress. The report sums up the major activities and developments in the national atomic energy program. As has been done in several of the previous mid-year reports, this report includes detail on another major phase of the national atomic energy program: control of radiation hazards.

  4. IEEE 8023 ethernet, current status and future prospects at the LHC

    CERN Document Server

    Dobinson, Robert W; Haas, S; Martin, B; Le Vine, M J; Saka, F

    2000-01-01

    The status of the IEEE 802.3 standard is reviewed and prospects for the future, including the new 10 Gigabit version of Ethernet, are discussed. The relevance of Ethernet for experiments at the CERN Large Hadron Collider is considered, with emphasis on on-line applications and areas which are technically challenging. 8 Refs.

  5. Problems and solutions in application of IEEE standards at Savannah River Site, Department of Energy (DOE) nuclear facilities

    International Nuclear Information System (INIS)

    Lee, Y.S.; Bowers, T.L.; Chopra, B.J.; Thompson, T.T.; Zimmerman, E.W.

    1993-01-01

    The Department of Energy (DOE) Nuclear Material Production Facilities at the Savannah River Site (SRS) were designed, constructed, and placed into operation in the early 1950's, based on existing industry codes/standards, design criteria, analytical procedures. Since that time, DOE has developed Orders and Polices for the planning, design and construction of DOE Nuclear Reactor Facilities which invoke or reference commercial nuclear reactor codes and standards. The application of IEEE reactor design requirements such as Equipment Qualification, Seismic Qualification, Single Failure Criteria, and Separation Requirement, to non-reactor facilities has been a problem since the IEEE reactor criteria do not directly confirm to the needs of non-reactor facilities. SRS Systems Engineering is developing a methodology for the application of IEEE Standards to non-reactor facilities at SRS

  6. Integration of IEEE 1451 and HL7 exchanging information for patients' sensor data.

    Science.gov (United States)

    Kim, Wooshik; Lim, Suyoung; Ahn, Jinsoo; Nah, Jiyoung; Kim, Namhyun

    2010-12-01

    HL7 (Health Level 7) is a standard developed for exchanging incompatible healthcare information generated from programs or devices among heterogenous medical information systems. At present, HL7 is growing as a global standard. However, the HL7 standard does not support effective methods for treating data from various medical sensors, especially from mobile sensors. As ubiquitous systems are growing, HL7 must communicate with various medical transducers. In the area of sensor fields, IEEE 1451 is a group of standards for controlling transducers and for communicating data from/to various transducers. In this paper, we present the possibility of interoperability between the two standards, i.e., HL7 and IEEE 1451. After we present a method to integrate them and show the preliminary results of this approach.

  7. A Cross-Layer Key Management Scheme for MIPv6 Fast Handover over IEEE 802.11 Wireless LAN

    Directory of Open Access Journals (Sweden)

    Chang-Seop Park

    2015-01-01

    Full Text Available A new key management and security scheme is proposed to integrate Layer Two (L2 and Layer Three (L3 keys for secure and fast Mobile IPv6 handover over IEEE 802.11 Wireless Local Area Network (WLAN. Unlike the original IEEE 802.11-based Mobile IPv6 Fast Handover (FMIPv6 that requires time-consuming IEEE 802.1x-based Extensible Authentication Protocol (EAP authentication on each L3 handover, the newly proposed key management and security scheme requires only one 802.1x-EAP regardless of how many L3 handovers occur. Therefore, the proposed scheme reduces the handover latency that results from a lengthy 802.1x-based EAP. The proposed key management and security scheme is extensively analyzed in terms of security and performance, and the proposed security scheme is shown to be more secure than those that were previously proposed.

  8. Basic security measures for IEEE 802.11 wireless networks

    OpenAIRE

    Sarmiento, Oscar P.; Guerrero, Fabio G.; Rey Argote, David

    2008-01-01

    This article presents a tutorial/discussion of three commonly-used IEEE 802.11 wireless network security standards: WEP, WPA and WPA2. A detailed analysis of the RC4 algorithm supporting WEP is presented, including its vulnerabilities. The WPA and WPA2 encryption protocols’ most relevant aspects and technical characteristics are reviewed for a comparative analysis of the three standards in terms of the security they provide. Special attention has been paid to WEP encryption by using an educat...

  9. Eighth International Symposium on Recent Advances in Environmental Health Research

    Directory of Open Access Journals (Sweden)

    Paul B. Tchounwou

    2012-05-01

    Full Text Available This special issue of International Journal of Environmental Research and Public Health is dedicated to the publication of selected papers presented at the Eighth International Symposium on Recent Advances in Environmental Health Research. The Symposium was organized by Jackson State University (JSU from September 18-21, 2011 at the Marriott Hotel in Jackson, Mississippi. It was built upon the overwhelming success of seven previous symposia hosted by JSU. [...

  10. A Novel Prioritization Scheme to Improve QoS in IEEE 802.11e Networks

    Directory of Open Access Journals (Sweden)

    Navid Tadayon

    2010-01-01

    Full Text Available IEEE 802.11 WLAN utilizes a distributed function at its MAC layer, namely, DCF to access the wireless medium. Due to its distributed nature, DCF is able to guarantee working stability in a wireless medium while maintaining the assembling and maintenance cost in a low level. However, DCF is inefficient in dealing with real-time traffics due to its incapability on providing QoS. IEEE 802.11e was introduced as a supplementary standard to cope with this problem. This standard introduces an Enhanced Distributed Coordination Function (EDCF that works based on diff-Serve model and can serve multiple classes of traffics (by using different prioritizations schemes. With the emergence of new time-sensitive applications, EDCF has proved to be yet inefficient in dealing with these kinds of traffics because it could not provide network with well-differentiated QoS. In this study, we propose a novel prioritization scheme to improve QoS level in IEEE 802.11e network. In this scheme, we replace Uniform PDF with Gamma PDF, which has salient differentiating properties. We investigate the suitability and superiority of this scheme on furnishing network with well-differentiated QoS using probabilistic analysis. We strengthen our claims by extensive simulation runs.

  11. IEEE C37.98-1987: IEEE standard seismic testing of relays

    International Nuclear Information System (INIS)

    Anon.

    1992-01-01

    This standard specifies the procedures to be used in the seismic testing of relays used in power system facilities. The standard is concerned with the determination of the seismic fragility level of relays and also gives recommendations for proof testing. The purpose of this standard is to establish procedures for determining the seismic capabilities of protective and auxiliary relays. These procedures employ what has been called fragility testing in IEEE Std 344-1987. To define the conditions for fragility testing of relays, parameters in three separate areas must be specified. In general, they are (1) the electrical settings and inputs to the relay, and other information to define its conditions during the test; (2) the change in state, deviation in operating characteristics or tolerances, or other change of performance of the relay that constitutes failure; (3) the seismic vibration environment to be imposed during the test. Since it is not possible to define the conditions for every conceivable application for all relays, those parameters, which in practice encompass the majority of applications, have been specified in this standard. When the application of the relay is other than as specified under any of (1), (2), and (3), or if it is not practical to apply existing results of fragility tests to that new application, then proof testing must be performed for that new case

  12. IEEE C37.98-1978: IEEE standard seismic testing of relays

    International Nuclear Information System (INIS)

    Anon.

    1992-01-01

    This standard specifies the procedures to be used in the seismic testing of relays used in power system facilities. The standard is concerned with the determination of the seismic fragility level of relays and also gives recommendations for proof testing. The purpose of this standard is to establish procedures for determining the seismic capabilities of protective and auxiliary relays. These procedures employ what has been called fragility testing in ANSI/IEEE Std 344-1975, Recommended Practices for Seismic Qualification of Class 1E Equipment for Nuclear Power Generating Stations. In order to define the conditions for fragility testing of relays, parameters in three separate areas must be specified. In general they are: (1) the electrical settings and inputs to the relay, and other information to define its conditions during the test; (2) the change in state, deviation in operating characteristics or tolerances, or other change of performance of the relay which constitutes failure; (3) the seismic vibration environment to be imposed during the test. Since it is not possible to define the conditions for every conceivable application for all relays, those parameters, which in practice encompass the majority of applications, have been specified in this standard. When the application of the relay is other than as specified under any of (1), (2), and (3), or if it is not practical to apply existing results of fragility tests to that new case

  13. 2011 IEEE Visualization Contest Winner: Visualizing Unsteady Vortical Behavior of a Centrifugal Pump

    KAUST Repository

    Otto, Mathias; Kuhn, Alexander; Engelke, Wito; Theisel, Holger

    2012-01-01

    In the 2011 IEEE Visualization Contest, the dataset represented a high-resolution simulation of a centrifugal pump operating below optimal speed. The goal was to find suitable visualization techniques to identify regions of rotating stall

  14. 17th IEEE NPSS Real Time Conference – RT-2010

    CERN Multimedia

    Carlos Varandas

    2010-01-01

    Congress Centre of “Instituto Superior Técnico”, Lisboa, Portugal, 24-28 May, 2010 ABSTRACT SUBMISSION OPEN Abstract Submission Deadline: March 1st, 2010 Dear Sir/Madam, We are pleased to announce that abstract submission for the 17th IEEE NPSS Real Time Conference is now open on our web site. The deadline for submitting an abstract is 1st March 2010. Full conference details General Chairman

  15. The effects of school policies and practices on eighth-grade science achievement: A multilevel analysis of TIMSS

    Science.gov (United States)

    Smyth, Carol Ann Mary

    Identifying the relative importance of both alterable school policies and fairly stable contextual factors as they relate to middle level science achievement, a domain of identified national concern, requires simultaneous investigation of multilevel predictors (i.e., student level and school level) specific to the grade level and academic subject area. The school level factors are predictors associated with both the school (e.g., average socioeconomic status, tracking, and instructional time) and the classroom (e.g., average academic press of peers, teacher collaboration, and instructional strategies). The current study assessed the effects of school policies, practices, and contextual factors on the science achievement of eighth grade students. These influences were considered to be both additive (i.e., influencing the mean achievement in a school after controlling for student characteristics) and interactive (i.e., affecting the relationships between student background characteristics and individual achievement). To account for the nested structure of predictors and cross level interactions among predictors, a multilevel model for middle level science achievement was estimated using hierarchical linear modeling (HLM) with data collected from eighth grade students, science teachers, and administrators in 1995 as part of the Third International Mathematics and Science Study (TIMSS). The major findings of this research suggest that although average eighth grade science achievement in a school was primarily associated with the contextual characteristics of the classroom and the school (e.g., average socioeconomic status and average academic press), both the academic differentiating influence of prior achievement and the social differentiating influence of parental education on the science achievement of eighth grade students were related not only to contextual characteristics of the classroom and the school, but also to the instructional policies of the classroom

  16. Incorporating antenna beamswitching technique into drivers for IEEE802.11 WLAN devices

    CSIR Research Space (South Africa)

    Mofolo, M

    2015-11-23

    Full Text Available the beamswitching technique for switched parasitic array (SPA) and electronically steerable parasitic array radiator (ESPAR) antennas in the drivers for IEEE802.11 WLAN devices. The modifications of the open source drivers (ath5k and ath9k) to enable real...

  17. An improved IEEE 802.11 protocol for reliable data transmission in power distribution fault diagnosis

    Energy Technology Data Exchange (ETDEWEB)

    Campoccia, F.; Di Silvestre, M.L.; Sanseverino, E.R.; Zizzo, G. [Palermo Univ., Palermo (Italy)

    2010-10-15

    In power systems, on-line transmission between local units and the central unit can be done by means of power line communications or wireless technology. During an electrical fault, the reliability of the distribution system depends on the security of the timely protective and restorative actions on the network. This paper focused on the WiFi system because of its economy and ease of installation. However, WiFi systems are typically managed by the IEEE 802.11 protocol, which is not reliable in terms of security in data communication. In WiFi networks, data is divided into packets and sent in succession to reduce errors within the radio channel. The IEEE 802.11 protocol has high probability for loss of packets or delay in their transmission. In order to ensure the reliability of data transmission times between two terminal units connected by WiFi stations, a new protocol was derived by modifying the IEEE 802.11. The improvements of the new protocol were highlighted and its capability for the diagnostic service was verified. The modified protocol eliminates the danger of collisions between packets and optimizes the transmission time for sending information. 6 refs., 7 tabs., 8 figs.

  18. Strategies for Optimal MAC Parameters Tuning in IEEE 802.15.6 Wearable Wireless Sensor Networks.

    Science.gov (United States)

    Alam, Muhammad Mahtab; Ben Hamida, Elyes

    2015-09-01

    Wireless body area networks (WBAN) has penetrated immensely in revolutionizing the classical heath-care system. Recently, number of WBAN applications has emerged which introduce potential limits to existing solutions. In particular, IEEE 802.15.6 standard has provided great flexibility, provisions and capabilities to deal emerging applications. In this paper, we investigate the application-specific throughput analysis by fine-tuning the physical (PHY) and medium access control (MAC) parameters of the IEEE 802.15.6 standard. Based on PHY characterizations in narrow band, at the MAC layer, carrier sense multiple access collision avoidance (CSMA/CA) and scheduled access protocols are extensively analyzed. It is concluded that, IEEE 802.15.6 standard can satisfy most of the WBANs applications throughput requirements by maximum achieving 680 Kbps. However, those emerging applications which require high quality audio or video transmissions, standard is not able to meet their constraints. Moreover, delay, energy efficiency and successful packet reception are considered as key performance metrics for comparing the MAC protocols. CSMA/CA protocol provides the best results to meet the delay constraints of medical and non-medical WBAN applications. Whereas, the scheduled access approach, performs very well both in energy efficiency and packet reception ratio.

  19. A School-Based Violence Prevention Model for At-Risk Eighth Grade Youth.

    Science.gov (United States)

    Rollin, Stephen A.; Kaiser-Ulrey, Cheryl; Potts, Isabelle; Creason, Alia Haque

    2003-01-01

    Examines the effectiveness of a school and community-based violence prevention program for at-risk eighth-grade students. School officials matched intervention students with community-based mentors in an employment setting. Findings suggest that mentored students had significant reductions in total number and days of suspensions, days of sanction,…

  20. An Overview of Ecological Footprinting and Other Tools and Their Application to the Development of Sustainability Process: Audit and Methodology at Holme Lacy College, UK

    Science.gov (United States)

    Dawe, Gerald F. M.; Vetter, Arnie; Martin, Stephen

    2004-01-01

    A sustainability audit of Holme Lacy College is described. The approach adopted a "triple bottom line" assessment, comprising a number of key steps: a scoping review utilising a revised Royal Institution of Chartered Surveyors project appraisal tool; an environmental impact assessment based on ecological footprinting and a social and…

  1. A distributed scheme to manage the dynamic coexistence of IEEE 802.15.4-based health-monitoring WBANs.

    Science.gov (United States)

    Deylami, Mohammad N; Jovanov, Emil

    2014-01-01

    The overlap of transmission ranges between wireless networks as a result of mobility is referred to as dynamic coexistence. The interference caused by coexistence may significantly affect the performance of wireless body area networks (WBANs) where reliability is particularly critical for health monitoring applications. In this paper, we analytically study the effects of dynamic coexistence on the operation of IEEE 802.15.4-based health monitoring WBANs. The current IEEE 802.15.4 standard lacks mechanisms for effectively managing the coexistence of mobile WBANs. Considering the specific characteristics and requirements of health monitoring WBANs, we propose the dynamic coexistence management (DCM) mechanism to make IEEE 802.15.4-based WBANs able to detect and mitigate the harmful effects of coexistence. We assess the effectiveness of this scheme using extensive OPNET simulations. Our results indicate that DCM improves the successful transmission rates of dynamically coexisting WBANs by 20%-25% for typical medical monitoring applications.

  2. BOB-RED queue management for IEEE 802.15.4 wireless sensor networks

    Directory of Open Access Journals (Sweden)

    Wu Jean-Lien

    2011-01-01

    Full Text Available Abstract Multimedia services over resource constrained wireless sensor networks (WSNs face a performance bottleneck issue from the gateway node to the sink node. Therefore, the queue management at the gateway node is crucial for diversified messages conveyed from the front nodes to the sink node. In this article, beacon order-based random early detection (BOB-RED queue management is proposed. BOB-RED is a dynamic adaptation scheme based on adjusting beacon interval and superframe duration in the IEEE 802.15.4 MAC superframe accompanied with RED queue management scheme to increase the transmission efficiency of multimedia over WSNs. We focus on the performance improvement upon different traffic loads over WSNs. Evaluation metrics include end-to-end delay, packet delivery ratio, and energy consumption in IEEE 802.15.4 beacon enabled mode. Simulation results show that BOB-RED can effectively decrease end-to-end delay and energy consumption compared to the DropTail scheme.

  3. Endovascular Treatment of Autogenous Radiocephalic Fistulas with the 'Eighth Note' Deformity for Hemodialysis

    International Nuclear Information System (INIS)

    Weng Meijui; Chen, Matt Chiung-Yu; Chi Wenche; Liu Yichun; Chien Kofen; Liang Hueilung; Pan, Huay-Ben

    2010-01-01

    The purpose of this paper is to describe a unique 'eighth note' deformity of the autogenous radiocephalic fistula for hemodialysis and to retrospectively evaluate the efficacy and safety of its endovascular treatment. Over 3 years, a total of 808 patients and 558 autogenous radiocephalic fistulas were treated for vascular access dysfunction or thrombosis. These included 14 fistulas in 14 patients (9 men, 5 women; mean age, 58.2 ± 2.8 years; range 27-79 years) whose fistulograms before treatment resembled a musical note, the eighth note. Endovascular treatment sought to remodel the deformed vascular access to a classic radiocephalic fistula and increase the number of cannulation sites available for hemodialysis. The technical and clinical success rates were each 92.8% (13/14). Fistula remodeling was successful in 13 patients. The postintervention primary patency was 100% at 90 days, 91.7 ± 0.8% at 120 days, 78.6 ± 13.9% at 180 days, 62.9 ± 17.9% at 360 days, 31.4 ± 24.0% at 540 days, and 0% at 720 days. The postintervention secondary patency was 100% at 90 days, 100% at 120 days, 100% at 180 days, 85.7 ± 13.2% at 360 days, and 85.7 ± 13.2% at 720 days. No major complications were noted. Minor complications were found in 71.4% of patients, all of which resolved spontaneously. In conclusion, endovascular treatment of fistulas with the eighth note deformity can effectively increase the number of available cannulation sites, facilitate fistula maturation, and facilitate thromboaspiration after fistula thrombosis.

  4. Hybrid Polling Method for Direct Link Communication for IEEE 802.11 Wireless LANs

    Directory of Open Access Journals (Sweden)

    Woo-Yong Choi

    2008-10-01

    Full Text Available The direct link communication between STAtions (STAs is one of the techniques to improve the MAC performance of IEEE 802.11 infrastructure networks. For the efficient direct link communication, in the literature, the simultaneous polling method was proposed to allow the multiple direct data communication to be performed simultaneously. However, the efficiency of the simultaneous polling method is affected by the interference condition. To alleviate the problem of the lower polling efficiency with the larger interference range, the hybrid polling method is proposed for the direct link communication between STAs in IEEE 802.11 infrastructure networks. By the proposed polling method, we can integrate the sequential and simultaneous polling methods properly according to the interference condition. Numerical examples are also presented to show the medium access control (MAC performance improvement by the proposed polling method.

  5. IEEE Std 649-1980: IEEE standard for qualifying Class 1E motor control centers for nuclear power generating stations

    International Nuclear Information System (INIS)

    Anon.

    1992-01-01

    This standard describes the basic principles, requirements, and methods for qualifying Class 1E motor control centers for outside containment applications in nuclear power generating stations. Qualification of motor control centers located inside containment in a nuclear power generating station is beyond the scope of this standard. The purpose of this standard is (1) to define specific qualification requirements for Class 1E motor control centers in accordance with the more general qualification requirements of IEEE Std 323-1974, IEE Standard for Qualifying Class 1E Equipment for Nuclear Power Generating Stations; (2) to provide guidance in establishing a qualification program for demonstrating the design adequacy of Class 1E motor control centers in nuclear power generating station applications

  6. The first forty years, 1947-1987

    International Nuclear Information System (INIS)

    Rowe, M.S.; Cohen, A.; Petersen, B.

    1987-01-01

    This report commemorates the fortieth anniversary of Brookhaven National Laboratory by representing a historical overview of research at the facility. The chapters of the report are entitled: The First Forty Years, Brookhaven: A National Resource, Fulfilling a Mission - Brookhaven's Mighty Machines, Marketing the Milestones in Basic Research, Meeting National Needs, Making a Difference in Everyday Life, and Looking Forward

  7. IEEE 802.11 ECG monitoring system.

    Science.gov (United States)

    Tejero-Calado, Juan; Lopez-Casado, Carmen; Bernal-Martin, Antonio; Lopez-Gomez, Miguel; Romero-Romero, Marco; Quesada, Guillermo; Lorca, Julio; Rivas, Ramon

    2005-01-01

    New wireless technologies make possible the implementation of high level integration wireless devices which allow the replacement of traditional large wired monitoring devices. This kind of devices favours at-home hospitalization, reducing the affluence to sanitary assistance centers to make routine controls. This fact causes a really favourable social impact, especially for elder people, rural-zone inhabitant, chronic patients and handicapped people. Furthermore, it offers new functionalities to physicians and will reduce the sanitary cost. Among these functionalities, biomedical signals can be sent to other devices (screen, PDA, PC...) or processing centers, without restricting the patients' mobility. The aim of this project is the development and implementation of a reduced size multi-channel electrocardiograph based on IEEE 802.11, which allows wireless monitoring of patients, and the insertion of the information into the TCP/IP Hospital network.

  8. Traveling with Eighth-Grade Students to Learn about State and Local History

    Science.gov (United States)

    Morris, Ronald V.

    2016-01-01

    Eighth-grade students from three school districts in three small towns in Crosby County, Texas, received academic credit for working together with the biannual Crosby County Pioneer Memorial Museum summer travel education program. Each of the three districts radiate from a small town. They were within one county, and the museum was located in the…

  9. Centaurs, Pegasus, Sherlock Holmes: Against the Prejudice in Favour of the Real

    Directory of Open Access Journals (Sweden)

    Travanini Cristina

    2016-12-01

    Full Text Available Meinong’s thought has been rediscovered in recent times by analytic philosophy: his object theory has significant consequences in formal ontology, and especially his account of impossible objects has proved itself to be decisive in a wide range of fields, from logic up to ontology of fiction. Rejecting the traditional ‘prejudice in favour of the real’, Meinong investigates what there is not: a peculiar non-existing object is precisely the fictional object, which exemplifies a number of properties (like Sherlock Holmes, who lives in Baker Street and is an outstanding detective without existing in the same way as flesh-and-blood detectives do. Fictional objects are in some sense incomplete objects, whose core of constituent properties is not completely determined. Now, what does it imply to hold that a fictional object may also occur in true statements? We shall deal with the objections raised by Russell and Quine against Meinong’s view, pointing out limits and advantages of both perspectives.

  10. IEEE 802.3 Ethernet, Current Status and Future Prospects at the LHC

    CERN Document Server

    Dobinson, Robert W; Haas, S W; Martin, B; Le Vine, M J; Saka, F

    2000-01-01

    The status of the IEEE 802.3 standard is reviewed and prospects for the future, including the new 10 Gigabit version of Ethernet, are discussed. The relevance of Ethernet for experiments at the CERN Large Hadron Collider is considered, with emphasis on on-line applications and areas which are technically challenging.

  11. The first forty years, 1947-1987

    Energy Technology Data Exchange (ETDEWEB)

    Rowe, M.S. (ed.); Cohen, A.; Petersen, B.

    1987-01-01

    This report commemorates the fortieth anniversary of Brookhaven National Laboratory by representing a historical overview of research at the facility. The chapters of the report are entitled: The First Forty Years, Brookhaven: A National Resource, Fulfilling a Mission - Brookhaven's Mighty Machines, Marketing the Milestones in Basic Research, Meeting National Needs, Making a Difference in Everyday Life, and Looking Forward.

  12. The IEEE-SA patent policy update under the lens of EU competition law

    NARCIS (Netherlands)

    Kanevskaia, Olia; Zingales, Nicolo

    2016-01-01

    In 2015, the Institute of Electrical and Electronics Engineers (IEEE) Standardization Association made some controversial changes to its patent policy. The changes include a recommended method of calculation of FRAND royalty rates, and a request to members holding a standard essential patent (SEP)

  13. A network architecture for precision formation flying using the IEEE 802.11 MAC Protocol

    Science.gov (United States)

    Clare, Loren P.; Gao, Jay L.; Jennings, Esther H.; Okino, Clayton

    2005-01-01

    Precision Formation Flying missions involve the tracking and maintenance of spacecraft in a desired geometric formation. The strong coupling of spacecraft in formation flying control requires inter-spacecraft communication to exchange information. In this paper, we present a network architecture that supports PFF control, from the initial random deployment phase to the final formation. We show that a suitable MAC layer for the application protocol is IEEE's 802.11 MAC protocol. IEEE 802.11 MAC has two modes of operations: DCF and PCF. We show that DCF is suitable for the initial deployment phase while switching to PCF when the spacecraft are in formation improves jitter and throughput. We also consider the effect of routing on protocol performance and suggest when it is profitable to turn off route discovery to achieve better network performance.

  14. 2011 IEEE Visualization Contest Winner: Visualizing Unsteady Vortical Behavior of a Centrifugal Pump

    KAUST Repository

    Otto, Mathias

    2012-09-01

    In the 2011 IEEE Visualization Contest, the dataset represented a high-resolution simulation of a centrifugal pump operating below optimal speed. The goal was to find suitable visualization techniques to identify regions of rotating stall that impede the pump\\'s effectiveness. The winning entry split analysis of the pump into three parts based on the pump\\'s functional behavior. It then applied local and integration-based methods to communicate the unsteady flow behavior in different regions of the dataset. This research formed the basis for a comparison of common vortex extractors and more recent methods. In particular, integration-based methods (separation measures, accumulated scalar fields, particle path lines, and advection textures) are well suited to capture the complex time-dependent flow behavior. This video (http://youtu.be/ oD7QuabY0oU) shows simulations of unsteady flow in a centrifugal pump. © 2012 IEEE.

  15. A Novel IEEE 802.15.4e DSME MAC for Wireless Sensor Networks.

    Science.gov (United States)

    Sahoo, Prasan Kumar; Pattanaik, Sudhir Ranjan; Wu, Shih-Lin

    2017-01-16

    IEEE 802.15.4e standard proposes Deterministic and Synchronous Multichannel Extension (DSME) mode for wireless sensor networks (WSNs) to support industrial, commercial and health care applications. In this paper, a new channel access scheme and beacon scheduling schemes are designed for the IEEE 802.15.4e enabled WSNs in star topology to reduce the network discovery time and energy consumption. In addition, a new dynamic guaranteed retransmission slot allocation scheme is designed for devices with the failure Guaranteed Time Slot (GTS) transmission to reduce the retransmission delay. To evaluate our schemes, analytical models are designed to analyze the performance of WSNs in terms of reliability, delay, throughput and energy consumption. Our schemes are validated with simulation and analytical results and are observed that simulation results well match with the analytical one. The evaluated results of our designed schemes can improve the reliability, throughput, delay, and energy consumptions significantly.

  16. Design Optimization of Cyber-Physical Distributed Systems using IEEE Time-sensitive Networks (TSN)

    DEFF Research Database (Denmark)

    Pop, Paul; Lander Raagaard, Michael; Craciunas, Silviu S.

    2016-01-01

    to the optimization of distributed cyber-physical systems using real-time Ethernet for communication. Then, we formulate two novel optimization problems related to the scheduling and routing of TT and AVB traffic in TSN. Thus, we consider that we know the topology of the network as well as the set of TT and AVB flows......In this paper we are interested in safety-critical real-time applications implemented on distributed architectures supporting the Time-SensitiveNetworking (TSN) standard. The ongoing standardization of TSN is an IEEE effort to bring deterministic real-time capabilities into the IEEE 802.1 Ethernet...... standard supporting safety-critical systems and guaranteed Quality-of-Service. TSN will support Time-Triggered (TT) communication based on schedule tables, Audio-Video-Bridging (AVB) flows with bounded end-to-end latency as well as Best-Effort messages. We first present a survey of research related...

  17. An Investigation of Mathematics Anxiety among Sixth through Eighth Grade Students in Turkey

    Science.gov (United States)

    Birgin, Osman; Baloglu, Mustafa; Catlioglu, Hakan; Gurbuz, Ramazan

    2010-01-01

    The purpose of the present study is to investigate mathematics anxiety among 220 sixth through eighth grade Turkish students in terms of mathematics achievement levels, perceived enjoyment of the mathematics teaching method, perceived enjoyment of mathematics, and perceived help with mathematics from parents. The Mathematics Anxiety Scale for…

  18. DoS detection in IEEE 802.11 with the presence of hidden nodes

    Directory of Open Access Journals (Sweden)

    Joseph Soryal

    2014-07-01

    Full Text Available The paper presents a novel technique to detect Denial of Service (DoS attacks applied by misbehaving nodes in wireless networks with the presence of hidden nodes employing the widely used IEEE 802.11 Distributed Coordination Function (DCF protocols described in the IEEE standard [1]. Attacker nodes alter the IEEE 802.11 DCF firmware to illicitly capture the channel via elevating the probability of the average number of packets transmitted successfully using up the bandwidth share of the innocent nodes that follow the protocol standards. We obtained the theoretical network throughput by solving two-dimensional Markov Chain model as described by Bianchi [2], and Liu and Saadawi [3] to determine the channel capacity. We validated the results obtained via the theoretical computations with the results obtained by OPNET simulator [4] to define the baseline for the average attainable throughput in the channel under standard conditions where all nodes follow the standards. The main goal of the DoS attacker is to prevent the innocent nodes from accessing the channel and by capturing the channel’s bandwidth. In addition, the attacker strives to appear as an innocent node that follows the standards. The protocol resides in every node to enable each node to police other nodes in its immediate wireless coverage area. All innocent nodes are able to detect and identify the DoS attacker in its wireless coverage area. We applied the protocol to two Physical Layer technologies: Direct Sequence Spread Spectrum (DSSS and Frequency Hopping Spread Spectrum (FHSS and the results are presented to validate the algorithm.

  19. DoS detection in IEEE 802.11 with the presence of hidden nodes.

    Science.gov (United States)

    Soryal, Joseph; Liu, Xijie; Saadawi, Tarek

    2014-07-01

    The paper presents a novel technique to detect Denial of Service (DoS) attacks applied by misbehaving nodes in wireless networks with the presence of hidden nodes employing the widely used IEEE 802.11 Distributed Coordination Function (DCF) protocols described in the IEEE standard [1]. Attacker nodes alter the IEEE 802.11 DCF firmware to illicitly capture the channel via elevating the probability of the average number of packets transmitted successfully using up the bandwidth share of the innocent nodes that follow the protocol standards. We obtained the theoretical network throughput by solving two-dimensional Markov Chain model as described by Bianchi [2], and Liu and Saadawi [3] to determine the channel capacity. We validated the results obtained via the theoretical computations with the results obtained by OPNET simulator [4] to define the baseline for the average attainable throughput in the channel under standard conditions where all nodes follow the standards. The main goal of the DoS attacker is to prevent the innocent nodes from accessing the channel and by capturing the channel's bandwidth. In addition, the attacker strives to appear as an innocent node that follows the standards. The protocol resides in every node to enable each node to police other nodes in its immediate wireless coverage area. All innocent nodes are able to detect and identify the DoS attacker in its wireless coverage area. We applied the protocol to two Physical Layer technologies: Direct Sequence Spread Spectrum (DSSS) and Frequency Hopping Spread Spectrum (FHSS) and the results are presented to validate the algorithm.

  20. IEEE recommended practices for seismic qualification of Class 1E equipment for nuclear power generating stations

    International Nuclear Information System (INIS)

    Anon.

    1975-01-01

    The IEEE has developed this document to provide direction for developing programs to seismically qualify Class 1E equipment for nuclear power generating stations. It supplements IEEE Std 323-1974, IEEE Standard for Qualifying Class 1E Equipment for Nuclear Power Generating Stations, which describes the basic requirements for equipment qualification. The Class 1E equipment to be qualified by produres or standards established by this document are of many forms, characteristics, and materials; therefore, the document presents many acceptable methods with the intent of permitting the user to make a judicious selection from among the various options. In making such a selection, the user should choose those that best meet a particular equipment's requirements. Further, in using this document as a specification for the purchase of equipment, the many options should also be recognized and the document invoked accordingly. It is recommended that the need for specific standards for the seismic qualifiction of particular kinds of equipment be evaluated by those responsible for such documents and that consideration be given to the application of particular methods from these documents which are most suitable

  1. Energy-aware path selection metric for IEEE 802.11s wireless mesh networking

    CSIR Research Space (South Africa)

    Mhlanga, MM

    2009-01-01

    Full Text Available The IEEE 802.11s working group has commenced activities, which would lead to the development of a standard for wireless mesh networks (WMNs). The draft of 802.11s introduces a new path selection metric called airtime link metric. However...

  2. Energy-aware path selection metric for IEEE 802.11s wireless mesh networking

    CSIR Research Space (South Africa)

    Mhlanga, MM

    2009-08-01

    Full Text Available The IEEE 802.11s working group has commenced activities, which would lead to the development of a standard for wireless mesh networks (WMNs). The draft of 802.11s introduces a new path selection metric called airtime link metric. However...

  3. A 1-GHz charge pump PLL frequency synthesizer for IEEE 1394b PHY

    DEFF Research Database (Denmark)

    Ji, J.; Liu, H.; Li, Q.

    2012-01-01

    This paper presents an implementation of multi-rate SerDes transceiver for IEEE 1394b applications. Simple and effective pre-emphasis and equalizer circuits are used at transmitter and receiver, respectively. A phase interpolator based clock and data recovery circuit with optimized linearity is a...

  4. Corrections to "Connectivity-Based Reliable Multicast MAC Protocol for IEEE 802.11 Wireless LANs"

    Directory of Open Access Journals (Sweden)

    Choi Woo-Yong

    2010-01-01

    Full Text Available We have found the errors in the throughput formulae presented in our paper "Connectivity-based reliable multicast MAC protocol for IEEE 802.11 wireless LANs". We provide the corrected formulae and numerical results.

  5. Anti nutritional evaluation of the flour of the nipples of holm oak (quercus ilex) and oak cork (quercus suber) Raw and pressure-sealed

    International Nuclear Information System (INIS)

    El Mahi, F. Z.

    2009-01-01

    The present study contributes to the development of the food potential of the nipples of oak like new resources likely to be exploited on an industrial scale for their use in animal feeds. Our work relates to two species S of nipples of oak, edible, the holm oak and the other fodder one, the oak cork known for their spontaneousness and their vey significant geographical distribution. (Author)

  6. IEEE Xplore® Digital Library - Evolving to Meet YOUR Changing Needs

    OpenAIRE

    2014-01-01

    Представлена презентация доклада "Использование платформы IEEE Digital Library: уникальные научные публикации в области электроники, радиосвязи, вычислительной техники, информационных технологий, энергетики, машиностроения, физики, химии, геологии, нанотехнологий" Эстер Лукаш, специалиста по обучению IEEE (Германия), на семинаре «Использование платформы IEEE Digital Library», прошедшем 02 октября 2014 года в УрФУ, на английском языке....

  7. Investigating the efficiency of IEEE 802.15.4 for medical monitoring applications.

    Science.gov (United States)

    Pelegris, P; Banitsas, K

    2011-01-01

    Recent advancements in wireless communications technologies bring us one step closer to provide reliable Telecare services as an alternative to patients staying in a hospital mainly for monitoring purposes. In this research we investigate the efficiency of IEEE 802.15.4 in a simple scenario where a patient is being monitored using an ECG and a blood analysis module. This approach binds well with assisted living solutions, by sharing the network infrastructure for both monitoring and control while taking advantage of the low power features of the protocol. Such applications are becoming more and more realistic to implement as IEEE 802.15.4 compatible hardware becomes increasingly available. Our aim is to examine the impact of Beacon and Superframe Order in the medium access delay, dropped packets, end to end delay, average retransmission attempts and consumed power focusing on this bandwidth demanding situation where the network load does not allow low duty cycles, in order to draw some conclusions on the effect that this will have to telemonitoring applications.

  8. [The "diagnosis" in the light of Charles S. Peirce, Sherlock Holmes, Sigmund Freud and modern neurobiology].

    Science.gov (United States)

    Adler, R H

    2006-05-10

    A diagnostic hypothesis is a causa ficta. It is an assumption, suitable to explain phenomena, which are not yet proven to be the only and valid explanation of the observed. One of Wilhelm Hauff's faitales illustrates how a hypothesis is generated. It is based on the interpretation of signs. Signs are of an ikonic, an indexical or a symbolic nature. According to S. Peirce, a hypothesis is created by abduction, to Conan Doyle's Sherlock Holmes by immersion into thoughts, and to S. Freud by free floating attention. The three procedures are alike. Neurobiological structures and functions, which correspond to these processes, are described; especially the emotional-implicite memory. The technique of hypothesis-generation is meaningful to clinical medicine.

  9. Dynamic subframe allocation for mobile broadband m-health using IEEE 802.16j mobile multihop relay networks.

    Science.gov (United States)

    Alinejad, Ali; Istepanian, R S H; Philip, N

    2012-01-01

    The concept of 4G health will be one of the key focus areas of future m-health research and enterprise activities in the coming years. WiMAX technology is one of the constituent 4G wireless technologies that provides broadband wireless access (BWA). Despite the fact that WiMAX is able to provide a high data rate in a relatively large coverage; this technology has specific limitations such as: coverage, signal attenuation problems due to shadowing or path loss, and limited available spectrum. The IEEE 802.16j mobile multihop relay (MMR) technology is a pragmatic solution designed to overcome these limitations. The aim of IEEE 802.16j MMR is to expand the IEEE 802.16e's capabilities with multihop features. In particular, the uplink (UL) and downlink (DL) subframe allocation in WiMAX network is usually fixed. However, dynamic frame allocation is a useful mechanism to optimize uplink and downlink subframe size dynamically based on the traffic conditions through real-time traffic monitoring. This particular mechanism is important for future WiMAX based m-health applications as it allows the tradeoff in both UL and DL channels. In this paper, we address the dynamic frame allocation issue in IEEE 802.16j MMR network for m-health applications. A comparative performance analysis of the proposed approach is validated using the OPNET Modeler(®). The simulation results have shown an improved performance of resource allocation and end-to-end delay performance for typical medical video streaming application.

  10. El arte de la deducción: La huella en el espectáculo mediático de Holmes

    Directory of Open Access Journals (Sweden)

    Sergio Beeche Antezana

    2012-11-01

    Full Text Available El presente artículo tiene la intención de analizar las características, relaciones interpersonales y representaciones audiovisuales del famoso personaje literario Sherlock Holmes, creado por el escritor inglés Sir Arthur Conan Doyle. Tomando de base las obras clásicas para dar las comparaciones pertinentes con la más reciente adaptación de la televisión británica, observando que una perspectiva diferente puede aportar una gran innovación de ideas, personajes y escenarios

  11. Interoperability in digital electrocardiography: harmonization of ISO/IEEE x73-PHD and SCP-ECG.

    Science.gov (United States)

    Trigo, Jesús D; Chiarugi, Franco; Alesanco, Alvaro; Martínez-Espronceda, Miguel; Serrano, Luis; Chronaki, Catherine E; Escayola, Javier; Martínez, Ignacio; García, José

    2010-11-01

    The ISO/IEEE 11073 (x73) family of standards is a reference frame for medical device interoperability. A draft for an ECG device specialization (ISO/IEEE 11073-10406-d02) has already been presented to the Personal Health Device (PHD) Working Group, and the Standard Communications Protocol for Computer-Assisted ElectroCardioGraphy (SCP-ECG) Standard for short-term diagnostic ECGs (EN1064:2005+A1:2007) has recently been approved as part of the x73 family (ISO 11073-91064:2009). These factors suggest the coordinated use of these two standards in foreseeable telecardiology environments, and hence the need to harmonize them. Such harmonization is the subject of this paper. Thus, a mapping of the mandatory attributes defined in the second draft of the ISO/IEEE 11073-10406-d02 and the minimum SCP-ECG fields is presented, and various other capabilities of the SCP-ECG Standard (such as the messaging part) are also analyzed from an x73-PHD point of view. As a result, this paper addresses and analyzes the implications of some inconsistencies in the coordinated use of these two standards. Finally, a proof-of-concept implementation of the draft x73-PHD ECG device specialization is presented, along with the conversion from x73-PHD to SCP-ECG. This paper, therefore, provides recommendations for future implementations of telecardiology systems that are compliant with both x73-PHD and SCP-ECG.

  12. Real-Time Support on IEEE 802.11 Wireless Ad-Hoc Networks: Reality vs. Theory

    Science.gov (United States)

    Kang, Mikyung; Kang, Dong-In; Suh, Jinwoo

    The usable throughput of an IEEE 802.11 system for an application is much less than the raw bandwidth. Although 802.11b has a theoretical maximum of 11Mbps, more than half of the bandwidth is consumed by overhead leaving at most 5Mbps of usable bandwidth. Considering this characteristic, this paper proposes and analyzes a real-time distributed scheduling scheme based on the existing IEEE 802.11 wireless ad-hoc networks, using USC/ISI's Power Aware Sensing Tracking and Analysis (PASTA) hardware platform. We compared the distributed real-time scheduling scheme with the real-time polling scheme to meet deadline, and compared a measured real bandwidth with a theoretical result. The theoretical and experimental results show that the distributed scheduling scheme can guarantee real-time traffic and enhances the performance up to 74% compared with polling scheme.

  13. 0011-0030.IEEE 754: 64 Bit Double Precision FloatsThis.pdf | 01 ...

    Indian Academy of Sciences (India)

    Home; public; Volumes; reso; 021; 01; 0011-0030.IEEE 754: 64 Bit Double Precision FloatsThis.pdf. 404! error. The page your are looking for can not be found! Please check the link or use the navigation bar at the top. YouTube; Twitter; Facebook; Blog. Academy News. IAS Logo. 29th Mid-year meeting. Posted on 19 ...

  14. The Effects of Issue Investigation and Action Training on Eighth-Grade Students' Environmental Behavior.

    Science.gov (United States)

    Ramsey, John M.

    1993-01-01

    Reports the instructional effects of a formal environmental education methodology, issue investigation and action training (IIAT), on eighth-grade students. Focuses on whether IIAT can improve responsible environmental behavior in middle school students and whether variables associated with responsible adult environmental behavior will be…

  15. Proceedings of the eighth Symposium of Atomic Energy Research

    International Nuclear Information System (INIS)

    Vidovszky, I.

    1998-10-01

    These are the remaining 9 papers, presented on the eighth Symposium of Atomic Energy Research, held in Bystrice nad Perstejnem, Czech Republic, 21-25 September 1998. The papers are presented in their original form, i. e. no corrections or modifications were carried out. The content of this volume is divided into thematic groups: Spectral and Core Calculation Methods, Core Design, Operation and Fuel Management, Core Monitoring, Surveillance and Testing, Neutron Kinetics and reactor Dynamics Methods, Safety Issues and Analysis, Rod Drop Reactivity Measurements, Criticality safety, Spent Fuel and Decommissioning, - according to the presentation sequence on the Symposium

  16. Revisión del estado del arte deIR-Ultra-Wideband y simulación de la respuesta impulsiva del canal IEEE802.15.4a Review of the state of art of IR-Ultra-Wideband and simulation of Impulse Responce of the IEEE 802.15.4a channel

    Directory of Open Access Journals (Sweden)

    Julio Suárez Páez

    2010-06-01

    Full Text Available Este artículo realiza una revisión del estado del arte de la tecnología basada en canales de Banda Ultra Ancha (UWB, Ultra–Wideband enfocándose en su regulación, estandarización, aplicaciones básicas, modelo de canal IEEE 802.15.4a y simulación de la respuesta impulsiva de este tipo de canal. También se pretende introducir al lector en las tecnologías basadas en canales IR–UWB y en los parámetros para el modelamiento y simulación del canal UWB IEEE 802.15.4a.This paper reviews the state of the art of the technology based in channels of Ultra Wide band (UWB Ultra–Wideband focusing on its regulation, standardization, basic applications, IEEE 802.15.4a channel model and simulation of the impulsive response of this type of channel. Also, it aims to introduce the reader to the technologies based on IR–UWB channels and the parameters for modeling and simulation of IEEE 802.15.4a UWB channel.

  17. PREFACE: The Eighth Liquid Matter Conference The Eighth Liquid Matter Conference

    Science.gov (United States)

    Dellago, Christoph; Kahl, Gerhard; Likos, Christos N.

    2012-07-01

    The Eighth Liquid Matter Conference (LMC8) was held at the Universität Wien from 6-10 September 2011. Initiated in 1990, the conferences of this series cover a broad range of highly interdisciplinary topics, ranging from simple liquids to soft matter and biophysical systems. The vast spectrum of scientific subjects presented and discussed at the LMC8 is reflected in the themes of the ten symposia: Ionic and quantum liquids, liquid metals Water, solutions and reaction dynamics Liquid crystals Polymers, polyelectrolytes, biopolymers Colloids Films, foams, surfactants, emulsions, aerosols Confined fluids, interfacial phenomena Supercooled liquids, glasses, gels Non-equilibrium systems, rheology, nanofluids Biofluids, active matter This special issue contains scientific papers, authored by participants of the LMC8, which provide a cross-section of the scientific activities in current liquid matter science, as discussed at the conference, and demonstrate the scientific as well as methodological progress made in this field over the past couple of years. The Eighth Liquid Matter Conference contents The Eighth Liquid Matter ConferenceChristoph Dellago, Gerhard Kahl and Christos N Likos Comparing light-induced colloidal quasicrystals with different rotational symmetriesMichael Schmiedeberg and Holger Stark Hydrogen bond network relaxation in aqueous polyelectrolyte solutions: the effect of temperatureS Sarti, D Truzzolillo and F Bordi Equilibrium concentration profiles and sedimentation kinetics of colloidal gels under gravitational stressS Buzzaccaro, E Secchi, G Brambilla, R Piazza and L Cipelletti The capillary interaction between two vertical cylindersHimantha Cooray, Pietro Cicuta and Dominic Vella Hydrodynamic and viscoelastic effects in polymer diffusionJ Farago, H Meyer, J Baschnagel and A N Semenov A density-functional theory study of microphase formation in binary Gaussian mixturesM Carta, D Pini, A Parola and L Reatto Microcanonical determination of the

  18. Proceedings of the 1988 IEEE international conference on robotics and automation. Volume 1

    International Nuclear Information System (INIS)

    Anon.

    1988-01-01

    These proceedings compile the papers presented at the international conference (1988) sponsored by IEEE Council on ''Robotics and Automation''. The subjects discussed were: automation and robots of nuclear power stations; algorithms of multiprocessors; parallel processing and computer architecture; and U.S. DOE research programs on nuclear power plants

  19. NIH-IEEE 2015 Strategic Conference on Healthcare Innovations and Point-of-Care Technologies for Prec

    Science.gov (United States)

    NIH and the Institute for Electrical and Electronics Engineering, Engineering in Medicine and Biology Society (IEEE/EMBS) hosted the third iteration of the Healthcare Innovations and Point-of-Care Technologies Conference last week.

  20. Comparison of seasonal variations of ozone exposure and fluxes in a Mediterranean Holm oak forest between the exceptionally dry 2003 and the following year

    International Nuclear Information System (INIS)

    Gerosa, Giacomo; Finco, Angelo; Mereu, Simone; Vitale, Marcello; Manes, Fausto; Denti, Antonio Ballarin

    2009-01-01

    Ozone and energy fluxes have been measured using the eddy covariance technique, from June to December 2004 in Castelporziano near Rome (Italy), and compared to similar measurements made in the previous year. The studied ecosystem consisted in a typical Mediterranean Holm oak forest. Stomatal fluxes have been calculated using the resistance analogy and by inverting the Penmann-Monteith equation. Results showed that the average stomatal contribution accounts for 42.6% of the total fluxes. Non-stomatal deposition proved to be enhanced by increasing leaf wetness and air humidity during the autumnal months. From a comparison of the two years, it can be inferred that water supply is the most important limiting factor for ozone uptake and that prolonged droughts alter significantly the stomatal conductance, even 2 months after the soil water content is replenished. Ozone exposure, expressed as AOT40, behaves similarly to the cumulated stomatal flux in dry conditions whereas a different behaviour for the two indices appears in wet autumnal conditions. A difference also occurs between the two years. - Ozone fluxes to a Holm oak coastal forest show inter-annual variations depending on meteorological conditions and water availability.

  1. Status of the IEEE P896 Future Backplane Bus

    International Nuclear Information System (INIS)

    Gustavson, D.B.

    1983-10-01

    The IEEE P896 Future Backplane Bus project has been influenced by and has influenced FASTBUS and several other contemporary bus designs. This paper summarizes the current status of that project, which is directed toward the needs of modern 32-bit microprocessor systems with multiple processors. Some of the technology developed for P896 will be important for future non-ECL implementations of FASTBUS and other buses. In particular, new bus drivers and receivers should greatly improve the performance and reliability of backplane buses and cable buses. The current status of the P896 serial bus is also summarized

  2. 15th IEEE International Conference on Intelligent Engineering Systems

    CERN Document Server

    Živčák, Jozef; Aspects of Computational Intelligence Theory and Applications

    2013-01-01

    This volume covers the state-of-the art of the research and development in various aspects of computational intelligence and gives some perspective directions of development. Except the traditional engineering areas that contain theoretical knowledge, applications, designs and projects, the book includes the area of use of computational intelligence in biomedical engineering. „Aspects of Computational Intelligence: Theory and Applications” is a compilation of carefully selected extended papers written on the basis of original contributions presented at the 15th IEEE International Conference on Intelligent Engineering Systems 2011, INES 2011 held at June 23.-26. 2011 in AquaCity Poprad, Slovakia.    

  3. IEEE Std 323-1983: IEEE standard for qualifying Class 1E equipment for nuclear power generating stations

    International Nuclear Information System (INIS)

    Anon.

    1992-01-01

    This standard describes the basic requirements for qualifying Class 1E equipment with interfaces that are to be used in nuclear power generating stations. The requirements presented include the principles, procedures, and methods of qualification. These qualification requirements, when met, will confirm the adequacy of the equipment design under normal, abnormal, design basis event, post design basis event, and in-service test conditions for the performance of safety function(s). The purpose of this standard is to identify requirements for the qualification of Class 1E equipment, including those interfaces whose failure could adversely affect the performance of Class 1E equipment and systems. The methods described shall be used for qualifying equipment, extending qualification, and updating qualification if the equipment is modified. Other issued IEEE standards which present qualification methods for specific equipment or components, or both, and those that deal with parts of the qualification program, may be used to supplement this standard, as applicable

  4. Performance Analysis of IEEE 802.11 DCF and IEEE 802.11e EDCA in Non-saturation Condition

    Science.gov (United States)

    Kim, Tae Ok; Kim, Kyung Jae; Choi, Bong Dae

    We analyze the MAC performance of the IEEE 802.11 DCF and 802.11e EDCA in non-saturation condition where device does not have packets to transmit sometimes. We assume that a flow is not generated while the previous flow is in service and the number of packets in a flow is geometrically distributed. In this paper, we take into account the feature of non-saturation condition in standards: possibility of transmission performed without preceding backoff procedure for the first packet arriving at the idle station. Our approach is to model a stochastic behavior of one station as a discrete time Markov chain. We obtain four performance measures: normalized channel throughput, average packet HoL (head of line) delay, expected time to complete transmission of a flow and packet loss probability. Our results can be used for admission control to find the optimal number of stations with some constraints on these measures.

  5. Improving Energy Efficiency in Idle Listening of IEEE 802.11 WLANs

    Directory of Open Access Journals (Sweden)

    Muhammad Adnan

    2016-01-01

    Full Text Available This paper aims to improve energy efficiency of IEEE 802.11 wireless local area networks (WLANs by effectively dealing with idle listening (IL, which is required for channel sensing and is unavoidable in a contention-based channel access mechanism. Firstly, we show that IL is a dominant source of energy drain in WLANs and it cannot be effectively alleviated by the power saving mechanism proposed in the IEEE 802.11 standard. To solve this problem, we propose an energy-efficient mechanism that combines three schemes in a systematic way: downclocking, frame aggregation, and contention window adjustment. The downclocking scheme lets a station remain in a semisleep state when overhearing frames destined to neighbor stations, whereby the station consumes the minimal energy without impairing channel access capability. As well as decreasing the channel access overhead, the frame aggregation scheme prolongs the period of semisleep time. Moreover, by controlling the size of contention window based on the number of stations, the proposed mechanism decreases unnecessary IL time due to collision and retransmission. By deriving an analysis model and performing extensive simulations, we confirm that the proposed mechanism significantly improves the energy efficiency and throughput, by up to 2.8 and 1.8 times, respectively, compared to the conventional power saving mechanisms.

  6. A note on bound constraints handling for the IEEE CEC'05 benchmark function suite.

    Science.gov (United States)

    Liao, Tianjun; Molina, Daniel; de Oca, Marco A Montes; Stützle, Thomas

    2014-01-01

    The benchmark functions and some of the algorithms proposed for the special session on real parameter optimization of the 2005 IEEE Congress on Evolutionary Computation (CEC'05) have played and still play an important role in the assessment of the state of the art in continuous optimization. In this article, we show that if bound constraints are not enforced for the final reported solutions, state-of-the-art algorithms produce infeasible best candidate solutions for the majority of functions of the IEEE CEC'05 benchmark function suite. This occurs even though the optima of the CEC'05 functions are within the specified bounds. This phenomenon has important implications on algorithm comparisons, and therefore on algorithm designs. This article's goal is to draw the attention of the community to the fact that some authors might have drawn wrong conclusions from experiments using the CEC'05 problems.

  7. The Engineer's Thumb or Sherlock Holmes on the trail of 'the uncanny'.

    Science.gov (United States)

    Batail, J

    1997-08-01

    Freud identified 'primal phantasies' (life in the womb, 'primal scene', seduction, castration). It is argued that 'The Engineer's Thumb', a short story from 'The Adventures of Sherlock Holmes', draws its uncanniness from the fact that it is underpinned by all the primal phantasies described by Freud. 'The Engineer's Thumb' therefore illustrates what analytical interpretation can contribute to the understanding of certain literary works. 'The Engineer's Thumb' may also serve as an introduction to a broader study of the Freudian concept of 'the uncanny'. This study seems to confirm what Freud said when he pointed out that 'an uncanny experience occurs either when infantile complexes which have been repressed are once more revived by some impression, or when primitive beliefs which have been surmounted seem once more to be confirmed' (1919, p. 249). 'The Engineer's Thumb' has another interesting feature: in this short story. Conan Doyle, by setting up a 'talking cure', anticipates the creation of psychoanalysis and highlights in a striking way certain aspects of what was to become psychoanalytical treatment.

  8. A high-linearity InGaP/GaAs HBT power amplifier for IEEE 802.11a/n

    International Nuclear Information System (INIS)

    Cui Jie; Chen Lei; Kang Chunlei; Shi Jia; Zhang Xuguang; Ai Baoli; Liu Yi

    2013-01-01

    A three-stage 4.8–6 GHz monolithic power amplifier (PA) compatible with IEEE 802.11a/n designed based on an advanced 2 μm InGaP/GaAs hetero-junction bipolar transistor (HBT) process is presented. The PA integrates input matching and closed-loop power control circuits on chip. Under 3.3 V DC bias, the amplifier achieves a ∼31 dB small signal gain, excellent wide band input and output matching among overall 1.2 GHz bandwidth, and up to 24.5 dBm linear output power below EVM 3% with IEEE 802.11a 64QAM OFDM input signal. (semiconductor integrated circuits)

  9. Design and implementation of an IEEE 802.11 baseband OFDM transceiver in 0.18 μm CMOS

    International Nuclear Information System (INIS)

    Wu Bin; Zhou Yumei; Zhu Yongxu; Zhang Zhengdong; Cai Jingjing

    2011-01-01

    An SISO IEEE 802.11 baseband OFDM transceiver ASIC is implemented. The chip can support all of the SISO IEEE 802.11 work modes by optimizing the key module and sharing the module between the transmitter and receiver. The area and power are decreased greatly compared with other designs. The baseband prototype has been verified under the WLAN baseband test equipment and through transferring the video. The 0.18 μm 1P/6M CMOS technology layout is finished and the chip is fabricated in SMIC, which occupies a 2.6 x 2.6 mm 2 area and consumes 83 mW under typical work modes. (semiconductor integrated circuits)

  10. Design and implementation of an IEEE 802.11 baseband OFDM transceiver in 0.18 μm CMOS

    Science.gov (United States)

    Bin, Wu; Yumei, Zhou; Yongxu, Zhu; Zhengdong, Zhang; Jingjing, Cai

    2011-05-01

    An SISO IEEE 802.11 baseband OFDM transceiver ASIC is implemented. The chip can support all of the SISO IEEE 802.11 work modes by optimizing the key module and sharing the module between the transmitter and receiver. The area and power are decreased greatly compared with other designs. The baseband prototype has been verified under the WLAN baseband test equipment and through transferring the video. The 0.18 μm 1P/6M CMOS technology layout is finished and the chip is fabricated in SMIC, which occupies a 2.6 × 2.6 mm2 area and consumes 83 mW under typical work modes.

  11. Design and implementation of an IEEE 802.11 baseband OFDM transceiver in 0.18 {mu}m CMOS

    Energy Technology Data Exchange (ETDEWEB)

    Wu Bin; Zhou Yumei; Zhu Yongxu; Zhang Zhengdong; Cai Jingjing, E-mail: wubin@ime.ac.cn [Institute of Microelectronics, Chinese Academy of Sciences, Beijing 100029 (China)

    2011-05-15

    An SISO IEEE 802.11 baseband OFDM transceiver ASIC is implemented. The chip can support all of the SISO IEEE 802.11 work modes by optimizing the key module and sharing the module between the transmitter and receiver. The area and power are decreased greatly compared with other designs. The baseband prototype has been verified under the WLAN baseband test equipment and through transferring the video. The 0.18 {mu}m 1P/6M CMOS technology layout is finished and the chip is fabricated in SMIC, which occupies a 2.6 x 2.6 mm{sup 2} area and consumes 83 mW under typical work modes. (semiconductor integrated circuits)

  12. Analysis of Adaptive Control Scheme in IEEE 802.11 and IEEE 802.11e Wireless LANs

    Science.gov (United States)

    Lee, Bih-Hwang; Lai, Hui-Cheng

    In order to achieve the prioritized quality of service (QoS) guarantee, the IEEE 802.11e EDCAF (the enhanced distributed channel access function) provides the distinguished services by configuring the different QoS parameters to different access categories (ACs). An admission control scheme is needed to maximize the utilization of wireless channel. Most of papers study throughput improvement by solving the complicated multidimensional Markov-chain model. In this paper, we introduce a back-off model to study the transmission probability of the different arbitration interframe space number (AIFSN) and the minimum contention window size (CWmin). We propose an adaptive control scheme (ACS) to dynamically update AIFSN and CWmin based on the periodical monitoring of current channel status and QoS requirements to achieve the specific service differentiation at access points (AP). This paper provides an effective tuning mechanism for improving QoS in WLAN. Analytical and simulation results show that the proposed scheme outperforms the basic EDCAF in terms of throughput and service differentiation especially at high collision rate.

  13. Human exposure standards in the frequency range 1 Hz To 100 kHz: the case for adoption of the IEEE standard.

    Science.gov (United States)

    Patrick Reilly, J

    2014-10-01

    Differences between IEEE C95 Standards (C95.6-2002 and C95.1-2005) in the low-frequency (1 Hz-100 kHz) and the ICNIRP-2010 guidelines appear across the frequency spectrum. Factors accounting for lack of convergence include: differences between the IEEE standards and the ICNIRP guidelines with respect to biological induction models, stated objectives, data trail from experimentally derived thresholds through physical and biological principles, selection and justification of safety/reduction factors, use of probability models, compliance standards for the limbs as distinct from the whole body, defined population categories, strategies for central nervous system protection below 20 Hz, and correspondence of environmental electric field limits with contact currents. This paper discusses these factors and makes the case for adoption of the limits in the IEEE standards.

  14. Adaptive Radio Resource Allocation in Hierarchical QoS Scheduling for IEEE 802.16 Systems

    DEFF Research Database (Denmark)

    Wang, Hua; Dittmann, Lars

    2007-01-01

    Future mobile communication systems such as IEEE 802.16 are expected to deliver a variety of multimedia services with diverse QoS requirements. To guarantee the QoS provision, appropriate scheduler architecture and scheduling algorithms have to be carefully designed. In this paper, we propose...

  15. 78 FR 40000 - Eighth Coast Guard District Annual Safety Zones; Riverfront Independence Festival Fireworks; Ohio...

    Science.gov (United States)

    2013-07-03

    ...-AA00 Eighth Coast Guard District Annual Safety Zones; Riverfront Independence Festival Fireworks; Ohio.... SUMMARY: The Coast Guard will enforce a Safety Zone for the Riverfront Independence Festival Fireworks on... navigable waters during the Riverfront Independence Festival Fireworks. During the enforcement period, in...

  16. IEEE 1394 CAMERA IMAGING SYSTEM FOR BROOKHAVENS BOOSTER APPLICATION FACILITY BEAM DIAGNOSTICS

    International Nuclear Information System (INIS)

    BROWN, K.A.; FRAK, B.; GASSNER, D.; HOFF, L.; OLSEN, R.H.; SATOGATA, T.; TEPIKIAN, S.

    2002-01-01

    Brookhaven's Booster Applications Facility (BAF) will deliver resonant extracted heavy ion beams from the AGS Booster to short-exposure fixed-target experiments located at the end of the BAF beam line. The facility is designed to deliver a wide range of heavy ion species over a range of intensities from 10 3 to over 10 8 ions/pulse, and over a range of energies from 0.1 to 3.0 GeV/nucleon. With these constraints we have designed instrumentation packages which can deliver the maximum amount of dynamic range at a reasonable cost. Through the use of high quality optics systems and neutral density light filters we will achieve 4 to 5 orders of magnitude in light collection. By using digital IEEE1394 camera systems we are able to eliminate the frame-grabber stage in processing and directly transfer data at maximum rates of 400 Mb/set. In this note we give a detailed description of the system design and discuss the parameters used to develop the system specifications. We will also discuss the IEEE1394 camera software interface and the high-level user interface

  17. Achievement, Engagement, and Behavior Outcomes of Youth at Risk Following a Pre-Eighth-Grade Summer Academic Enrichment Program and Participation in a School-Wide, School Year Long, Ownership, Mastery, and Grading Initiative

    Science.gov (United States)

    Alati, David K.

    2011-01-01

    No significant differences in beginning eighth-grade pretest compared to ending eighth-grade posttest California Achievement Test Normal Curve Equivalent Scores were found for youth at risk who completed a pre-eighth-grade summer academic enrichment program where comparisons for reading vocabulary t(19) = 0.46, p = 0.33 (one-tailed), d = 0.107,…

  18. Identification of forty-five gene-derived polymorphic microsatellite ...

    Indian Academy of Sciences (India)

    [Chen M., Gao L., Zhang W., You H., Sun Q. and Chang Y. 2013 Identification of forty-five ... including Japan, China, Korea and fareastern Russia (Chang et al. 2009). Because of ... tory using the Illumina HiSeq 2000 Sequencing Technology.

  19. Obituary: Elizabeth Katherine Holmes, 1973-2004

    Science.gov (United States)

    Beichman, Charles Arnold

    2004-12-01

    Elizabeth (Beth) K. Holmes died suddenly in Pasadena on March 23, 2004, from the unexpected effects of a long-standing heart condition. She was 30 years old. At the moment of her passing, she was at her computer comparing her theoretical models on the effects of planets on the distribution of zodiacal dust with some of the first observations from the Spitzer Space Telescope. Born on June 24, 1973, in New York City, Beth was the only child of James and Barbara Holmes, who were respectively, a financial manager and a nurse and social worker. Undeterred by numerous treatments and operations to correct a congenital heart condition, Beth developed an interest in math and physics leading to her graduation from MIT in 1995 with a bachelor's degree in Physics. She entered the University of Florida shortly afterwards to begin her PhD studies under the direction of Stanley Dermott. Beth was particularly interested in the dynamics of interplanetary dust, and initially worked on secular perturbations of the zodiacal cloud: how the planets impose warping of the cloud, and how they can force the center of the cloud to be offset from the Sun. Despite the fact that Beth was primarily a theorist, she was keen to include some observing experience in her PhD education. She recently completed an observing program with Harold Butner at the Steward and Palomar Observatories looking for submillimeter and mid-infrared emission around nearby main-sequence stars - a signpost of planetary formation. The results were published last year in the Astronomical Journal. Beth's PhD thesis work, some results of which were recently published in the Astrophysical Journal, focused on dust originating in the Kuiper belt and how some of this dust is expected to be spatially structured due to resonant interactions with Neptune. This phenomenon may be quite common in other planetary systems, with recent images of Epsilon Eridani perhaps providing a prime example of a Kuiper disk analog. After graduating

  20. IEEE standard for qualifying class IE equipment for nuclear power generating stations

    International Nuclear Information System (INIS)

    Anon.

    1974-01-01

    The Institute of Electrical and Electrical Engineers, Inc. (IEEE) standards for electrical equipment (Class IE) for nuclear power generating stations are given. The standards are to provide guidance for demonstrating and documenting the adequacy of electric equipment used in all Class IE and interface systems. Representative in containment design basis event conditions for the principal reactor types are included in the appendixes for guidance in enviromental simulation

  1. Predictable and reliable ECG monitoring over IEEE 802.11 WLANs within a hospital.

    Science.gov (United States)

    Park, Juyoung; Kang, Kyungtae

    2014-09-01

    Telecardiology provides mobility for patients who require constant electrocardiogram (ECG) monitoring. However, its safety is dependent on the predictability and robustness of data delivery, which must overcome errors in the wireless channel through which the ECG data are transmitted. We report here a framework that can be used to gauge the applicability of IEEE 802.11 wireless local area network (WLAN) technology to ECG monitoring systems in terms of delay constraints and transmission reliability. For this purpose, a medical-grade WLAN architecture achieved predictable delay through the combination of a medium access control mechanism based on the point coordination function provided by IEEE 802.11 and an error control scheme based on Reed-Solomon coding and block interleaving. The size of the jitter buffer needed was determined by this architecture to avoid service dropout caused by buffer underrun, through analysis of variations in transmission delay. Finally, we assessed this architecture in terms of service latency and reliability by modeling the transmission of uncompressed two-lead electrocardiogram data from the MIT-BIH Arrhythmia Database and highlight the applicability of this wireless technology to telecardiology.

  2. Real-Time-Simulation of IEEE-5-Bus Network on OPAL-RT-OP4510 Simulator

    Science.gov (United States)

    Atul Bhandakkar, Anjali; Mathew, Lini, Dr.

    2018-03-01

    The Real-Time Simulator tools have high computing technologies, improved performance. They are widely used for design and improvement of electrical systems. The advancement of the software tools like MATLAB/SIMULINK with its Real-Time Workshop (RTW) and Real-Time Windows Target (RTWT), real-time simulators are used extensively in many engineering fields, such as industry, education, and research institutions. OPAL-RT-OP4510 is a Real-Time Simulator which is used in both industry and academia. In this paper, the real-time simulation of IEEE-5-Bus network is carried out by means of OPAL-RT-OP4510 with CRO and other hardware. The performance of the network is observed with the introduction of fault at various locations. The waveforms of voltage, current, active and reactive power are observed in the MATLAB simulation environment and on the CRO. Also, Load Flow Analysis (LFA) of IEEE-5-Bus network is computed using MATLAB/Simulink power-gui load flow tool.

  3. A Green Media Access Method for IEEE 802.15.6 Wireless Body Area Network.

    Science.gov (United States)

    Jacob, Anil K; Jacob, Lillykutty

    2017-09-30

    It is of utmost importance to conserve battery energy to the maximum possible extent in WBAN nodes while collecting and transferring medical data. The IEEE 802.15.6 WBAN standard does not specify any method to conserve energy. This paper focuses on a method to conserve energy in IEEE 802.15.6 WBAN nodes when using CSMA/CA, while simultaneously restricting data delivery delay to the required value as specified in medical applications. The technique is to allow the nodes to sleep all the times except for receiving beacons and for transmitting data frames whenever a data frame enters an empty buffer. The energy consumed by the nodes and the average latency of data frame for periodical arrival of data are found out analytically. The analytical results are validated and also the proposed method is compared with other energy conserving schemes, using Castalia simulation studies. The proposed method shows superior performance in both device lifetime and latency of emergency medical data.

  4. WIH-based IEEE 802.11 ECG monitoring implementation.

    Science.gov (United States)

    Moein, A; Pouladian, M

    2007-01-01

    New wireless technologies make possible the implementation of high level integration wireless devices which allow the replacement of traditional large wired monitoring devices. It offers new functionalities to physicians and will reduce the costs. Among these functionalities, biomedical signals can be sent to other devices (PDA, PC . . . ) or processing centers, without restricting the patients' mobility. This article discusses the WIH (Ward-In-Hand) structure and the software required for its implementation before an operational example is presented with its results. The aim of this project is the development and implementation of a reduced size electrocardiograph based on IEEE 802.11 with high speed and more accuracy, which allows wireless monitoring of patients, and the insertion of the information into the Wi-Fi hospital networks.

  5. Contributions to the 14th IEEE/NPSS Symposium on fusion engineering

    International Nuclear Information System (INIS)

    Navarro, A.P.; Almoguera, L.; Alonso Gozalo, J.; Alonso Candenas, J.; Blaumoser, M.

    1992-01-01

    Three communications about the TJ-II device, under construction at CIEMAT with preferential support from EURATOM, were presented to the 14th IEEE/NPSS Symposium on Fusion Engineering and are collected in this report. The first one describes in detail the device and its present status of design and construction. The remaining two deal with the two most critical components of the project: the vacuum vessel and the central hard conductor. (author) 16 fig. 16 ref

  6. [Mobile Health: IEEE Standard for Wearable Cuffless Blood Pressure Measuring Devices].

    Science.gov (United States)

    Zhou, Xia; Wu, Wenli; Bao, Shudi

    2015-07-01

    IEEE Std 1708-2014 breaks through the traditional standards of cuff based blood pressure measuring devices and establishes a normative definition of wearable cuffless blood pressure measuring devices and the objective performance evaluation of this kind of devices. This study firstly introduces the background of the new standard. Then, the standard details will be described, and the impact of cuffless blood pressure measuring devices with the new standard on manufacturers and end users will be addressed.

  7. Proceedings of the eighth European annual conference on human decision making and manual control

    International Nuclear Information System (INIS)

    Lind, M.; Hollnagel, E.

    1989-01-01

    The papers contributed at the eighth European annual conference on human decision making and manual control cover the subject areas of vehicle control, robotics, modeling, operator support and cognitive engineering, artificial intelligence and neural network. Some of the papers are relevant to power plant control and in this respect to nuclear safety. (AB)

  8. A Security Solution for IEEE 802.11's Ad-hoc Mode:Password-Authentication and Group Diffie-Hellman Key Exchange

    Energy Technology Data Exchange (ETDEWEB)

    Emmanuel, Bresson; Olivier, Chevassut; David, Pointcheval

    2005-10-01

    The IEEE 802 standards ease the deployment of networkinginfrastructures and enable employers to accesscorporate networks whiletraveling. These standards provide two modes of communication calledinfrastructure and ad-hoc modes. A security solution for the IEEE802.11's infrastructure mode took several years to reach maturity andfirmware are still been upgraded, yet a solution for the ad-hoc modeneeds to be specified. The present paper is a first attempt in thisdirection. It leverages the latest developments in the area ofpassword-based authentication and (group) Diffie-Hellman key exchange todevelop a provably-secure key-exchange protocol for IEEE 802.11's ad-hocmode. The protocol allows users to securely join and leave the wirelessgroup at time, accommodates either a single-shared password orpairwise-shared passwords among the group members, or at least with acentral server; achieves security against dictionary attacks in theideal-hash model (i.e. random-oracles). This is, to the best of ourknowledge, the first such protocol to appear in the cryptographicliterature.

  9. Performance Analysis of IEEE 802.15.6 CSMA/CA Protocol for WBAN Medical Scenario through DTMC Model.

    Science.gov (United States)

    Kumar, Vivek; Gupta, Bharat

    2016-12-01

    The newly drafted IEEE 802.15.6 standard for Wireless Body Area Networks (WBAN) has been concentrating on a numerous medical and non-medical applications. Such short range wireless communication standard offers ultra-low power consumption with variable data rates from few Kbps to Mbps in, on or around the proximity of the human body. In this paper, the performance analysis of carrier sense multiple access with collision avoidance (CSMA/CA) scheme based on IEEE 802.15.6 standard in terms of throughput, reliability, clear channel assessment (CCA) failure probability, packet drop probability, and end-to-end delay has been presented. We have developed a discrete-time Markov chain (DTMC) to significantly evaluate the performances of IEEE 802.15.6 CSMA/CA under non-ideal channel condition having saturated traffic condition including node wait time and service time. We also visualize that, as soon as the payload length increases the CCA failure probability increases, which results in lower node's reliability. Also, we have calculated the end-to-end delay in order to prioritize the node wait time cause by backoff and retransmission. The user priority (UP) wise DTMC analysis has been performed to show the importance of the standard especially for medical scenario.

  10. IEEE Std 383-1974: IEEE standard for type test of Class IE electric cables, field splices, and connections for nuclear power generating stations

    International Nuclear Information System (INIS)

    Anon.

    1992-01-01

    This standard provides direction for establishing type tests which may be used in qualifying Class 1E electric cables, field splices, and other connections for service in nuclear power generating stations. General guidelines for qualifications are given in IEEE Std 323-1974, Standard for Qualifying Class IE Electric Equipment for Nuclear Power Generating Stations. Categories of cables covered are those used for power control and instrumentation services. Though intended primarily to pertain to cable for field installation, this guide may also be used for the qualification of internal wiring of manufactured devices. This guide does not cover cables for service within the reactor vessel

  11. 7th IEEE International Conference Intelligent Systems

    CERN Document Server

    Atanassov, KT; Doukovska, L; Hadjiski, M; Jotsov, V; Kacprzyk, J; Kasabov, N; Sotirov, S; Szmidt, E; Zadrożny, S; Filev, D; Jabłkowski, J; Kacprzyk, J; Krawczak, M; Popchev, I; Rutkowski, L; Sgurev, V; Sotirova, E; Szynkarczyk, P

    2015-01-01

    This two volume set of books constitutes the proceedings of the 2014  7th IEEE International Conference Intelligent Systems (IS), or IEEE IS’2014 for short, held on September 24‐26, 2014 in Warsaw, Poland. Moreover, it contains some selected papers from the collocated IWIFSGN'2014-Thirteenth International Workshop on Intuitionistic Fuzzy Sets and Generalized Nets.The conference was organized by the Systems Research Institute, Polish Academy of Sciences, Department IV of Engineering Sciences, Polish Academy of Sciences, and Industrial Institute of Automation and Measurements - PIAP.The papers included in the two proceedings volumes have been subject to a thorough review process by three highly qualified peer reviewers.Comments and suggestions from them have considerable helped improve the quality of the papers but also the division of the volumes into parts, and assignment of the papers to the best suited parts.  

  12. 2012 Special NSREC Issue of the IEEE Transactions on Nuclear Science Comments by the Editors

    Science.gov (United States)

    Schwank, Jim; Brown, Dennis; Girard, Sylvain; Gouker, Pascale; Gerardin, Simone; Quinn, Heather; Barnaby, Hugh

    2012-12-01

    The December 2012 special issue of the IEEE Transactions on Nuclear Science contains selected papers from the 49th annual IEEE International Nuclear and Space Radiation Effects Conference (NSREC) held July 16-20, 2012, in Miami, Florida USA. 95 papers presented at the 2012 NSREC were submitted for consideration for this year’s special issue. Those papers that appear in this special issue were able to successfully complete the review process before the deadline for the December issue. A few additional papers may appear in subsequent issues of the TRANSACTIONS. This publication is the premier archival journal for research on space and nuclear radiation effects in materials, devices, circuits, and systems. This distinction is the direct result of the conscientious efforts of both the authors, who present and document their work, and the reviewers, who selflessly volunteer their time and talent to help review the manuscripts. Each paper in this journal has been reviewed by experts selected by the editors for their expertise and knowledge of the particular subject areas. The peer review process for a typical technical journal generally takes six months to one year to complete. To publish this special issue of the IEEE Transactions on Nuclear Science (in December), the review process, from initial submission to final form, must be completed in about 10 weeks. Because of the short schedule, both the authors and reviewers are required to respond very quickly. The reviewers listed on the following pages contributed vitally to this quick-turn review process.We would like to express our sincere appreciation to each of them for accepting this difficult, but critical role in the process. To provide consistent reviews of papers throughout the year, the IEEE Transactions on Nuclear Science relies on a year-round editorial board that manages reviews for submissions throughout the year to the TRANSACTIONS in the area of radiation effects. The review process is managed by a Senior

  13. Holm Oak (Quercus ilex L.) canopy as interceptor of airborne trace elements and their accumulation in the litter and topsoil

    International Nuclear Information System (INIS)

    Fantozzi, Federica; Monaci, Fabrizio; Blanusa, Tijana; Bargagli, Roberto

    2013-01-01

    We investigated the role of urban Holm Oak (Quercus ilex L.) trees as an airborne metal accumulators and metals' environmental fate. Analyses confirmed Pb, Cd, Cu and Zn as a main contaminants in Siena's urban environment; only Pb concentrations decreased significantly compared to earlier surveys. Additionally, we determined chemical composition of tree leaves, litter and topsoil (underneath/outside tree crown) in urban and extra-urban oak stands. Most notably, litter in urban samples collected outside the canopy had significantly lower concentrations of organic matter and higher concentrations of Pb, Cu, Cd and Zn than litter collected underneath the canopy. There was a greater metals' accumulation in topsoil, in samples collected under the tree canopy and especially near the trunk (‘stemflow area’). Thus, in urban ecosystems the Holm Oak stands likely increase the soil capability to bind metals. -- Highlights: ► Of the main metal contaminants only leaf Pb concentrations decreased in the period 1994–2011. ► Leaf Cd, Cr, Cu, Pb and Zn concentrations were higher in urban than in extra urban park. ► In urban park litter, Cu, Cd, Pb and Zn concentrations were higher outside than underneath the tree crown. ► Conversely, in urban park soil, Cu, Cd, Pb and Zn concentrations were lower outside the crown. ► Soil therefore behaves as a sink for metal contaminants such as Cu, Pb and Cd. -- Quercus ilex leaves are efficient interceptors of airborne trace elements in urban environments and we found an increased accumulation of metals in topsoil under the tree canopy

  14. Institute of fundamental research: forty years of research

    International Nuclear Information System (INIS)

    1986-01-01

    This document is aimed at illustration of forty years of fundamental research at CEA. It has not been conceived to give an exhaustive view of current research at IRF, but to give an illustration of these researches to non-specialists, and even to non-scientifists [fr

  15. Eighth Scientific Meeting of the Spanish Astronomical Society

    CERN Document Server

    Diego, Jose M; González-Serrano, J. Ignacio; Gorgas, Javier; Highlights of Spanish Astrophysics V

    2010-01-01

    This volume collects the invited contributions and plenary sessions presented at the Eighth Scientific Meeting of the Spanish Astronomical Society (Sociedad Española de Astronomía, SEA) held on July 7-11, 2008 in Santander. These contributions cover all fields of astronomy and astrophysics, i.e., the Sun and solar system, the galaxy and its components, galaxies and cosmology, observatories and instrumentation, as well as astronomy teaching and dissemination. Further plenary sessions were devoted to selected hot topics, including the exploration of the solar system, gravitational lensing, exoplanets, X-ray binaries, solar magnetism, gravitational waves, the ALHAMBRA collaboration, and the OSIRIS instrument on the new 10-m GTC. Abstracts of the contributions presented at the parallels sessions and posters are also included in the book. Complete versions of those papers are available online.

  16. Rate Adaptation Based on Collision Probability for IEEE 802.11 WLANs

    Science.gov (United States)

    Kim, Taejoon; Lim, Jong-Tae

    Nowadays IEEE 802.11 wireless local area networks (WLANs) support multiple transmission rates. To achieve the best performance, transmitting stations adopt the various forms of automatic rate fallback (ARF). However, ARF suffers from severe performance degradation as the number of transmitting stations increases. In this paper, we propose a new rate adaptation scheme which adjusts the ARF's up/down threshold according to the channel contention level. Simulation result shows that the proposed scheme achieves fairly good performance compared with the existing schemes.

  17. Comparison and Analysis of IEEE 344 and IEC 60980 standards for harmonization of seismic qualification of safety-related equipment

    International Nuclear Information System (INIS)

    Lee, Young Ok; Kim, Jong Seog; Seo, Jeong Ho; Kim, Myung Jun

    2011-01-01

    The seismic qualification of safety related equipment in nuclear power plants should demonstrate an equipment's ability to perform its safety function during/or after the time it is subjected to the forces resulting from one SSE. In addition, the equipment must withstand the effects of a number of OBEs, preceding the SSE. IEEE 344 and IEC 60980 present the criteria for establishing procedures demonstrating that the Class 1E equipment can meet its performance requirement during seismic events. Currently, IEEE 344 is used for regulation of nuclear power plant in the United State whereas IEC 60980 is mainly used in Europe. In particular, NPPs of France and China apply with RCC-E and GB that are domestic standards, respectively. Equipment supplier and Utility have difficulties because of different applicable standards. Equipment supplier to export S/R components/equipment to other standard area performs additional seismic qualification. For example, equipment are qualifies according to IEC 60980, RCC-E, GB although they have been qualified in accordance with IEEE 344. Also, utility to attempt power up-rate, life extension of NPP constructed under rules of RCC-E such as Ulchin NPP 1 and 2 has similar difficulties. RCC-E endorses IEC 60980 and GB is almost same as IEC 60980 except minor difference of earthquake environment definition. Therefore this paper surveys the similarities and differences between IEEE 344 and IEC 60980. In addition, this paper considers how the two sets of standards may be used in a complementary fashion to be possible using one or the other standard area

  18. Proceedings of the eighth Symposium of Atomic Energy Research

    International Nuclear Information System (INIS)

    Vidovszky, I.

    1998-10-01

    The present volume contains 53 papers, presented on the eighth Symposium of Atomic Energy Research, held in Bystrice nad Perstejnem, Czech Republic, 21-25 September 1998. The papers are presented in their original form, i. e. no corrections or modifications were carried out. The content of this volume is divided into thematic groups: Spectral and Core Calculation Methods, Core Design, Operation and Fuel Management, Core Monitoring, Surveillance and Testing, Neutron Kinetics and reactor Dynamics Methods, Safety Issues and Analysis, Rod Drop Reactivity Measurements, Criticality safety, Spent Fuel and Decommissioning, - according to the presentation sequence on the Symposium. At the end of the volume a list of the participants and an alphabetical author index is given as well

  19. Hydrogeological characterization of Back Forty area, Albany Research Center, Albany, Oregon

    International Nuclear Information System (INIS)

    Tsai, S.Y.; Smith, W.H.

    1983-12-01

    Radiological surveys were conducted to determine the potential migration of radionuclides from the waste area to the area commonly referred to as the Back Forty, located in the southern portion of the ARC site. The survey results indicated that parts of the Back Forty contain soils contaminated with uranium, thorium, and their associated decay products. A hydrogeologic characterization study was conducted at the Back Forty as part of an effort to more thoroughly assess radionuclide migration in the area. The objectives of the study were: (1) to define the soil characteristics and stratigraphy at the site, (2) to describe the general conditions of each geologic unit, and (3) to determine the direction and hydraulic gradient of areal groundwater flow. The site investigation activities included literature review of existing hydrogeological data for the Albany area, onsite borehold drilling, and measurement of groundwater levels. 7 references, 9 figures, 2 tables

  20. Comparison of Writing Anxiety and Writing Dispositions of Sixth, Seventh and Eighth Grade Students

    Science.gov (United States)

    Berk, Rifat Ramazan; Ünal, Emre

    2017-01-01

    The purpose of this study is to determine sixth, seventh and eighth grade students' writing anxiety and dispositions and to examine to what extent they predict each other. The basis of this study is to determine whether writing disposition is the significant predictor of writing anxiety or not and whether students' grade levels and genders are…

  1. Adaptive Backoff Algorithm for Contention Window for Dense IEEE 802.11 WLANs

    Directory of Open Access Journals (Sweden)

    Ikram Syed

    2016-01-01

    Full Text Available The performance improvement in IEEE 802.11 WLANs in widely fluctuating network loads is a challenging task. To improve the performance in this saturated state, we develop an adaptive backoff algorithm that maximizes the system throughput, reduces the collision probability, and maintains a high fairness for the IEEE 802.11 DCF under dense network conditions. In this paper, we present two main advantages of the proposed ABA-CW algorithm. First, it estimates the number of active stations and then calculates an optimal contention window based on the active station number. Each station calculates the channel state probabilities by observing the channel for the total backoff period. Based on these channel states probabilities, each station can estimate the number of active stations in the network, after which it calculates the optimal CW utilizing the estimated active number of stations. To evaluate the proposed mechanism, we derive an analytical model to determine the network performance. From our results, the proposed ABA-CW mechanism achieved better system performance compared to fixed-CW (BEB, EIED, LILD, and SETL and adaptive-CW (AMOCW, Idle Sense mechanisms. The simulation results confirmed the outstanding performance of the proposed mechanism in that it led to a lower collision probability, higher throughput, and high fairness.

  2. Cross-Layer Measurement on an IEEE 802.11g Wireless Network Supporting MPEG-2 Video Streaming Applications in the Presence of Interference

    Directory of Open Access Journals (Sweden)

    Alessandro Sona

    2010-01-01

    Full Text Available The performance of wireless local area networks supporting video streaming applications, based on MPEG-2 video codec, in the presence of interference is here dealt with. IEEE 802.11g standard wireless networks, that do not support QoS in according with IEEE 802.11e standard, are, in particular, accounted for and Bluetooth signals, additive white Gaussian noise, and competitive data traffic are considered as sources of interference. The goal is twofold: from one side, experimentally assessing and correlating the values that some performance metrics assume at the same time at different layers of an IEEE 802.11g WLAN delivering video streaming in the presence of in-channel interference; from the other side, deducing helpful and practical hints for designers and technicians, in order to efficiently assess and enhance the performance of an IEEE 802.11g WLAN supporting video streaming in some suitable setup conditions and in the presence of interference. To this purpose, an experimental analysis is planned following a cross-layer measurement approach, and a proper testbed within a semianechoic chamber is used. Valuable results are obtained in terms of signal-to-interference ratio, packet loss ratio, jitter, video quality, and interference data rate; helpful hints for designers and technicians are finally gained.

  3. A Fair Cooperative MAC Protocol in IEEE 802.11 WLAN

    Directory of Open Access Journals (Sweden)

    Seyed Davoud Mousavi

    2018-05-01

    Full Text Available Cooperative communication techniques have recently enabled wireless technologies to overcome their challenges. The main objective of these techniques is to improve resource allocation. In this paper, we propose a new protocol in medium access control (MAC of the IEEE 802.11 standard. In our new protocol, which is called Fair Cooperative MAC (FC-MAC, every relay node participates in cooperation proportionally to its provided cooperation gain. This technique improves network resource allocation by exploiting the potential capacity of all relay candidates. Simulation results demonstrate that the FC-MAC protocol presents better performance in terms of throughput, fairness, and network lifetime.

  4. IMITATION AGAINST ORIGINAL: CİNGÖZ RECAİ VERSUS SHERLOCK HOLMES TAKLİT ORİJİNALE KARŞI: CİNGÖZ RECAİ VERSUS SHERLOCK HOLMES

    Directory of Open Access Journals (Sweden)

    Seval ŞAHİN

    2011-01-01

    Full Text Available In this article is carried out Cingöz Recai against Sherlock Holmes, which is published in 1928 by Peyami Safa using penname Server Bedi by way of taking into consideration Homi Bhabba, René Girard, Fredric Jameson and Nurdan Gürbilek’s aproach on imitation and original. Cingöz Recai is brought a different approach on the relationship between imitation and original by strategy created by the author’s explanation about both the conflict of East-West and the imitation and original. Bu makalede Peyami Safa’nın Server Bedi takma adıyla yazdığı ve 1928 yılında yayımlanan Sherlock Holmes’e Karşı Cingöz Recai serileri üzerinde durulmuştur. İncelemede Homi Bhabba, René Girard, Fredric Jameson ve Nurdan Gürbilek’in taklit ve orijinal ilişkisine dair yaklaşımlarından faydalanılmıştır. Cingöz Recai, Türk edebiyatında taklit ve orijinal ilişkisine farklı bir yaklaşım getirmiştir. Bu yaklaşımda yazarın kahramanı üzerinden ortaya koyduğu strateji bir taraftan Doğu-Batı meselesini gündeme getirirken diğer taraftan taklit ve orijinal ilişkisini sorgulamaya açar.

  5. Forty Years of Excellence, 1946 to 1986. Volume XXXVIII

    National Research Council Canada - National Science Library

    1986-01-01

    ... at providing the base for future technology. But, of more lasting importance, ONR developed policies and procedures forty years ago which became the organizational models for the National Science Foundation and other research agencies involving...

  6. An Asynchronous IEEE Floating-Point Arithmetic Unit

    Directory of Open Access Journals (Sweden)

    Joel R. Noche

    2007-12-01

    Full Text Available An asynchronous floating-point arithmetic unit is designed and tested at the transistor level usingCadence software. It uses CMOS (complementary metal oxide semiconductor and DCVS (differentialcascode voltage switch logic in a 0.35 µm process using a 3.3 V supply voltage, with dual-rail data andsingle-rail control signals using four-phase handshaking.Using 17,085 transistors, the unit handles single-precision (32-bit addition/subtraction, multiplication,division, and remainder using the IEEE 754-1985 Standard for Binary Floating-Point Arithmetic, withrounding and other operations to be handled by separate hardware or software. Division and remainderare done using a restoring subtractive algorithm; multiplication uses an additive algorithm. Exceptionsare noted by flags (and not trap handlers and the output is in single-precision.Previous work on asynchronous floating-point arithmetic units have mostly focused on single operationssuch as division. This is the first work to the authors' knowledge that can perform floating-point addition,multiplication, division, and remainder using a common datapath.

  7. Television Viewing and Snacking Behaviors of Fourth- and Eighth-Grade Schoolchildren in Texas

    OpenAIRE

    Hoelscher, Deanna M.; Vader, Amanda M.; Walters, Scott T.; Harris, T. Robert

    2009-01-01

    Introduction Child and adolescent overweight is a serious health issue. Both snacking and television watching have been associated with childhood overweight, but the relationships have not been well examined in a multiethnic population. The aim of this study was to examine relationships between weekday television viewing, snack consumption, consumption of foods advertised on television, and overweight status of a multiethnic sample of fourth- and eighth-grade schoolchildren in Texas. Methods ...

  8. Performance characterization of the IEEE 802.11 signal transmission over a multimode fiber PON

    Science.gov (United States)

    Maksymiuk, L.; Siuzdak, J.

    2014-11-01

    In this paper there are presented measurements concerning performance analysis of the IEEE 802.11 signal distribution over multimode fiber based passive optical network. In the paper there are addressed three main sources of impairments: modal noise, frequency response fluctuation of the multimode fiber and non-linear distortion of the signal in the receiver.

  9. Multitemporal Very High Resolution From Space: Outcome of the 2016 IEEE GRSS Data Fusion Contest

    NARCIS (Netherlands)

    Mou, L.; Zhu, X.; Vakalopoulou, M.; Karantzalos, K.; Paragios, N.; Saux, Le B.; Moser, G.; Tuia, D.

    2017-01-01

    In this paper, the scientific outcomes of the 2016 Data Fusion Contest organized by the Image Analysis and Data Fusion Technical Committee of the IEEE Geoscience and Remote Sensing Society are discussed. The 2016 Contest was an open topic competition based on a multitemporal and multimodal dataset,

  10. Dynamic Contention Window Control Scheme in IEEE 802.11e EDCA-Based Wireless LANs

    Science.gov (United States)

    Abeysekera, B. A. Hirantha Sithira; Matsuda, Takahiro; Takine, Tetsuya

    In the IEEE 802.11 MAC protocol, access points (APs) are given the same priority as wireless terminals in terms of acquiring the wireless link, even though they aggregate several downlink flows. This feature leads to a serious throughput degradation of downlink flows, compared with uplink flows. In this paper, we propose a dynamic contention window control scheme for the IEEE 802.11e EDCA-based wireless LANs, in order to achieve fairness between uplink and downlink TCP flows while guaranteeing QoS requirements for real-time traffic. The proposed scheme first determines the minimum contention window size in the best-effort access category at APs, based on the number of TCP flows. It then determines the minimum and maximum contention window sizes in higher priority access categories, such as voice and video, so as to guarantee QoS requirements for these real-time traffic. Note that the proposed scheme does not require any modification to the MAC protocol at wireless terminals. Through simulation experiments, we show the effectiveness of the proposed scheme.

  11. French in Lesotho schools forty years after independence ...

    African Journals Online (AJOL)

    Most independent African states are now, like Lesotho, about forty years old. What has become of foreign languages such as French that once thrived under colonial rule albeit mostly in schools targeting non-indigenous learners? In Lesotho French seems to be the preserve of private or “international” schools. Can African ...

  12. Performance modeling of a two-tier primary-secondary network with IEEE 802.11 broadcast scheme

    KAUST Repository

    Khabazian, Mehdi

    2011-03-01

    In this paper, we study the performance of a two-tier primary-secondary network based on IEEE 802.11 broadcast scheme. We assume that a number of primary and secondary users coexist in the radio environment and share a single band. To protect the primary users\\' priority, the secondary users are allowed to contend for the channel only if they sense it idle for a certain sensing time. Considering an exponential packet inter-arrival time for the primary network, we model each primary user as an independent M/G/1 queue. Subsequently, we determine the primary users\\' average medium access delay in the presence of secondary users as well as the hybrid network\\'s throughput. Numerical results and discussions show the effects of parameters pertaining to the secondary users, such as as sensing time, packet payload size and population size, on the performance of the primary network. Furthermore, we provide simulation results which confirm the accuracy of the proposed analysis. © 2011 IEEE.

  13. Performance modeling of a two-tier primary-secondary network with IEEE 802.11 broadcast scheme

    KAUST Repository

    Khabazian, Mehdi; Aissa, Sonia; El Kefi, Rania

    2011-01-01

    In this paper, we study the performance of a two-tier primary-secondary network based on IEEE 802.11 broadcast scheme. We assume that a number of primary and secondary users coexist in the radio environment and share a single band. To protect the primary users' priority, the secondary users are allowed to contend for the channel only if they sense it idle for a certain sensing time. Considering an exponential packet inter-arrival time for the primary network, we model each primary user as an independent M/G/1 queue. Subsequently, we determine the primary users' average medium access delay in the presence of secondary users as well as the hybrid network's throughput. Numerical results and discussions show the effects of parameters pertaining to the secondary users, such as as sensing time, packet payload size and population size, on the performance of the primary network. Furthermore, we provide simulation results which confirm the accuracy of the proposed analysis. © 2011 IEEE.

  14. Summary of Professional Activities, Center for Intelligence and Special Programs. 1990

    Science.gov (United States)

    1991-06-01

    system engineering support to components of the intelligence community, particularly in the areas of networks, information security, artificial ...lintttpatev bioth -overnmnent andt (’ofliet - (Wia tet Iitulogy to atsV the’ needs 01 intelig ~ence analysis asqc to newh fin-med D~epartment ot (enten s Te...Similarity-Based Classilti- Packet Switching Technol- April 1990. cation," Eighth National ogy," 1190 IEEE Military Confeience on Artificial

  15. Eighth Grade In-Service Teachers' Knowledge of Proportional Reasoning and Functions: A Secondary Data Analysis

    Science.gov (United States)

    Masters, Jessica

    2012-01-01

    A secondary data analysis was conducted using a large dataset from a study related to online professional development for eighth grade teachers of mathematics. Using this data, the paper provides a snapshot of the current state of teachers' knowledge related to proportional reasoning and functions. The paper also considers how teachers' knowledge…

  16. Performance Analysis of IEEE 802.11g TCM Waveforms Transmitted over a Channel with Pulse-Noise Interference

    National Research Council Canada - National Science Library

    Drivas, Athanasios

    2007-01-01

    .... The application of TCM combines FEC coding and M-ary modulation in one operation. The objective of this thesis is to investigate the performance of an orthogonal frequency-division multiplexing (OFDM) based IEEE...

  17. Mathematical Analysis of EDCA's Performance on the Control Channel of an IEEE 802.11p WAVE Vehicular Network

    Directory of Open Access Journals (Sweden)

    Hussein T. Mouftah

    2010-01-01

    Full Text Available Wireless networks for vehicular environments are gaining increasing importance due to their ability to provide a means for stations on the roadside and radio units on board of vehicles to communicate and share safety-related information, thus reducing the probability of accidents and increasing the efficiency of the transportation system. With this goal in mind, the IEEE is currently developing the Wireless Access in Vehicular Environments (WAVE IEEE 802.11p standard. WAVE devices use the IEEE 802.11's Enhanced Distributed Channel Access (EDCA MAC protocol to compete for the transmission medium. This work proposes an analytical tool to evaluate the performance of EDCA under the specific conditions of the so-called control channel (CCH of a WAVE environment, including the particular EDCA parameter values and the fact that all safety-critical data frames are broadcasted. The protocol is modeled using Markov chains and results related to throughput, frame-error rate, buffer occupancy and delay are obtained under different traffic-load conditions. The main analysis is performed assuming that the CCH works continuously, and then an explanation is given as to the considerations that are needed to account for the fact that activity on the CCH is intermittent.

  18. IEEE 845 - a proposed guideline for use of human factors in design and retrofit design of nuclear power plants

    International Nuclear Information System (INIS)

    Schurman, D.L.

    1987-01-01

    This paper describes the development and content of the Institute of Electrical and Electronics Engineers (IEEE) Standard 845. This guide was developed by Working Group 7.2 of Subcommittee 7 of the Nuclear Power Engineering Committee of the Power Engineering Society of the IEEE. The guide has been approved by the Nuclear Power Engineering Committee (NPEC) and is now in the standards development and approval process. The guide is the first standards action approved by the NPEC of IEEE and is presented here to obtain wider peer response to its content. The guide provides a systematic framework for selection of human factors techniques and for the use of those techniques. The guide also provides a list of commonly used human factors techniques, along with a commentary about cost, ease of use, and other characteristics of each of the techniques. The guide is written with the project engineer and design engineer in mind. Thus, the guide attempts to provide a basis for the systematic selection of human factors techniques for various purposes and guidance regarding which of these techniques is likely to require the assistance of a human factors expert to apply

  19. IEEE Conference Record of 1980 Fourteenth Pulse Power Modulator Symposium, 3-5 June 1980.

    Science.gov (United States)

    1980-01-01

    Capacitor Discharges, Proc IEEE 113, p. able operation on Nova we are examing alter- 1549 (1966). nate switch gas (Ar:N 2 :SF 6 ) and electrode material...VOLTTA-KILOVOLTS PLATE VO LTAM --LOVLTS Figure 8. Constant Current Curve for the X2097U Figure 11. Constant Current Curve for the X2097V at 2000 Volt

  20. Reliable and Efficient Access for Alarm-initiated and Regular M2M Traffic in IEEE 802.11ah Systems

    DEFF Research Database (Denmark)

    Madueño, Germán Corrales; Stefanovic, Cedomir; Popovski, Petar

    2016-01-01

    IEEE 802.11ah is a novel WiFi-based protocol, aiming to provide an access solution for the machine-to-machine (M2M) communications. In this paper, we propose an adaptive access mechanism that can be seamlessly incorporated into IEEE 802.11ah protocol operation and that supports all potential M2M...... reporting regimes, which are periodic, on-demand and alarm reporting. The proposed access method is based a periodically re- occurring pool of time slots, whose size is proactively determined on the basis of the reporting activity in the cell. We show that it is possible to both efficiently and reliably...

  1. Development and results of a test program to demonstrate compliance with IEEE STD 384 and R.G. 1.75 electrical separation requirements

    International Nuclear Information System (INIS)

    Eckert, G.P.; Heneberry, E.F.; Walker, F.P.; Konkus, J.F.

    1987-01-01

    The IEEE Std 384-1974, entitled ''Criteria for Separation of Class 1E Equipment and Circuits,'' contains criteria to ensure the independence of redundant Class 1E equipment when designing electrical systems in nuclear plants. The NRC, in R.G. 1.75 Rev. 2, 1978, endorses, with comments, IEEE-384, as the means of achieving independence. One method given in IEEE-384, is that of maintaining a specified separation between components; another method utilizes a combination of separation and barriers. The standard also allows alternative methods to be used when justified by test-based analyses. This paper is a report of a test program undertaken to provide a basis for analysis in the development of alternative methods of achieving separation. The test parameters developed and used, and the results obtained, should prove useful in determining alternative methods of complying with R.G. 1.75 requirements

  2. Impacto de mecanismos de seguridad en sensores IEEE 802.15.4

    OpenAIRE

    Tripp Barba, Carolina; Casademont Serra, Jordi

    2009-01-01

    En la actualidad son muchos los mecanismos de seguridad que el estándar IEEE 802.15.4 permite a las redes inalámbricas de sensores [1] Dicho estándar define las especificaciones de la Capa de Acceso al Medio y la Capa Física de los dispositivos inalámbricos de área personal. La última revisión corresponde al 2006. Dichas revisiones y actualizaciones son hechas por el grupo de trabajo 802.15. Sin embargo estos mecanismos consumen recursos como memoria y batería, que son...

  3. Impact of cell load on 5GHz IEEE 802.11 WLAN

    OpenAIRE

    Abu-Tair, Mamoun; Bhatti, Saleem Noel

    2017-01-01

    We have conducted an empirical study of the latest 5GHz IEEE 802.11 wireless LAN (WLAN) variants of 802.11n (5GHz) and 802.11ac (Wave 1), under different cell load conditions. We have considered typical configurations of both protocols on a Linux testbed. Under light load,there is no clear difference between 802.11n and 802.11ac in terms of performance and energy consumption. However, in some cases of high cell load, we have found that there may be a small advantage with 802.11ac. Overall, we...

  4. Genetic concepts in Greek literature from the eighth to the fourth century B.C.

    Science.gov (United States)

    Bazopoulou-Kyrkanidou, E

    1992-03-01

    A review of the concepts of genetics found in epic, historical and dramatic ancient Greek writings from the eighth to the fourth centuries B.C., is presented. The derived data suggest that the development of genetical concepts and ideas started with the praise of the heroes' divine or noble origin in Homer's epic poems (eighth century B.C.). It continued in the tracing of the descent and vicissitudes of the families of the Greek gods and the common ancestry of the Greek tribes as described in Hesiod's genealogical poems (around 700 B.C.), in the statement of descent and dual parenthood of leaders and kings in the books of Herodotus and Xenophon (fifth and fourth centuries B.C.), and in the concern about the lineage of the tragic figures in Greek drama (fifth century B.C.). The genetical concepts expressed in these writings most probably reflected popular notions of that time. They must, therefore, have been the basis of the perceptions and theories on heredity and procreation expressed by the ancient physicians and philosophers in the fifth and fourth centuries B.C., which in turn influenced the development of genetics for many centuries.

  5. Eighth Planta Europa Conference «Save Plants for Earth's Future» (Kiev, Ukraine

    Directory of Open Access Journals (Sweden)

    Alexander N. Tashev

    2017-08-01

    Full Text Available This paper presents information about the Eighth Planta Europa Conference (Save plants for Earth's future (22–26 May 2017, Kiev, Ukraine. We presented brief data on the history of previous Planta Europa meetings. We presented general information about the main events of the Conference, its thematic areas represented by oral and poster presentations. Brief data on the number of participants, presentations and excursions into botanical gardens of Kiev are presented.

  6. Metaconceptually-Enhanced Simulation-Based Inquiry: Effects on Eighth Grade Students' Conceptual Change and Science Epistemic Beliefs

    Science.gov (United States)

    Huang, Kun; Ge, Xun; Eseryel, Deniz

    2017-01-01

    This study investigated the effects of metaconceptually-enhanced, simulation-based inquiry learning on eighth grade students' conceptual change in science and their development of science epistemic beliefs. Two experimental groups studied the topics of motion and force using the same computer simulations but with different simulation guides: one…

  7. The Performance Evaluation of an IEEE 802.11 Network Containing Misbehavior Nodes under Different Backoff Algorithms

    Directory of Open Access Journals (Sweden)

    Trong-Minh Hoang

    2017-01-01

    Full Text Available Security of any wireless network is always an important issue due to its serious impacts on network performance. Practically, the IEEE 802.11 medium access control can be violated by several native or smart attacks that result in downgrading network performance. In recent years, there are several studies using analytical model to analyze medium access control (MAC layer misbehavior issue to explore this problem but they have focused on binary exponential backoff only. Moreover, a practical condition such as the freezing backoff issue is not included in the previous models. Hence, this paper presents a novel analytical model of the IEEE 802.11 MAC to thoroughly understand impacts of misbehaving node on network throughput and delay parameters. Particularly, the model can express detailed backoff algorithms so that the evaluation of the network performance under some typical attacks through numerical simulation results would be easy.

  8. A pseudo differential Gm—C complex filter with frequency tuning for IEEE802.15.4 applications

    Science.gov (United States)

    Xin, Cheng; Lungui, Zhong; Haigang, Yang; Fei, Liu; Tongqiang, Gao

    2011-07-01

    This paper presents a CMOS Gm—C complex filter for a low-IF receiver of the IEEE 802.15.4 standard. A pseudo differential OTA with reconfigurable common mode feedback and common mode feed-forward is proposed as well as the frequency tuning method based on a relaxation oscillator. A detailed analysis of non-ideality of the OTA and the frequency tuning method is elaborated. The analysis and measurement results have shown that the center frequency of the complex filter could be tuned accurately. The chip was fabricated in a standard 0.35 μm CMOS process, with a single 3.3 V power supply. The filter consumes 2.1mA current, has a measured in-band group delay ripple of less than 0.16 μs and an IRR larger than 28 dB at 2 MHz apart, which could meet the requirements oftheIEEE802.15.4 standard.

  9. Controversy in the classroom: How eighth-grade and undergraduate students reason about tradeoffs of genetically modified food

    Science.gov (United States)

    Seethaler, Sherry Lynn

    Current issues in science provide a rich context for learning because they can involve complex tradeoffs that cut across traditional disciplinary boundaries. Despite this potential benefit, and the need for citizens to make decisions about such issues, science controversy remains rare in the classroom. Consequently, there is much unknown about how students make sense of complex, multidisciplinary science. This research examined eighth-grade (n = 190) and undergraduate (n = 9) students' reasoning about tradeoffs in the genetically modified food controversy (main study). To extend the findings from the main study, undergraduate students' reasoning was followed as they learned about ten additional science controversies (extension). The studies took place in the context of curricula designed on the basis of the Scaffolded Knowledge Integration Framework, which posits a set of design principles that help students form a rich, integrated network of ideas about a topic. Two new methodologies were developed for this work. The Embedded Perspective of Science Controversy was used to study students' integration of content in their written arguments (main study) and oral and written questions (extension). The Perspective views science controversy as a set of nested levels, where tradeoffs are one of the levels, but connecting to other levels (underlying scientific details, bigger picture context, etc.) is important for the weighing of tradeoffs. A scheme based on Toulmin's (1958) work on argumentation provided a way of comparing the structure of students' arguments. As indicated by pre and post test scores, the curriculum helped both eighth-grade students (t = 11.7, p genetically modified food. In their final papers, both eighth-grade and undergraduate students presented evidence for and against their positions, in contrast with prior literature showing individuals have difficulty coming up with evidence against their positions. The students were also moving across the levels

  10. Oldest Packet Drop (OPD): a Buffering Mechanism for Beaconing in IEEE 802.11p VANETs

    NARCIS (Netherlands)

    van Eenennaam, Martijn; Hendriks, Luuk; Karagiannis, Georgios; Heijenk, Geert

    2011-01-01

    The IEEE 802.11p MAC technology can be used to provide connectivity for real-time vehicle control known as Cooperative Adaptive Cruise Control. Due to the real-time nature of this system, it is paramount the delay of the received information is as small as possible. This paper researches the Oldest

  11. Interference Measurements in IEEE 802.11 Communication Links Due to Different Types of Interference Sources

    NARCIS (Netherlands)

    van Bloem, J.W.H.; Schiphorst, Roelof; Kluwer, Taco; Slump, Cornelis H.

    2012-01-01

    The number of wireless devices (smartphones, laptops, sensors) that use the 2.4 GHz ISM band is rapidly increasing. The most common communication system in this band is Wi-Fi (IEEE 802.11b/g/n). For that reason coexistence between Wi-Fi and other systems becomes more and more important. In this

  12. Throughput analysis of the IEEE 802.4 token bus standard under heavy load

    Science.gov (United States)

    Pang, Joseph; Tobagi, Fouad

    1987-01-01

    It has become clear in the last few years that there is a trend towards integrated digital services. Parallel to the development of public Integrated Services Digital Network (ISDN) is service integration in the local area (e.g., a campus, a building, an aircraft). The types of services to be integrated depend very much on the specific local environment. However, applications tend to generate data traffic belonging to one of two classes. According to IEEE 802.4 terminology, the first major class of traffic is termed synchronous, such as packetized voice and data generated from other applications with real-time constraints, and the second class is called asynchronous which includes most computer data traffic such as file transfer or facsimile. The IEEE 802.4 token bus protocol which was designed to support both synchronous and asynchronous traffic is examined. The protocol is basically a timer-controlled token bus access scheme. By a suitable choice of the design parameters, it can be shown that access delay is bounded for synchronous traffic. As well, the bandwidth allocated to asynchronous traffic can be controlled. A throughput analysis of the protocol under heavy load with constant channel occupation of synchronous traffic and constant token-passing times is presented.

  13. Do mathematics textbooks cultivate shallow teaching? Applying the TIMSS Video Study criteria to Australian eighth-grade mathematics textbooks

    Science.gov (United States)

    Vincent, Jill; Stacey, Kaye

    2008-04-01

    Australian eighth-grade mathematics lessons were shown by the 1999 TIMSS Video Study to use a high proportion of problems of low procedural complexity, with considerable repetition, and an absence of deductive reasoning. Using definitions from the Video Study, this study re-investigated this `shallow teaching syndrome' by examining the problems on three topics in nine eighth-grade textbooks from four Australian states for procedural complexity, type of solving processes, degree of repetition, proportion of `application' problems and proportion of problems requiring deductive reasoning. Overall, there was broad similarity between the characteristics of problems in the textbooks and in the Australian Video Study lessons. There were, however, considerable differences between textbooks and between topics within textbooks. In some books, including the best-selling textbooks in several states, the balance is too far towards repetitive problems of low procedural complexity.

  14. A pseudo differential Gm-C complex filter with frequency tuning for IEEE802.15.4 applications

    International Nuclear Information System (INIS)

    Cheng Xin; Yang Haigang; Liu Fei; Gao Tongqiang; Zhong Lungui

    2011-01-01

    This paper presents a CMOS G m -C complex filter for a low-IF receiver of the IEEE 802.15.4 standard. A pseudo differential OTA with reconfigurable common mode feedback and common mode feed-forward is proposed as well as the frequency tuning method based on a relaxation oscillator. A detailed analysis of non-ideality of the OTA and the frequency tuning method is elaborated. The analysis and measurement results have shown that the center frequency of the complex filter could be tuned accurately. The chip was fabricated in a standard 0.35 μm CMOS process, with a single 3.3 V power supply. The filter consumes 2.1mA current, has a measured in-band group delay ripple of less than 0.16 μs and an IRR larger than 28 dB at 2 MHz apart, which could meet the requirements oftheIEEE802.15.4 standard. (semiconductor integrated circuits)

  15. Evaluasi Kinerja IEEE 802.11e HCCA untuk Dukungan QoS pada WLAN Menggunakan NS-2

    Directory of Open Access Journals (Sweden)

    Amry Daulat Gultom

    2014-06-01

    Full Text Available Wireless Local Area Network (WLAN digunakan oleh trafik multimedia yang seharusnya memerlukan persyaratan jaringan yang lebih baik terhadap delay, jitter dan packet losses. IEEE 802.11 Task Group E memperkenalkan perbaikan protokol MAC 802.11, yaitu Hybrid Coordination Function (HCF, yang terdiri dari dua mekanisme akses: Enhanced Distributed Channel Access (EDCA dan HCF Controlled Channel Access (HCCA yang memberikan dukungan Kualitas Layanan/Quality of Service (QoS bagi trafik multimedia. Tujuan dari penelitian ini adalah untuk memahami algoritma protokol MAC IEEE 802.11e HCCA pada jaringan WLAN, dan menganalisis kinerja protokol MAC 802.11e HCCA pada aplikasi multimedia dengan menggunakan metode simulasi pada NS-2. Metrik kinerja yang diukur adalah jitter dan throughput-nya. Hasil penelitian ini menunjukkan bahwa protokol MAC HCCA dapat memberikan jaminan QoS dibanding protokol MAC DCF, dimana jitter HCCA lebih stabil dari pada jitter DCF. Begitupula dengan throughput HCCA yang tidak berubah selama trafik berlangsung, tidak seperti pada DCF yang masih mengalami fluktuasi yang besar.

  16. Performance analysis of the IEEE 802.16e power management for the initiations of awakening

    Institute of Scientific and Technical Information of China (English)

    2007-01-01

    To increase battery life in IEEE 802.16e systems, it is essential to efficiently manage energy in mobile stations. The sleep-mode operation in power management helps to increase the life of a station by saving energy consumption. In power management, there are two important performance metrics: energy consumption and the response delay of awakening medium access control (MAC) service data unit (SDU). While in a base station (BS) initiation of awakening, the two performance metrics should be simultaneously considered, in a mobile subscriber station (MSS) initiation of awakening, the response delay is not considered because it is self-operational. There performance metrics are affected by the minimum sleep interval (Tmin), the maximum sleep interval (Tmax), and the average interarrival time of awakening MAC SDUs (TI) during sleep-mode operation. Therefore, it is imperative to evaluate the two initiations of awakening depending on TI. To reach a fuller understanding of the performance, this paper shows an analytical mode and simulations results for the standard sleep-mode operation in the IEEE 802.16e MAC.

  17. Group-Orthogonal Code-Division Multiplex: A Physical-Layer Enhancement for IEEE 802.11n Networks

    Directory of Open Access Journals (Sweden)

    Felip Riera-Palou

    2010-01-01

    Full Text Available The new standard for wireless local area networks (WLANs, named IEEE 802.11n, has been recently released. This new norm builds upon and remains compatible with the previous WLANs standards IEEE 802.11a/g while it is able to achieve transmission rates of up to 600 Mbps. These increased data rates are mainly a consequence of two important new features: (1 multiple antenna technology at transmission and reception, and (2 optional doubling of the system bandwidth thanks to the availability of an additional 20 MHz band. This paper proposes the use of Group-Orthogonal Code Division Multiplex (GO-CDM as a means to improve the performance of the 802.11n standard by further exploiting the inherent frequency diversity. It is explained why GO-CDM synergistically matches with the two aforementioned new features and the performance gains it can offer under different configurations is illustrated. Furthermore, the effects that group-orthogonal has on key implementation issues such as channel estimation, carrier frequency offset, and peak-to-average power ratio (PAPR are also considered.

  18. 2008 Special NSREC Issue of the IEEE Transactions on Nuclear Science Comments by the Editors

    Science.gov (United States)

    Schwank, Jim; Buchner, Steve; Marshall, Paul; Duzellier, Sophie; Brown, Dennis; Poivey, Christian; Pease, Ron

    2008-12-01

    The December 2008 special issue of the IEEE Transactions on Nuclear Science contains selected papers from the 45th annual IEEE International Nuclear and Space Radiation Effects Conference (NSREC) held in Tucson, Arizona, July 14 - 18, 2008. Over 115 papers presented at the 2008 NSREC were submitted for consideration for this year's special issue. Those papers that appear in this special issue were able to successfully complete the review process before the deadline for the December issue. A few additional papers may appear in subsequent issues of the TRANSACTIONS. This publication is the premier archival journal for research on space and nuclear radiation effects in materials, devices, circuits, and systems. This distinction is the direct result of the conscientious efforts of both the authors, who present and document their work, and the reviewers, who selflessly volunteer their time and talent to help review the manuscripts. Each paper in this journal has been reviewed by experts selected by the editors for their expertise and knowledge of the particular subject areas.

  19. IEEE 802154 and ZigBee as enabling technologies for low-power wireless systems with quality-of-service constraints

    CERN Document Server

    Tennina, Stefano; Daidone, Roberta; Alves, Mário; Jurčík, Petr; Severino, Ricardo; Tiloca, Marco; Hauer, Jan-Hinrich; Pereira, Nuno; Dini, Gianluca; Bouroche, Mélanie; Tovar, Eduardo

    2013-01-01

    This book outlines the most important characteristics of IEEE 802.15.4 and ZigBee and how they can be used to engineer Wireless Sensor Network (WSN) systems and applications, with a particular focus on Quality-of-Service (QoS) aspects. It starts by providing a snapshot of the most relevant features of these two protocols, identifying some gaps in the standard specifications. Then it describes several state-of-the-art open-source implementations, models and tools that have been designed by the authors and have been widely used by the international community. The book also outlines the fundamental performance limits of IEEE 802.15.4/ZigBee networks, based on well-sustained analytical, simulation and experimental models, including how to dimension such networks to optimize delay/energy trade-offs.

  20. Basic security measures for IEEE 802.11 wireless networks

    Directory of Open Access Journals (Sweden)

    Oscar P. Sarmiento

    2008-05-01

    Full Text Available This article presents a tutorial/discussion of three commonly-used IEEE 802.11 wireless network security standards: WEP, WPA and WPA2. A detailed analysis of the RC4 algorithm supporting WEP is presented, including its vulnera-bilities. The WPA and WPA2 encryption protocols’ most relevant aspects and technical characteristics are reviewed for a comparative analysis of the three standards in terms of the security they provide. Special attention has been paid to WEP encryption by using an educational simulation tool written in C++ Builder for facilitating the unders-tanding of this protocol at academic level. Two practical cases of wireless security configurations using Cisco net-working equipment are also presented: configuring and enabling WPA-Personal and WPA2-Personal (these being security options used by TKIP and AES, respectively.

  1. Real-life IT architecture design reports and their relation to IEEE Std 1471 stakeholders and concerns

    NARCIS (Netherlands)

    van Vliet, H.; Koning, H.

    2006-01-01

    Architectural designs are an important means to manage the development and deployment of information technology (IT). Much debate has been going on about a proper definition of architecture in IT and about how to describe it. In 2000, the IEEE Std 1471 proposed a model of an architecture description

  2. Apoptosis Governs the Elimination of Schistosoma japonicum from the Non-Permissive Host Microtus fortis

    Science.gov (United States)

    Peng, Jinbiao; Gobert, Geoffrey N.; Hong, Yang; Jiang, Weibin; Han, Hongxiao; McManus, Donald P.; Wang, Xinzhi; Liu, Jinming; Fu, Zhiqiang; Shi, Yaojun; Lin, Jiaojiao

    2011-01-01

    The reed vole, Microtus fortis, is the only known mammalian host in which schistosomes of Schistosoma japonicum are unable to mature and cause significant pathogenesis. However, little is known about how Schistosoma japonicum maturation (and, therefore, the development of schistosomiasis) is prevented in M. fortis. In the present study, the ultrastructure of 10 days post infection schistosomula from BALB/c mice and M. fortis were first compared using scanning electron microscopy and transmission electron microscopy. Electron microscopic investigations showed growth retardation and ultrastructural differences in the tegument and sub-tegumental tissues as well as in the parenchymal cells of schistosomula from M. fortis compared with those in BALB/c mice. Then, microarray analysis revealed significant differential expression between the schistosomula from the two rodents, with 3,293 down-regulated (by ≥2-fold) and 71 up-regulated (≥2 fold) genes in schistosomula from the former. The up-regulated genes included a proliferation-related gene encoding granulin (Grn) and tropomyosin. Genes that were down-regulated in schistosomula from M. fortis included apoptosis-inhibited genes encoding a baculoviral IAP repeat-containing protein (SjIAP) and cytokine-induced apoptosis inhibitor (SjCIAP), genes encoding molecules involved in insulin metabolism, long-chain fatty acid metabolism, signal transduction, the transforming growth factor (TGF) pathway, the Wnt pathway and in development. TUNEL (terminal deoxynucleotidyl transferase dUTP nick end labeling) and PI/Annexin V-FITC assays, caspase 3/7 activity analysis, and flow cytometry revealed that the percentages of early apoptotic and late apoptotic and/or necrotic cells, as well as the level of caspase activity, in schistosomula from M. fortis were all significantly higher than in those from BALB/c mice. PMID:21731652

  3. 78 FR 55214 - Annual Marine Events in the Eighth Coast Guard District, Sabine River; Orange, TX

    Science.gov (United States)

    2013-09-10

    ... DEPARTMENT OF HOMELAND SECURITY Coast Guard 33 CFR Part 100 [Docket No. USCG-2013-0723] Annual Marine Events in the Eighth Coast Guard District, Sabine River; Orange, TX AGENCY: Coast Guard, DHS... Neches River in Orange, TX from 3 p.m. on September 20, 2013, through 6 p.m. on September 22, 2013. This...

  4. 77 FR 47519 - Annual Marine Events in the Eighth Coast Guard District, Sabine River; Orange, TX

    Science.gov (United States)

    2012-08-09

    ... DEPARTMENT OF HOMELAND SECURITY Coast Guard 33 CFR Part 100 [Docket No. USCG-2012-0656] Annual Marine Events in the Eighth Coast Guard District, Sabine River; Orange, TX AGENCY: Coast Guard, DHS... Regulations for the S.P.O.R.T. Power Boat Neches River in Orange, TX from 3 p.m. on September 21, 2012...

  5. Eighth annual meeting, Vienna, Austria, 15-18 April 1975. Summary report. Part III

    International Nuclear Information System (INIS)

    1976-01-01

    The Summary Report of the Eighth Annual Meeting of the International Working Group on Fast Reactors contains the minutes of the meeting (Part 1); papers which review the national programmes in the field of LMFBRs (Part 2) and the discussions on the review of national programmes (Part 3). The agenda of the meeting involved design, construction, operating experiences of demonstration fast power reactors, reprocessing of spent fuel from LMFBRs, reliability of decay heat removal systems, fuel failure mechanisms, safety of LMFBRs

  6. Eighth annual meeting, Vienna, Austria, 15-18 April 1975. Summary report. Part III

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    1976-01-01

    The Summary Report of the Eighth Annual Meeting of the International Working Group on Fast Reactors contains the minutes of the meeting (Part 1); papers which review the national programmes in the field of LMFBRs (Part 2) and the discussions on the review of national programmes (Part 3). The agenda of the meeting involved design, construction, operating experiences of demonstration fast power reactors, reprocessing of spent fuel from LMFBRs, reliability of decay heat removal systems, fuel failure mechanisms, safety of LMFBRs.

  7. Eighth annual meeting, Vienna, Austria, 15-18 April 1975. Summary report. Part I

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    1975-08-01

    The Summary Report of the Eighth Annual Meeting of the International Working Group on Fast Reactors contains the minutes of the meeting (Part 1); papers which review the national programmes in the field of LMFBRs (Part 2) and the discussions on the review of national programmes (Part 3). The agenda of the meeting involved design, construction, operating experiences of demonstration fast power reactors, reprocessing of spent fuel from LMFBRs, reliability of decay heat removal systems, fuel failure mechanisms, safety of LMFBRs.

  8. Eighth annual meeting, Vienna, Austria, 15-18 April 1975. Summary report. Part I

    International Nuclear Information System (INIS)

    1975-08-01

    The Summary Report of the Eighth Annual Meeting of the International Working Group on Fast Reactors contains the minutes of the meeting (Part 1); papers which review the national programmes in the field of LMFBRs (Part 2) and the discussions on the review of national programmes (Part 3). The agenda of the meeting involved design, construction, operating experiences of demonstration fast power reactors, reprocessing of spent fuel from LMFBRs, reliability of decay heat removal systems, fuel failure mechanisms, safety of LMFBRs

  9. Eighth CW and High Average Power RF Workshop

    CERN Document Server

    2014-01-01

    We are pleased to announce the next Continuous Wave and High Average RF Power Workshop, CWRF2014, to take place at Hotel NH Trieste, Trieste, Italy from 13 to 16 May, 2014. This is the eighth in the CWRF workshop series and will be hosted by Elettra - Sincrotrone Trieste S.C.p.A. (www.elettra.eu). CWRF2014 will provide an opportunity for designers and users of CW and high average power RF systems to meet and interact in a convivial environment to share experiences and ideas on applications which utilize high-power klystrons, gridded tubes, combined solid-state architectures, high-voltage power supplies, high-voltage modulators, high-power combiners, circulators, cavities, power couplers and tuners. New ideas for high-power RF system upgrades and novel ways of RF power generation and distribution will also be discussed. CWRF2014 sessions will start on Tuesday morning and will conclude on Friday lunchtime. A visit to Elettra and FERMI will be organized during the workshop. ORGANIZING COMMITTEE (OC): Al...

  10. The TIMSS Videotape Classroom Study: Methods and Findings from an Exploratory Research Project on Eighth-Grade Mathematics Instruction in Germany, Japan, and the United States. A Research and Development Report.

    Science.gov (United States)

    Stigler, James W.; Gonzales, Patrick; Kwanaka, Takako; Knoll, Steffen; Serrano, Ana

    This report presents the methods and preliminary findings of the Videotape Classroom Study, a video study of eighth-grade mathematics lessons in Germany, Japan, and the United States. This exploratory research project is part of the Third International Mathematics and Science Study (TIMSS). The study included 231 eighth-grade mathematics…

  11. IEEE standard requirements for reliability analysis in the design and operation of safety systems for nuclear power generating stations

    International Nuclear Information System (INIS)

    Anon.

    1976-01-01

    The purpose of this standard is to provide uniform, minimum acceptable requirements for the performance of reliability analyses for safety-related systems found in nuclear-power generating stations, but not to define the need for an analysis. The need for reliability analysis has been identified in other standards which expand the requirements of regulations (e.g., IEEE Std 379-1972 (ANSI N41.2-1972), ''Guide for the Application of the Single-Failure Criterion to Nuclear Power Generating Station Protection System,'' which describes the application of the single-failure criterion). IEEE Std 352-1975, ''Guide for General Principles of Reliability Analysis of Nuclear Power Generating Station Protection Systems,'' provides guidance in the application and use of reliability techniques referred to in this standard

  12. Mathematical modeling of a radio-frequency path for IEEE 802.11ah based wireless sensor networks

    Science.gov (United States)

    Tyshchenko, Igor; Cherepanov, Alexander; Dmitrii, Vakhnin; Popova, Mariia

    2017-09-01

    This article discusses the process of creating the mathematical model of a radio-frequency path for an IEEE 802.11ah based wireless sensor networks using M atLab Simulink CAD tools. In addition, it describes occurring perturbing effects and determining the presence of a useful signal in the received mixture.

  13. Connectivity-Based Reliable Multicast MAC Protocol for IEEE 802.11 Wireless LANs

    Directory of Open Access Journals (Sweden)

    Woo-Yong Choi

    2009-01-01

    Full Text Available We propose the efficient reliable multicast MAC protocol based on the connectivity information among the recipients. Enhancing the BMMM (Batch Mode Multicast MAC protocol, the reliable multicast MAC protocol significantly reduces the RAK (Request for ACK frame transmissions in a reasonable computational time and enhances the MAC performance. By the analytical performance analysis, the throughputs of the BMMM protocol and our proposed MAC protocol are derived. Numerical examples show that our proposed MAC protocol increases the reliable multicast MAC performance for IEEE 802.11 wireless LANs.

  14. Distributed Fair Access Point Selection for Multi-Rate IEEE 802.11 WLANs

    Science.gov (United States)

    Gong, Huazhi; Nahm, Kitae; Kim, Jongwon

    In IEEE 802.11 networks, the access point (AP) selection based on the strongest signal strength often results in the extremely unfair bandwidth allocation among mobile users (MUs). In this paper, we propose a distributed AP selection algorithm to achieve a fair bandwidth allocation for MUs. The proposed algorithm gradually balances the AP loads based on max-min fairness for the available multiple bit rate choices in a distributed manner. We analyze the stability and overhead of the proposed algorithm, and show the improvement of the fairness via computer simulation.

  15. Conference Proceedings for 1997 IEEE 24th International Conference on Plasma Sciences, 19 - 22 May 1997, San Diego, California

    National Research Council Canada - National Science Library

    Hyman, Julius

    1997-01-01

    This 360 page softbound publication includes the following major sections, An invitation to ICOPS'97, Catamaran Resort Hotel Floor Pinas, Officers of the IEEE Nuclear and Plasma Sciences Society, Conference Information...

  16. 77 FR 37318 - Eighth Coast Guard District Annual Safety Zones; Sound of Independence; Santa Rosa Sound; Fort...

    Science.gov (United States)

    2012-06-21

    ...-AA00 Eighth Coast Guard District Annual Safety Zones; Sound of Independence; Santa Rosa Sound; Fort... Coast Guard will enforce a Safety Zone for the Sound of Independence event in the Santa Rosa Sound, Fort... during the Sound of Independence. During the enforcement period, entry into, transiting or anchoring in...

  17. 78 FR 77359 - Eighth Coast Guard District Annual Safety Zones; New Year's Eve Celebration/City of Mobile...

    Science.gov (United States)

    2013-12-23

    ...-AA00 Eighth Coast Guard District Annual Safety Zones; New Year's Eve Celebration/City of Mobile; Mobile Channel; Mobile, AL AGENCY: Coast Guard, DHS. ACTION: Temporary final rule. SUMMARY: The Coast Guard will enforce the City of Mobile New Year's Eve Celebration safety zone in the Mobile Channel, Mobile, AL from...

  18. THE ROLE OF THE BISHOPS OF ASIA MINOR IN THE DIFFUSION OF ICONOCLASM DURING THE EIGHTH CENTURY IN BYZANTIUM

    Directory of Open Access Journals (Sweden)

    Sergey Zaplatnikov

    2013-08-01

    Full Text Available This article is concerned with one of the most discussed problem in the history of Byzantium regarding the origin and circumstances of the appearance of iconoclasm in the eighth century. The author studies the contradiction between the early and later sources about the role of the bishops in Asia Minor in the diffusion of the iconoclastic heresy, particularly that of Bishop Constantine of Nacolea. The agenda of the Eighth Ecumenical Council, in which Constantine is described as the major heresiarch of iconoclasm, serve as a primary later source. On the other hand, earlier sources include the epistles of Germanos I of Constantinople, which indicate the Orthodoxy of this hierarch particularly regarding the icons and their veneration. An apparent contradiction in historiography is usually resolved by means of an examination of still another work of Germanos, his tractate On Heresies and the Councils, the contents of which directly prove the guilt of Constantine of Nacolea in diffusing the heresy. But an analysis of this work clearly shows that Germanos was not really its author. But, on the other hand, Constantine of Nicolea is deliberately portrayed in this work as the person responsible for the diffusion of the heresy, in order to absolve from guilt, the real perpetrators, the Emperors Leo III and Constantine V of the Isaurian Dynasty, the descendants of whom emerged as the initiators of the Eighth Ecumenical Council and, paradoxically, the victorious conquerors of the Iconoclastic Heresy

  19. Exact Solutions of Generalized Modified Boussinesq, Kuramoto-Sivashinsky, and Camassa-Holm Equations via Double Reduction Theory

    Directory of Open Access Journals (Sweden)

    Zulfiqar Ali

    2013-01-01

    Full Text Available We find exact solutions of the Generalized Modified Boussinesq (GMB equation, the Kuromoto-Sivashinsky (KS equation the and, Camassa-Holm (CH equation by utilizing the double reduction theory related to conserved vectors. The fourth order GMB equation involves the arbitrary function and mixed derivative terms in highest derivative. The partial Noether’s approach yields seven conserved vectors for GMB equation and one conserved for vector KS equation. Due to presence of mixed derivative term the conserved vectors for GMB equation derived by the Noether like theorem do not satisfy the divergence relationship. The extra terms that constitute the trivial part of conserved vectors are adjusted and the resulting conserved vectors satisfy the divergence property. The double reduction theory yields two independent solutions and one reduction for GMB equation and one solution for KS equation. For CH equation two independent solutions are obtained elsewhere by double reduction theory with the help of conserved Vectors.

  20. Analytic Approximations for Soliton Solutions of Short-Wave Models for Camassa-Holm and Degasperis-Procesi Equations

    International Nuclear Information System (INIS)

    Yang Pei; Li Zhibin; Chen Yong

    2010-01-01

    In this paper, the short-wave model equations are investigated, which are associated with the Camassa-Holm (CH) and Degasperis-Procesi (DP) shallow-water wave equations. Firstly, by means of the transformation of the independent variables and the travelling wave transformation, the partial differential equation is reduced to an ordinary differential equation. Secondly, the equation is solved by homotopy analysis method. Lastly, by the transformations back to the original independent variables, the solution of the original partial differential equation is obtained. The two types of solutions of the short-wave models are obtained in parametric form, one is one-cusp soliton for the CH equation while the other one is one-loop soliton for the DP equation. The approximate analytic solutions expressed by a series of exponential functions agree well with the exact solutions. It demonstrates the validity and great potential of homotopy analysis method for complicated nonlinear solitary wave problems. (general)

  1. 4th IEEE/ACIS International Conference on Computer and Information Science

    CERN Document Server

    2016-01-01

    This edited book presents scientific results of the 14th IEEE/ACIS International Conference on Computer and Information Science (ICIS 2015) which was held on June 28 – July 1, 2015 in Las Vegas, USA. The aim of this conference was to bring together researchers and scientists, businessmen and entrepreneurs, teachers, engineers, computer users, and students to discuss the numerous fields of computer science and to share their experiences and exchange new ideas and information in a meaningful way. Research results about all aspects (theory, applications and tools) of computer and information science, and to discuss the practical challenges encountered along the way and the solutions adopted to solve them.

  2. Latency and Jitter Analysis for IEEE 802.11e Wireless LANs

    Directory of Open Access Journals (Sweden)

    Sungkwan Youm

    2013-01-01

    Full Text Available This paper presents a numerical analysis of latency and jitter for IEEE 802.11e wireless local area networks (WLANs in a saturation condition, by using a Markov model. We use this model to explicate how the enhanced distributed coordination function (EDCF differentiates classes of service and to characterize the probability distribution of the medium access control (MAC layer packet latency and jitter, on which the quality of the voice over Internet protocol (VoIP calls is dependent. From the proposed analytic model, we can estimate the available number of nodes determining the system performance, in order to satisfy user demands on the latency and jitter.

  3. Scattered light characterization of FORTIS

    Science.gov (United States)

    McCandliss, Stephan R.; Carter, Anna; Redwine, Keith; Teste, Stephane; Pelton, Russell; Hagopian, John; Kutyrev, Alexander; Li, Mary J.; Moseley, S. Harvey

    2017-08-01

    We describe our efforts to build a Wide-Field Lyman alpha Geocoronal simulator (WFLaGs) for characterizing the end-to-end sensitivity of FORTIS (Far-UV Off Rowland-circle Telescope for Imaging and Spectroscopy) to scattered Lyman α emission from outside of the nominal (1/2 degree)2 field-of-view. WFLaGs is a 50 mm diameter F/1 aluminum parabolic collimator fed by a hollow cathode discharge lamp with a 80 mm clear MgF2 window housed in a vacuum skin. It creates emission over a 10 degree FOV. WFLaGS will allow us to validate and refine a recently developed scattered light model and verify our scatter light mitigation strategies, which will incorporate low scatter baffle materials, and possibly 3-d printed light traps, covering exposed scatter centers. We present measurements of scattering intensity of Lyman alpha as a function of angle with respect to the specular reflectance direction for several candidate baffle materials. Initial testing of WFLaGs will be described.

  4. Forty cases of maxillary sinus carcinoma

    Energy Technology Data Exchange (ETDEWEB)

    Tanaka, Go; Yamada, Shoichiro; Sawatsubashi, Motohiro; Miyazaki, Junji; Tsuda, Kuniyoshi; Inokuchi, Akira [Saga Medical School (Japan)

    2002-01-01

    Forty patients with squamous cell carcinoma in the maxillary sinus were investigated between 1989 and 1999. They consisted of 28 males and 12 females. Their ages ranged from 18 to 84 years (mean 62 years). According to the 1987 UICC TNM classification system, 3 patients were classified as stage II, 3 were stage III and 34 were stage IV. The overall three-year and five-year survival rates were 52% and 44%, respectively. Local recurrence was observed in 11 stage IV cases and 10 of them were not controlled. For further improving the prognosis of such patients, new techniques such as skull base surgery, super selective intraarterial chemotherapy, and concurrent chemo-radiation should be included in the treatment regimen. (author)

  5. An Adaptive Medium Access Parameter Prediction Scheme for IEEE 802.11 Real-Time Applications

    Directory of Open Access Journals (Sweden)

    Estefanía Coronado

    2017-01-01

    Full Text Available Multimedia communications have experienced an unprecedented growth due mainly to the increase in the content quality and the emergence of smart devices. The demand for these contents is tending towards wireless technologies. However, these transmissions are quite sensitive to network delays. Therefore, ensuring an optimum QoS level becomes of great importance. The IEEE 802.11e amendment was released to address the lack of QoS capabilities in the original IEEE 802.11 standard. Accordingly, the Enhanced Distributed Channel Access (EDCA function was introduced, allowing it to differentiate traffic streams through a group of Medium Access Control (MAC parameters. Although EDCA recommends a default configuration for these parameters, it has been proved that it is not optimum in many scenarios. In this work a dynamic prediction scheme for these parameters is presented. This approach ensures an appropriate traffic differentiation while maintaining compatibility with the stations without QoS support. As the APs are the only devices that use this algorithm, no changes are required to current network cards. The results show improvements in both voice and video transmissions, as well as in the QoS level of the network that the proposal achieves with regard to EDCA.

  6. Vispubdata.org: A Metadata Collection About IEEE Visualization (VIS) Publications.

    Science.gov (United States)

    Isenberg, Petra; Heimerl, Florian; Koch, Steffen; Isenberg, Tobias; Xu, Panpan; Stolper, Charles D; Sedlmair, Michael; Chen, Jian; Moller, Torsten; Stasko, John

    2017-09-01

    We have created and made available to all a dataset with information about every paper that has appeared at the IEEE Visualization (VIS) set of conferences: InfoVis, SciVis, VAST, and Vis. The information about each paper includes its title, abstract, authors, and citations to other papers in the conference series, among many other attributes. This article describes the motivation for creating the dataset, as well as our process of coalescing and cleaning the data, and a set of three visualizations we created to facilitate exploration of the data. This data is meant to be useful to the broad data visualization community to help understand the evolution of the field and as an example document collection for text data visualization research.

  7. Simple Adaptive Single Differential Coherence Detection of BPSK Signals in IEEE 802.15.4 Wireless Sensor Networks.

    Science.gov (United States)

    Zhang, Gaoyuan; Wen, Hong; Wang, Longye; Xie, Ping; Song, Liang; Tang, Jie; Liao, Runfa

    2017-12-26

    In this paper, we propose an adaptive single differential coherent detection (SDCD) scheme for the binary phase shift keying (BPSK) signals in IEEE 802.15.4 Wireless Sensor Networks (WSNs). In particular, the residual carrier frequency offset effect (CFOE) for differential detection is adaptively estimated, with only linear operation, according to the changing channel conditions. It was found that the carrier frequency offset (CFO) and chip signal-to-noise ratio (SNR) conditions do not need a priori knowledge. This partly benefits from that the combination of the trigonometric approximation sin - 1 ( x ) ≈ x and a useful assumption, namely, the asymptotic or high chip SNR, is considered for simplification of the full estimation scheme. Simulation results demonstrate that the proposed algorithm can achieve an accurate estimation and the detection performance can completely meet the requirement of the IEEE 802.15.4 standard, although with a little loss of reliability and robustness as compared with the conventional optimal single-symbol detector.

  8. Perlecan and basement membrane-chondroitin sulfate proteoglycan (bamacan) are two basement membrane chondroitin/dermatan sulfate proteoglycans in the Engelbreth-Holm-Swarm tumor matrix

    DEFF Research Database (Denmark)

    Couchman, J R; Kapoor, R; Sthanam, M

    1996-01-01

    heparan sulfate proteoglycan, widespread in many basement membranes and connective tissues. We now identify two distinct proteoglycan species from this tumor source, which are substituted with galactosaminoglycans and which show basement membrane localization by immunohistochemistry. One species......The presence of proteoglycans bearing galactosaminoglycan chains has been reported, but none has been identified previously in the matrix of the Engelbreth-Holm-Swarm tumor, which is a source of several basement membrane components. This tumor matrix contains perlecan, a large, low buoyant density......-CSPG are distinct in core protein structure. Both are, however, basement membrane components, although there are tissue-specific differences in their distribution....

  9. BabelFish-Tools for IEEE C37.118.2-compliant real-time synchrophasor data mediation

    Science.gov (United States)

    Almas, M. S.; Vanfretti, L.; Baudette, M.

    BabelFish (BF) is a real-time data mediator for development and fast prototyping of synchrophasor applications. BF is compliant with the synchrophasor data transmission IEEE Std C37.118.2-2011. BF establishes a TCP/IP connection with any Phasor Measurement Unit (PMU) or Phasor Data Concentrator (PDC) stream and parses the IEEE Std C37.118.2-2011 frames in real-time to provide access to raw numerical data in the LabVIEW environment. Furthermore, BF allows the user to select "data-of-interest" and transmit it to either a local or remote application using the User Datagram Protocol (UDP) in order to support both unicast and multicast communication. In the power systems Wide Area Monitoring Protection and Control (WAMPAC) domain, BF provides the first Free/Libre and Open Source Software (FLOSS) for the purpose of giving the users tools for fast prototyping of new applications processing PMU measurements in their chosen environment, thus liberating them of time consuming synchrophasor data handling and allowing them to develop applications in a modular fashion, without a need of a large and monolithic synchrophasor software environment.

  10. ANÁLISE DE DESEMPENHO EM REDES IEEE 802.3 APLICADO PARA SISTEMA DE TEMPO REAL

    Directory of Open Access Journals (Sweden)

    Ricardo Alexsandro de Medeiros Valentim

    2011-06-01

    Full Text Available A tecnologia Ethernet domina o mercado de rede local de computadores. No entanto, não foi estabelecida como uma tecnologia para automação industrial, onde o determinismo procura os requisitos com um desempenho de tempo real. Muitas soluções têm sido propostas para resolver o problema do determinismo não, que se baseiam principalmente no TDMA (acesso múltiplo por divisão de tempo, passagem de token e mestre-escravo. É neste contexto que este trabalho é realizado, através de medidas de desempenho em redes de comunicação que utilizam o padrão IEEE 802.3, observando o comportamento destas redes, quando submetidos a diferentes cenários de sobrecarga. Para isso, as variações foram aprovadas em ambiente de teste, que será baseado em Shared Ethernet (Hub, Ethernet e Ethernet Switch com prioridade (IEEE 802.1Q. Desta forma, é possível indicar quais os dispositivos analisados pelos testes de desempenho demonstrado um comportamento mais adequado para suportar as aplicações com requisitos de tempo real.

  11. Low-cost RAU with Optical Power Supply Used in a Hybrid RoF IEEE 802.11 Network

    Science.gov (United States)

    Kowalczyk, M.; Siuzdak, J.

    2014-09-01

    The paper presents design and implementation of a low-cost RAU (Remote Antenna Unit) device. It was designed to work in a hybrid Wi-Fi/optical network based on the IEEE 802.11b/g standard. An unique feature of the device is the possibility of optical power supply.

  12. Open Data for Global Multimodal Land Use Classification: Outcome of the 2017 IEEE GRSS Data Fusion Contest

    NARCIS (Netherlands)

    Yokoya, Naoto; Ghamisi, Pedram; Xia, Junshi; Sukhanov, Sergey; Heremans, Roel; Tankoyeu, Ivan; Bechtel, Benjamin; Saux, Le Bertrand; Moser, Gabriele; Tuia, Devis

    2018-01-01

    In this paper, we present the scientific outcomes of the 2017 Data Fusion Contest organized by the Image Analysis and Data Fusion Technical Committee of the IEEE Geoscience and Remote Sensing Society. The 2017 Contest was aimed at addressing the problem of local climate zones classification based on

  13. INCLUSIÓN DE CORRELACIONES TEMPORALES CON DEPENDENCIA A LARGO PLAZO Y PATRONES AUTOSIMILARES EN MODELOS DE REDES IEEE 802.3 INCLUSION OF LONG-RANGE-DEPENDENT TEMPORARY CORRELATIONS AND SELF-SIMILAR PATTERNS IN IEEE 802.3 NETWORKS MODELS

    Directory of Open Access Journals (Sweden)

    Ginno Millán Naveas

    2010-04-01

    Full Text Available En este trabajo se presentan los fundamentos de un proyecto de investigación sobre el modelado de redes de computadoras con mecanismo de control de acceso al medio, según el estándar IEEE 802.3-2005, empleando los postulados de la teoría de conjuntos autosimilares para establecer el nivel de impacto que poseen las correlaciones temporales con dependencia de largo alcance sobre el rendimiento de tales redes. Se postula una nueva forma de estimar grados de autosimilaridad basada en una variación del estimador de Whittle.The foundation of a research project about a model of computer networks with media access control mechanism based on the IEEE standard 802.3-2005 is presented. The model draws from the theory of self-similar sets for establishing the impact level that the long-range-dependent temporary correlations have on the performance of such networks. A new method for the estimation of self-similar levels based on a variation of the Whittle estimator is postulated.

  14. A generalized auxiliary equation method and its application to nonlinear Klein-Gordon and generalized nonlinear Camassa-Holm equations

    International Nuclear Information System (INIS)

    Yomba, Emmanuel

    2008-01-01

    With the aid of symbolic computation, a generalized auxiliary equation method is proposed to construct more general exact solutions to two types of NLPDEs. First, we present new family of solutions to a nonlinear Klein-Gordon equation, by using this auxiliary equation method including a new first-order nonlinear ODE with six-degree nonlinear term proposed by Sirendaoreji. Then, we apply an indirect F-function method very close to the F-expansion method to solve the generalized Camassa-Holm equation with fully nonlinear dispersion and fully nonlinear convection C(l,n,p). Taking advantage of the new first-order nonlinear ODE with six degree nonlinear term, this indirect F-function method is used to map the solutions of C(l,n,p) equations to those of that nonlinear ODE. As a result, we can successfully obtain in a unified way, many exact solutions

  15. IEEE guide for general principles of reliability analysis of nuclear power generating station protection systems

    International Nuclear Information System (INIS)

    Anon.

    1975-01-01

    Presented is the Institute of Electrical and Electronics Engineers, Inc. (IEEE) guide for general principles of reliability analysis of nuclear power generating station protection systems. The document has been prepared to provide the basic principles needed to conduct a reliability analysis of protection systems. Included is information on qualitative and quantitative analysis, guides for failure data acquisition and use, and guide for establishment of intervals

  16. Analyzing the Engineering Educational Research in Spain: A Global Vision through the Awards of CESEI-IEEE

    Science.gov (United States)

    Plaza, I.; Arcega, F.; Castro, M.; Llamas, M.

    2011-01-01

    CESEI is the acronym of the Spanish Chapter of the Education Society of IEEE (the Institute of Electric and Electronics Engineers). Every year, the CESEI awards a prize for the best doctoral thesis and FDP (final (master) degree projects) about education. The thesis or the project must be developed in the areas of electrical engineering,…

  17. Analysis of Radio communication solutions in small and isolated communities under the IEEE 802.22 standard

    OpenAIRE

    Arroyo Arzubi, Alejandro; Castro Lechtaler, Antonio; Foti, Antonio Roberto; Fusario, Rubén J.; García Guibout, Jorge; Sens, Lorena

    2013-01-01

    In recent years the use of wireless communications has increased significantly. Rural communities without cable network communication have found a solution in wireless technologies. Based on previous fieldwork, this paper analyzes software development of integration based technologies for communication equipment. It focuses on the feasibility of the IEEE 802.22 standard as a solution to the wireless problem.

  18. A time-based admission control mechanism for IEEE 802.11 ad Hoc networks

    OpenAIRE

    Costa, Luís Henrique M. K.; Cerveira, Carlos Rodrigo

    2006-01-01

    This paper presents a time-based admission control mechanism (TAC) for IEEE 802.11 ad hoc networks. The proposed mechanism was adapted to the QoS AODV routing protocol, which takes the quality of service requirements of the data flow into account in the route discovery process. TAC-AODV estimates the idle time of the physical medium based on the frames listened. The incoming traffic is admitted according to the offered load as well as the intra-flow interference, calculated based on the numbe...

  19. The Eighth Central European Conference “Chemistry towards Biology”: Snapshot†

    Science.gov (United States)

    Perczel, András; Atanasov, Atanas G.; Sklenář, Vladimír; Nováček, Jiří; Papoušková, Veronika; Kadeřávek, Pavel; Žídek, Lukáš; Kozłowski, Henryk; Watły, Joanna; Hecel, Aleksandra; Kołkowska, Paulina; Koča, Jaroslav; Svobodová-Vařeková, Radka; Pravda, Lukáš; Sehnal, David; Horský, Vladimír; Geidl, Stanislav; Enriz, Ricardo D.; Matějka, Pavel; Jeništová, Adéla; Dendisová, Marcela; Kokaislová, Alžběta; Weissig, Volkmar; Olsen, Mark; Coffey, Aidan; Ajuebor, Jude; Keary, Ruth; Sanz-Gaitero, Marta; van Raaij, Mark J.; McAuliffe, Olivia; Waltenberger, Birgit; Mocan, Andrei; Šmejkal, Karel; Heiss, Elke H.; Diederich, Marc; Musioł, Robert; Košmrlj, Janez; Polanński, Jarosław; Jampílek, Josef

    2017-01-01

    The Eighth Central European Conference “Chemistry towards Biology” was held in Brno, Czech Republic, on 28 August–1 September 2016 to bring together experts in biology, chemistry and design of bioactive compounds; promote the exchange of scientific results, methods and ideas; and encourage cooperation between researchers from all over the world. The topics of the conference covered “Chemistry towards Biology”, meaning that the event welcomed chemists working on biology-related problems, biologists using chemical methods, and students and other researchers of the respective areas that fall within the common scope of chemistry and biology. The authors of this manuscript are plenary speakers and other participants of the symposium and members of their research teams. The following summary highlights the major points/topics of the meeting. PMID:27763518

  20. Editorial for IEEE Transactions on Power Electronics, January 2013

    DEFF Research Database (Denmark)

    Blaabjerg, Frede; Lehman, Brad

    2013-01-01

    should increase the impact factor of the IEEE TRANSACTIONS ON POWER ELECTRONICS (TPEL). In 2007, TPEL published 2600 pages, and it has gradually been increased to 4000 pages in 2011, 5000 pages in 2012, and 5500 pages are projected for 2013. We have decided to publish 12 printed issues so every month...... a new issue will be printed. A graph is provided showing the number of regular papers received in the past years as well as the number of published pages in the TPEL. Finally they note that in 2008, TPEL obtained a record high value for the impact factor (as shown in a figure) but in 2009 it was reduced...... the papers to be read over a longer time span; 2) Web of Science (ISI Thomsen Reuter) began to register new power electronics conferences in their database, and citations from conferences counts and contributes to a higher impact factor....