WorldWideScience

Sample records for gridftp protocol richard

  1. A GridFTP transport driver for Globus XIO

    International Nuclear Information System (INIS)

    Kettimuthu, R.; Wantao, L.; Link, J.; Bresnahan, J.

    2008-01-01

    GridFTP is a high-performance, reliable data transfer protocol optimized for high-bandwidth wide-area networks. Based on the Internet FTP protocol, it defines extensions for high-performance operation and security. The Globus implementation of GridFTP provides a modular and extensible data transfer system architecture suitable for wide area and high-performance environments. GridFTP is the de facto standard in projects requiring secure, robust, high-speed bulk data transport. For example, the high energy physics community is basing its entire tiered data movement infrastructure for the Large Hadron Collider computing Grid on GridFTP; the Laser Interferometer Gravitational Wave Observatory routinely uses GridFTP to move 1 TB a day during production runs; and GridFTP is the recommended data transfer mechanism to maximize data transfer rates on the TeraGrid. Commonly used GridFTP clients include globus-url-copy, uberftp, and the Globus Reliable File Transfer service. In this paper, we present a Globus XIO based client to GridFTP that provides a simple Open/Close/Read/Write (OCRW) interface to the users. Such a client greatly eases the addition of GridFTP support to third-party programs, such as SRB and MPICH-G2. Further, this client provides an easier and familiar interface for applications to efficiently access remote files. We compare the performance of this client with that of globus-url-copy on multiple endpoints in the TeraGrid infrastructure. We perform both memory-to-memory and disk-to-disk transfers and show that the performance of this OCRW client is comparable to that of globus-url-copy. We also show that our GridFTP client significantly outperforms the GPFS WAN on the TeraGrid.

  2. Using Globus GridFTP to Transfer and Share Big Data | Poster

    Science.gov (United States)

    By Ashley DeVine, Staff Writer, and Mark Wance, Guest Writer; photo by Richard Frederickson, Staff Photographer Transferring big data, such as the genomics data delivered to customers from the Center for Cancer Research Sequencing Facility (CCR SF), has been difficult in the past because the transfer systems have not kept pace with the size of the data. However, the situation is changing as a result of the Globus GridFTP project.

  3. On enhancing GridFTP and GPFS performances

    International Nuclear Information System (INIS)

    Cavalli, A; Ciocca, C; Dell'Agnello, L; Ferrari, T; Gregori, D; Martelli, B; Prosperini, A; Ricci, P; Ronchieri, E; Sapunenko, V; Vitlacil, D; Zani, S; Sartirana, A

    2010-01-01

    One of the most demanding tasks which Computing in High Energy Physics has to deal with is reliable and high throughput transfer of large data volumes. Maximization and optimization of the data throughput are therefore key issues which have to be addressed by detailed investigations of the involved infrastructures and services. In this note, we present some transfer performance tests carried out at the INFN-CNAF Tier-1 center, using SLC4 64-bit Grid File Transfer Protocol (GridFTP) servers and a disk storage system based on the General Parallel File System (GPFS) from IBM. We describe the testbed setup and report the measurements of throughput performances in function of some fundamental variables, such as number of parallel file and number of streams per transfer, concurrent read and write activity and size of data blocks transferred. During this activity, we have verified that a significant improvement in performances of the GridFTP server can be obtained using 64bit version of Operating System and GPFS from IBM.

  4. Utilising UDT to push the bandwidth envelope

    Science.gov (United States)

    Garrett, B.; Davies, B.

    eScience applications, in particular High Energy Physics, often involve large amounts of data and/or computing and often require secure resource sharing across organizational boundaries, and are thus not easily handled by today's networking infrastructures. By utilising the switched lightpath connections provided by the UKLight network it has been possible to research the use of alternate protocols for data transport. While the HEP projects make use of a number of middleware solutions for data storage and transport, they all rely on GridFTP for WAN transport. The GridFTP protocol runs over TCP as the layer 3 protocol by default, however with the latest released of the Globus toolkit it is possible to utilise alternate protocols at the layer 3 level. One of the alternatives is a reliable version of UDP called UDT. This report presents the results of the tests measuring the performance of single-threaded file transfers using GridFTP running over both TCP and the UDT protocol.

  5. Richard III

    DEFF Research Database (Denmark)

    Lauridsen, Palle Schantz

    2017-01-01

    Kort analyse af Shakespeares Richard III med fokus på, hvordan denne skurk fremstilles, så tilskuere (og læsere) langt henad vejen kan føle sympati med ham. Med paralleller til Netflix-serien "House of Cards"......Kort analyse af Shakespeares Richard III med fokus på, hvordan denne skurk fremstilles, så tilskuere (og læsere) langt henad vejen kan føle sympati med ham. Med paralleller til Netflix-serien "House of Cards"...

  6. J. Richard Hackman (1940-2013)

    OpenAIRE

    Wageman, Ruth; Amabile, Teresa M.

    2013-01-01

    When J. Richard Hackman died in Cambridge, Massachusetts, on January 8, 2013, psychology lost a giant. Six and a half feet tall, with an outsize personality to match, Richard was the leading scholar in two distinct areas: work design and team effectiveness. In both domains, his work is foundational. Throughout his career, Richard applied rigorous methods to problems of great social importance, tirelessly championing multi-level analyses of problems that matter. His impact on our field has bee...

  7. Richard Nixon, 1972-2016 Obituary

    OpenAIRE

    Tom, Brian Dermot; Thompson, Simon Gregory; Duffy, SW; Sweeting, Michael John; Ohlssen, DI

    2017-01-01

    After a year-long journey with cancer, Dr Richard Nixon died on August 26th, 2016, aged only 43 years. He leaves behind his wife of 5 years, Valda, and their 1-year-old baby daughter, Kyra. Richard, a Yorkshireman, was born on September 8th, 1972. He attended Ilkley Grammar School, studied mathematics at Durham University (1991–1994) and was awarded the Diploma in Mathematical Statistics from the University of Cambridge in 1995. Richard then took a career break for a couple of years to...

  8. Richard's back: death, scoliosis and myth making.

    Science.gov (United States)

    Lund, Mary Ann

    2015-12-01

    The body of a mediaeval monarch was always under scrutiny, and Richard III's was no exception. In death, however, his body became subject to new forms of examination and interpretation: stripped naked after the battle of Bosworth, his corpse was carried to Leicester and exhibited before being buried. In 2012, it was rediscovered. The revelation that Richard suffered from scoliosis prompts this article to re-evaluate the historical sources about Richard's physique and his posthumous reputation. This article argues that Richard's death and his myth as 'crookback' are inextricably linked and traces attitudes to spinal curvature in the early modern period. It also considers how Shakespeare represented Richard as deformed, and aspects of performance history which suggest physical vulnerability. It then considers Richard's scoliosis from the perspective of medical history, reviewing classical accounts of scoliosis and arguing that Richard was probably treated with a mixture of axial traction and pressure. It demonstrates from the evidence of Richard's medical household that he was well placed to receive hands-on therapies and considers in particular the role of his physician and surgeon, William Hobbes. Finally, it shows how the case of Richard III demonstrates the close relationship between politics and medicine in the period and the contorted process of historical myth making. Published by the BMJ Publishing Group Limited. For permission to use (where not already granted under a licence) please go to http://www.bmj.com/company/products-services/rights-and-licensing/

  9. Richard Lavenham on Future Contingents

    DEFF Research Database (Denmark)

    Øhrstrøm, Peter

    1983-01-01

    Richard Lavenham on Future Contingents’, Cahiers de l’Institut du Moyen-âge Grec et Latin, 44 (1983), p.180-186.......‘Richard Lavenham on Future Contingents’, Cahiers de l’Institut du Moyen-âge Grec et Latin, 44 (1983), p.180-186....

  10. Richards Barrier LA Reference Design Feature Evaluation

    International Nuclear Information System (INIS)

    N.E. Kramer

    1999-01-01

    The Richards Barrier is one of the design features of the repository to be considered for the License Application (LA), Richards was a soil scientist who first described the diversion of moisture between two materials with different hydrologic properties. In this report, a Richards Barrier is a special type of backfill with a fine-grained material (such as sand) overlaying a coarse-grained material (such as gravel). Water that enters an emplacement drift will first encounter the fine-grained material and be transported around the coarse-grained material covering the waste package, thus protecting the waste package from contact with most of the groundwater. The objective of this report is to discuss the benefits and liabilities to the repository by the inclusion of a Richards Barrier type backfill in emplacement drifts. The Richards Barrier can act as a barrier to water flow, can reduce the waste package material dissolution rate, limit mobilization of the radionuclides, and can provide structural protection for the waste package. The scope of this report is to: (1) Analyze the behavior of barrier materials following the intrusion of groundwater for influxes of 1 to 300 mm per year. The report will demonstrate diversion of groundwater intrusions into the barrier over an extended time period when seismic activity and consolidation may cause the potential for liquefaction and settlement of the Richards Barrier. (2) Review the thermal effects of the Richards Barrier on material behavior. (3) Analyze the effect of rockfall on the performance of the Richards Barrier and the depth of the barrier required to protect waste packages under the barrier. (4) Review radiological and heating conditions on placement of multiple layers of the barrier. Subsurface Nuclear Safety personnel will perform calculations to determine the radiation reduction-time relationship and shielding capacity of the barrier. (5) Evaluate the effects of ventilation on cooling of emplacement drifts and

  11. Obituary: Richard Joseph Elston, 1960-2004

    Science.gov (United States)

    Jannuzi, Buell Tomasson; Bechtold, Jill

    2004-12-01

    Richard Joseph Elston, known for his development of innovative astronomical instrumentation, died on 26 January 2004 in Gainesville, Florida, after a four-year battle with Hodgkin's lymphoma. A professor of astronomy at the University of Florida, Richard had an unusually broad range of interests and skills, and a willingness to share his passion for astronomy with others, which made him a highly valued member of the astronomical community. Born 1 July 1960, in Albuquerque, New Mexico, Richard was the son of a geologist father and journalist mother. His childhood interest in astronomy and instrumentation matured as he majored in physics and astronomy at the University of New Mexico (BS, 1983) under the mentorship of Michael Zeilik. Richard pursued his PhD in astronomy at the University of Arizona and earned his degree in 1988. He pioneered the use of IR arrays for deep imaging surveys of the sky to study galaxy formation, and completed his thesis Search for Rapidly Forming Galaxies at High Redshift under the direction of George Rieke. Richard's graduate work included the first detection of galaxies at intermediate redshifts with evolved populations too red to have been identifiable from optical imaging surveys alone. In the Astrophysical Journal Letters in 1988, he, George Rieke, and Marcia Rieke reported the discovery of this new class of galaxies, now known as EROs (Extremely Red Objects), important as the possible progenitors of present day elliptical galaxies. Following post-doctoral positions at Kitt Peak National Observatory from 1988 to 1991 and at the Observatories of the Carnegie Institution of Washington from 1991 to 1992, Richard joined the scientific staff of Cerro Tololo Inter-American Observatory in Chile, part of the NSF's National Optical Astronomy Observatory. By 1994, he had become head of CTIO's IR instrumentation program and was leading the development of new instruments for the US astronomical community. In 1996, Richard married astronomer

  12. Richard Florida : loovsektor on majanduskasvu mootor / Richard Florida ; interv. Argo Ideon

    Index Scriptorium Estoniae

    Florida, Richard

    2008-01-01

    USA majandus- ja ühiskonnateadlane Richard Florida loovklassi teooriast, selle osast majanduskasvu tagamisel, seosest ühiskonna tolerantsuse ja ühiskonna majandusliku edukuse vahel, sotsiaalse sidususe takistavast rollist loovuse motiveerimisel

  13. System level traffic shaping in disk servers with heterogeneous protocols

    International Nuclear Information System (INIS)

    Cano, Eric; Kruse, Daniele Francesco

    2014-01-01

    Disk access and tape migrations compete for network bandwidth in CASTORs disk servers, over various protocols: RFIO, Xroot, root and GridFTP. As there are a limited number of tape drives, it is important to keep them busy all the time, at their nominal speed. With potentially 100s of user read streams per server, the bandwidth for the tape migrations has to be guaranteed to a controlled level, and not the fair share the system gives by default. Xroot provides a prioritization mechanism, but using it implies moving exclusively to the Xroot protocol, which is not possible in short to mid-term time frame, as users are equally using all protocols. The greatest commonality of all those protocols is not more than the usage of TCP/IP. We investigated the Linux kernel traffic shaper to control TCP/ IP bandwidth. The performance and limitations of the traffic shaper have been understood in test environment, and satisfactory working point has been found for production. Notably, TCP offload engines' negative impact on traffic shaping, and the limitations of the length of the traffic shaping rules were discovered and measured. A suitable working point has been found and the traffic shaping is now successfully deployed in the CASTOR production systems at CERN. This system level approach could be transposed easily to other environments.

  14. Professor Richard Feynman colloquium

    CERN Multimedia

    1965-01-01

    Richard P. Feynman received the Nobel Prize for physics in 1965. Following the ceremony in Stockholm, Feynman gave the colloquium "Development of the space-time view of quantum electrodynamics" at CERN on 17th December.

  15. Richard von Volkmann

    Science.gov (United States)

    Willy, Christian; Schneider, Peter; Engelhardt, Michael; Hargens, Alan R.

    2008-01-01

    Richard von Volkmann (1830–1889), one of the most important surgeons of the 19th century, is regarded as one of the fathers of orthopaedic surgery. He was a contemporary of Langenbeck, Esmarch, Lister, Billroth, Kocher, and Trendelenburg. He was head of the Department of Surgery at the University of Halle, Germany (1867–1889). His popularity attracted doctors and patients from all over the world. He was the lead physician for the German military during two wars. From this experience, he compared the mortality of civilian and war injuries and investigated the general poor hygienic conditions in civilian hospitals. This led him to introduce the “antiseptic technique” to Germany that was developed by Lister. His powers of observation and creativity led him to findings and achievements that to this day bear his name: Volkmann’s contracture and the Hueter-Volkmann law. Additionally, he was a gifted writer; he published not only scientific literature but also books of children’s fairy tales and poems under the pen name of Richard Leander, assuring him a permanent place in the world of literature as well as orthopaedics. PMID:18196438

  16. Richard Avedon ja Annie Leibovitz laulsid kaanonit / Marika Alver

    Index Scriptorium Estoniae

    Alver, Marika

    2008-01-01

    Richard Avedoni (1923-2004) retrospektiivnäitusest (fotod aastatest 1946-2004) kuraator Helle Crenzien (Lousiana Kaasaegse Kunsti muuseum Taanis), millega kaasnes ka Helen Whitney film "Richard Avedon : darkness and light" ja Annie Leibovitzi (1949) suurprojektist "A photographer's life 1990-2005" Pariisis

  17. In conversation with: Professor Richard James

    Directory of Open Access Journals (Sweden)

    John Clarke

    2014-03-01

    Full Text Available In 2011, Richard James wrote in the Foreword to Nelson, Clarke, Kift, and Creagh’s (2012 monograph on Australasian literature on the First Year Experience that:The trend towards universal participation will usher in dramatic changes in the character of the first year in higher education. … (p. iiiIn an interview at the University of Melbourne, Australia in July 2013 between Richard James and John Clarke, Co-editor of the International Journal of the First Year in Higher Education, these and related issues were explored.  The interview picks up where the Foreword left off:  focussing on universal participation.

  18. 77 FR 21555 - Manning, Richard W.; Notice of Filing

    Science.gov (United States)

    2012-04-10

    ... DEPARTMENT OF ENERGY Federal Energy Regulatory Commission [Docket No. ID-6835-001] Manning, Richard W.; Notice of Filing Take notice that on April 2, 2012, Richard W. Manning submitted for filing... not serve to make protestants parties to the proceeding. Any person wishing to become a party must...

  19. Richard Halliburton's Bearded Tales

    Science.gov (United States)

    Morris, Charles E., III

    2009-01-01

    Fusing the concept of "the beard" with the genre of the tall tale to theorize bearded tales deepens our understanding of closet eloquence, or rhetorical repertories of sexual passing in U.S. history. An examination of adventurer-writer-lecturer Richard Halliburton's sexual provenance and bestselling travel tale, "The Royal Road to Romance" (1925),…

  20. Richards Bay effluent pipeline

    CSIR Research Space (South Africa)

    Lord, DA

    1986-07-01

    Full Text Available of major concern identified in the effluent are the large volume of byproduct calcium sulphate (phosphogypsum) which would smother marine life, high concentrations of fluoride highly toxic to marine life, heavy metals, chlorinated organic material... ........................ 9 THE RICHARDS BAY PIPELINE ........................................ 16 Environmental considerations ................................... 16 - Phosphogypsum disposal ................................... 16 - Effects of fluoride on locally occurring...

  1. Quantum Man: Richard Feynman's Life in Science

    CERN Document Server

    CERN. Geneva

    2011-01-01

    It took a man who was willing to break all the rules to tame a theory that breaks all the rules. This talk will be based on my new book Quantum Man: Richard Feynman's life in science. I will try and present a scientific overview of the contributions of Richard Feynman, as seen through the arc of his fascinating life. From Quantum Mechanics to Antiparticles, from Rio de Janeiro to Los Alamos, a whirlwind tour will provide insights into the character, life and accomplishments of one of the 20th centuries most important scientists, and provide an object lesson in scientific integrity.

  2. Swearing Used in Richard Wright’s Black Boy

    OpenAIRE

    Giyatmi Giyatmi; Ratih WIjayava; Nunun Tri Widarwati

    2017-01-01

    This research aims at finding the types of swearing expressions and linguistic forms of English swearing used in Richard Wright's Black Boy. This is a descriptive qualitative research since it describes the phenomena of swearing used in the novel. The data of the research are all the conversations or sentences used swearing in the novel written by Richard Wright namely Black Boy as the main data source. The method of collecting data in this research is observation and teknik lanjut catat. Aft...

  3. EDITORIAL: Richard Palmer: celebrating 37 years with Journal of Physics: Condensed Matter Richard Palmer: celebrating 37 years with Journal of Physics: Condensed Matter

    Science.gov (United States)

    Ferry, David

    2009-01-01

    It is with a great deal of both happiness and sadness that I have to announce that we are losing one of the real strengths of the Journal of Physics: Condensed Matter (JPCM). Dr Richard Palmer, our Senior Publisher, announced his retirement, and this issue marks the first without his involvement. Of course, we are happy that he will get to enjoy his retirement, but we are sad to lose such a valuable member of our team. Richard first started work at IOP Publishing in March 1971 as an Editorial Assistant with Journal of Physics B: Atomic and Molecular Physics. After a few months, he transferred to Journal of Physics C: Solid State Physics. During his first year, he was sent on a residential publishing training course and asked to sign an undertaking to stay at IOP Publishing for at least two years. Although Richard refused to sign, as he did not want to commit himself, he has remained with the journal since then. The following year, the Assistant Editor of Journal of Physics C: Solid State Physics, Malcolm Haines, walked out without notice in order to work on his family vineyard in France, and Richard stepped into the breach. In those days, external editors had a much more hands-on role in IOP Publishing and he had to travel to Harwell to be interviewed by Alan Lidiard, the Honorary Editor of Journal of Physics C: Solid State Physics, before being given the job of Assistant Editor permanently. I am told that in those days the job consisted mainly of editing and proofreading and peer review. There was no journal development work. At some point in the early 1980s, production and peer review were split into separate departments and Richard then headed a group of journals consisting of Journal of Physics C: Solid State Physics, Journal of Physics D: Applied Physics and Journal of Physics F: Metal Physics, Semiconductor Science and Technology, Superconductor Science and Technology, Plasma Physics and Controlled Fusion, and later Nanotechnology and Modelling and Simulation

  4. Potshemu medved rõtshit / Richard Pipes

    Index Scriptorium Estoniae

    Pipes, Richard

    2006-01-01

    Harvardi ülikooli ajalooprofessor Richard Pipes arutleb, miks Venemaa viimase aja käitumises väljendub soovimatus koostööks, sageli ka vaenulikkus. Venemaa võimetus rahvusvahelises kontekstis oma kohta leida, selle ajaloolised juured

  5. Richard Peters and Valuing Authenticity

    Science.gov (United States)

    Degenhardt, M. A. B.

    2009-01-01

    Richard Peters has been praised for the authenticity of his philosophy, and inquiry into aspects of the development of his philosophy reveals a profound authenticity. Yet authenticity is something he seems not to favour. The apparent paradox is resolved by observing historical changes in the understanding of authenticity as an important value.…

  6. In Conversation with Paul Richards

    Science.gov (United States)

    Holman, Andrew

    2013-01-01

    Paul Richards is one of those individuals who make a difference and is as far from institutional as one can be. The author met up with him at the Learning Disability Today conference in London to talk more about his work and life. Paul coordinates the service user involvement across Southdown Housing Association, based in Sussex.

  7. Obituary: Dr. Richard Roland Baker

    Directory of Open Access Journals (Sweden)

    Thornton R

    2014-12-01

    Full Text Available Richard Baker died at Easter 2007 after a very short illness. It is sad that he died so soon after his retirement from the British American Tobacco Company at the end of 2005, and just as he was beginning to enjoy his new life, even though tobacco science still had a part to play.

  8. Richard W. Ziolkowski Receives Honorary Doctorate

    DEFF Research Database (Denmark)

    Breinbjerg, Olav

    2012-01-01

    At the annual Commemoration of the Technical University of Denmark (DTU) on April 27, 2012, Prof. Richard W. Ziolkowski, University of Arizona (UoA), received DTU's highest academic degree, the Honorary Doctor degree: Doctor Technices Honoris Causa (Figure 1). Prof. Ziolkowski has been a close...

  9. A distributed storage system with dCache

    Science.gov (United States)

    Behrmann, G.; Fuhrmann, P.; Grønager, M.; Kleist, J.

    2008-07-01

    The LCG collaboration is encompassed by a number of Tier 1 centers. The Nordic LCG Tier 1, operated by NDGF, is in contrast to many other Tier 1 centers distributed over the Nordic countries. A distributed setup was chosen for both political and technical reasons, but also provides a number of unique challenges. dCache is well known and respected as a powerful distributed storage resource manager, and was chosen for implementing the storage aspects of the Nordic Tier 1. In contrast to classic dCache deployments, we deploy dCache over a WAN with limited bandwidth, high latency, frequent network failures, and spanning many administrative domains. These properties provide unique challenges, covering topics such as security, administration, maintenance, upgradability, reliability, and performance. Our initial focus has been on implementing the GFD.47 OGF recommendation (which introduced the GridFTP 2 protocol) in dCache and the Globus Toolkit. Compared to GridFTP 1, GridFTP 2 allows for more intelligent data flow between clients and storage pools, thus enabling more efficient use of our limited bandwidth.

  10. A distributed storage system with dCache

    International Nuclear Information System (INIS)

    Behrmann, G; Groenager, M; Fuhrmann, P; Kleist, J

    2008-01-01

    The LCG collaboration is encompassed by a number of Tier 1 centers. The Nordic LCG Tier 1, operated by NDGF, is in contrast to many other Tier 1 centers distributed over the Nordic countries. A distributed setup was chosen for both political and technical reasons, but also provides a number of unique challenges. dCache is well known and respected as a powerful distributed storage resource manager, and was chosen for implementing the storage aspects of the Nordic Tier 1. In contrast to classic dCache deployments, we deploy dCache over a WAN with limited bandwidth, high latency, frequent network failures, and spanning many administrative domains. These properties provide unique challenges, covering topics such as security, administration, maintenance, upgradability, reliability, and performance. Our initial focus has been on implementing the GFD.47 OGF recommendation (which introduced the GridFTP 2 protocol) in dCache and the Globus Toolkit. Compared to GridFTP 1, GridFTP 2 allows for more intelligent data flow between clients and storage pools, thus enabling more efficient use of our limited bandwidth

  11. Recensie "The Great Reset" : Richard Florida

    NARCIS (Netherlands)

    Roy van Dalm

    2010-01-01

    Like the Great Depression and the Long Depression before it, experts have viewed prolonged economic downturns as crises. In The Great Reset , bestselling author Richard Florida argues that we should instead see the recent recession as an opportunity to create entirely new ways of working and living

  12. Seeing Scale: Richard Dunn’s Structuralism

    Directory of Open Access Journals (Sweden)

    Keith Broadfoot

    2012-11-01

    Full Text Available Writing on the occasion of a retrospective of Richard Dunn’s work, Terence Maloon argued that ‘structuralism had an important bearing on virtually all of Richard Dunn’s mature works’, with ‘his modular, “crossed” formats’ being the most obvious manifestation of this. In this article I wish to reconsider this relation, withdrawing from a broad consideration of the framework of structuralism to focus on some of the quite particular ideas that Lacan proposed in response to structuralism. Beginning from a pivotal painting in the 1960s that developed out of Dunn’s experience of viewing the work of Barnett Newman, I wish to suggest a relation between the ongoing exploration of the thematic of scale in Dunn’s work and the idea of the symbolic that Lacan derives from structuralist thought. This relation, I argue, opens up a different way of understanding the art historical transition from Minimalism to Conceptual art.

  13. Theodore William Richards and the Periodic Table

    Science.gov (United States)

    Conant, James B.

    1970-01-01

    Discusses the contribution of Theodore Richards to the accurate determination of atomic weights of copper and other elements; his major contribution was to the building of the definitive periodic table of the elements. (BR)

  14. Method of lines solution of Richards` equation

    Energy Technology Data Exchange (ETDEWEB)

    Kelley, C.T.; Miller, C.T.; Tocci, M.D.

    1996-12-31

    We consider the method of lines solution of Richard`s equation, which models flow through porous media, as an example of a situation in which the method can give incorrect results because of premature termination of the nonlinear corrector iteration. This premature termination arises when the solution has a sharp moving front and the Jacobian is ill-conditioned. While this problem can be solved by tightening the tolerances provided to the ODE or DAE solver used for the temporal integration, it is more efficient to modify the termination criteria of the nonlinear solver and/or recompute the Jacobian more frequently. In this paper we continue previous work on this topic by analyzing the modifications in more detail and giving a strategy on how the modifications can be turned on and off in response to changes in the character of the solution.

  15. W. Richard Scott, Institutions and Organizations: Ideas, Interests, and Identities

    DEFF Research Database (Denmark)

    Jakobsen, Michael

    2014-01-01

    Book review of: W. Richard Scott: Institutions and Organizations: Ideas, Interests, and Identities. 4th edition. Thousand Oaks, CA: SAGE Publications, 2014. xiii, 345 pp.......Book review of: W. Richard Scott: Institutions and Organizations: Ideas, Interests, and Identities. 4th edition. Thousand Oaks, CA: SAGE Publications, 2014. xiii, 345 pp....

  16. Kuues väljasuremine / Richard Leakey, Roger Lewin

    Index Scriptorium Estoniae

    Leakey, Richard

    2002-01-01

    Inimtegevuse hävitavast toimest looduslikule mitmekesisusele, mis tingib loodusliku energiatootmise järsu kahanemise, millest omakorda sõltub inimese enda ellujäämine. Lühidalt Richard Leakey'st

  17. Bridging the Knowledge Gaps between Richards' Equation and Budyko Equation

    Science.gov (United States)

    Wang, D.

    2017-12-01

    The empirical Budyko equation represents the partitioning of mean annual precipitation into evaporation and runoff. Richards' equation, based on Darcy's law, represents the movement of water in unsaturated soils. The linkage between Richards' equation and Budyko equation is presented by invoking the empirical Soil Conservation Service curve number (SCS-CN) model for computing surface runoff at the event-scale. The basis of the SCS-CN method is the proportionality relationship, i.e., the ratio of continuing abstraction to its potential is equal to the ratio of surface runoff to its potential value. The proportionality relationship can be derived from the Richards' equation for computing infiltration excess and saturation excess models at the catchment scale. Meanwhile, the generalized proportionality relationship is demonstrated as the common basis of SCS-CN method, monthly "abcd" model, and Budyko equation. Therefore, the linkage between Darcy's law and the emergent pattern of mean annual water balance at the catchment scale is presented through the proportionality relationship.

  18. Richard A. Werners forskning i pengeskabelse

    DEFF Research Database (Denmark)

    2016-01-01

    Hvilken rolle spiller penge i samfundsøkonomien og hvilken rolle burde penge spille i den økonomiske videnskab? Det forsker Richard Werner i. Han er professor i økonomi ved Southampton University i England, og her præsenteres fire dele af hans forskning i penge: (1) Hvad foregår der egentlig i en...

  19. Richard Mattessich: vida y obra

    OpenAIRE

    Daniel Carrasco Díaz

    2006-01-01

    El texto que se ofrece a continuación constituye el discurso pronunciado por el profesor Daniel Carrasco Díaz, catedrático de Economía Financiera y Contabilidad como padrino del homenajeado, en el solemne acto de investidura del Prof. Dr. Richard Mattessich, profesor emérito de la Sauder School of Commerce, de la University of British Columbia, Vancouver (Canadá), como Doctor honoris causa por la Universidad de Málaga, celebrado el 18 de mayo de 2006.

  20. Failed Mothers, Monster Sons. Reading Shakespeare’S Richard Iii as a Fairy Tale

    Directory of Open Access Journals (Sweden)

    Percec Dana

    2014-03-01

    Full Text Available The paper looks at Shakespeare’s historical play Richard III and its fairy tale-like character given by the configuration of the main character as an arch-villain and the presence of motifs and patterns typically associated with the fairy tale genre. More specifically, it considers the mother-son relationship between the Duchess of York and Richard in the light of the motif of monstrous birth. It is not a coincidence that the emergence of such motifs coincides with the historical contexts of the early modern period. Reading Richard III in this key is related to the revisionist approach to chronicle plays.

  1. Richard Weaver's Untraditional Case for Federalism

    OpenAIRE

    Jeremy David Bailey

    2004-01-01

    Although Richard M. Weaver's political writings do not offer a systematic examination of federalism, they include a defense of federalist arrangements. Because Weaver's federalism is central to his conservatism, and because his argument for federalism differs from more common conservative defenses of federalism offered in the twentieth century, his writings allow students of federalism to examine possible connections between federalism and conservative political thought. Copyright 2004, Oxfor...

  2. In memoriam: Richard (Rick) G. Harrison—benefactor for ...

    Indian Academy of Sciences (India)

    Professor Richard Harrison (1946–2016), a most influential evolutionary biologist of ... were profoundly important in my development as a scientist and a person. ... observations to infer his love of family, but I am going to risk correction by those ...

  3. PREFACE: Celebrating 20 years of Journal of Physics: Condensed Matter—in honour of Richard Palmer Celebrating 20 years of Journal of Physics: Condensed Matter—in honour of Richard Palmer

    Science.gov (United States)

    Ferry, David; Dowben, Peter; Inglesfield, John

    2009-11-01

    This year marks the 20th anniversary of the launch of Journal of Physics: Condensed Matter in 1989. The journal was formed from the merger of Journal of Physics C: Solid State Physics and Journal of Physics F: Metal Physics which had separated in 1971. In the 20 years since its launch, Journal of Physics: Condensed Matter has more than doubled in size, while raising standards. Indeed, Journal of Physics: Condensed Matter has become one of the leading scientific journals for our field. This could not have occurred without great leadership at the top. No one has been more responsible for this growth in both size and quality than our Senior Publisher, Richard Palmer. Richard first started work at IOP in March 1971 as an Editorial Assistant with J. Phys. B After a few months, he transferred to J. Phys.C The following year, the Assistant Editor of J. Phys. C, Malcolm Haines, left suddenly in order to work on his family vineyard in France, and Richard stepped into the breach. In those days, external editors had a much more hands-on role in IOP Publishing and he had to travel to Harwell to be interviewed by Alan Lidiard, the Honorary Editor of J. Phys. C, before being given the job of Assistant Editor permanently. Since J. Phys. C and J. Phys. F re-merged to form Journal of Physics: Condensed Matter, Richard gradually shed his other journal responsibilities, except for Reports on Progress in Physics, to build up Journal of Physics: Condensed Matter. He has worked closely with four Editors-in-Chief of J. Phys. C and five of Journal of Physics: Condensed Matter. When Richard announced his retirement this past winter, we met it with a great deal of both happiness and sadness. Of course, we are happy that he is going to be allowed to enjoy his retirement, but we remain very sad to lose such a valuable member of our team, especially the one who had provided the heart and soul of the journal over its 20 years. We will be able to rely upon the team which Richard ably trained as

  4. Trochanteric fractures. Classification and mechanical stability in McLaughlin, Ender and Richard osteosynthesis

    Energy Technology Data Exchange (ETDEWEB)

    Herrlin, K.; Stroemberg, T.; Lidgren, L.; Walloee, A.; Pettersson, H.

    Four hundred and thirty trochanteric factures operated upon with McLaughlin, Ender or Richard's osteosynthesis were divided into 6 different types based on their radiographic appearance before and immediately after reposition with special reference to the medial cortical support. A significant correlation was found between the fracture type and subsequent mechanical complications where types 1 and 2 gave less, and types 4 and 5 more complications. A comparison of the various osteosyntheses showed that Richard's had significantly fewer complications than either the Ender or McLaughlin types. For Richard's osteosynthesis alone no correlation to fracture type could be made because of the small number of complications in this group.

  5. Richard Wollheim 1923-2003 / Marek Volt

    Index Scriptorium Estoniae

    Volt, Marek

    2004-01-01

    Järelehüüe anglo-ameerika filosoofile Richard Wollheimile (5. V 1923-4. XI 2003), kes huvitus maalist ja psühhoanalüüsist ning kuulub XX sajandi analüütilist kunstifilosoofiat enim kujundanud filosoofide hulka. Tema peamised tööd: "Art and Its Objects" (1968), "Painting As an Art" (1987), "On Painting and the Self" (1992). Ilmunud ka raamatus: Volt, Marek. Esteetikast. Tallinn : Sirp, 2006

  6. Richard von Volkmann: surgeon and Renaissance man.

    Science.gov (United States)

    Willy, Christian; Schneider, Peter; Engelhardt, Michael; Hargens, Alan R; Mubarak, Scott J

    2008-02-01

    Richard von Volkmann (1830-1889), one of the most important surgeons of the 19(th) century, is regarded as one of the fathers of orthopaedic surgery. He was a contemporary of Langenbeck, Esmarch, Lister, Billroth, Kocher, and Trendelenburg. He was head of the Department of Surgery at the University of Halle, Germany (1867-1889). His popularity attracted doctors and patients from all over the world. He was the lead physician for the German military during two wars. From this experience, he compared the mortality of civilian and war injuries and investigated the general poor hygienic conditions in civilian hospitals. This led him to introduce the "antiseptic technique" to Germany that was developed by Lister. His powers of observation and creativity led him to findings and achievements that to this day bear his name: Volkmann's contracture and the Hueter-Volkmann law. Additionally, he was a gifted writer; he published not only scientific literature but also books of children's fairy tales and poems under the pen name of Richard Leander, assuring him a permanent place in the world of literature as well as orthopaedics.

  7. 75 FR 53730 - Culturally Significant Objects Imported for Exhibition Determinations: “Richard Hawkins-Third Mind”

    Science.gov (United States)

    2010-09-01

    ... DEPARTMENT OF STATE [Public Notice 7148] Culturally Significant Objects Imported for Exhibition Determinations: ``Richard Hawkins--Third Mind'' SUMMARY: Notice is hereby given of the following determinations... the exhibition ``Richard Hawkins--Third Mind,'' imported from abroad for temporary exhibition within...

  8. Fluid flow in porous media using image-based modelling to parametrize Richards' equation.

    Science.gov (United States)

    Cooper, L J; Daly, K R; Hallett, P D; Naveed, M; Koebernick, N; Bengough, A G; George, T S; Roose, T

    2017-11-01

    The parameters in Richards' equation are usually calculated from experimentally measured values of the soil-water characteristic curve and saturated hydraulic conductivity. The complex pore structures that often occur in porous media complicate such parametrization due to hysteresis between wetting and drying and the effects of tortuosity. Rather than estimate the parameters in Richards' equation from these indirect measurements, image-based modelling is used to investigate the relationship between the pore structure and the parameters. A three-dimensional, X-ray computed tomography image stack of a soil sample with voxel resolution of 6 μm has been used to create a computational mesh. The Cahn-Hilliard-Stokes equations for two-fluid flow, in this case water and air, were applied to this mesh and solved using the finite-element method in COMSOL Multiphysics. The upscaled parameters in Richards' equation are then obtained via homogenization. The effect on the soil-water retention curve due to three different contact angles, 0°, 20° and 60°, was also investigated. The results show that the pore structure affects the properties of the flow on the large scale, and different contact angles can change the parameters for Richards' equation.

  9. 76 FR 10936 - Culturally Significant Objects Imported for Exhibition Determinations: “Richard Serra Drawing: A...

    Science.gov (United States)

    2011-02-28

    ... DEPARTMENT OF STATE [Public Notice: 7348] Culturally Significant Objects Imported for Exhibition Determinations: ``Richard Serra Drawing: A Retrospective'' SUMMARY: Notice is hereby given of the following... objects to be included in the exhibition ``Richard Serra Drawing: A Retrospective,'' imported from abroad...

  10. Travelling wave solutions for the Richards equation incorporating non-equilibrium effects in the capillarity pressure

    NARCIS (Netherlands)

    van Duijn, C. J.; Mitra, K.; Pop, I. S.

    2018-01-01

    The Richards equation is a mathematical model for unsaturated flow through porous media. This paper considers an extension of the Richards equation, where non-equilibrium effects like hysteresis and dynamic capillarity are incorporated in the relationship that relates the water pressure and the

  11. 78 FR 43093 - Richard C. Theuer; Filing of Food Additive Petition and Citizen Petition

    Science.gov (United States)

    2013-07-19

    ... [Docket Nos. FDA-2013-F-0700 and FDA-2013-P-0472] Richard C. Theuer; Filing of Food Additive Petition and... proposing that the food additive regulations be amended to prohibit the use of carrageenan and salts of... that Richard C. Theuer, Ph.D., 7904 Sutterton Ct., Raleigh, NC 27615, has filed a food additive...

  12. When Richard Branson wants to build his own facility; Quand Richard Branson veut construire son propre complexe

    Energy Technology Data Exchange (ETDEWEB)

    Cosnard, D

    2005-10-01

    The capacity of petroleum refineries is today insufficient to meet the demand. In front of this shortage, Sir Richard Branson, the owner of Virgin Atlantic Airways, has decided to invest in the building of a refinery in Europe or in Canada. His new company, Virgin Oil, is already launched. However, the setting up of a new facility is very expensive and raises important problems of permits and public contestation which remain to be solved. Short paper. (J.S.)

  13. Reading 'blackface': A (narrative) introduction to Richard Kearney's ...

    African Journals Online (AJOL)

    Prominent Irish philosopher Richard Kearney's notion of 'carnal hermeneutics' is introduced by applying it to a case study of a recent event that took place at one of South Africa's university campuses. The narrative assists in illuminating some of the core principles of carnal hermeneutics and illustrates the applicability of ...

  14. H.E. Mr Richard J. Fredericks, Ambassador of the United States of America to Switzerland

    CERN Document Server

    Patrice Loïez

    2001-01-01

    Photo 01 : Prof. L. Maiani, CERN Director-General, gives a piece of LHC super conducting wire to H.E. Mr. Richard J. Fredericks; Photo 02 : Prof. L. Maiani, CERN Director-General, Mr. Jan van der Boon, CERN Director of Administration and H.E. Mr. J. Richard Fredericks

  15. Success: Richard Dyer on Diana Ross [and Beyond

    NARCIS (Netherlands)

    Kooijman, J.

    2016-01-01

    In June 1982, film scholar Richard Dyer published a two-page essay on African-American star Diana Ross in the journal Marxism Today. Part of Dyer’s essay focuses on the American conception of success and specifically on how Ross is one of the few black artists who has been "allowed" to be such a

  16. Richard Feynman Quarks, Bombs, and Bongos

    CERN Document Server

    Henderson, Harry

    2010-01-01

    Described by his peers as the "finest physicist of his generation," Richard Feynman defied scientist stereotypes. This brash New York-born American physicist startled the more conservative giants of European physics with his endless ability to improvise. Indeed, later in life, Feynman became an accomplished bongo player. Feynman's legacy to physics was his ability to simplify complex equations and clarify fundamental principles through the use of graphs. He developed the theory of quantum electrodynamics, which illustrates the behavior of electrically charged particles, such as elect

  17. To Have Been a Student of Richard Feynman

    Indian Academy of Sciences (India)

    Excerpt from Most of the Good Stuff: Memories of Richard Feynman, 1993, ... of Feynman, but while it inspired us to try for originality after we left Cornell, it also lowered our productivity to a point that at times was dangerous to our academic careers. In truth .... (However, my actual thesis topic turned out to be a different one.).

  18. An appreciation of Richard Threlkeld Cox

    Science.gov (United States)

    Tribus, Myron

    2002-05-01

    Richard T. Cox's contributions to the foundations of probability theory and inductive logic are not generally appreciated or understood. This paper reviews his life and accomplishments, especially those in his book The Algebra of Probable Inference and his final publication Inference and Inquiry which, in this author's opinion, has the potential to influence in a significant way the design and analysis of self organizing systems which learn from experience. A simple application to the simulation of a neuron is presented as an example of the power of Cox's contribution.

  19. Richard H. Thaler: Wirtschaftsnobelpreisträger 2017

    OpenAIRE

    Bruttel, Lisa Verena; Stolley, Florian

    2017-01-01

    Der diesjährige Nobelpreisträger Richard H. Thaler ist einer breiteren Öffentlichkeit vor allem durch sein mit Cass R. Sunstein gemeinsam verfasstes Buch zum Nudging bekannt geworden. Tatsächlich hat er in den vergangenen 40 Jahren die Entwicklung der Verhaltensökonomie entscheidend mitgeprägt und vorangebracht. Thaler hat die Annahmen hinter dem Modell des Homo oeconomicus untersucht und die Abweichungen menschlichen Verhaltens von den Rationalitätsannahmen auf zwei wesentliche Ursachen zurü...

  20. Technical realization of a closure concept for a chamber-system in the underground Richard repository in the Czech Republic

    International Nuclear Information System (INIS)

    Kucerka, Miroslav

    2006-01-01

    The Phare project CZ 632.02.04 'Realization of closure of a chamber in the Richard repository as input for establishing a safety case' is a follow up implementation phase of the Phare project, CZ 01.14.03 'Solution for closure of a chamber in the Richard repository'. Main objective of both projects is to propose and realize a disposal system in selected chambers of the Richard repository, which will eliminate burden from the past practices in waste management during the first phase of the Richard repository operation (1965 - 1980) and which will improve its overall long term safety. This objective will be assured by realization of the concept of so called 'hydraulic cage', which technical solution was developed by DBE Technology within the Phare project CZ 01.14.03. The solution is described in the previous presentation 'Hydraulic Cage Concept for Waste Chambers and its Technical Implementation for the Underground Richard Repository, Litomerice, Czech Republic'. (author)

  1. Illustrated & Dissected: Professor Richard Sawdon Smith.

    Science.gov (United States)

    2015-06-01

    This Alternative Gallery feature introduces the photographic artist Professor Richard Sawdon Smith. Professor Sawdon Smith's work stems around a fascination with representations of anatomy that have been fuelled by his experience as a hospital patient. The work has allowed him to explore ideas through the use of medical illustrations which include early anatomical drawings, personal medical photography and facial modelling. The work highlights how such imagery can be used in the context of a patient seeking understanding and acceptance of ill health and disease using the body as a canvas on which to translate the experience.

  2. Richard Feynman a life in science

    CERN Document Server

    Gribbin, John

    1998-01-01

    This text is a portrayal of one of the greatest scientists of the late 20th-century, which also provides a picture of the significant physics of the period. It combines personal anecdotes, writings and recollections with narrative. Richard Feynman's career included: war-time work on the atomic bomb at Los Alamos; a theory of quantum mechanics for which he won the Nobel prize; and major contributions to the sciences of gravity, nuclear physics and particle theory. In 1986, he was able to show that the Challenger disaster was due to the effect of cold on the booster rocket rubber sealings.

  3. Richard Bright and his neurological studies.

    Science.gov (United States)

    Pearce, J M S

    2009-01-01

    Richard Bright was one of the famous triumvirate of Guy's Hospital physicians in the Victorian era. Remembered for his account of glomerulonephritis (Bright's disease) he also made many important and original contributions to medicine and neurology. These included his work on cortical epileptogenesis, descriptions of simple partial (Jacksonian) seizures, infantile convulsions, and a variety of nervous diseases. Most notable were his reports of neurological studies including papers on traumatic tetanus, syringomyelia, arteries of the brain, contractures of spinal origin, tumours of the base of the brain, and narcolepsy. His career and these contributions are outlined. Copyright 2009 S. Karger AG, Basel.

  4. Quasi-constitutional change without intent : A response to Richard Albert

    NARCIS (Netherlands)

    Passchier, Reijer

    2017-01-01

    Recently, Buffalo Law Review published Richard Albert’s article on “quasi-constitutional amendments.” These are, in Albert’s words, “sub-constitutional changes that do not possess the same legal status as a constitutional amendment, that are formally susceptible to statutory repeal or revision, but

  5. Koht, kust tagasi ei tulda / Mark Jenkins ; fotod Cory Richards

    Index Scriptorium Estoniae

    Jenkins, Mark

    2015-01-01

    National Geographicu ekspeditsiooni, mille koosseisu kuulusid Renan Ozturk, Mark Jenkins, Cory Richards, Emily Harrington ja Kilaree O'Neill, püüdlustest tõusta Kagu-Aasia kõrgeima mäe Hkakabo Razi tippu ning mõõta selle täpset kõrgust GPS-i abil

  6. Wooing-Scenes in “Richard III”: A Parody of Courtliness?

    Directory of Open Access Journals (Sweden)

    Agnieszka Stępkowska

    2009-11-01

    Full Text Available In the famous opening soliloquy of Shakespeare’s Richard III, Richard mightily voices his repugnance to “fair well-spoken days” and their “idle pleasures”. He realizes his physical deformity and believes that it sets him apart from others. He openly admits that he is “not shaped for sportive tricks, nor made to court an amorous looking-glass”. Yet, his monstrosity constitutes more perhaps of his aggressive masculine exceptionality rather than of his deformity. Richard’s bullying masculinity manifests itself in his contempt for women. In the wooing scenes we clearly see his pugnacious pursuit of power over effeminate contentment by reducing women to mere objects. Additionally, those scenes are interesting from a psychological viewpoint as they brim over with conflicting emotions. Therefore, the paper explores two wooing encounters of the play, which belong the best examples of effective persuasion and also something we may refer to as ‘the power of eloquence’.

  7. Richard Kelly: Pioneirismo na iluminação da arquitetura moderna

    Directory of Open Access Journals (Sweden)

    Fernanda Brito Bandeira

    2018-04-01

    Full Text Available Livros resenhado: NEUMANN, Dietrich; STERN, Robert A. M. The structure of light: Richard Kelly and the illumination of modern architecture. New York: Yale University Press, 2010, 214 p. ISBN: 978-0-300-16370-4

  8. Richard Rorty's Conception of Philosophy of Education Revisited

    Science.gov (United States)

    Noaparast, Khosrow Bagheri

    2014-01-01

    In this essay Khosrow Bagheri Noaparast argues that, by focusing on acculturation and edification, Richard Rorty has provided a promising view for education because without acculturation, education turns into a destructive endeavor, and without edification, education risks the danger of being repetitive and reproductive. However, Rorty's view…

  9. The Paradox of the Public Realm in Richard Rorty

    Directory of Open Access Journals (Sweden)

    Martha Palacio Avendaño

    2008-12-01

    Full Text Available The concepto of the public sphere in Richard Rorty's philosophy, inherited of liberal tradition, allows be treated as a part of a game of language called democratic liberalism. One of the rules for validating a move in this game consists in taking for granted the distinction between the public and the private spheres. Richard Rorty thought that democratic liberalism did not need any foundation beyond the way to play it; its only criteria would be the game's practices, according an utopia which would allow us to make more movements in the game. That is, democratic liberalism does not require foundations, but just practices for achieving a social hioe inspired on freedom and pluralism. This kind of utopia, based upon the non-cruelty principle, would make possible an inclusive society where everyone would have a place for their own private vocabulary. In this way, Rorty would have linked freedom and solidarity. However, this language-game reveals the paradox of the link which implies the meaning of the public shere. Herein, freedom is not a sufficient condition of solidarity; hence, there is no place for social inclusion in Rorty's language game.

  10. Has Richard Rorty a moral philosophy?

    Directory of Open Access Journals (Sweden)

    Mohammad Asghari

    2015-06-01

    Full Text Available I try to show that Richard Rorty, although is not a moral philosopher like Kant, nerveless, has moral philosophy that must be taken seriously. Rorty was not engaged with moral philosophy in the systematic manner common among leading modern and contemporary moral philosophers. This paper has two parts: first part, in brief, is concerned with principles of his philosophy such as anti-essentialism, Darwinism, Freudism, and historicism. Second part which be long and detailed, considers many moral themes in Rorty's thought such as critique of Kantian morality, solidarity, moral progress, cruelty and concept of other, etc. Subsequently, I will try to answer the research question of the article namely, has Rorty a moral philosophy?

  11. Whatever Happened to Richard Reid's List of First Programming Languages?

    Science.gov (United States)

    Siegfried, Robert M.; Greco, Daniel M.; Miceli, Nicholas G.; Siegfried, Jason P.

    2012-01-01

    Throughout the 1990s, Richard Reid of Michigan State University maintained a list showing the first programming language used in introductory programming courses taken by computer science and information systems majors; it was updated for several years afterwards by Frances Van Scoy of West Virginia University. However, it has been 5 years since…

  12. Richard Wright, Toni Morrison, and United States book clubs

    Directory of Open Access Journals (Sweden)

    Mark Madigan

    2004-12-01

    Full Text Available This essay focuses on the influence of commercial book clubs in the United States. It will examine the country's oldest commercial book club, the Book-of-the-Month Club (BOMC, Oprah's Book Club (OBC, which bears the name of its founder, television personality Oprah Winfrey, and their roles in the careers of two African-American authors, Richard Wright and Toni Morrison.

  13. Argument from Design in Richard Baxter's Natural Theology

    Directory of Open Access Journals (Sweden)

    Igor Koshelev

    2017-12-01

    Full Text Available The article deals with the teleological argument, or argument from design, as expounded by a famous English Protestant theologian Richard Baxter, one of the leading 17-th century English Puritans, in his work “The Reasons of the Christian Religion”. Natural theology, providing arguments for the existence of God based on reason and without appeal to the Revelation, has always played a vital role throughout the entire history of theological thought. The most popular was the so called teleological argument, or the argument from design, which stands out among all rational arguments for the existence of the Creator. It is mostly known from the “Fifth Way” of the medieval Scholastic philosopher Thomas Aquinas and a famous work “Natural Theology” by an English 19-th century theologian William Paley. The foundation for the modern research in the area was laid during the age of the Scientific Revolution of the 17th century English nature philosophers and theologians, especially Robert Boyle, who believed the teleological argument to be the key element of Natural Theology. His friend and confessor, Richard Baxter, a prominent representative of the Puritan Natural Theology, mostly known by his theological works, paved the way for Natural Theology both in his own time and the following centuries. His work was thought to be the best collection of the evidences for Christianity.

  14. Response to Richard Widdess: Music, Meaning and Culture

    Directory of Open Access Journals (Sweden)

    Jerome Lewis

    2012-09-01

    Full Text Available This commentary discusses the anthropological implications of Richard Widess’ paper by summarizing some anthropological approaches to music, especially focusing on the way musical participation inculcates and transmits an aesthetic orientation that guides action across cultural domains such as politics, economics and religion. The paper ends by suggesting that the heart of human culture is more likely to be an aesthetic orientation than a script or set of rules, and traces out some reasons why music does this so well.

  15. Review: Lyn Richards (2005. Handling Qualitative Data: A Practical Guide

    Directory of Open Access Journals (Sweden)

    Robert L. Miller

    2006-03-01

    Full Text Available Handling Qualitative Data: A Practical Guide is an introductory textbook covering all stages of qualitative research from the initial conceptualisation of a project, through data collection and analysis, to writing up. The author, Lyn RICHARDS, is a well-known developer of two key qualitative software analysis packages, NUD*IST and NVivo. While RICHARDS clearly advocates the use of qualitative analysis software, the text is "generic" and could be used in tandem with any qualitative software package. The book concentrates on practical advice about the use of software to manage and analyse qualitative data, and provides insights in these areas. The consideration of issues around team-based qualitative research is another strong point. However, due in part to its short length, the overall coverage of topics tends to be superficial. In itself, the book does not provide sufficient detailed support for a student who would like to use it as her/his main source of guidance for carrying out a qualitative research project. URN: urn:nbn:de:0114-fqs0602244

  16. Drawings of fossils by Robert Hooke and Richard Waller

    Science.gov (United States)

    Kusukawa, Sachiko

    2013-01-01

    The drawings of fossils by Robert Hooke and Richard Waller that were the basis of the engravings in Hooke's Posthumous works (1705) are published here for the first time. The drawings show that both Hooke and Waller were proficient draftsmen with a keen eye for the details of petrified objects. These drawings provided Hooke with a polemic edge in making the case for the organic origins of ‘figured stones’.

  17. Justiça e sociedade liberal em Richard Rorty: justiça como lealdade e o projeto social de uma utopia

    Directory of Open Access Journals (Sweden)

    Marcelo de Almeida Silva

    2014-07-01

    Full Text Available O presente texto pretende explorar o conceito de justiça de Richard Rorty e a proposta da Utopia Liberal que o autor apresenta. Para tanto, explora, dentro da obra de Richard Rorty e de alguns autores com quem dialoga, contribuições para o debate da concepção do termo Justiça como um senso de lealdade ampliada e de sua proposta para uma sociedade mais justa, igualitária e inclusiva.   Abstract: This paper aims to explore the concept of justice from Richard Rorty and his proposal about the idea of a Liberal Utopia. With this goal we seek, within the work of Richard Rorty, and some authors with whom he converses, contributions to the discussion of the conception of justice as an expanded sense of loyalty and his proposal for a fairer, equitable and inclusive society.   Resumen: Este trabajo se propone explorar el concepto de justicia de Richard Rorty y la propuesta de liberal utopía que el autor presenta. Con este objetivo, vamos a buscar en la obra de Richard Rorty, y algunos autores con los que conversa, contribuciones a la discusión sobre la concepción de la justicia como un sentido más amplio de la lealtad y su propuesta de una sociedad más justa, equitativa e incluyente.

  18. Strauss, Richard. Ariane a Naxos: opera seulement, integrale. Miliza Korjus / Michel Parouty

    Index Scriptorium Estoniae

    Parouty, Michel

    1995-01-01

    Uuest heliplaadist "Strauss, Richard. Ariane a Naxos: opera seulement, integrale. Miliza Korjus (Najade). Orchestre de l'Opea l'Efat de Vienne" Arlecchino ARL 14-16, distribution Dante (3 CD: 390 F). 1935, 1944. TT: 3h 46'17"

  19. Making the Road While Walking It: A Conversation with Richard Simpson

    Science.gov (United States)

    Zabel, Robert H.; Kaff, Marilyn; Teagarden, James

    2016-01-01

    Richard Simpson is professor of special education at the University of Kansas (KU). Dr. Simpson's duties at KU have included roles of staff psychologist, teaching associate, assistant professor, project director, associate professor, professor, and chairperson for the Department of Special Education. He has directed numerous University of Kansas…

  20. Lendab nagu kotkas üle maailmas kogutud tarkuse / Richard Aroksaar ; intervjueerinud Ene Riet

    Index Scriptorium Estoniae

    Aroksaar, Richard

    2014-01-01

    Intervjuu eestlase Richard Aroksaarega, kes õppinud psühholoogiat ja raamatukogundust, töötab USA Rahvusparkide Ühenduse raamatukogus (National Park Service Library, NPS) süsteemi raamatukoguhoidja ja administraatorina

  1. Prof. Richard Mattessich at 95. His Research Methodology

    Directory of Open Access Journals (Sweden)

    Giuseppe Galassi

    2017-12-01

    Full Text Available This paper is presented as a tribute to prof. Richard Mattessich. It is written “through the eyes” of a researcher who has worked closely with him over a period of 42 years, starting attending his courses of “Income Determination Theory” and “Research Methodology” at the University of British Columbia in 1975. Among his huge scientific research and publications, I intend to underline these three major contributions: (i Accounting metrics and other mathematical instruments which anticipated computer spreadsheet by 30 years; (ii. The preparation of accountants for information economics by means of analytical methods; and (iii The proposition of the “onion model of reality” to distinguish different Kind of reality. Este trabajo se presenta como un tributo al profesor Richard Mattessich. Está escrito “con los ojos” de un investigador que ha trabajado estrechamente con él durante un período de 42 años, comenzando a asistir a sus cursos de " Income Determination Theory" y "Research Methodology" en la Universidad de British Columbia en 1975. Entre su investigación y publicaciones, más importantes pretendo subrayar estas tres contribuciones principales: (i Accounting metrics and other mathematical instruments which anticipated computer spreadsheet by 30 years; (ii The preparation of accountants for information economics by means of analytical methods; y (iii The proposition of the “onion model of reality” to distinguish different Kind of reality.

  2. Swearing Used in Richard Wright’s Black Boy

    Directory of Open Access Journals (Sweden)

    Giyatmi Giyatmi

    2017-07-01

    Full Text Available This research aims at finding the types of swearing expressions and linguistic forms of English swearing used in Richard Wright’s Black Boy. This is a descriptive qualitative research since it describes the phenomena of swearing used in the novel. The data of the research are all the conversations or sentences used swearing in the novel written by Richard Wright namely Black Boy as the main data source. The method of collecting data in this research is observation and teknik lanjut catat. After all the data had been collected then they are coded using the coding system such as data number/title of novel/chapter/page/data. There is no data reduction since all the data are analyzed in this research. This research used theory triangulation. Kind of swearing expressions found in this novel dealing with God and religion terms, name of  animals and plants, part of body, racial terms, stupidity terms, name of occupation, sexual terms, family terms. The linguistic forms of English swearing used in this novel are word, phrase, and clause. The swearing in the form of words consists of (1 noun referring to place, person, occupation, animal, and idea (2 verb and (3 adjective. Phrase consists of (1 noun phrase with swearing functioning as headword, modifier, and both headword and modifier, (2 adjective phrase with swearing functioning as modifier. Swearing expression is also found in the form of sentence.

  3. Historical Investigations of the Richard B. Russell Multiple Resource Area.

    Science.gov (United States)

    1981-11-01

    period of this project as a contemporary c~lebration and a reiteration of an ancient folk construction, Stonehenge . Appropriately, as this document goes to...55, 56m, 59m, 64m, 65-68, 71- Stonehenge 216 72, 75-76, 79-84, 84m, 91, 94- Sutch, Richard 20 95, 100, lOlm, 102, 103, 121m, Swift, James Y. 195 126

  4. Review of Richard Bausch, Hello to the Cannibals

    Directory of Open Access Journals (Sweden)

    Géraldine Chouard

    2006-03-01

    Full Text Available Richard Bausch is credited with five collections of short stories and nine novels that have received various awards in the United States. His latest work, Hello to the Cannibals, blends a historical epic and a more intimate tale. Watch out‑this is a voracious novel.Other CarnageAn ethnologist investigating cannibalistic rites in Africa asks the head of the tribe : « Do you still have cannibals in your tribe ? » « No, we ate the last one yesterday, » answers the head of the tribe. Undoubtedly,...

  5. El vocabulario sechurano de Richard Spruce

    Directory of Open Access Journals (Sweden)

    Matthias Urban

    2015-12-01

    Full Text Available This paper makes accesible a new transcription of Richard Spruce’s vocabulary of the Sechura language. Collected in the mid-19th century by the British botanist, it constitutes one of only two sources of data for this language of northernmost Peru. A comparison of the original with previously published versions shows serious errors in transcription, in particular in those of Otto von Buchwald and Jacinto Jijón y Camaaño. The article also discusses the probable circumstances of data collection and the publication history of the hitherto known version, and concludes with some first observations on the significance of Spruce’s wordlist for elucidating the linguistic history of the region, in particular with regard to the question of the linguistic situation at Olmos.

  6. Transforming Faith: H. Richard Niebuhr and Paulo Freire on Moral Education

    Science.gov (United States)

    Daniel, Joshua Leonard

    2013-01-01

    Through a contextual comparison of the theological ethics of H. Richard Niebuhr and the educational theory of Paulo Freire, I argue that socialization, while an essential task of moral education, is an insufficient aim. The proper aim of moral education is individual development. The intention of my argument is address tendencies towards…

  7. When Richard Branson wants to build his own facility

    International Nuclear Information System (INIS)

    Cosnard, D.

    2005-01-01

    The capacity of petroleum refineries is today insufficient to meet the demand. In front of this shortage, Sir Richard Branson, the owner of Virgin Atlantic Airways, has decided to invest in the building of a refinery in Europe or in Canada. His new company, Virgin Oil, is already launched. However, the setting up of a new facility is very expensive and raises important problems of permits and public contestation which remain to be solved. Short paper. (J.S.)

  8. Richard Carwardine and Jay Sexton, eds., The Global Lincoln.

    Directory of Open Access Journals (Sweden)

    Hans Krabbendam

    2012-06-01

    Full Text Available Most countries have their export heroes that transcend their national origin: India has its Ghandi, South Africa its Mandela, England its Churchill, and the US has Abraham Lincoln. While particularly known for his role in the American Civil War, he has developed into an international beacon for liberalism and democracy, especially for nationals deprived of this liberties.This collection of essays, edited by Corpus Christi College (Oxford, UK colleagues Richard Carwardine and Jay Sexton, puts...

  9. Ripples from a Passing Ship: Memories; and a Legacy of Richard Peters

    Science.gov (United States)

    Harris, Kevin

    2013-01-01

    This paper outlines aspects and dimensions of my "relationship" with Richard Peters from 1966 onward. The underlying suggestion is that, while Peters' contribution to philosophy of education was undeniably of major proportions, both that contribution and his legacy are institutional rather than substantive. (Contains 15 notes.)

  10. Süütuse kaotamine / Richard Branson ; intervjueerinud Peter Fisk ; tõlkinud Endrik Randoja

    Index Scriptorium Estoniae

    Branson, Richard

    2009-01-01

    Turunduskirjanik Peter Fiski intervjuu Suurbritannia ärimagnaadi Sir Richard Bransoniga, milles arutletakse ettevõtja suurimate saavutuste ja suurimate pettuste üle, uuritakse Bransoni võimet juhtida oma 450 ettevõtet, tema suhtumist konkurentsi ning uutesse äriideedesse, samuti tema ajakasutust

  11. Obituary: Richard D. Schwartz (1941-2011)

    Science.gov (United States)

    Wilking, Bruce

    2011-12-01

    Richard D. Schwartz, Professor Emeritus of Astronomy, died at his home in Sequim, WA, after a nearly 3 year battle against pancreatic cancer. Richard was born in Pretty Prairie, Kansas. He was active in sports and band and graduated in 1959. After completing a BS at Kansas State, and a Master's degree in Divinity at Union Seminary in NY, he further studied astrophysics, receiving his doctorate from University of Washington in 1973. When Dick arrived at the University of Missouri-St. Louis in 1975, he was the only astronomer in the Department of Physics. He built the astronomy program and initiated the B.S. in physics with an astrophysics option that the majority of physics majors choose. Dick was a wonderful teacher and provided outstanding leadership to the campus. He designed and provided oversight on the construction of the campus observatory that was completed in 1981. Since that time the observatory has served as both a teaching and research facility. It is also used for monthly public open houses that draw hundreds of people annually to the campus to view the moon, stars, and planets. Upon his retirement in 2003, the Board of Curators approved naming the campus observatory the "Richard D. Schwartz Observatory" in honor of his distinctive service to the University of Missouri-St. Louis. Just as important as Dick's service to promote public interest in astronomy was his effort to make the campus observatory a research facility. Dick equipped and maintained the observatory with state-of-art detectors that allowed students to get their first taste of scientific research. From 1991-2003, he managed the campus program for the NASA/Missouri Space Grant Consortium and mentored over 30 research students in projects at the observatory. Some of the results have been published in astronomical journals. Many of those students went on to graduate schools and several have achieved tenure and distinction at major universities. In addition to Dick's service to the University

  12. Efficacy Quotient Tindakan ESWL Piezolith Richard Wolf 3000 pada Penderita Batu Ureter di RSUPN Dr. Cipto Mangunkusumo, 2008–2011

    Directory of Open Access Journals (Sweden)

    Vinny Verdini

    2017-01-01

    Full Text Available Extracorporeal shockwave lithotripsy (ESWL saat ini telah menjadi metode yang paling umum dalam tatalaksana aktif batu ureter. Sejak Maret 2008, RSCM telah menggunakan mesin ESWL piezolith 3000 richard wolf dan belum diketahui nilai efficacy quotient (EQ. Penelitian ini bertujuan untuk menentukan nilai EQ dari tindakan ESWL menggunakan mesin piezolith richard wolf 3000 pada batu ureter dan hubungan angka bebas batu dengan lokasi batu, jumlah batu, beban batu, opasitas batu, obstruksi, dan fungsi ginjal. Studi cross sectional ini dilakukan pada bulan Januari 2008-Desember 2011 dan data dianalisis dengan statistik multivariat. Terdapat 113 (95 % dari 119 pasien yang dinyatakan bebas batu setelah tindakan ESWL pertama. Didapatkan nilai EQ 0,89. Hanya ukuran batu yang mempengaruhi angka bebas batu dalam penelitian ini (p<0,05. Disimpulkan bahwa prosedur ESWL menggunakan mesin richard wolf piezolith 3000 memiliki nilai EQ dan angka bebas batu yang lebih baik daripada mesin-mesin sebelumnya dan mesin lain yang sejenis. Faktor yang mempengaruhi keberhasilan adalah ukuran batu ureter yang ditatalaksana.Kata Kunci: batu ureter, ESWL, efficacy quotient, angka bebas batu. Efficacy Quotient of ESWL Piezolith Richard Wolf 3000 Machine in Patientswith Ureteral Stones in Dr. Cipto MangunkusumoNational Hospital 2008 - 2011AbstractExtracorporeal shockwave lithotripsy (ESWL is the most common method of ureteral stone management. Since 2008, RSCM has ben using ESWL piezolith 3000 richard wolf and efficacy quotient (EQ value have not yet studied. The study aims was to determine the efficacy quotient (EQ of ESWL using piezolith richard wolf 3000 machine for ureteral stone by analyzing free-stone rate with location of stones, number of stones, stone burden, stone opacity, obstruction and kidney function. This cross sectional study was carried out in January 2008-December 2011, with multivariate analytical study. Ninety five percent (n=113 of 119 patients were

  13. Richard Wollheim über die Metapher in der Malerei

    OpenAIRE

    Heinrich, Richard

    1993-01-01

    Es handelt sich um den Text eines Vortrages, den ich Jänner 1993 im Rahmen einer Vortragsreihe am Institut für Kunstgeschichte der Universität Wien gehalten habe. Er ist bisher unpubliziert und nicht redigiert. Das worüber ich spreche ist ein Artikel von Richard Wollheim mit dem Titel "Die Metapher in der Malerei". Diesen Artikel habe ich herausgegeben, gemeinsam mit meinem Kollegen Helmuth Vetter, 1991 in dem Band "Bilder der Philosophie". Ursprünglich handelt es sich um einen Vortrag, d...

  14. RICHARD WAGNER E O ROMANTISMO ALEMÃO

    Directory of Open Access Journals (Sweden)

    Rainer Câmara Patriota

    2015-07-01

    Full Text Available A cultura musical romântica encontra em Richard Wagner– em sua obra musical e teórica – um de seus maiores protagonistas.A rejeição da Aufklärung e a exaltação da supremacia germânica –elementos constituidores da Weltanschauung romântica alemã –caracterizam fortemente o pensamento e a atitude de Wagner frenteà vida, assumindo conotações ainda mais radicais através de seucontumaz antissemitismo. De modo que pensar Wagner por ocasiãode seu bicentenário também significa retomar uma discussão crucialsobre o romantismo alemão e suas implicações políticas eideológicas.

  15. Conoscenza e etica in Richard Rorty

    Directory of Open Access Journals (Sweden)

    Emilia Romano

    2011-12-01

    Full Text Available The era in which we live, characterized by multiculturalism and complexity, it is a time when it is clear the difficulty of man to orient and to choose their own way. It’s the time of the fall of every certainty, is the era of “post”, after the tradition, after metaphysics, after the truth, and that requires more effort than any other constant reflection. The neopragmatismo seems to be an effective investigative tool for conducting this reflection and a vantage point to carry on a conversation around the issues of education. In particular, the author intended to refer to the work of Richard Rorty, the author who more than others reflected on the encounter between two important pragmatist tradition: that of classical pragmatism and the “continental” or responsible for the development of a new European concept of truth, understood as a critical and interpretative.

  16. Resisting Biopolitics through “Diaphanous Wonder”: Richard Flanagan's Gould's Book of Fish

    NARCIS (Netherlands)

    Wiese, Doro|info:eu-repo/dai/nl/304842699

    2014-01-01

    In Gould's Book of Fish (2003), author Richard Flanagan manages to invent a format in which content and style account for historical events on Sarah Island, Tasmania in the 1820s, yet he does so in a manner that is not in the least objective, disinterested or fact-orientated. The perspective of

  17. "Symposium" by Richard Dawkins, Gerard 't Hooft, Alain Connes

    CERN Multimedia

    Maximilien Brice

    2004-01-01

    Richard Dawkins will speak on biology, Gerard ‘t Hooft will focus on physics, and Alain Connes will discuss mathematics. CERN scientists probe ever-deeper levels of matter and their interactions, but can we say that the patterns they see are truly fundamental? Does the universe obey the same laws throughout? Since mathematical constructions can be true in the absence of any relation to the physical world, is mathematics more fundamental than physics? Extraterrestrial life would probably look much different from that on Earth, but natural selection still be fundamental to their evolution?

  18. Applied techniques for high bandwidth data transfers across wide area networks

    International Nuclear Information System (INIS)

    Lee, J.; Gunter, D.; Tierney, B.; Allcock, B.; Bester, J.; Bresnahan, J.; Tuecke, S.

    2001-01-01

    Large distributed systems such as Computational/Data Grids require large amounts of data to be co-located with the computing facilities for processing. From their work developing a scalable distributed network cache, the authors have gained experience with techniques necessary to achieve high data throughput over high bandwidth Wide Area Networks (WAN). The authors discuss several hardware and software design techniques, and then describe their application to an implementation of an enhanced FTP protocol called GridFTP. The authors describe results from the Supercomputing 2000 conference

  19. Juvenile Cosmology; Or Richard Powers’ Post-Global Doughnut

    Directory of Open Access Journals (Sweden)

    Judith Roof

    2010-02-01

    Full Text Available Le roman de Richard Powers, Operation Wandering Soul (1993, présente le lien subtil qui associe un mondialisme déjà usé et vieillissant à l’enfant perçu comme catégorie dominante. Comme les faces serpentines d’un ruban de Möbius lové autour de l’illimité et de l’intemporel, le texte, tendu entre ses deux infinis – l’univers et l’enfant – révise la portée, la conception, la structure et le style du genre romanesque. Délaissant Aristote pour Einstein, Operation Wandering Soul se place sur le terrain de la cosmologie. Le récit, qui rassemble la kyrielle des grands ralliements juvéniles et leurs vains pèlerinages, concentre l’espace-temps dans une présentation qui évoque la « somme des histoires » de Richard Feynman. La contraction de l’espace-temps opérée par le roman ne fait pas de celui-ci un hymne simpliste au global (catégorie déjà aussi datée que celle des malheureux vétérans du Vietnam, mais capte au contraire la conscience grandissante d’une existence sans origine qui s’étend à perte de vue au-delà de ses coordonnées supposées. Le roman s’enroule sur lui-même tout en s’épanchant au dehors, boucle ses cadres et ses détours tout en desserrant leur emprise. Il fait tourner la roue de ses récits comme des planètes en rotation, la ronde d’un système solaire, le tourbillon d’une galaxie. La conscience que présente Operation Wandering Soul ne se résume donc pas au seul point de vue de l’âme errante qu’est le personnage de Kraft, mais consiste en la somme de tous les temps et de tous les lieux, de leurs strates accumulées comme une conscience en acte, complexe et tissée de réseaux, qui n’appartient à personne et est partagée par tous. Cette accumulation organise le jeu des perspectives multiples qui instaurent l’acte de lecture et sont instaurées par lui. À cet égard, lire constitue ici une physique des oubliés.Richard Powers’ novel Operation Wandering

  20. Kitchenette: Hell or Home? Different"Kitchenette"Images Created by Richard Wright and Gwendolyn Brooks%Kitchenette:Hell or Home?Different"Kitchenette"Images Created by Richard Wright and Gwendolyn Brooks

    Institute of Scientific and Technical Information of China (English)

    肖志宏

    2017-01-01

    How the southern black migrants navigate and survive the northern urban space is a question profoundly explored and realistically documented in many migration narratives in African American literature. This paper concentrates on the image of Chicago"kitchenette"in the works of Richard Wright and Gwendolyn Brooks, in an attempt to demonstrate the different inter-pretations of migrant spaces on the urban landscape.

  1. Astronomical fire: Richard Carrington and the solar flare of 1859.

    Science.gov (United States)

    Clark, Stuart

    2007-09-01

    An explosion on the Sun in 1859, serendipitously witnessed by amateur astronomer Richard Carrington, plunged telegraphic communications into chaos and bathed two thirds of the Earth's skies in aurorae. Explaining what happened to the Sun and how it could affect Earth, 93 million miles away, helped change the direction of astronomy. From being concerned principally with charting the stars to aid navigation, astronomers became increasingly concerned with what the celestial objects were, how they behaved and how they might affect life on Earth.

  2. Racial Shame and the Pleasure of Transformation: Richard Rodriguez's Queer Aesthetics of Assimilation

    Science.gov (United States)

    Beltran, Cristina

    2012-01-01

    This essay analyzes Latino conservative thought by rethinking the logics of assimilation through a simultaneous exploration of aesthetic possibility and negative affect. Focusing on the writings of Richard Rodriguez, the essay considers how creative forms of self-individuation and political agency cannot easily be decoupled from negative forms of…

  3. La paradoja de lo público en Richard Rorty

    Directory of Open Access Journals (Sweden)

    Martha Palacio Avendaño

    2008-01-01

    Full Text Available El concepto de lo público en Richard Rorty, heredero de la tradición liberal, admite ser tratado como parte de un juego del lenguaje denominado liberalismo democrático. En ese sentido, una de las reglas de este juego para saber si una jugada es válida consiste en asumir la distinción entre esfera pública y privada. Richard Rorty pensó que este juego no requería fundamentación más allá de la forma de jugarlo, que el criterio en que se apoyaría estaba en las prácticas que tienen lugar dentro del mismo con arreglo a sostener una utopía que permitiera hacer cada vez más jugadas. Esto es, el liberalismo democrático no requería basarse en algo más allá de las prácticas conducentes a lograr una esperanza social alentada por la libertad en defensa del pluralismo. Su utopía liberal, guiada por el principio de la no-crueldad, haría posible una sociedad inclusiva en la que todos tuvieran espacio para su léxico privado. De este modo, Rorty habría vinculado libertad y solidaridad, pero su juego del lenguaje permite advertir la paradoja del vínculo que implicaría el sentido de lo público. Aquí, la libertad no es condición suficiente de la solidaridad, de modo que la inclusión social no tiene cabida en su juego del lenguaje.

  4. Richard Rorty, o la posibilidad de un etnocentrismo universal

    Directory of Open Access Journals (Sweden)

    Isabel Gamero Cabrera

    2010-04-01

    Full Text Available En el presente artículo intentaremos comprender y analizar las implicaciones actuales de dos tesis del filósofo estadounidense Richard Rorty en relación con su etnocentrismo: La expansión global del sistema democrático liberal como horizonte de su teoría política y la restricción de las creencias de importancia última a la esfera privada. Compararemos esta teoría con las aportaciones de otros dos autores: una interpretación antropológica de los juegos de lenguaje de Wittgenstein y la democracia radical de Mouffe.

  5. A soil moisture accounting-procedure with a Richards' equation-based soil texture-dependent parameterization

    Science.gov (United States)

    Given a time series of potential evapotranspiration and rainfall data, there are at least two approaches for estimating vertical percolation rates. One approach involves solving Richards' equation (RE) with a plant uptake model. An alternative approach involves applying a simple soil moisture accoun...

  6. [Sir William Richard Gowers: author of the "bible of neurology"].

    Science.gov (United States)

    Hirose, Genjiro

    2014-11-01

    William Richard Gowers is one of the great pioneers in neurology and the author of the well-known neurology textbook, "A Manual of Diseases of the Nervous System." His concepts of neurology are based on meticulously and carefully accumulated knowledge of history, observations, and neurological examinations of patients with various neurological diseases. He is not only a great neurologist but also a great teacher who loves teaching students and physicians through well-prepared lectures. We can glean the essence of the field of neurology through his life story and numerous writings concerning neurological diseases.

  7. Of poetics and possibility: Richard Kearney’s post-metaphysical God

    Directory of Open Access Journals (Sweden)

    Yolande Steenkamp

    2017-11-01

    Full Text Available This article provides an overview of Richard Kearney’s attempt at re-imagining God post-metaphysically. In the context of a continental dialogue on the topic, Kearney has responded to onto-theology with a hermeneutic and phenomenologically informed attempt to rethink God post-metaphysically. This eschatological understanding of God is expounded in the article and is placed in relation to Kearney’s more recent concept of Anatheism. The article closes with a few remarks on what may be gained by Kearney’s work, as well as outlining a few critical questions.

  8. Understanding Richard Wright's "Black Boy": A Student Casebook to Issues, Sources, and Historical Documents.

    Science.gov (United States)

    Felgar, Robert

    In "Black Boy," Richard Wright triumphs over an ugly, racist world by fashioning an inspiring, powerful, beautiful, and fictionalized autobiography. To help students understand and appreciate his story in the cultural, political, racial, social, and literary contexts of its time, this casebook provides primary historical documents,…

  9. Il concetto di medium artistico: Richard Wollheim interprete di Ludwig Wittgenstein

    OpenAIRE

    Maistrello, Andrea

    2016-01-01

    The aim of the dissertation is twofold: (i) analyzing the notion (well known by aestheticians, but not so intensively studied) of artistic medium; (ii) showing the relevance of such notion for aesthetics through the examination of some relevant aspects of Richard Wollheim’s philosophy of art, maybe the main figure in Anglo-American philosophy as for considering artistic medium central in art-theorizing. Artistic media, according to Wollheim, can develop only if properly connected to a cultura...

  10. Gamma radiation and radon concentration levels at the radioactive waste repositories 'Richard' and 'Bratrstvi'

    International Nuclear Information System (INIS)

    Berka, Z.; Sabol, J.; Janu, M.

    1998-01-01

    Owing to the fact that cosmic rays are shielded off, the photon equivalent dose rates in the corridors of the Richard repository are usually slightly lower than outside. However, in points close to barrels containing radioactive waste, the dose rates can reach values as high as tens of μSv/h. Because of high concentrations of natural radionuclides, the dose rates in the Bratrstvi repository is generally considerably higher, as much as 5 times the normal background value. Radon concentrations exhibit specific time variations which are modified by ventilation. Where ventilation is poor or absent, the radon concentrations are extremely high, viz. up to 30 and 300 kBq/m 3 in the Richard and Bratrstvi repositories, respectively. Personal exposure of workers depend on the total time spent underground and on the ventilation rate. While the contribution from photons can be kept below the relevant limits, the radon-related doses may be significant and even exceed the professional limits if no precautions are taken. (P.A.)

  11. Somaesthetic Training, Aesthetics, Ethics, and the Politics of Difference in Richard Shusterman's "Body Consciousness"

    Science.gov (United States)

    Powell, Kimberly

    2010-01-01

    In this essay, the author first addresses the theme of disciplined somatic training and its relationship to self-awareness and transformation. Her attention is focused specifically on the chapter on Ludwig Wittgenstein, in which Richard Shusterman presents and then elaborates upon the philosopher's connections between conscious bodily feelings and…

  12. Richard III in Russian Theatre at the Twilight of the "Thaw"

    OpenAIRE

    Sokolyansky, Mark

    2007-01-01

    Richard III was very rarely staged in Russian theatre in tsarist and Stalin’s times, because the story of inhuman tyranny provoked associations with Russian political reality. In the period of the so-called “Thaw” (1954ß1964) the play became very popular in the USSR and several scenic productions of it were real events in Russian (and Soviet) theatrical life. In the essay three most original and successful performances (in Kujbyshev, Gorkij and Erevan) are discussed and compare...

  13. Metaforos populiarojo mokslo literatūroje: Richard Dawkins knygos analizė

    OpenAIRE

    Urbanavičiūtė, Dovilė

    2017-01-01

    The following paper discusses metaphor usage in the genre of popular science. The object of this analysis is a chapter called ‘Immortal coils’ taken from Richard Dawkins’ book The Selfish Gene. The study discusses the impact of creative conceptual metaphors on the construction of the overall meaning of the text, as well as the significance of their linguistic manifestations and context. In focusing on the genre of popular science, it also makes an attempt at defining potential difficulties of...

  14. Free as in Freedom Richard Stallman's Crusade for Free Software

    CERN Document Server

    Williams, Sam

    2011-01-01

    Free as in Freedom interweaves biographical snapshots of GNU project founder Richard Stallman with the political, social and economic history of the free software movement. It examines Stallman's unique personality and how that personality has been at turns a driving force and a drawback in terms of the movement's overall success. Free as in Freedom examines one man's 20-year attempt to codify and communicate the ethics of 1970s era "hacking" culture in such a way that later generations might easily share and build upon the knowledge of their computing forebears. The book documents Stallman'

  15. Naturalismo e existencialismo na teoria moral de Richard Hare

    Directory of Open Access Journals (Sweden)

    Marco Antônio Oliveira de Azevedo

    2009-08-01

    Full Text Available http://dx.doi.org/10.5007/1677-2954.2009v8n2p247 Em um artigo de 1966, Amartya Sen procurou mostrar que mesmo Richard Hare, um devoto explícitodo antinaturalismo em ética, ainda que inadvertidamente, incorreu num tipo de naturalismo que Senintitulou de existencial. Neste breve artigo, traço um resumo dessa crítica à teoria de Hare, em especial,da chamada “Lei de Hume”, a qual Sen preferiu apropriadamente intitular “Regra de Hare”. Pretendomostrar como esse tipo peculiar de “existencialismo” nos conduz, ainda que sob o possível protesto deHare e seus seguidores, a conclusões subjetivistas e relativistas sobre a moralidade.

  16. Richard Swedberg, The Art of Social Theory

    DEFF Research Database (Denmark)

    Carleheden, Mikael

    2015-01-01

    to systematic consideration. Swedberg attributes this strange absence to what he sees as the miserable state of contemporary social theory. We must, he claims, avoid two misconceptions: ‘empiricism’ and ‘abstract theory’. In the first case, theory is reduced to the task of summarizing the outcome of empirical......It is a rare event when a new general field of research opens up within sociology. However, with this book, Richard Swedberg intends to do just that. It is not just another book on social theory. It is a book on ‘theorizing’. And that makes all the difference. Swedberg has chosen the term ‘art......’, but also ‘craft’, to emphasize the practical side of doing theory. This topic has been strangely absent, not just in sociology but in the social sciences in general. In order to see this absence, we should ask ourselves how education in sociology is conventionally organized. The answer is by a taken...

  17. Missing Kettles and Too Few Toasters: The Forecasting Methodology at Morphy Richards

    OpenAIRE

    Lane, D; Hughes, D

    2002-01-01

    Faced with problems in forecasting at Morphy Richards, this research represents an investigation into their forecasting methodology following the hypothesis that the current forecasting system was no longer sufficient to ensure guaranteed supply to customers, or to enable forward planning.\\ud \\ud The purpose of the research was to identify any requirements for change within the forecasting system and to identify the ‘best practice’ within the industry. Primary research was carried out using a...

  18. The 1D Richards' equation in two layered soils: a Filippov approach to treat discontinuities

    Science.gov (United States)

    Berardi, Marco; Difonzo, Fabio; Vurro, Michele; Lopez, Luciano

    2018-05-01

    The infiltration process into the soil is generally modeled by the Richards' partial differential equation (PDE). In this paper a new approach for modeling the infiltration process through the interface of two different soils is proposed, where the interface is seen as a discontinuity surface defined by suitable state variables. Thus, the original 1D Richards' PDE, enriched by a particular choice of the boundary conditions, is first approximated by means of a time semidiscretization, that is by means of the transversal method of lines (TMOL). In such a way a sequence of discontinuous initial value problems, described by a sequence of second order differential systems in the space variable, is derived. Then, Filippov theory on discontinuous dynamical systems may be applied in order to study the relevant dynamics of the problem. The numerical integration of the semidiscretized differential system will be performed by using a one-step method, which employs an event driven procedure to locate the discontinuity surface and to adequately change the vector field.

  19. Richard Murphy: a life in writing

    Directory of Open Access Journals (Sweden)

    E. Meihuizen

    2006-07-01

    Full Text Available The Irish poet Richard Murphy published his autobiography “The kick: a life among writers” in 2003. From a slightly different perspective the subtitle of this work could be rewritten as “A life in writing” since it is an account of the agencies that moulded a life devoted to creative writing which forms the book’s essential impetus. The memoir is based on notebooks which Murphy kept throughout his life “to hold the scraps of verse, elusive images, dreams, desires and revelations” to be developed into poetry. Apart from contextualising his poetry by registering the relationships, circumstances and landscapes from which it germinated, Murphy also tells of the creative process itself and the personal poetics underlying this process. This article explores what is regarded as the central determining feature of Murphy’s identity as poet, namely the relationship between the creative self and a particular place, where the concept of “place” is seen as a cultural palimpsest which represents not only physical qualities, but also the shaping and development of the landscape through time according to a certain way of life.

  20. Book Review of Relational Patterns, Therapeutic Presence: Concepts and practice of Integrative Psychotherapy by Richard G. Erskine

    OpenAIRE

    Marye O'Reilly-Knapp

    2015-01-01

    Book Review of Relational Patterns, Therapeutic Presence: Concepts and practice of Integrative Psychotherapy by Richard G. Erskine. Published by Karnac Books: London, 2015 Paperback, Pages 366, ISBN 13: 978-1-78220-190-8

  1. High Throughput WAN Data Transfer with Hadoop-based Storage

    Science.gov (United States)

    Amin, A.; Bockelman, B.; Letts, J.; Levshina, T.; Martin, T.; Pi, H.; Sfiligoi, I.; Thomas, M.; Wüerthwein, F.

    2011-12-01

    Hadoop distributed file system (HDFS) is becoming more popular in recent years as a key building block of integrated grid storage solution in the field of scientific computing. Wide Area Network (WAN) data transfer is one of the important data operations for large high energy physics experiments to manage, share and process datasets of PetaBytes scale in a highly distributed grid computing environment. In this paper, we present the experience of high throughput WAN data transfer with HDFS-based Storage Element. Two protocols, GridFTP and fast data transfer (FDT), are used to characterize the network performance of WAN data transfer.

  2. High Throughput WAN Data Transfer with Hadoop-based Storage

    International Nuclear Information System (INIS)

    Amin, A; Thomas, M; Bockelman, B; Letts, J; Martin, T; Pi, H; Sfiligoi, I; Wüerthwein, F; Levshina, T

    2011-01-01

    Hadoop distributed file system (HDFS) is becoming more popular in recent years as a key building block of integrated grid storage solution in the field of scientific computing. Wide Area Network (WAN) data transfer is one of the important data operations for large high energy physics experiments to manage, share and process datasets of PetaBytes scale in a highly distributed grid computing environment. In this paper, we present the experience of high throughput WAN data transfer with HDFS-based Storage Element. Two protocols, GridFTP and fast data transfer (FDT), are used to characterize the network performance of WAN data transfer.

  3. Astronaut Richard H. Truly in training session RMS for STS-2 bldg 9A

    Science.gov (United States)

    1981-01-01

    Astronaut Richard H. Truly in training session with the Remote Manipulator System (RMS) for STS-2 bldg 9A. Views show Truly working at the command console while watching out the windows. Karen Ehlers, an RMS procedures specialist, can be seen at left side of frame (34314); view from behind Truly as he trains at the RMS console (34315).

  4. Adoption of a SAML-XACML Profile for Authorization Interoperability across Grid Middleware in OSG and EGEE

    International Nuclear Information System (INIS)

    Garzoglio, G; Chadwick, K; Dykstra, D; Hesselroth, T; Levshina, T; Sharma, N; Timm, S; Bester, J; Martin, S; Groep, D; Koeroo, O; Salle, M; Verstegen, A; Gu, J; Sim, A

    2011-01-01

    The Authorization Interoperability activity was initiated in 2006 to foster interoperability between middleware and authorization infrastructures deployed in the Open Science Grid (OSG) and the Enabling Grids for E-sciencE (EGEE) projects. This activity delivered a common authorization protocol and a set of libraries that implement that protocol. In addition, a set of the most common Grid gateways, or Policy Enforcement Points (Globus Toolkit v4 Gatekeeper, GridFTP, dCache, etc.) and site authorization services, or Policy Decision Points (LCAS/LCMAPS, SCAS, GUMS, etc.) have been integrated with these libraries. At this time, various software providers, including the Globus Toolkit v5, BeStMan, and the Site AuthoriZation service (SAZ), are integrating the authorization interoperability protocol with their products. In addition, as more and more software supports the same protocol, the community is converging on LCMAPS as a common module for identity attribute parsing and authorization call-out. This paper presents this effort, discusses the status of adoption of the common protocol and projects the community work on authorization in the near future.

  5. Adoption of a SAML-XACML profile for authorization interoperability across grid middleware in OSG and EGEE

    Energy Technology Data Exchange (ETDEWEB)

    Garzoglio, G. [Fermilab; Bester, J. [Argonne; Chadwick, K. [Fermilab; Dykstra, D. [Fermilab; Groep, D. [NIKHEF, Amsterdam; Gu, J. [LBL, Berkeley; Hesselroth, T. [Fermilab; Koeroo, O. [NIKHEF, Amsterdam; Levshina, T. [Fermilab; Martin, S. [Argonne; Salle, M. [NIKHEF, Amsterdam; Sharma, N. [Fermilab; Sim, A. [LBL, Berkeley; Timm, S. [Fermilab; Verstegen, A. [NIKHEF, Amsterdam

    2011-01-01

    The Authorization Interoperability activity was initiated in 2006 to foster interoperability between middleware and authorization infrastructures deployed in the Open Science Grid (OSG) and the Enabling Grids for E-sciencE (EGEE) projects. This activity delivered a common authorization protocol and a set of libraries that implement that protocol. In addition, a set of the most common Grid gateways, or Policy Enforcement Points (Globus Toolkit v4 Gatekeeper, GridFTP, dCache, etc.) and site authorization services, or Policy Decision Points (LCAS/LCMAPS, SCAS, GUMS, etc.) have been integrated with these libraries. At this time, various software providers, including the Globus Toolkit v5, BeStMan, and the Site AuthoriZation service (SAZ), are integrating the authorization interoperability protocol with their products. In addition, as more and more software supports the same protocol, the community is converging on LCMAPS as a common module for identity attribute parsing and authorization call-out. This paper presents this effort, discusses the status of adoption of the common protocol and projects the community work on authorization in the near future.

  6. X-ray cross-sections and crossroads (The International Radiation Physics Society) - Richard Pratt's contributions to both

    International Nuclear Information System (INIS)

    Hubbell, J.H.

    2000-01-01

    Some examples of the impact of the theoretical contributions by Richard Pratt and his collaborators on photon cross section compilations at NBS/NIST and elsewhere over the past several decades are presented. Both the theoretical and measurement works which combine to provide this data base, and the contact with the varied user groups in medical applications, nuclear engineering, crystallography and X-ray astronomy, have formed a global crossroads of researchers now embodied in the International Radiation Physics Society (IRPS). Since the founding of the IRPS at the 3 rd International Symposium on Radiation Physics (ISRP-3) in Ferrara, Italy, in 1985, the Secretariat for this 'global radiation physics family' (the IRPS) has resided at the University of Pittsburgh under the direction of Richard Pratt. A brief account of the origins and history of the IRPS, beginning with ISRP-1 in Calcutta in 1974, is presented.

  7. X-ray cross-sections and crossroads (The International Radiation Physics Society) - Richard Pratt's contributions to both

    Science.gov (United States)

    Hubbell, J. H.

    2000-08-01

    Some examples of the impact of the theoretical contributions by Richard Pratt and his collaborators on photon cross section compilations at NBS/NIST and elsewhere over the past several decades are presented. Both the theoretical and measurement works which combine to provide this data base, and the contact with the varied user groups in medical applications, nuclear engineering, crystallography and X-ray astronomy, have formed a global crossroads of researchers now embodied in the International Radiation Physics Society (IRPS). Since the founding of the IRPS at the 3rd International Symposium on Radiation Physics (ISRP-3) in Ferrara, Italy, in 1985, the Secretariat for this ``global radiation physics family'' (the IRPS) has resided at the University of Pittsburgh under the direction of Richard Pratt. A brief account of the origins and history of the IRPS, beginning with ISRP-1 in Calcutta in 1974, is presented.

  8. Book Review of Relational Patterns, Therapeutic Presence: Concepts and practice of Integrative Psychotherapy by Richard G. Erskine

    Directory of Open Access Journals (Sweden)

    Marye O'Reilly-Knapp

    2015-12-01

    Full Text Available Book Review of Relational Patterns, Therapeutic Presence: Concepts and practice of Integrative Psychotherapy by Richard G. Erskine. Published by Karnac Books: London, 2015 Paperback, Pages 366, ISBN 13: 978-1-78220-190-8

  9. Muusikamaailm : Suur klaveripidu Ruhrimaal. Kissingeni festival tippudega. Sulasoli 80. aastapäev. Richard Rodgers 100 / Priit Kuusk

    Index Scriptorium Estoniae

    Kuusk, Priit, 1938-

    2002-01-01

    6. juuni-17. augustini Ruhrimaal toimuvast klaverifestivalist. Bad Kissingenis toimuvatest suvepidustustest. Soome Lauljate ja Mängijate Liit tähistab asutamise 80. aastapäeva. Helilooja Richard Rodgersi sünnist möödub 100 aastat

  10. Construction of Fluid - solid Coupling Model with Improved Richards - BP & Its Engineering Application

    Science.gov (United States)

    Xie, Chengyu; Jia, Nan; Shi, Dongping; Lu, Hao

    2017-10-01

    In order to study the slurry diffusion law during grouting, Richards unsaturated-saturated model was introduced, the definition of the grouting model is clear, the Richards model control equation was established, And the BP neural network was introduced, the improved fluid-solid coupling model was constructed, Through the use of saturated - unsaturated seepage flow model, As well as the overflow boundary iterative solution of the mixed boundary conditions, the free surface is calculated. Engineering practice for an example, with the aid of multi - field coupling analysis software, the diffusion law of slurry was simulated numerically. The results show that the slurry diffusion rule is affected by grouting material, initial pressure and other factors. When the slurry starts, it flows in the cracks along the upper side of the grouting hole, when the pressure gradient is reduced to the critical pressure, that is, to the lower side of the flow, when the slurry diffusion stability, and ultimately its shape like an 8. The slurry is spread evenly from the overall point of view, from the grouting mouth toward the surrounding evenly spread, it gradually reaches saturation by non-saturation, and it is not a purely saturated flow, when the slurry spread and reach a saturated state, the diffusion time is the engineering grouting time.

  11. Newtonian nudging for a Richards equation-based distributed hydrological model

    Science.gov (United States)

    Paniconi, Claudio; Marrocu, Marino; Putti, Mario; Verbunt, Mark

    The objective of data assimilation is to provide physically consistent estimates of spatially distributed environmental variables. In this study a relatively simple data assimilation method has been implemented in a relatively complex hydrological model. The data assimilation technique is Newtonian relaxation or nudging, in which model variables are driven towards observations by a forcing term added to the model equations. The forcing term is proportional to the difference between simulation and observation (relaxation component) and contains four-dimensional weighting functions that can incorporate prior knowledge about the spatial and temporal variability and characteristic scales of the state variable(s) being assimilated. The numerical model couples a three-dimensional finite element Richards equation solver for variably saturated porous media and a finite difference diffusion wave approximation based on digital elevation data for surface water dynamics. We describe the implementation of the data assimilation algorithm for the coupled model and report on the numerical and hydrological performance of the resulting assimilation scheme. Nudging is shown to be successful in improving the hydrological simulation results, and it introduces little computational cost, in terms of CPU and other numerical aspects of the model's behavior, in some cases even improving numerical performance compared to model runs without nudging. We also examine the sensitivity of the model to nudging term parameters including the spatio-temporal influence coefficients in the weighting functions. Overall the nudging algorithm is quite flexible, for instance in dealing with concurrent observation datasets, gridded or scattered data, and different state variables, and the implementation presented here can be readily extended to any of these features not already incorporated. Moreover the nudging code and tests can serve as a basis for implementation of more sophisticated data assimilation

  12. Richard Rufus's theory of mixture: a medieval explanation of chemical combination.

    Science.gov (United States)

    Weisberg, Michael; Wood, Rega

    2003-05-01

    Richard Rufus of Cornwall offered a novel solution to the problem of mixture raised by Aristotle. The puzzle is that mixts or mixed bodies (blood, flesh, wood, etc.) seem to be unexplainable through logic, even though the world is full of them. Rufus's contribution to this long-standing theoretical debate is the development of a modal interpretation of certain Averroistic doctrines. Rufus's account, which posits that the elemental forms in a mixt are in accidental potential, avoids many of the problems that plagued non-atomistic medieval theories of mixture. This paper is an initial examination of Rufus' account.

  13. Süüme sundis vabrikujuhti palgatööliseks jääma / Richard Mutso ; interv. Jüri Saar

    Index Scriptorium Estoniae

    Mutso, Richard, 1933-

    2003-01-01

    Intervjuu Võru mööblitehase Wermo peadirektorina töötanud, praeguse tehase nõukogu liikme Richard Mutsoga tehase juhtimisest, euroreferendumist, eraelust. Kommenteerivad: Silva Mutso, Veljo Ipits

  14. Richard Wright's Thematic Treatment of Women in "Uncle Tom's Children,""Black Boy," and "Native Son."

    Science.gov (United States)

    Brewton, Butler E.

    Richard Wright's literary work emphasizes a contrast between black women and white women. Although both are "givers" to black boys, the nature of what they give is different. The black woman gives physical life, feeds it, and protects it at the expense of spiritual or creative vitality. Her goal is to survive bodily, to breathe, to have…

  15. Pimping climate change: Richard Branson, global warming, and the performance of green capitalism

    OpenAIRE

    Scott Prudham

    2009-01-01

    On 21 September 2006 UK über-entrepreneur and Virgin Group Chairman Richard Branson pledged approximately £1.6 billion, the equivalent of all the profits from Virgin Atlantic and Virgin Trains for the next ten years, to fighting climate change. Since then, Branson has restated his commitment to action on global warming, including investment in technologies for sequestering carbon dioxide from the atmosphere. In this paper, I critically examine and engage with Branson’s announcements as a spec...

  16. Selfish memes: An update of Richard Dawkins’ bibliometric analysis of key papers in sociobiology

    OpenAIRE

    Aaen-Stockdale, Craig

    2017-01-01

    This is an Open Access journal available from http://www.mdpi.com/ In the second edition of The Selfish Gene, Richard Dawkins included a short bibliometric analysis of key papers instrumental to the sociobiological revolution, the intention of which was to support his proposal that ideas spread within a population in an epidemiological manner. In his analysis, Dawkins primarily discussed the influence of an article by British evolutionary biologist William Donald Hamilton which had introdu...

  17. Nothing Risked, Nothing Gained: Richard Powers' Gain and the Horizon of Risk

    Directory of Open Access Journals (Sweden)

    Aaron Jaffe

    2010-02-01

    Full Text Available Cet article interprète Gain, sixième roman de Richard Powers, à la lumière du concept de « seconde modernité » proposé par le sociologue allemand Ulrich Beck. Ce concept souligne la dissémination du risque et la manière dont celle-ci invalide les marchés conclus par la « première modernité » entre l’avenir et le présent, entre l’intérieur du corps et l’extérieur. Cet article entend montrer que Beck fournit un cadre interprétatif utile à la compréhension de ces rapports, hors des impasses catégorielles que suscite l’opposition entre les deux régimes narratifs à l’œuvre dans le texte : le récit biographique, local et individuel, de la maladie de Laura Rowen Bodey, et l’histoire collective de l’entreprise Clare devenue conglomérat.This essay interprets Richard Powers' sixth novel Gain with reference to the German sociologist Ulrich Beck's concept of “second modernity.” The concept underscores the dispersal of risk and how it shreds promissory notes understood in “first modernity” between the future and present and the insides and outsides of the body. It argues that Beck supplies an apt interpretive framework for understanding these relationships and overcoming the categorical impasses between the two narrative words at work in Power's novel, the biographical situatedness of Laura Rowen Bodey's illness and the corporate history of the Clare conglomerate.

  18. Richards Bay Mesometeorological Data – Vertical profiles of air temperature and wind velocity and surface wind statistics.

    CSIR Research Space (South Africa)

    Scholtz, MT

    1978-03-01

    Full Text Available This report details the experimental methods and data obtained in the course of a study of the movement of stable air over a complex region. The field work was carried out in the Richards Bay area on the Natal Coast during the period May to August...

  19. Popular science - common ground. A literary critique of Richard Dawkins's The Selfish Gene

    OpenAIRE

    Nilsen, Helene

    2012-01-01

    This thesis aims to perform a literary reading of Richard Dawkins's The Selfish Gene from a perspective situated outside of the 'battle of the two cultures'. Chapter 1 takes Foucault's article What is an author?" as its point of departure. After discussing how Dawkins may be seen as a reader of Darwin, I will go on to discuss Foucault's concept of the author-function, before I move on to consider some different readings of and approaches to The Selfish Gene. With reference to a polemic bet...

  20. The effects of coal dust on photosynthetic performance of the mangrove, Avicennia marina in Richards Bay, South Africa

    International Nuclear Information System (INIS)

    Naidoo, G.; Chirkoot, D.

    2004-01-01

    Richards Bay, on the northern KwaZulu-Natal coast, is the largest coal exporting port in South Africa. The coal is stored at the Richards Bay Coal Terminal (RBCT) prior to export. Dust from coal operations is a major problem in the Richards Bay area. In this study, we tested the hypothesis that coal dust adversely affects photosynthetic performance of Avicennia marina (Forssk.) Vierh., the dominant mangrove species in the harbour. Photosynthetic performance was determined on 10 trees by measuring carbon dioxide uptake and chlorophyll fluorescence parameters at two elevation sites and on upper and lower leaf surfaces that were covered or uncovered with coal dust. Measurements were made on five clear, sunny days at saturating light (>1000 μmol m -2 s -1 ) and high temperature (28-30 deg. C). Coal dust significantly reduced carbon dioxide exchange of upper and lower leaf surfaces by 17-39%, the reduction being generally greater on the lower leaf surface that is covered by a dense mat of trichomes and salt glands. The reduction in carbon dioxide exchange by coal dust was higher at the high elevation site that supported isolated dwarfed trees. The chlorophyll fluorescence data indicated that leaves coated with dust exhibited significantly lower photosystem II (PS II) quantum yield, lower electron transport rate (ETR) through PSII and reduced quantum efficiency of PSII (F v F m ). The chlorophyll fluorescence data supported the gas exchange measurements and are consistent with reduced photosynthetic performance of leaves coated with coal dust. - Coal dust reduced photosynthetic performance of the mangrove, Avicennia marina

  1. Marie-Christine Agosto. Richard Brautigan. Les fleurs de néant.

    Directory of Open Access Journals (Sweden)

    Jean-Bernard Basse

    2006-04-01

    Full Text Available Richard Brautigan, si on lui reconnaît un certain humour, est souvent associé avec condescendance au phénomène hippy et considéré comme un auteur démodé, superficiel. Celui qui écrivait dans Cahier d’un Retour de Troie : « Les mots sont des fleurs de néant » est pourtant l’un de ces écrivains que l’on pourrait qualifier de mineurs essentiels, et seuls ceux qui l’ont peu ou mal lu s’étonneront de ce que Marie-Christine Agosto ait choisi de donner comme sous-titre « Les fleurs de néant » au pet...

  2. Transcendence, Taxis, Trust: Richard Kearney and Jacques Derrida

    Directory of Open Access Journals (Sweden)

    Ulrich Schmiedel

    2017-03-01

    Full Text Available Whatever else it takes to drive a taxi, it takes trust. Day after day, the driver has to decide whether the other is or is not trustworthy. I take the taxi as a test case to analyze and assess Richard Kearney’s diacritical hermeneutics of the other. I argue that Kearney functionalizes the concept of transcendence in order to connect the transcendence of the finite other to the transcendence of the infinite other. However, in his central critique of the deconstructionists following Jacques Derrida, Kearney counters his connection. While Kearney’s critique of Derrida’s account of absolute alterity is correct and compelling, I argue that Derrida’s critique of a distinction between the trustworthy other and the non-trustworthy other might be more crucial than Kearney contends. Insisting on openness to the other’s otherness, Derrida provokes any hermeneutic of the other to trust in transcendence. The taxi is taken as a test to illustrate the implications which diacritical and deconstructive drivers might have for evaluating the entanglement of ethics and eschatology—inside and outside the taxi.

  3. Richard J. Bernstein on Ethics and Philosophy between the Linguistic and the Pragmatic Turn

    OpenAIRE

    Marchetti, Sarin

    2017-01-01

    1. In his compelling article American Pragmatism: The Conflict of Narratives, Richard Bernstein quotes a perceptive line by Alasdair MacIntyre that goes [A] tradition not only embodies the narrative of an argument, but is only recovered by an argumentative retelling of that narrative which will itself be in conflict with other argumentative retellings. Bernstein, in the essay mentioned, works through MacIntyre’s passage in order to “engage in the ‘argumentative retelling’ of a metanarrative –...

  4. Diagnosis and treatment of polycystic ovary syndrome (PCOS): an interview with Richard Legro.

    Science.gov (United States)

    Legro, Richard

    2015-03-27

    In this podcast, we talk to Professor Richard Legro about the recommendations for the diagnosis and treatment of polycystic ovary syndrome (PCOS) based on clinical practice guidelines and discuss the challenges of diagnosis PCOS at specific age groups. The controversies associated with treatment of PCOS, including therapies for infertility as this is a problem commonly observed in PCOS subjects, are highlighted together with future directions on the topic. The podcast for this interview is available at. http://www.biomedcentral.com/content/supplementary/s12916-015-0299-2-s1.mp3.

  5. Richard J. Hill, Picturing Scotland through the Waverley Novels: Walter Scott and the Origins of the Victorian Illustrated Novel.

    Directory of Open Access Journals (Sweden)

    Jacqueline Irene Cannata

    2012-10-01

    Full Text Available Richard J. Hill, Picturing Scotland through the Waverley Novels: Walter Scott and the Origins of the Victorian Illustrated Novel . Farnham, Surrey, and Burlington, VT: Ashgate, 2010. Pp. 236. ISBN 978-0-7546-6806-0. US$99.99.

  6. Applied techniques for high bandwidth data transfers across wide area networks

    International Nuclear Information System (INIS)

    Lee, Jason; Gunter, Dan; Tierney, Brian; Allcock, Bill; Bester, Joe; Bresnahan, John; Tuecke, Steve

    2001-01-01

    Large distributed systems such as Computational/Data Grids require large amounts of data to be co-located with the computing facilities for processing. Ensuring that the data is there in time for the computation in today's Internet is a massive problem. From our work developing a scalable distributed network cache, we have gained experience with techniques necessary to achieve high data throughput over high bandwidth Wide Area Networks (WAN). In this paper, we discuss several hardware and software design techniques and issues, and then describe their application to an implementation of an enhanced FTP protocol called GridFTP. We also describe results from two applications using these techniques, which were obtained at the Supercomputing 2000 conference

  7. Dr. Richard J. Whelan: Seeing the Field of Emotional and Behavior Disorders through the Lens of a Pioneer

    Science.gov (United States)

    Kaff, Marilyn S.; Teagarden, Jim; Zabel, Robert H.

    2011-01-01

    Dr. Richard J. Whelan is a distinguished professor emeritus at the University of Kansas. His earliest professional experiences were at the Children's Hospital (Southard School) of the Menninger Clinic, where he served as a recreational therapist, teacher, and director of education. During his career at the University of Kansas and the KU Medical…

  8. The deployment of a large scale object store at the RAL Tier-1

    Science.gov (United States)

    Dewhurst, A.; Johnson, I.; Adams, J.; Canning, B.; Vasilakakos, G.; Packer, A.

    2017-10-01

    Since 2014, the RAL Tier-1 has been working on deploying a Ceph backed object store. The aim is to replace Castor for disk-only storage. This new service must be scalable to meet the data demands of the LHC to 2020 and beyond. As well as offering access protocols the LHC experiments currently use, it must also provide industry standard access protocols. In order to keep costs down the service must use erasure coding rather than replication to ensure data reliability. This paper will present details of the storage service setup, which has been named Echo, as well as the experience gained from running it. The RAL Tier-1 has also been developing XrootD and GridFTP plugins for Ceph. Both plugins are built on top of the same libraries that write striped data into Ceph and therefore data written by one protocol will be accessible by the other. In the long term we hope the LHC experiments will migrate to industry standard protocols, therefore these plugins will only provide the features needed by the LHC experiments. This paper will report on the development and testing of these plugins.

  9. Richards growth model and viability indicators for populations subject to interventions

    Directory of Open Access Journals (Sweden)

    Selene Loibel

    2010-12-01

    Full Text Available In this work we study the problem of modeling identification of a population employing a discrete dynamic model based on the Richards growth model. The population is subjected to interventions due to consumption, such as hunting or farming animals. The model identification allows us to estimate the probability or the average time for a population number to reach a certain level. The parameter inference for these models are obtained with the use of the likelihood profile technique as developed in this paper. The identification method here developed can be applied to evaluate the productivity of animal husbandry or to evaluate the risk of extinction of autochthon populations. It is applied to data of the Brazilian beef cattle herd population, and the the population number to reach a certain goal level is investigated.Neste trabalho estudamos o problema de identificação do modelo de uma população utilizando um modelo dinâmico discreto baseado no modelo de crescimento de Richards. A população é submetida a intervenções devido ao consumo, como no caso de caça ou na criação de animais. A identificação do modelo permite-nos estimar a probabilidade ou o tempo médio de ocorrência para que se atinja um certo número populacional. A inferência paramétrica dos modelos é obtida através da técnica de perfil de máxima verossimilhança como desenvolvida neste trabalho. O método de identificação desenvolvido pode ser aplicado para avaliar a produtividade de criação animal ou o risco de extinção de uma população autóctone. Ele foi aplicado aos dados da população global de gado de corte bovino brasileiro, e é utilizado na investigação de a população atingir um certo número desejado de cabeças.

  10. Richard Murphy: Autobiography and the Connemara landscape

    Directory of Open Access Journals (Sweden)

    Elsa Meihuizen

    2015-08-01

    Full Text Available It could be argued that an important feature of Richard Murphy’s work, and of his identity as a poet is the relationship between the creative self and a particular place, where ‘place’ should be understood as referring not just to physical qualities of the natural environment, but in a broader sense to denote an environment in which everything is interrelated and connected, and in which there is no sharp division between the natural and the human. The landscape providing inspiration for Murphy’s poetic imagination is the landscapes and seascapes of Connemara in north-west Ireland. In 1959 he settled in this environment which was to be his base for the next 20 years and from this period and this location emanated the bulk of his poetic oeuvre. For Murphy committing to a life of writing poetry necessarily means being in the Connemara landscape. Returning to this environment in adulthood represents a quest for recovering childhood feelings, of belonging and love, as connected to particular places. Murphy’s Connemara poems could be read as an account of this process of re-placement, as a type of autobiographical text in which the artist creates a ‘double portrait’: in writing about the landscape he also writes about himself, creating a place-portrait which is, at the same time, a self-portrait.

  11. Lucien Cuénot, Richard Goldschmidt y Miquel Crusafont Pairó

    Directory of Open Access Journals (Sweden)

    Casinos, Adrià

    2016-06-01

    Full Text Available An unpublished text, corresponding to a communication done by Crusafont Pairó is analysed. The communication is strongly critical with Cuénot’s necrology published previously by Goldschmidt, where he regrets the teleological ideas on evolution that Cuénot maintained in the last years of his life.Se analiza un texto inédito de Miquel Crusafont Pairó, correspondiente a comunicación que llevó a cabo en la Fundació Bosch i Cardellach, sobre la necrológica de Lucien Cuénot publicada por Richard Goldschmidt. La comunicación es un fuerte ataque a Goldschmidt por sus críticas a la deriva teleológica de Cuénot en los últimos años de su vida.

  12. Why Was General Richard O’Connor’s Command in Northwest Europe Less Effective Than Expected?

    Science.gov (United States)

    2011-03-01

    Commander of 7 Division and Military Governor of Jerusalem , September 1938- August 1939. ______. Papers of General Sir Richard O’Connor KT, GCB, DSO, MC...Montgomery, Brian. A Field Marshall in the Family: A Personal Biography of Montgomery of Alamein. New York: Taplinger, 1973. Montgomery, Field...Commanders: A Composite Biography . Combat Studies Institute publications, Fort Leavenworth, Kansas: U.S. Army Command and General Staff College, 1989

  13. Símbolo y forma: los hermanos Grimm en Richard Wagner

    Directory of Open Access Journals (Sweden)

    Miguel Salmerón Infante

    2015-05-01

    Full Text Available Este escrito estudia el cómo y el porqué de la presencia de los Cuentos de los Hermanos Grimm en la obra de Richard Wagner. Para dar un enfoque más concreto a esta reflexión el análisis se centra en Sigfrido, el drama musical de Wagner con más atmósfera de cuento, y las influencias y préstamos temáticos, formales y lingüísticos que le aportan los KHM. El artículo entiende que hay dos elementos que aprovecha Wagner de los Grimm para sus dramas musicales. El símbolo para su proyecto de tejido de la identidad alemana. Y la forma del cuento con sus temas y fórmulas recurrentes que el aplicó a su música y muy concretamente al Leitmotiv. Todo ello sin olvidar la muy frecuente presencia de la figura del huérfano tanto en Wagner como en los Grimm.  

  14. DPM: Future Proof Storage

    CERN Document Server

    Alvarez, Alejandro; Furano, Fabrizio; Hellmich, Martin; Keeble, Oliver; Rocha, Ricardo; CERN. Geneva. IT Department

    2012-01-01

    The Disk Pool Manager (DPM) is a lightweight solution for grid enabled disk storage management. Operated at more than 240 sites it has the widest distribution of all grid storage solutions in the WLCG infrastructure. It provides an easy way to manage and configure disk pools, and exposes multiple interfaces for data access (rfio, xroot, nfs, gridftp and http/dav) and control (srm). During the last year we have been working on providing stable, high performant data access to our storage system using standard protocols, while extending the storage management functionality and adapting both configuration and deployment procedures to reuse commonly used building blocks. In this contribution we cover in detail the extensive evaluation we have performed of our new HTTP/WebDAV and NFS 4.1 frontends, in terms of functionality and performance. We summarize the issues we faced and the solutions we developed to turn them into valid alternatives to the existing grid protocols - namely the additional work required to prov...

  15. Leachate flow around a well in MSW landfill: Analysis of field tests using Richards model.

    Science.gov (United States)

    Slimani, R; Oxarango, L; Sbartai, B; Tinet, A-J; Olivier, F; Dias, D

    2017-05-01

    During the lifespan of a Municipal Solid Waste landfill, its leachate drainage system may get clogged. Then, as a consequence of rainfall, leachate generation and possibly leachate injection, the moisture content in the landfill increases to the point that a leachate mound could be created. Therefore, pumping the leachate becomes a necessary solution. This paper presents an original analysis of leachate pumping and injection in an instrumented well. The water table level around the well is monitored by nine piezometers which allow the leachate flow behaviour to be captured. A numerical model based on Richards equation and an exponential relationship between saturated hydraulic conductivity and depth is used to analyze the landfill response to pumping and injection. Decreasing permeability with depth appears to have a major influence on the behaviour of the leachate flow. It could have a drastic negative impact on the pumping efficiency with a maximum quasi-stationary pumping rate limited to approximately 1m 3 /h for the tested well and the radius of influence is less than 20m. The numerical model provides a reasonable description of both pumping and injection tests. However, an anomalous behaviour observed at the transition between pumping and recovery phases is observed. This could be due to a limitation of the Richards model in that it neglects the gas phase behaviour and other double porosity heterogeneous effects. Copyright © 2016 Elsevier Ltd. All rights reserved.

  16. An experimental ‘Life’ for an experimental life : Richard Waller's biography of Robert Hooke (1705)

    OpenAIRE

    Moxham, Noah

    2016-01-01

    Richard Waller's ‘Life of Dr Robert Hooke’, prefixed to his edition of Hooke's Posthumous Works (1705), is an important source for the life of one of the most eminent members of the early Royal Society. It also has the distinction of being one of the earliest biographies of a man of science to be published in English. I argue that it is in fact the first biography to embrace the subject's natural-philosophical work as the centre of his life, and I investigate Waller's reasons for adopting thi...

  17. Exact and grid-free solutions to the Lighthill-Whitham-Richards traffic flow model with bounded acceleration for a class of fundamental diagrams

    KAUST Repository

    Qiu, Shanwen; Abdelaziz, Mohamed Ewis; Abdel Latif, Fadl Hicham Fadl; Claudel, Christian G.

    2013-01-01

    In this article, we propose a new exact and grid-free numerical scheme for computing solutions associated with an hybrid traffic flow model based on the Lighthill-Whitham-Richards (LWR) partial differential equation, for a class of fundamental

  18. Harmonic analysis, partial differential equations and applications in honor of Richard L. Wheeden

    CERN Document Server

    Franchi, Bruno; Lu, Guozhen; Perez, Carlos; Sawyer, Eric

    2017-01-01

    This is a collection of contributed papers by many eminent Harmonic Analysts and specialists of Partial Differential equations. The papers focus on weighted norm equalities for singular integrals, focusing wave equations, degenerate elliptic equations, Navier-Stokes flow in two dimensions and Poincare-Sobolev inequalities in the setting of metric spaces equipped with measures among others. Many topics considered in this volume stem from the interests of Richard L. Wheeden whose contributions to Potential Theory, singular integral theory and degenerate elliptic PDE theory this volume honors. Luis Caffarelli, Sagun Chanillo, Bruno Franchi, Cristian Guttierez, Xiaojun Huang, Carlos Kenig, Ermanno Lanconelli, Eric Sawyer and Alexander Volberg, are some of the many contributors to this volume. .

  19. Book review: Unholy trinity: The IMF, World Bank and WTO Richard Peet

    Directory of Open Access Journals (Sweden)

    M Breitenbach

    2014-05-01

    Full Text Available In this timely book Richard Peet and his team lay the foundation with an excellent analysis of the process of globalisation and the resultant emergence of the global economy. The authors are especially critical of the increasing influence of institutions like the International Monetary Fund (IMF, World Bank and World Trade Organisation (WTO on the economy and the consequences experienced by peoples, cultures and the environment. The single ideology of neo-liberalism is blamed for the undesirable outcomes. This book considers concepts of power, political interest, hegemony, discourse, responsibility and the power of practicality, in critically examining the IMF, World Bank and WTO. The conclusion is reached that “all three institutions play roles greatly different from those originally agreed to under the charters that set them up”.

  20. Richard Wrangham. Catching fire. How cooking made us Human. Basic Books (Perseus Books Group

    Directory of Open Access Journals (Sweden)

    Claude-Marcel Hladik

    2009-11-01

    Full Text Available L’histoire de l’émergence de l’homme est remise en cause par cet ouvrage puisque jusqu’à présent la plupart des anthropologues et des paléontologues s’accordaient pour faire remonter à environ 500.000 ans les premières utilisations du feu pour la cuisson des aliments par le genre Homo. Les arguments présentés par Richard Wrangham dans son dernier ouvrage nous font remonter aux deux derniers millions d’années. Wrangham et ses collègues avaient publié, dès 1999, les résultats de fouilles au cou...

  1. Meeting to honor F. Richard Stephenson on his 70th birthday

    CERN Document Server

    Green, David; Strom, Richard

    2015-01-01

    This book contains papers from a conference held to celebrate the 70th birthday of one of the world’s foremost astronomical historians, Professor F. Richard Stephenson, the latest recipient of the American Astronomical Society’s highest award for research in astronomical history, the LeRoy Doggett Prize. Reflecting Professor Stephenson’s extensive research portfolio, this book brings together under one cover papers on four different areas of scholarship: applied historical astronomy (which Stephenson founded); Islamic astronomy; Oriental astronomy; and amateur astronomy.  These papers are penned by astronomers from Canada, China, England, France, Georgia, Iran, Japan, Lebanon, the Netherlands, Portugal, Thailand and the USA. Its diverse coverage represents a wide cross-section of the history of astronomy community.  Under discussion are ways in which recent research using historical data has provided new insights into auroral and solar activity, supernovae and changes in the rotation rate of the E...

  2. A performance study of WebDav access to storages within the Belle II collaboration

    Science.gov (United States)

    Pardi, S.; Russo, G.

    2017-10-01

    WebDav and HTTP are becoming popular protocols for data access in the High Energy Physics community. The most used Grid and Cloud storage solutions provide such kind of interfaces, in this scenario tuning and performance evaluation became crucial aspects to promote the adoption of these protocols within the Belle II community. In this work, we present the results of a large-scale test activity, made with the goal to evaluate performances and reliability of the WebDav protocol, and study a possible adoption for the user analysis. More specifically, we considered a pilot infrastructure composed by a set of storage elements configured with the WebDav interface, hosted at the Belle II sites. The performance tests include a comparison with xrootd and gridftp. As reference tests we used a set of analysis jobs running under the Belle II software framework, accessing the input data with the ROOT I/O library, in order to simulate as much as possible a realistic user activity. The final analysis shows the possibility to achieve promising performances with WebDav on different storage systems, and gives an interesting feedback, for Belle II community and for other high energy physics experiments.

  3. A critical review of Richard Lynn's reports on reaction time and race.

    Science.gov (United States)

    Thomas, Drew M

    2011-01-01

    In the early 1990s, psychologist Richard Lynn published papers documenting average reaction times and decision times in samples of nine-year-olds taken from across the world. After summarizing these data, Lynn interpreted his results as evidence of national and racial differences in decision time and general intelligence. Others have also interpreted Lynn's data as evidence of racial differences in decision time and intelligence. However, comparing Lynn's summaries with his original reports shows that Lynn misreported and omitted some of his own data. Once these errors are fixed the rankings of nations in Lynn's datasets are unstable across different decision time measures. This instability, as well as within-race heterogeneity and between-race overlap in decision times, implies that Lynn's reaction time data do not permit generalizations about the decision times and intelligence of people of different races.

  4. AD-1 with research pilot Richard E. Gray

    Science.gov (United States)

    1982-01-01

    Standing in front of the AD-1 Oblique Wing research aircraft is research pilot Richard E. Gray. Richard E. Gray joined National Aeronautics and Space Administration's Johnson Space Center, Houston, Texas, in November 1978, as an aerospace research pilot. In November 1981, Dick joined the NASA's Ames-Dryden Flight Research Facility, Edwards, California, as a research pilot. Dick was a former Co-op at the NASA Flight Research Center (a previous name of the Ames-Dryden Flight Research Facility), serving as an Operations Engineer. At Ames-Dryden, Dick was a pilot for the F-14 Aileron Rudder Interconnect Program, AD-1 Oblique Wing Research Aircraft, F-8 Digital Fly-By-Wire and Pilot Induced Oscillations investigations. He also flew the F-104, T-37, and the F-15. On November 8, 1982, Gray was fatally injured in a T-37 jet aircraft while making a pilot proficiency flight. Dick graduated with a Bachelors degree in Aeronautical Engineering from San Jose State University in 1969. He joined the U.S. Navy in July 1969, becoming a Naval Aviator in January 1971, when he was assigned to F-4 Phantoms at Naval Air Station (NAS) Miramar, California. In 1972, he flew 48 combat missions in Vietnam in F-4s with VF-111 aboard the USS Coral Sea. After making a second cruise in 1973, Dick was assigned to Air Test and Evaluation Squadron Four (VX-4) at NAS Point Mugu, California, as a project pilot on various operational test and evaluation programs. In November 1978, Dick retired from the Navy and joined NASA's Johnson Space Center. At JSC Gray served as chief project pilot on the WB-57F high-altitude research projects and as the prime television chase pilot in a T-38 for the landing portion of the Space Shuttle orbital flight tests. Dick had over 3,000 hours in more than 30 types of aircraft, an airline transport rating, and 252 carrier arrested landings. He was a member of the Society of Experimental Test Pilots serving on the Board of Directors as Southwest Section Technical Adviser in

  5. Forjando nuestras democracias: entre Richard Rorty y Vladimiro Montesinos

    Directory of Open Access Journals (Sweden)

    Miguel Giusti

    2001-07-01

    Full Text Available This article aims at explaining the recent history of Peru, in an exercise in which it is possible to extract lessons about the way Latin American democracies have been(or have not been forged. The text draws a parallel between the ideas developed by Richard Rorty in his recently published book, Forjar nuestro país. El pensamiento de izquierdas en los Estados Unidos del siglo XX, and the events in Fugimori's and Montesinos' Peru. If, according to what Rorty believes, "national pride is for the countries what self esteem is for individuals ... " how would it be possible to narrate a history in which there are few motives to be proud of? Trying to escape fatalism and sarcasm, the text tries to show that Montesino's political course is, symbolically, a summary of the decomposition process of Peruvian democracy. Secondly, the text analyses the movements of the political left wing and deals with the support the regimen received from inside and outside the country, a support that was largely based on the illusion of political stability. Finally, it states, as Rorty does, that in order to forge democracies it is necessary for us to be deeply committed to the defense of the State of Right.

  6. Richard Arwed Pfeifer - a pioneer of 'medical pedagogy' and an opponent of Paul Schroder.

    Science.gov (United States)

    Steinberg, Holger; Carius, Dirk; Himmerich, Hubertus

    2013-12-01

    Richard Arwed Pfeifer (1877-1957) was one of the initiators and foster fathers of the renowned child-psychiatric and special needs education workgroup at Leipzig University under Paul Schröder (1873-1941) in the 1920s and 1930s. This paper is an account of their dispute concerning the interrelations between child and adolescent psychiatry and special needs education, as well as their disagreement about whether adolescent psychopaths should be admitted to specialized child psychiatric wards or elsewhere. Moreover, Pfeifer questioned the practical relevance of the separation of constitutional and environmentally-based psychopathy and fought eugenic research, which he found incompatible with the ethics of his profession as a remedial teacher and child psychiatrist.

  7. PolyRES: A polygon-based Richards equation solver

    International Nuclear Information System (INIS)

    Hills, R.G.

    1995-12-01

    This document describes the theory, implementation, and use of a software package designed to solve the transient, two-dimensional, Richards equation for water flow in unsaturated-saturated soils. This package was specifically designed to model complex geometries with minimal input from the user and to simulate groundwater flow related to assessment of low-level radioactive waste disposal sites and engineered facilities. The spatial variation of the hydraulic properties can be defined across individual polygon-shaped subdomains, called objects. These objects combine to form a polygon-shaped model domain. Each object can have its own distribution of hydraulic parameters. The resulting model domain and polygon-shaped internal objects are mapped onto a rectangular, finite-volume, computational grid by a preprocessor. This allows the user to specify model geometry independently of the underlying grid and greatly simplifies user input for complex geometries. In addition, this approach significantly reduces the computational requirements since complex geometries are actually modeled on a rectangular grid. This results in well-structured, finite difference-like systems of equations that require minimal storage and are very efficient to solve. The documentation for this software package includes a user's manual, a detailed description of the underlying theory, and a detailed discussion of program flow. Several example problems are presented that show the use and features of the software package. The water flow predictions for several of these example problems are compared to those of another algorithm to test for prediction equivalency

  8. O ateísmo de Richard Dawkins nas fronteiras da ciência evolucionista e do senso comum

    OpenAIRE

    Franco, Clarissa de

    2014-01-01

    O objeto de estudo consiste nas principais ideias ateístas de Richard Dawkins e na recepção destas por parte dos ateus inseridos na cultura brasileira. Dawkins é um dos principais divulgadores e militantes do movimento ateísta da atualidade, e a despeito de sua faceta pública divulgada em sites mundiais e em livros de reconhecido sucesso existem debates do autor, concernentes aos espaços acadêmicos e restritos a cientistas, que nem sempre se apresentam congruentes às suas e...

  9. The Mysterious Fall of Soeharto: A Genre Analysis of Richard Mann’s Plots and Schemes that Brought Down Soeharto (PSBDS

    Directory of Open Access Journals (Sweden)

    Sugeng Purwanto

    2012-12-01

    Full Text Available The real cause of Soeharto’s fall from the Indonesian presidency remains a mystery. Richard Mann (1998 launched three significant rhetorical questions: (a Was President Soeharto toppled by student demonstrators and people’s power? (b Was he brought down by the withdrawal of support from the United States? (c Or, was his sudden fall brought about by all of the two plus large doses of Oriental plotting and scheming? This article attempts to analyze Richard Mann’s PSBDS in terms of its macrostructure in order to find out the real cause of Soeharto’s fall. The analysis is substantiated by different resources as linguistic evidences, to justify the validity of the findings. The study revealed a proposition that critical reading is the key to successful comprehension of a text which may include a crosschecking with other resources, a careful identification of the generic structure of a text, and paying attention to how an author positions his or her readers. The article concludes, that in fact, Soeharto resigned from presidency on his own wisdom in order to avoid more bloodshed in Indonesian dreamland.

  10. Femineidad y ficción en la obra operística de Richard Strauss

    Directory of Open Access Journals (Sweden)

    María José Sánchez Usón

    2014-01-01

    Full Text Available Tras la muerte de Wagner y Brahms, Richard Straussemergió como uno de los compositores más importantesy populares de la música del siglo XX. Su trayectoria vitaly profesional, azarosa y turbulenta, al igual que las décadasque vivió, estuvo marcada por la realidad femenina.Es innegable que las mujeres de la vida de Strauss, todasde fuerte y distintiva personalidad, dejaron en él huellastan hondas que fue necesario llevarlas a escena, no sólocomo una aportación valiosa a la tipología caracterológicafemenina, sino también como un ejercicio terapéuticopersonal. Así, mujeres reales y mujeres ficticias se confundenen sus obras en un proceso creativo único: el delhombre-artista.

  11. Arte y política: un estudio comparativo de Jacques Rancière y Nelly Richard para el arte latinoamericano

    Directory of Open Access Journals (Sweden)

    Verónica Capasso

    2016-01-01

    Full Text Available En este artículo se indagan y comparan las teorías de Jacques Rancière y Nelly Richard sobre la relación entre arte y política desde el pensamiento posfundacional, y se producen reflexiones y análisis de manifestaciones artísticas latinoamericanas vanguardistas o críticas en diálogo con ambas. Para ello, se parte de una presentación de las teorías de Rancière y Richard en términos generales, se focaliza en las ideas que dichos autores tienen de la política y, específicamente, en la conceptualización que hacen del arte y su relación con la política. Al mismo tiempo, se desarrolla una interpretación de producciones artísticas desde una mirada centrada en sus diversas conexiones con lo político, más allá del contenido temático de estas. Se utiliza la perspectiva metodológica cualitativa transdisciplinaria, que articula distintas áreas de conocimiento (filosofía política, sociología, historia del arte. En el caso de los desarrollos de Jacques Rancière, se recurre a herramientas teóricas metropolitanas para resituarlas y repensarlas en función del arte de Latinoamérica. En este sentido, se trata de potenciar sus ideas en el análisis de casos locales. En cuanto a la teoría de Nelly Richard, sus conceptos de arte crítico y vanguardista se ponen en relación con el arte latinoamericano. Finalmente, se propone una comparación en la cual se destacan similitudes y diferencias conceptuales entre ambos en combinación con análisis de casos para abrir el panorama analítico e interpretativo que vincule teorías actuales con estudios de manifestaciones artísticas locales.

  12. Perception of Leitmotives in Richard Wagner's Der Ring des Nibelungen

    Directory of Open Access Journals (Sweden)

    David J. Baker

    2017-05-01

    Full Text Available The music of Richard Wagner tends to generate very diverse judgments indicative of the complex relationship between listeners and the sophisticated musical structures in Wagner's music. This paper presents findings from two listening experiments using the music from Wagner's Der Ring des Nibelungen that explores musical as well as individual listener parameters to better understand how listeners are able to hear leitmotives, a compositional device closely associated with Wagner's music. Results confirm findings from a previous experiment showing that specific expertise with Wagner's music can account for a greater portion of the variance in an individual's ability to recognize and remember musical material compared to measures of generic musical training. Results also explore how acoustical distance of the leitmotives affects memory recognition using a chroma similarity measure. In addition, we show how characteristics of the compositional structure of the leitmotives contributes to their salience and memorability. A final model is then presented that accounts for the aforementioned individual differences factors, as well as parameters of musical surface and structure. Our results suggest that that future work in music perception may consider both individual differences variables beyond musical training, as well as symbolic features and audio commonly used in music information retrieval in order to build robust models of musical perception and cognition.

  13. The ISS flight of Richard Garriott: a template for medicine and science investigation on future spaceflight participant missions.

    Science.gov (United States)

    Jennings, Richard T; Garriott, Owen K; Bogomolov, Valery V; Pochuev, Vladimir I; Morgun, Valery V; Garriott, Richard A

    2010-02-01

    A total of eight commercial spaceflight participants have launched to the International Space Station (ISS) on Soyuz vehicles. Based on an older mean age compared to career astronauts and an increased prevalence of medical conditions, spaceflight participants have provided the opportunity to learn about the effect of space travel on crewmembers with medical problems. The 12-d Soyuz TMA-13/12 ISS flight of spaceflight participant Richard Garriott included medical factors that required preflight intervention, risk mitigation strategies, and provided the opportunity for medical study on-orbit. Equally important, Mr. Garriott conducted extensive medical, scientific, and educational payload operations during the flight. These included 7 medical experiments and a total of 15 scientific projects such as protein crystal growth, Earth observations/photography, educational projects with schools, and amateur radio. The medical studies included the effect of microgravity on immune function, sleep, bone loss, corneal refractive surgery, low back pain, motion perception, and intraocular pressure. The overall mission success resulted from non-bureaucratic agility in mission planning, cooperation with investigators from NASA, ISS, International Partners, and the Korean Aerospace Research Institute, in-flight support and leadership from a team with spaceflight and Capcom experience, and overall mission support from the ISS program. This article focuses on science opportunities that suborbital and orbital spaceflight participant flights offer and suggests that the science program on Richard Garriott's flight be considered a model for future orbital and suborbital missions. The medical challenges are presented in a companion article.

  14. Genetics and the origin of species: the continuing synthesis a symposium in honor of Richard G. Harrison

    Science.gov (United States)

    Grosberg, Richard K.; Rand, David M.; Normark, Benjamin B.

    2013-01-01

    This is a special issue of Genetica that has its origins in a symposium held in honor of Richard G. Harrison at Ithaca, New York on July 22–23. Former students of Rick Harrison organized the symposium and most of the speakers were former students, as well. The quality and breadth of the talks were a testament to Rick’s influence as a thinker, synthesizer, and mentor and it is only appropriate to reflect on Rick’s contributions to the fields of evolutionary ecology, systematics, and genetics in this preface to the symposium articles. PMID:21152955

  15. Hamilton on surnud, tema mõju mitte : in memoriam Richard Hamilton (24. II 1922 - 13. IX 2011) / Kadri Karro ; kommenteerinud Eha Komissarov, Sirje Helme, Jaak Kangilaski

    Index Scriptorium Estoniae

    Karro,Kadri

    2011-01-01

    Briti kunstniku Richard Hamiltoni (1922 - 2011) loomingust eesti kunstiteadlaste Eha Komissarovi, Sirje Helme ja Jaak Kangilaski pilgu läbi. Lähemalt 1956. aastal valminud kollaažist "Mis teeb tänapäeva kodud nii eriliseks, nii meeldivaks?"

  16. Destruction of the Phoenix/Hibiscus and Barringtonia racemosa Communities at Richards Bay, Natal, South Africa

    Directory of Open Access Journals (Sweden)

    P. J. Weisser

    1982-10-01

    Full Text Available The destruction of the Phoenix!Hibiscus and Barringtonia racemosa Communities described by Venter in 1972 on the southern shores of Richards Bay is reported. The cause was the artificial openingof a new mouth about 5,5 km south of the original mouth, which increased tidal range and salinity. These swamp communities occupied a narrow band about 6 ha in area behind the Bruguiera gymnorrhiza Community. An estimated 95 % of the communities was affected and only on the landward border were some isolated remnants of species such as Acrostichum aureum, Hibiscus tiliaceus and Phoenix reclinata detected .Young stands of  Phragmites australis, seedlings of  Bruguiera gymnorrhiza and Avicennia marina and epipelic algae are recoIonizing the affected area.

  17. BACK TO THE ORIGINS OF THE REPUDIATION OF WUNDT: OSWALD KÜLPE AND RICHARD AVENARIUS.

    Science.gov (United States)

    Russo Krauss, Chiara

    2017-01-01

    This essay provides a fresh account of the break between Oswald Külpe and his master Wilhelm Wundt. Kurt Danziger's reconstruction of the "repudiation" of Wundt, which has become the canon for this significant episode of history of psychology, focused on the supposed influence of Ernst Mach on this set of events, overshadowing the other exponent of Empiriocriticism: Richard Avenarius. Analyzing archival documents and examining anew the primary sources, the paper shows that Avenarius was himself a member of Wundt's circle, and that his "repudiation" of the master paved the way for Külpe. The essay points out the original anti-Wundtian aspects of Avenarius' notion of psychology, thus showing how they were then adopted by Külpe. © 2016 Wiley Periodicals, Inc.

  18. HealthSouth's most wanted. Founder and former chairman and CEO Richard Scrushy is indicted for 85 counts of conspiracy, fraud and money laundering.

    Science.gov (United States)

    Piotrowski, Julie

    2003-11-10

    Wake-up call for the industry or an isolated case of corporate chicanery? Healthcare experts are divided on the import of Richard Scrushy's indictment on 85 counts last week in connection with the financial scandal at HealthSouth Corp. The indictment alleges the company founder relied on electronic and telephone surveillance, threats and intimidation to control his accomplices.

  19. “This World Is Not My Home”: Richard Mouw and Christian Nationalism

    Directory of Open Access Journals (Sweden)

    Aaron Pattillo-Lunt

    2016-12-01

    Full Text Available American evangelicalism has often been punctuated by dual commitments to the United States and to God. Those commitments were strongest within politically conservative evangelicalism. Though representing a solid majority among professing evangelicals, conservatives could not speak for the movement as a whole. Politically progressive evangelicals, beginning in the 1960s, formed a dissenting opinion of the post-World War II revival of Christian nationalism. They dared to challenge American action abroad, noticeably during the Vietnam War. Their critique of Christian nationalism and conservative evangelicals’ close ties to the Republican Party led them to seek refuge in either progressive policies or the Democratic Party. A third, underexplored subgroup of evangelicalism rooted in reformed theology becomes important to consider in this regard. These reformed evangelicals sought to contextualize nationalism in biblical rather than partisan or political terms. This goal is championed well by Richard Mouw, resulting in a nuanced look at evangelical Christians’ difficult dual role as both citizens of the Kingdom of God and the United States.

  20. Analytical and grid-free solutions to the Lighthill-Whitham-Richards traffic flow model

    KAUST Repository

    Mazaré , Pierre Emmanuel; Dehwah, Ahmad H.; Claudel, Christian G.; Bayen, Alexandre M.

    2011-01-01

    In this article, we propose a computational method for solving the Lighthill-Whitham-Richards (LWR) partial differential equation (PDE) semi-analytically for arbitrary piecewise-constant initial and boundary conditions, and for arbitrary concave fundamental diagrams. With these assumptions, we show that the solution to the LWR PDE at any location and time can be computed exactly and semi-analytically for a very low computational cost using the cumulative number of vehicles formulation of the problem. We implement the proposed computational method on a representative traffic flow scenario to illustrate the exactness of the analytical solution. We also show that the proposed scheme can handle more complex scenarios including traffic lights or moving bottlenecks. The computational cost of the method is very favorable, and is compared with existing algorithms. A toolbox implementation available for public download is briefly described, and posted at http://traffic.berkeley.edu/project/downloads/lwrsolver. © 2011 Elsevier Ltd.

  1. Analytical and grid-free solutions to the Lighthill-Whitham-Richards traffic flow model

    KAUST Repository

    Mazaré, Pierre Emmanuel

    2011-12-01

    In this article, we propose a computational method for solving the Lighthill-Whitham-Richards (LWR) partial differential equation (PDE) semi-analytically for arbitrary piecewise-constant initial and boundary conditions, and for arbitrary concave fundamental diagrams. With these assumptions, we show that the solution to the LWR PDE at any location and time can be computed exactly and semi-analytically for a very low computational cost using the cumulative number of vehicles formulation of the problem. We implement the proposed computational method on a representative traffic flow scenario to illustrate the exactness of the analytical solution. We also show that the proposed scheme can handle more complex scenarios including traffic lights or moving bottlenecks. The computational cost of the method is very favorable, and is compared with existing algorithms. A toolbox implementation available for public download is briefly described, and posted at http://traffic.berkeley.edu/project/downloads/lwrsolver. © 2011 Elsevier Ltd.

  2. Je suis un zombie : Études récentes sur Richard Matheson et le mort-vivant

    OpenAIRE

    Ransom, Amy J.; Trudel, Jean-Louis

    2013-01-01

    Dans ce texte nous résumons quatre essais récents sur le phénomène actuel du zombie ainsi qu’un collectif sur l’œuvre de Richard Matheson dont la première version filmique du roman Je suis une légende a servi d’inspiration à l’ur-film de zombies, La nuit des morts vivants de George A. Romero. Tandis que Pierre Cassou-Noguès et Maxime Coulombe signent des traitements plus philosophiques du zombie, leurs ouvrages diffèrent beaucoup dans leur forme et leur fonction. Pour leur part, Amélie Pépin ...

  3. [Richard Koch's life in national socialism and in Soviet emigration].

    Science.gov (United States)

    Boltres, Daniela; Töpfer, Frank; Wiesing, Urban

    2006-01-01

    The Jewish historian and theorist of medicine, Richard Koch, teaching in Frankfurt/Main, fled in 1936 from National Socialist Germany to the USSR where he lived in the Caucasian spa Essentuki until his death in 1949. Here he worked as a doctor and continued his scientific work, especially on the foundations of medicine in natural philosophy. None of his works of this time were published. Koch was a scientific outsider in the USSR, and he was aware of this. However, he tried to make his views compatible with official doctrines. In 1947 he lost his employment at the medical clinic of Essentuki, and his material situation grew worse. It is still an open question whether this development was related to an increasingly anti-Jewish atmosphere in the USSR that was linked with the Stalinist "purges", as Koch himself appeared to believe. Before his flight from Germany Koch did not show any tendency towards communism or the political left at all. His attitude towards Soviet society and Stalin was mixed: cautious criticism was accompanied by strong expressions of commitment to Stalin and Koch's new Socialist home. The question to what extent Koch's comments showed his true convictions must remain without a definite answer. At least in part they can be understood as precautions in threatening circumstances. The opportunity of a remigration to Germany after 1945, however, was turned down by Koch.

  4. Espíritos cheios de bichos: A fauna nas viagens de Louis Agassiz e Richard Francis Burton pelo Brasil oitocentista

    Directory of Open Access Journals (Sweden)

    Janaina Zito Losada

    2015-04-01

    Full Text Available O Brasil do século XIX foi alvo de inúmeras viagens realizadas por cientistas estrangeiros. O objetivo deste artigo é analisar as impressões sobre a fauna brasileira presentes nos relatos das viagens realizadas pelo naturalista suíço Louis Agassiz, em 1865, e pelo explorador inglês Richard Francis Burton, em 1868. Destes relatos privilegiam-se as descrições do meio natural de diferentes regiões brasileiras e das particularidades da fauna silvestre por eles encontrada.

  5. Protocol Implementation Generator

    DEFF Research Database (Denmark)

    Carvalho Quaresma, Jose Nuno; Probst, Christian W.

    2010-01-01

    Users expect communication systems to guarantee, amongst others, privacy and integrity of their data. These can be ensured by using well-established protocols; the best protocol, however, is useless if not all parties involved in a communication have a correct implementation of the protocol and a...... Generator framework based on the LySatool and a translator from the LySa language into C or Java....... necessary tools. In this paper, we present the Protocol Implementation Generator (PiG), a framework that can be used to add protocol generation to protocol negotiation, or to easily share and implement new protocols throughout a network. PiG enables the sharing, verification, and translation...

  6. La chiesa di Richard Meier a Tor Tre Teste e il suo contributo al consolidamento identitario dei nuovi quartieri romani oltre il GRA / The church designed by Richard Meier in Tor Tre Teste and the identity consolidation in the new roman neighbourhoods beyond the Great Circular Road

    Directory of Open Access Journals (Sweden)

    Giuseppe Bonaccorso

    2014-06-01

    Full Text Available Il contributo proposto ha l’obiettivo di analizzare alcuni significativi brani del tessuto urbano della periferia est di Roma, adottando metodi interpretativi legati alla storia, alla società, alla programmazione urbanistica e alla costruzione. Gli aspetti salienti del quadrante orientale della periferia romana verranno così delineati partendo “dal di dentro”, sottolineandone i percorsi, gli spazi e i nuclei compositivi che sono all’origine della struttura e della forma stessa dei quartieri disposti a cavallo del Grande Raccordo Anulare. In questo ambito, si pone l’attenzione su alcuni episodi chiave che vedono protagoniste le nuove chiese che riescono a creare una centralità all’interno dei quartieri periferici sostituendo le biblioteche, le piazze e i centri commerciali.  Analizzando da vicino questi esempi, si scopre come di recente sono state realizzate chiese firmate da architetti di fama internazionale proprio allo scopo di rafforzare, o meglio di costruire, un fattore identitario per ciascun quartiere ubicato nel settore orientale della città. Partendo quindi dal generale si arriva a indagare una chiesa e un quartiere che possono essere considerati un modello da seguire per tutta la periferia a ridosso del GRA: la chiesa giubilare di Dio Padre Misericordioso progettata da Richard Meier nel quartiere di Tor Tre Teste. La sequenzialità degli eventi che hanno contraddistinto il concorso per la progettazione della chiesa, la scelta della proposta di Richard Meier, la complessità del cantiere, l’analisi tecnica, stilistica e simbolica della realizzazione finale sono quindi analizzate nell’ambito del rapporto con il quartiere e del tentativo di realizzare (attraverso di essa un centro di attrazione per tutta la periferia.   The article analyses some significant parts of the urban tissue at the eastern periphery of Rome, using the interpretative methods inherent to history, society, urban programming and construction

  7. Vertical Protocol Composition

    DEFF Research Database (Denmark)

    Groß, Thomas; Mödersheim, Sebastian Alexander

    2011-01-01

    The security of key exchange and secure channel protocols, such as TLS, has been studied intensively. However, only few works have considered what happens when the established keys are actually used—to run some protocol securely over the established “channel”. We call this a vertical protocol.......e., that the combination cannot introduce attacks that the individual protocols in isolation do not have. In this work, we prove a composability result in the symbolic model that allows for arbitrary vertical composition (including self-composition). It holds for protocols from any suite of channel and application...

  8. Poets/Trump/Philosophers: Reflections on Richard Rorty’s Liberalism, Ten Years after His Death

    Directory of Open Access Journals (Sweden)

    Giorgio Baruchello

    2017-08-01

    Full Text Available Starting with a prescient 1998 quote on the impending decline of US liberal democracy into right-wing, strong-man-based demagogy, this paper outlines Richard Rorty’s political philosophy, which I believe can help us understand perplexing political trends in today’s political reality well beyond the US alone. Specifically, I tackle three key-terms encapsulating the thrust of Rorty’s political philosophy, i.e. “liberalism of fear”, “bourgeois” and “postmodernism”. Also, I address a contraposition that explains how Rorty would approach and attempt to defend liberal democracy from contemporary right-wing, strong-man-based degenerations, namely the priority of “poetry” over “philosophy”. Essentially, if one wishes to win in the political arena, she must be armed with the most effective rhetorical weaponry, however good, solid and well-argued her political views may be. Finally, some remarks are offered on the role that “philosophy” can still play within the same arena.

  9. Três décadas de genes egoístas: Discutindo algumas premissas do best seller de Richard Dawkins

    OpenAIRE

    Vieira, Eduardo Paiva de Pontes; Chaves, Silvia Nogueira

    2011-01-01

    O presente trabalho resgata algumas idéias do biólogo evolucionista Richard Dawkins, apresentadas pela primeira vez em seu best-seller O Gene Egoísta (The Selfish Gene), de 1976. O caráter polêmico de algumas concepções ultradarwinistas e sociobiológicas da obra é campo fértil para o embate de idéias, revelando um universo rico para discussões em diversas frentes, especialmente aquelas que podem se desenvolver na formação crítica de alguns profissionais vinculados á ciências biológicas, socio...

  10. Richard Rorty:From Anti-metaphysical Neo-Pragmatism to Rejection of Philosophy

    Directory of Open Access Journals (Sweden)

    M. Akrami

    2010-01-01

    Full Text Available Richard Rorty is a neo-Pragmatist philosopher. For three decades, he has attacked the traditional philosophy (from Plato to Kant as well as any other epistemology searching for truth or claiming to mirror the nature in his philosophical works. Rorty holds that, according to the history of philosophy in his reading, there is no final answer to the traditional questions concerning knowledge, truth, and representation. These questions, therefore, should be dissolved and denied. He maintains that knowledge is justified belief, justification, however, being not the consequence of some correspondence between the theory or the statement, but the consequence of conversation, social practice, group consensus, and social solidarity. Rorty also thinks that democracy has priority on philosophy, disagreeing with the thesis that philosophy is the foundation of the rest of culture.Despite of usefulness of some elements and implications of Rorty’s metaphilosophy (such as his emphasis on freedom, democracy, and pluralism as well as his insisting on philosophical humility and avoiding scientific pride, it is faced with several problems, including 1 ignoring the referential and realist features of language, 2 confusing interpretation and reality, 3 eliminating the border between objectivity and subjectivity, 4 interfering of public and private life, and 5 ignoring the need of science, culture, technology and, in particular, politics, in philosophy. The authors try to show and analyze some elements of these problems.

  11. Quantum mechanics in the cold war; Quantenmechanik im Kalten Krieg. David Bohm und Richard Feynman

    Energy Technology Data Exchange (ETDEWEB)

    Forstner, C.

    2007-07-01

    In the middle of the 20th century David Bohm and Richard Feynman developed two fundamentally different approaches of modern quantum mechanics: Bohm a realistic interpretation by means of hidden parameters and Feynman the path-integral formalism. This is by this more remarakable, because both physicists started from similar conditions and originated from similar connections. By its comparing approach this study presents more than a contribution to the history of the quantum theory. By the question for the social and cultural conditions of the formation of theories it is furthermore of science-sociological and science-theoretical interest. The in the beginning similar and later different binding of both scientists into the scientific community allows furthermore to study, which adapting pressure each group puts on the individual scientist and the fundamental parts of his research, and which new degrees of freedom in the formation of theories arise, when this constraint is cancelled.

  12. Field Triage Decision Scheme: The National Trauma Triage Protocol

    Centers for Disease Control (CDC) Podcasts

    In this podcast, Dr. Richard C. Hunt, Director of CDC's Division of Injury Response, provides an overview on the development process and scientific basis for the revised field triage guidelines published in the MMWR Recommendations and Report: Guidelines for Field Triage of Injured Patients, Recommendations of the National Expert Panel on Field Triage.

  13. Memoria y Estudios Culturales : un acercamiento al relato sobre la propia historia de vida en Raymond Williams y Richard Hoggart

    Directory of Open Access Journals (Sweden)

    Sebastián Matías Stra

    2018-01-01

    Full Text Available [es] Este trabajo intentará recuperar, de forma parcial y fragmentaria, las maneras en que el testimonio en primera persona articulado en el formato de memorias de la propia historia de vida tiene un posible valor metodológico en algunos textos seminales de la conformación de los estudios culturales ingleses. Hablamos particularmente del libro de 1957, The Uses of Literacy: Aspects of Working-class Life, with Special Reference to Publications and Entertainments, de Richard Hoggart y del tradicional artículo Culture is Ordinary de Raymond Williams, publicado en 1958 y que incluye de forma más rudimentaria algunas definiciones que conformaron la primera parte de la obra del autor galés, constituida por los libros Culture and Society y The Long Revolution. [en] This work will attempt to partially and fragmentarily recover the ways in which the testimony in first person articulated in the format of memories of the own history of life has a possible methodological value in some seminal texts of the conformation of the english cultural studies. We refer in special to the 1957 book, The Uses of Literacy: Aspects of Working-class Life, with Special Reference to Publications and Entertainments, by Richard Hoggart and the Raymond Williams' article Culture is Ordinary, published in 1958, which includes, in an incipient way, some of the definitions that formed the first part of the work of the Welsh author, made up of the books Culture and Society and The Long Revolution.

  14. Entre el Dios de Paley y el Dios de Bonnet: El Parco Evolucionismo Teísta de Richard Owen

    OpenAIRE

    Gustavo Caponi

    2013-01-01

    http://dx.doi.org/10.5007/1808-1711.2013v17n1p71En primer lugar, en este artículo se examina el carácter de las putativas referencias a la evolución de las especies que encontramos en las obras que Richard Owen publicó antes de 1858; y luego se analizan las escazas y vagas conjeturas evolucionistas que Owen sin duda formuló con posterioridad a la presentación pública de la Teoría de la Selección Natural.  En lo que respecta a lo primero, el objetivo es subrayar la ambigüedad de esas referenci...

  15. Exact solutions to traffic density estimation problems involving the Lighthill-Whitham-Richards traffic flow model using mixed integer programming

    KAUST Repository

    Canepa, Edward S.; Claudel, Christian G.

    2012-01-01

    This article presents a new mixed integer programming formulation of the traffic density estimation problem in highways modeled by the Lighthill Whitham Richards equation. We first present an equivalent formulation of the problem using an Hamilton-Jacobi equation. Then, using a semi-analytic formula, we show that the model constraints resulting from the Hamilton-Jacobi equation result in linear constraints, albeit with unknown integers. We then pose the problem of estimating the density at the initial time given incomplete and inaccurate traffic data as a Mixed Integer Program. We then present a numerical implementation of the method using experimental flow and probe data obtained during Mobile Century experiment. © 2012 IEEE.

  16. Exact solutions to traffic density estimation problems involving the Lighthill-Whitham-Richards traffic flow model using mixed integer programming

    KAUST Repository

    Canepa, Edward S.

    2012-09-01

    This article presents a new mixed integer programming formulation of the traffic density estimation problem in highways modeled by the Lighthill Whitham Richards equation. We first present an equivalent formulation of the problem using an Hamilton-Jacobi equation. Then, using a semi-analytic formula, we show that the model constraints resulting from the Hamilton-Jacobi equation result in linear constraints, albeit with unknown integers. We then pose the problem of estimating the density at the initial time given incomplete and inaccurate traffic data as a Mixed Integer Program. We then present a numerical implementation of the method using experimental flow and probe data obtained during Mobile Century experiment. © 2012 IEEE.

  17. Shakespeare for all Seasons ? Richard II en Avignon : de Jean Vilar (1957 à Ariane Mnouchkine (1982 Shakespeare for All Seasons? Richard II at the Avignon Festival: from Jean Vilar (1957 to Ariane Mnouchkine (1982

    Directory of Open Access Journals (Sweden)

    Isabelle Schwartz-Gastine

    2009-06-01

    Full Text Available Richard II has not often been performed on the French stage; however, in the 20th century, within a period of 35 years, two productions premiered at the same venue (the Cour d’Honneur at the open-air Avignon Festival, were so successful that they became emblematic of their times. In 1947 Jean Vilar opened the first Avignon Festival with an ascetic, charismatic eponymous hero who came to an inner knowledge of himself in his bare prison cell; in 1982 Ariane Mnouchkine offered a splendid visual display by transposing the play into the kabuki tradition; this offered the audience breath-taking and dynamic tableaux of elaborate court ceremonies and rebellious lords.At such a distance in time, the English medieval code of honour was dealt with according to completely different theatrical principles of ethics and aesthetics, mirroring the changes in perspective within French society.

  18. Has David Howden Vindicated Richard von Mises’s Definition of Probability?

    Directory of Open Access Journals (Sweden)

    Mark R. Crovelli

    2009-11-01

    Full Text Available In my recent article on these pages (Crovelli 2009 I argued that members of the Austrian School of economics have adopted and defended a faulty definition of probability. I argued that the definition of probability necessarily depends upon the nature of the world in which we live. I claimed that if the nature of the world is such that every event and phenomenon which occurs has a cause of some sort, then probability must be defined subjectively; that is, “as a measure of our uncertainty about the likelihood of occurrence of some event or phenomenon, based upon evidence that need not derive solely from past frequencies of ‘collectives’ or ‘classes.’” I further claimed that the nature of the world is indeed such that all events and phenomena have prior causes, and that this fact compels us to adopt a subjective definition of probability.David Howden has recently published what he claims is a refutation of my argument in his article “Single Trial Probability Applications: Can Subjectivity Evade Frequency Limitations” (Howden 2009. Unfortunately, Mr. Howden appears to not have understood my argument, and his purported refutation of my subjective definition consequently amounts to nothing more than a concatenation of confused and fallacious ideas that are completely irrelevant to my argument. David Howden has thus failed in his attempt to vindicate Richard von Mises’s definition of probability.

  19. Analyzing the effect of routing protocols on media access control protocols in radio networks

    Energy Technology Data Exchange (ETDEWEB)

    Barrett, C. L. (Christopher L.); Drozda, M. (Martin); Marathe, A. (Achla); Marathe, M. V. (Madhav V.)

    2002-01-01

    We study the effect of routing protocols on the performance of media access control (MAC) protocols in wireless radio networks. Three well known MAC protocols: 802.11, CSMA, and MACA are considered. Similarly three recently proposed routing protocols: AODV, DSR and LAR scheme 1 are considered. The experimental analysis was carried out using GloMoSim: a tool for simulating wireless networks. The main focus of our experiments was to study how the routing protocols affect the performance of the MAC protocols when the underlying network and traffic parameters are varied. The performance of the protocols was measured w.r.t. five important parameters: (i) number of received packets, (ii) average latency of each packet, (iii) throughput (iv) long term fairness and (v) number of control packets at the MAC layer level. Our results show that combinations of routing and MAC protocols yield varying performance under varying network topology and traffic situations. The result has an important implication; no combination of routing protocol and MAC protocol is the best over all situations. Also, the performance analysis of protocols at a given level in the protocol stack needs to be studied not locally in isolation but as a part of the complete protocol stack. A novel aspect of our work is the use of statistical technique, ANOVA (Analysis of Variance) to characterize the effect of routing protocols on MAC protocols. This technique is of independent interest and can be utilized in several other simulation and empirical studies.

  20. Stand diameter distribution modelling and prediction based on Richards function.

    Directory of Open Access Journals (Sweden)

    Ai-guo Duan

    Full Text Available The objective of this study was to introduce application of the Richards equation on modelling and prediction of stand diameter distribution. The long-term repeated measurement data sets, consisted of 309 diameter frequency distributions from Chinese fir (Cunninghamia lanceolata plantations in the southern China, were used. Also, 150 stands were used as fitting data, the other 159 stands were used for testing. Nonlinear regression method (NRM or maximum likelihood estimates method (MLEM were applied to estimate the parameters of models, and the parameter prediction method (PPM and parameter recovery method (PRM were used to predict the diameter distributions of unknown stands. Four main conclusions were obtained: (1 R distribution presented a more accurate simulation than three-parametric Weibull function; (2 the parameters p, q and r of R distribution proved to be its scale, location and shape parameters, and have a deep relationship with stand characteristics, which means the parameters of R distribution have good theoretical interpretation; (3 the ordinate of inflection point of R distribution has significant relativity with its skewness and kurtosis, and the fitted main distribution range for the cumulative diameter distribution of Chinese fir plantations was 0.4∼0.6; (4 the goodness-of-fit test showed diameter distributions of unknown stands can be well estimated by applying R distribution based on PRM or the combination of PPM and PRM under the condition that only quadratic mean DBH or plus stand age are known, and the non-rejection rates were near 80%, which are higher than the 72.33% non-rejection rate of three-parametric Weibull function based on the combination of PPM and PRM.

  1. Kalman filters for assimilating near-surface observations into the Richards equation - Part 2: A dual filter approach for simultaneous retrieval of states and parameters

    Science.gov (United States)

    Medina, H.; Romano, N.; Chirico, G. B.

    2014-07-01

    This study presents a dual Kalman filter (DSUKF - dual standard-unscented Kalman filter) for retrieving states and parameters controlling the soil water dynamics in a homogeneous soil column, by assimilating near-surface state observations. The DSUKF couples a standard Kalman filter for retrieving the states of a linear solver of the Richards equation, and an unscented Kalman filter for retrieving the parameters of the soil hydraulic functions, which are defined according to the van Genuchten-Mualem closed-form model. The accuracy and the computational expense of the DSUKF are compared with those of the dual ensemble Kalman filter (DEnKF) implemented with a nonlinear solver of the Richards equation. Both the DSUKF and the DEnKF are applied with two alternative state-space formulations of the Richards equation, respectively differentiated by the type of variable employed for representing the states: either the soil water content (θ) or the soil water matric pressure head (h). The comparison analyses are conducted with reference to synthetic time series of the true states, noise corrupted observations, and synthetic time series of the meteorological forcing. The performance of the retrieval algorithms are examined accounting for the effects exerted on the output by the input parameters, the observation depth and assimilation frequency, as well as by the relationship between retrieved states and assimilated variables. The uncertainty of the states retrieved with DSUKF is considerably reduced, for any initial wrong parameterization, with similar accuracy but less computational effort than the DEnKF, when this is implemented with ensembles of 25 members. For ensemble sizes of the same order of those involved in the DSUKF, the DEnKF fails to provide reliable posterior estimates of states and parameters. The retrieval performance of the soil hydraulic parameters is strongly affected by several factors, such as the initial guess of the unknown parameters, the wet or dry

  2. [Richard C. M. Mole: The Baltic states from the Soviet Union to the European Union. Identity, discourse and power in the post-communist transition of Estonia, Latvia and Lithuania] / Karsten Brüggemann

    Index Scriptorium Estoniae

    Brüggemann, Karsten, 1965-

    2014-01-01

    Arvustus: Mole, Richard C. M. The Baltic States from the Soviet Union to the European Union : identity, discourse and power in the post-communist transition of Estonia, Latvia and Lithuania. London ; New York : Routledge, 2012, 2013

  3. Unreliability and the Animal Narrator in Richard Adams’s The Plague Dogs

    Directory of Open Access Journals (Sweden)

    Anja Höing

    2017-03-01

    Full Text Available Richard Adams’s talking animal story The Plague Dogs (1978, with its deeply genre-atypical mode of narration, offers a multiplicity of avenues to explore the literary animal as animal. The story draws much of its power from the psychological complexity and related unreliability of both canine narrators, two research lab escapees gone feral. Both the terrier Snitter and the black mongrel Rowf are mentally ill and experience a highly subjective, part-fantastic world. In episodes of zero focalization, a sarcastic voice comments on the plot from the off, aggressively attacking a thoroughly anthropocentric superstructure the protagonists themselves are oblivious of, and presenting all that is normally constructed as “rational” in the implied reader’s world as a carnivalesque farce. Combining these equally unreliable narratives, The Plague Dogs creates a unique mixture of what Phelan (2007 calls “estranging” and “bonding” unreliability and brings to light the devastating consequences of anthropocentrism. The Plague Dogs not only defamiliarizes a genre usually committed to conventional means of storytelling, but the dominant Western conception of the status of animals in the world, showing that once we start to read the animal as animal, this sets into motion an avalanche of other concepts in need of re-reading, among them the very ones making up the fundamental pillars of Western societies’ anthropocentric self-conception.

  4. La France au Tsar : chanson patriotique créée par Marius Richard à la Scala, Henri Helme à Ba-ta-clan [illustration couleurs Donjean

    OpenAIRE

    François Bigot Éditeur , .; Daphy , Éliane

    2010-01-01

    La France au Tsar : chanson patriotique créée par Marius Richard à la Scala, Henri Helme à Ba-ta-clan ; paroles de Lucien Colonge, Musique de J. Claudel. [Illustration couleurs signée] Donjean. A la chanson populaire, Maison Bigot éditeur (sans cotage, sans ©, datation recherche en cours). Titre inconnu du catalogue BNF. Datation provisoire par année de dépôt médihal (2010)

  5. Optimization of Large Scale HEP Data Analysis in LHCb

    International Nuclear Information System (INIS)

    Remenska, Daniela; Aaij, Roel; Raven, Gerhard; Merk, Marcel; Templon, Jeff; Bril, Reinder J

    2011-01-01

    Observation has lead to a conclusion that the physics analysis jobs run by LHCb physicists on a local computing farm (i.e. non-grid) require more efficient access to the data which resides on the Grid. Our experiments have shown that the I/O bound nature of the analysis jobs in combination with the latency due to the remote access protocols (e.g. rfio, dcap) cause a low CPU efficiency of these jobs. In addition to causing a low CPU efficiency, the remote access protocols give rise to high overhead (in terms of amount of data transferred). This paper gives an overview of the concept of pre-fetching and caching of input files in the proximity of the processing resources, which is exploited to cope with the I/O bound analysis jobs. The files are copied from Grid storage elements (using GridFTP), while concurrently performing computations, inspired from a similar idea used in the ATLAS experiment. The results illustrate that this file staging approach is relatively insensitive to the original location of the data, and a significant improvement can be achieved in terms of the CPU efficiency of an analysis job. Dealing with scalability of such a solution on the Grid environment is discussed briefly.

  6. A Comparison Between Inter-Asterisk eXchange Protocol and Jingle Protocol: Session Time

    Directory of Open Access Journals (Sweden)

    H. S. Haj Aliwi

    2016-08-01

    Full Text Available Over the last few years, many multimedia conferencing and Voice over Internet Protocol (VoIP applications have been developed due to the use of signaling protocols in providing video, audio and text chatting services between at least two participants. This paper compares between two widely common signaling protocols: InterAsterisk eXchange Protocol (IAX and the extension of the eXtensible Messaging and Presence Protocol (Jingle in terms of delay time during call setup, call teardown, and media sessions.

  7. The Effect of Richard Wagner's Music and Beliefs on Hitler's Ideology

    Directory of Open Access Journals (Sweden)

    Carolyn S. Ticker

    2016-09-01

    Full Text Available The Holocaust will always be remembered as one of the most horrific and evil events in all of history. One question that has been so pervasive in regards to this historical event is the question of why. Why exactly did Hitler massacre the Jewish people? Why did he come to the conclusion that the Jews were somehow lesser than him, and that it was okay to kill them? What and who were his influences and how did they help form Hitler’s opinions leading up to the Holocaust? Although more than one situation or person influenced Hitler, I believe that one man in particular really helped contribute to Hitler’s ideas, especially about the Jewish people. This man is the famous musician Richard Wagner. While musicologists admit that Wagner was a musical genius, one aspect of his career that is hard to ignore is his strong antisemitism. In addition to speaking about his hatred for the Jews, he also wrote about it in his music, making it hard to glance over. Hitler had been close to the Wagner family, and had an obsessive, cult-like infatuation with Wagner’s music beginning in his childhood. This infatuation with Wagner’s music and his closeness to his later family helped facilitate and solidify his negative views about the Jewish people. In this paper I will explore the antisemitism that is within Wagner’s music and writing, and then I will discuss how Wagner’s antisemitism helped inform, influence, and shape Hitler’s ideas, indirectly assisting in the propagation of the Holocaust.

  8. Obituary: Richard B. Dunn, 1927-2005

    Science.gov (United States)

    Keil, Stephen L.; Dooling, David

    2007-12-01

    Dr. Richard B. Dunn, astronomer emeritus at the National Solar Observatory, died of a heart attack on September 29, 2005. He was recognized as one of the foremost experimental solar physicists. His innovative designs for telescopes and instruments led to many important discoveries in solar physics. Born in Baltimore, Maryland, in 1927 and raised in Minneapolis, Minnesota, Dick's parents were Dr. Halbert L. Dunn and Katherine Brandner. Halbert (MD, Ph.D., F.A.P.H.A.) was an physician who became Chief of the National Office of Vital Statistics, Public Health Service. He published a paper "High Level Wellness for Man and Society" that became the founding paper of the field of wellness health care. After their divorce in 1942, Katherine moved to New York and became a social worker. Dick had two older brothers who died before him, Halbert (born in 1921, who became a civil engineer) and Robert (born in 1924, who became an architect). Dick earned a BS in mechanical engineering and an MS in astronomy at the University of Minnesota. At the end of World War II he served in the United States Army in Japan. For his master's degree, Dick undertook the design and construction of a Lyot-type birefringent filter for observations of solar prominences. This early work led to his acceptance at Harvard, where Professor Donald Menzel encouraged him to continue his work with the 15-inch Cambridge telescope. In 1951 he conducted part of his doctoral thesis work at the fledgling Sacramento Peak Observatory in southern New Mexico. The observatory director, Dr. John Evans, was impressed with Dick's outstanding instrumental talents and invited him to join as one of the first scientific staff members. During his first few years at Sac Peak, Dick developed two more birefringent filter systems including one with an integrated coronagraph. With this system, he produced the best prominence and spicule observations ever obtained. Dick's career was dedicated to obtaining solar observations of the

  9. Entre el Dios de Paley y el Dios de Bonnet: El Parco Evolucionismo Teísta de Richard Owen

    Directory of Open Access Journals (Sweden)

    Gustavo Caponi

    2013-04-01

    Full Text Available Firstly, in this article it is examined the nature of the putative remarks concerning evolution of species that are found in the works that Richard Owen published before 1858; and then it is made the same thing with the few and vague evolutionist conjectures that Owen certainly made after the public presentation of Natural Selection Theory. Regarding the former topic, the goal will be to highlight the ambiguity of those Owen’s remarks, and concerning the latter topic what is looked for is to show that, when he explained his transmutationist thesis, Owen didn’t go beyond a pious theistic evolutionism, without postulating any mechanism of evolutionary change and remaining faithful to Design Theology praised by Paley.

  10. HOW CAN LOVE BE VIOLENT? REFLECTIONS ON RICHARD OF ST.VICTOR’S ON THE FOUR DEGREES OF VIOLENT LOVE

    Directory of Open Access Journals (Sweden)

    MARIUS TALOŞ

    2012-05-01

    Full Text Available The following article focuses on Richard of St. Victor´s most original treatise: On the Four Degrees of Violent Love. Although the topic of violence within the Christian view on ethics, politics and theology was not at all new by 1173, the major contribution of this short but dense mystical writing consists in developing systematically the violence as an inherent consequence of the infinite charity. The love is so powerful that it “wounds, binds, languishes and brings on a faint”, but the same force may have different effects: if these four steps appear to be destructive when oriented to satisfy the “profane” desires, their infinite strength show providential effects when turned to the divine source of the charity.

  11. The French dosimetry protocol

    International Nuclear Information System (INIS)

    Dutreix, A.

    1985-01-01

    After a general introduction the protocol is divided in five sections dealing with: determination of the quality of X-ray, γ-ray and electron beams; the measuring instrument; calibration of the reference instrument; determination of the reference absorbed dose in the user's beams; determination of the absorbed dose in water at other points, in other conditions. The French protocol is not essentially different from the Nordic protocol and it is based on the experience gained in using both the American and the Nordic protocols. Therefore, only the main difference with the published protocols are discussed. (Auth.)

  12. Richard Francis Burton e a inserÃÃo do kama-sutras como um manual sexual entre os vitorianos (Inglaterra, 1883)

    OpenAIRE

    Felipe Salvador Weissheimer

    2014-01-01

    Dentre os vÃrios âKama-sutrasâ difundidos no mercado, a versÃo clÃssica foi escrita por Vatsyayana (sÃculo I-IV, aproximadamente) e publicada na Inglaterra em 1883 pela Sociedade Hindu Kama-Shastra. Richard Francis Burton foi o membro de maior importÃncia na Sociedade Hindu Kama-Shastra, pois, alÃm de fomentar a publicaÃÃo, auxiliou na traduÃÃo, editou e enunciou vÃrios comentÃrios ao longo da obra. Em seus comentÃrios, percebemos que o projeto da traduÃÃo e publicaÃÃo do Kama-sutras visava e...

  13. The HPA photon protocol and proposed electron protocol

    International Nuclear Information System (INIS)

    Pitchford, W.G.

    1985-01-01

    The Hospital Physicists Association (HPA) photon dosimetry protocol has been produced and was published in 1983. Revised values of some components of Csub(lambda) and refinements introduced into the theory in the last few years have enabled new Csub(lambda) values to be produced. The proposed HPA electron protocol is at present in draft form and will be published shortly. Both protocels are discussed. (Auth.)

  14. Modelos de crescimento resultantes da combinação e variações dos modelos de Chapman-Richards e Silva-Bailey aplicados em Leucaena leucocephala (Lam. de Wit.

    Directory of Open Access Journals (Sweden)

    Cícero Carlos Ramos de Brito

    2010-08-01

    Full Text Available O objetivo deste trabalho foi desenvolver novos modelos de crescimento para recursos florestais aplicados à leucena [Leucaena leucocephala (Lam. de Wit], tendo como base as hipóteses biológicas propostas por Chapman-Richards e Silva-Bailey. O experimento de leucena foi conduzido na Estação Experimental da Empresa Pernambucana de Pesquisa Agropecuária - IPA, Caruaru, PE. Foram utilizadas 544 árvores de leucena de um experimento com vinte remedições realizadas ao longo de 12 anos. Compararam-se novos modelos de crescimento resultantes da combinação e variações dos modelos de Chapman-Richards e Silva-Bailey, bem como outros comumente usados em recursos florestais. Para a seleção das equações, utilizaram-se o Índice de Ajuste (IA, o erro-padrão da estimativa e a distribuição gráfica dos resíduos. Os resultados indicaram que todos os modelos testados se ajustaram de maneira satisfatória aos dados, podendo ser utilizados para se estimar o crescimento em altura da leucena.

  15. Staging Unincorporated Power: Richard Harding Davis and the Critique of Imperial News

    Directory of Open Access Journals (Sweden)

    Nirmal Trivedi

    2011-12-01

    Full Text Available This essay contextualizes the work of war correspondent Richard Harding Davis within an evolving “imperial news apparatus” that would culminate in his reporting of the Spanish-American War. Critics have conventionally framed Davis squarely within the imperial cause, associating him with his admirer Roosevelt and naval admiral Alfred T. Mahan. Contrary to readings of Davis as an apologist for US imperialism, Trivedi contends that Davis understood how US imperial power relied on an information apparatus to communicate to an increasingly media-conscious American public through culture, that is, via familiar narratives, symbols, and objects—what Trivedi calls “imperial news.” The essay follows Davis’s development from his fictional representation of the new war correspondent in “The Reporter Who Made Himself King” to his own war correspondence before and after the Spanish-American War as collected in the memoirs A Year from a Reporter’s Notebook (1897, Cuba in War Time (1897, and Notes of a War Correspondent (1912. Davis’s war correspondence and fictional work effectively stage US imperialism as “unincorporated power”: that is, as power reliant on a developing news-making apparatus that deploys particular discursive strategies to validate its political claims. This staging critiques strategies of US imperial sovereignty—specifically its “privatization of knowledge” and its promotion of the war correspondent as nothing more than a spectator and purveyor of massacres.

  16. Staging Unincorporated Power: Richard Harding Davis and the Critique of Imperial News

    Directory of Open Access Journals (Sweden)

    Nirmal Trivedi

    2011-12-01

    Full Text Available This essay contextualizes the work of war correspondent Richard Harding Davis within an evolving “imperial news apparatus” that would culminate in his reporting of the Spanish-American War. Critics have conventionally framed Davis squarely within the imperial cause, associating him with his admirer Roosevelt and naval admiral Alfred T. Mahan. Contrary to readings of Davis as an apologist for US imperialism, Trivedi contends that Davis understood how US imperial power relied on an information apparatus to communicate to an increasingly media-conscious American public through culture, that is, via familiar narratives, symbols, and objects—what Trivedi calls “imperial news.” The essay follows Davis’s development from his fictional representation of the new war correspondent in “The Reporter Who Made Himself King” to his own war correspondence before and after the Spanish-American War as collected in the memoirs A Year from a Reporter’s Notebook (1897, Cuba in War Time (1897, and Notes of a War Correspondent (1912. Davis’s war correspondence and fictional work effectively stage US imperialism as “unincorporated power”: that is, as power reliant on a developing news-making apparatus that deploys particular discursive strategies to validate its political claims. This staging critiques strategies of US imperial sovereignty—specifically its “privatization of knowledge” and its promotion of the war correspondent as nothing more than a spectator and purveyor of massacres.

  17. Satellite Communications Using Commercial Protocols

    Science.gov (United States)

    Ivancic, William D.; Griner, James H.; Dimond, Robert; Frantz, Brian D.; Kachmar, Brian; Shell, Dan

    2000-01-01

    NASA Glenn Research Center has been working with industry, academia, and other government agencies in assessing commercial communications protocols for satellite and space-based applications. In addition, NASA Glenn has been developing and advocating new satellite-friendly modifications to existing communications protocol standards. This paper summarizes recent research into the applicability of various commercial standard protocols for use over satellite and space- based communications networks as well as expectations for future protocol development. It serves as a reference point from which the detailed work can be readily accessed. Areas that will be addressed include asynchronous-transfer-mode quality of service; completed and ongoing work of the Internet Engineering Task Force; data-link-layer protocol development for unidirectional link routing; and protocols for aeronautical applications, including mobile Internet protocol routing for wireless/mobile hosts and the aeronautical telecommunications network protocol.

  18. Security Protocols in a Nutshell

    OpenAIRE

    Toorani, Mohsen

    2016-01-01

    Security protocols are building blocks in secure communications. They deploy some security mechanisms to provide certain security services. Security protocols are considered abstract when analyzed, but they can have extra vulnerabilities when implemented. This manuscript provides a holistic study on security protocols. It reviews foundations of security protocols, taxonomy of attacks on security protocols and their implementations, and different methods and models for security analysis of pro...

  19. Charles Darwin, Richard Owen, and Natural Selection: A Question of Priority.

    Science.gov (United States)

    Johnson, Curtis N

    2018-05-03

    No single author presented Darwin with a more difficult question about his priority in discovering natural selection than the British comparative anatomist and paleontologist Richard Owen. Owen was arguably the most influential biologist in Great Britain in Darwin's time. Darwin wanted his approbation for what he believed to be his own theory of natural selection. Unfortunately for Darwin, when Owen first commented in publication about Darwin's theory of descent he was openly hostile (Edinb. Rev. vol. 111, Article VIII, 1860, pp. 487-533, anonymous). Darwin was taken off-guard. In private meetings and correspondence prior to 1860 Owen had been nothing but polite and friendly, even helping Darwin in cataloguing and analyzing Darwin's zoological specimens from the Beagle voyage. Every early indication predicted a life-long friendship and collaboration. But that was not to be. Owen followed his slashing review with a mounting campaign in the 1860s to denounce and discredit both Darwin and his small but ascendant circle of friends and supporters. But that was not enough for Owen. Starting in 1866, perhaps by now realizing Darwin had landed the big fish, Owen launched a new campaign, to claim the discovery of "Darwin's theory" for himself. Darwin naturally fought back, mainly in the "Historical Sketch" that he prefaced to Origin starting in 1861. But when we peel back the layers of personal animus and escalating vituperation we discover in fact their quarrel was generated more by mutual misunderstanding than scientific disagreement. The battle ended only when Darwin finally penetrated to the crux of the matter and put an end to the rivalry in 1872, in the final version of the Sketch.

  20. Business protocol in integrated Europe

    OpenAIRE

    Pavelová, Nina

    2009-01-01

    The first chapter devotes to definitions of basic terms such as protocol or business protocol, to differences between protocol and etiquette, and between social etiquette and business etiquette. The second chapter focuses on the factors influencing the European business protocol. The third chapter is devoted to the etiquette of business protocol in the European countries. It touches the topics such as punctuality and planning of business appointment, greeting, business cards, dress and appear...

  1. Arctic observers: Richard King, monogenism and the historicisation of Inuit through travel narratives.

    Science.gov (United States)

    Sera-Shriar, Efram

    2015-06-01

    In 1848 the ethnologist, surgeon and Arctic explorer Richard King (1810-1876) published a three-part series on Inuit in the Journal of the Ethnological Society of London. This series provided a detailed history of Inuit from the eleventh century to the early nineteenth century. It incorporated a mixture of King's personal observations from his experience travelling to the Arctic as a member of George Back's expedition (1833-1835), and the testimonies of other contemporary and historical actors who had written on the subject. The aim was to historicise Inuit through the use of travel reports and show persistent features among the race. King was a monogenist and his sensitive recasting of Inuit was influenced by his participation in a research community actively engaged in humanitarian and abolitionist causes. The physician and ethnologist Thomas Hodgkin (1798-1866) argued that King's research on Inuit was one of the best ethnological approaches to emulate and that it set the standard for the nascent discipline. If we are to take seriously Hodgkin's claim, we should look at how King constructed his depiction of Inuit. There is much to be gained by investigating the practices of nineteenth-century ethnologists because it strengthens our knowledge of the discipline's past and shows how modern understandings of races were formed. Copyright © 2015 Elsevier Ltd. All rights reserved.

  2. A robust ECC based mutual authentication protocol with anonymity for session initiation protocol.

    Science.gov (United States)

    Mehmood, Zahid; Chen, Gongliang; Li, Jianhua; Li, Linsen; Alzahrani, Bander

    2017-01-01

    Over the past few years, Session Initiation Protocol (SIP) is found as a substantial application-layer protocol for the multimedia services. It is extensively used for managing, altering, terminating and distributing the multimedia sessions. Authentication plays a pivotal role in SIP environment. Currently, Lu et al. presented an authentication protocol for SIP and profess that newly proposed protocol is protected against all the familiar attacks. However, the detailed analysis describes that the Lu et al.'s protocol is exposed against server masquerading attack and user's masquerading attack. Moreover, it also fails to protect the user's identity as well as it possesses incorrect login and authentication phase. In order to establish a suitable and efficient protocol, having ability to overcome all these discrepancies, a robust ECC-based novel mutual authentication mechanism with anonymity for SIP is presented in this manuscript. The improved protocol contains an explicit parameter for user to cope the issues of security and correctness and is found to be more secure and relatively effective to protect the user's privacy, user's masquerading and server masquerading as it is verified through the comprehensive formal and informal security analysis.

  3. A robust ECC based mutual authentication protocol with anonymity for session initiation protocol.

    Directory of Open Access Journals (Sweden)

    Zahid Mehmood

    Full Text Available Over the past few years, Session Initiation Protocol (SIP is found as a substantial application-layer protocol for the multimedia services. It is extensively used for managing, altering, terminating and distributing the multimedia sessions. Authentication plays a pivotal role in SIP environment. Currently, Lu et al. presented an authentication protocol for SIP and profess that newly proposed protocol is protected against all the familiar attacks. However, the detailed analysis describes that the Lu et al.'s protocol is exposed against server masquerading attack and user's masquerading attack. Moreover, it also fails to protect the user's identity as well as it possesses incorrect login and authentication phase. In order to establish a suitable and efficient protocol, having ability to overcome all these discrepancies, a robust ECC-based novel mutual authentication mechanism with anonymity for SIP is presented in this manuscript. The improved protocol contains an explicit parameter for user to cope the issues of security and correctness and is found to be more secure and relatively effective to protect the user's privacy, user's masquerading and server masquerading as it is verified through the comprehensive formal and informal security analysis.

  4. J.M. Gratale on Tore T. Petersen’s Richard Nixon, Great Britain and the Anglo-American Alignment in the Persian Gulf and Arabian Peninsula

    Directory of Open Access Journals (Sweden)

    2009-09-01

    Full Text Available Tore T. Petersen. Richard Nixon, Great Britain and the Anglo-American Alignment in the Persian Gulf and Arabian Peninsula: Making Allies out of Clients. Sussex Academic Press, 2009.  172pp.  978-1-84519-277-8.Since the events of 9-11 there has been a sizeable quantity of books published on American foreign policy in broad terms, as well as more focused studies on contemporary developments in southwest Asia, more commonly referred to as the Middle East. Many of these volumes are highly politic...

  5. Power Saving MAC Protocols for WSNs and Optimization of S-MAC Protocol

    Directory of Open Access Journals (Sweden)

    Simarpreet Kaur

    2012-11-01

    Full Text Available Low power MAC protocols have received a lot of consideration in the last few years because of their influence on the lifetime of wireless sensor networks. Since, sensors typically operate on batteries, replacement of which is often difficult. A lot of work has been done to minimize the energy expenditure and prolong the sensor lifetime through energy efficient designs, across layers. Meanwhile, the sensor network should be able to maintain a certain throughput in order to fulfill the QoS requirements of the end user, and to ensure the constancy of the network. This paper introduces different types of MAC protocols used for WSNs and proposes S‐MAC, a Medium‐Access Control protocol designed for Wireless Sensor Networks. S‐MAC uses a few innovative techniques to reduce energy consumption and support selfconfiguration. A new protocol is suggested to improve the energy efficiency, latency and throughput of existing MAC protocol for WSNs. A modification of the protocol is then proposed to eliminate the need for some nodes to stay awake longer than the other nodes which improves the energy efficiency, latency and throughput and hence increases the life span of a wireless sensor network.

  6. Thinking through war: the social thought of Richard T. Ely, John R. Commons, and Edward A. Ross during the First World War.

    Science.gov (United States)

    Herzberg, D L

    2001-01-01

    This paper examines the social thought of University of Wisconsin professors Richard T. Ely, John R. Commons, and Edward A. Ross during World War I. Like many of their fellow scholars, these three were actively involved in the pro-war effort. Although their support for the war was strongly conditioned by personal and occupational considerations, the impact of their wartime service was not restricted to those realms. Their social thought, which they impressed into service explaining and justifying the war, was itself altered in subtle and sometimes surprising ways by the forceful positions they took on the political, economic, and racial significance of the conflict. Copyright 2001 John Wiley & Sons, Inc.

  7. Cross-Layer Protocol as a Better Option in Wireless Mesh Network with Respect to Layered-Protocol

    OpenAIRE

    Ahmed Abdulwahab Al-Ahdal; Dr. V. P. Pawar; G. N. Shinde

    2014-01-01

    The Optimal way to improve Wireless Mesh Networks (WMNs) performance is to use a better network protocol, but whether layered-protocol design or cross-layer design is a better option to optimize protocol performance in WMNs is still an on-going research topic. In this paper, we focus on cross-layer protocol as a better option with respect to layered-protocol. The layered protocol architecture (OSI) model divides networking tasks into layers and defines a pocket of services for each layer to b...

  8. Providing the physical basis of SCS curve number method and its proportionality relationship from Richards' equation

    Science.gov (United States)

    Hooshyar, M.; Wang, D.

    2016-12-01

    The empirical proportionality relationship, which indicates that the ratio of cumulative surface runoff and infiltration to their corresponding potentials are equal, is the basis of the extensively used Soil Conservation Service Curve Number (SCS-CN) method. The objective of this paper is to provide the physical basis of the SCS-CN method and its proportionality hypothesis from the infiltration excess runoff generation perspective. To achieve this purpose, an analytical solution of Richards' equation is derived for ponded infiltration in shallow water table environment under the following boundary conditions: 1) the soil is saturated at the land surface; and 2) there is a no-flux boundary which moves downward. The solution is established based on the assumptions of negligible gravitational effect, constant soil water diffusivity, and hydrostatic soil moisture profile between the no-flux boundary and water table. Based on the derived analytical solution, the proportionality hypothesis is a reasonable approximation for rainfall partitioning at the early stage of ponded infiltration in areas with a shallow water table for coarse textured soils.

  9. Obituary: Richard L. (Dick) Walker, Jr., 1938-2005

    Science.gov (United States)

    Pier, Jeffrey R.; Mason, Brian

    2005-12-01

    Koch Center for Science, Math, and Technology at Deerfield Academy in Massachusetts. He also consulted with James Turrell, providing astronomical position information for the design of the Roden Crater Project outside of Flagstaff. While he will be remembered for his significant scientific contributions to the field of astronomy, those who knew Dick, both scientists and non-scientists alike, will probably remember him best for his humility, his humanity, and his loyal and abiding friendship. He was a man with a terrific sense of humor and an infectious laugh. It was always an honor and pleasure to be in his company. Richard L. Walker, Jr. is survived by his wife, Patricia, two daughters from his first marriage: Brenda Walker of Las Vegas, NV, and Pamela Hepburn of Holland, OH, as well as four children from Patricia's first marriage: Doug Browning of Lake Havasu City, AZ, Michael Browning of Kingman, AZ, Kim Bructo of Orient, OH, and Jennifer Brown of Lake Havasu City, AZ. He is also survived by ten grandchildren and three great-grandchildren. He was preceded in death by his father Richard, mother Mary, and daughter, Paula Jean Elizabeth Stone.

  10. Sufi, Christian or Buddhist? Richard Francis Burton’s “Parameters of Belief”

    Directory of Open Access Journals (Sweden)

    John Wallen

    2013-09-01

    Full Text Available Richard Burton has been interpreted and misinterpreted by literary critics as eminent as Edward Said and Louisa Pratt as well as by others such as Rana Kabbani and Reina Lewis. Biographers like Fawn Brody, Edward Rice, Mary Lovell and Jon Godsall have also had their say. Burton has been variously described as imperialist, sexist, gay, obssessed with pornography, racist, plagiarist, sexual libertine, scatologist, expert sociologist, profoundly deceitful and impotent. In spite of this negative press, interest in Burton is always high as his life and times are relevant to many scholars interested in the 19th century origins of modern thought and postcolonial ideas. In this paper presentation I will attempt to get beyond the confused and contradictory portrayals of Burton over the last 50 or so years by looking in some detail at Burton’s two long poems: Stone Talk and The Kasidah. In these works, published 15 years apart, Burton writes under pseudonyms and, as I will argue, is able to express many of his deepest beliefs, especially in The Kasidah where he is playing the part of Hadji Abu Al Yezid, a Sufi like-wise man who possesses some startling similarities to Burton himself. What emerges from this close examination of the texts is a sensitive relativist who, while adhering to the scientific method in all his practical dealings, is yet able to consider the possibility that everything we see around us and all our experience of the world might be, finally, nothing more than Maya and illusion.

  11. [Multidisciplinary protocol for computed tomography imaging and angiographic embolization of splenic injury due to trauma: assessment of pre-protocol and post-protocol outcomes].

    Science.gov (United States)

    Koo, M; Sabaté, A; Magalló, P; García, M A; Domínguez, J; de Lama, M E; López, S

    2011-11-01

    To assess conservative treatment of splenic injury due to trauma, following a protocol for computed tomography (CT) and angiographic embolization. To quantify the predictive value of CT for detecting bleeding and need for embolization. The care protocol developed by the multidisciplinary team consisted of angiography with embolization of lesions revealed by contrast extravasation under CT as well as embolization of grade III-V injuries observed, or grade I-II injuries causing hemodynamic instability and/or need for blood transfusion. We collected data on demographic variables, injury severity score (ISS), angiographic findings, and injuries revealed by CT. Pre-protocol and post-protocol outcomes were compared. The sensitivity and specificity of CT findings were calculated for all patients who required angiographic embolization. Forty-four and 30 angiographies were performed in the pre- and post-protocol periods, respectively. The mean (SD) ISSs in the two periods were 25 (11) and 26 (12), respectively. A total of 24 (54%) embolizations were performed in the pre-protocol period and 28 (98%) after implementation of the protocol. Two and 7 embolizations involved the spleen in the 2 periods, respectively; abdominal laparotomies numbered 32 and 25, respectively, and 10 (31%) vs 4 (16%) splenectomies were performed. The specificity and sensitivity values for contrast extravasation found on CT and followed by embolization were 77.7% and 79.5%. The implementation of this multidisciplinary protocol using CT imaging and angiographic embolization led to a decrease in the number of splenectomies. The protocol allows us to take a more conservative treatment approach.

  12. Cryptographic Protocols:

    DEFF Research Database (Denmark)

    Geisler, Martin Joakim Bittel

    cryptography was thus concerned with message confidentiality and integrity. Modern cryptography cover a much wider range of subjects including the area of secure multiparty computation, which will be the main topic of this dissertation. Our first contribution is a new protocol for secure comparison, presented...... implemented the comparison protocol in Java and benchmarks show that is it highly competitive and practical. The biggest contribution of this dissertation is a general framework for secure multiparty computation. Instead of making new ad hoc implementations for each protocol, we want a single and extensible...... in Chapter 2. Comparisons play a key role in many systems such as online auctions and benchmarks — it is not unreasonable to say that when parties come together for a multiparty computation, it is because they want to make decisions that depend on private information. Decisions depend on comparisons. We have...

  13. You Don't Need Richards'... A New General 1-D Vadose Zone Solution Method that is Reliable

    Science.gov (United States)

    Ogden, F. L.; Lai, W.; Zhu, J.; Steinke, R. C.; Talbot, C. A.

    2015-12-01

    Hydrologic modelers and mathematicians have strived to improve 1-D Richards' equation (RE) solution reliability for predicting vadose zone fluxes. Despite advances in computing power and the numerical solution of partial differential equations since Richards first published the RE in 1931, the solution remains unreliable. That is to say that there is no guarantee that for a particular set of soil constitutive relations, moisture profile conditions, or forcing input that a numerical RE solver will converge to an answer. This risk of non-convergence renders prohibitive the use of RE solvers in hydrological models that need perhaps millions of infiltration solutions. In lieu of using unreliable numerical RE solutions, researchers have developed a wide array of approximate solutions that more-or-less mimic the behavior of the RE, with some notable deficiencies such as parameter insensitivity or divergence over time. The improved Talbot-Ogden (T-O) finite water-content scheme was shown by Ogden et al. (2015) to be an extremely good approximation of the 1-D RE solution, with a difference in cumulative infiltration of only 0.2 percent over an 8 month simulation comparing the improved T-O scheme with a RE numerical solver. The reason is that the newly-derived fundamental flow equation that underpins the improved T-O method is equivalent to the RE minus a term that is equal to the diffusive flux divided by the slope of the wetting front. Because the diffusive flux has zero mean, this term is not important in calculating the mean flux. The wetting front slope is near infinite (sharp) in coarser soils that produce more significant hydrological interactions between surface and ground waters, which also makes this missing term 1) disappear in the limit, and, 2) create stability challenges for the numerical solution of RE. The improved T-O method is a replacement for the 1-D RE in soils that can be simulated as homogeneous layers, where the user is willing to neglect the effects

  14. Multimode Communication Protocols Enabling Reconfigurable Radios

    Directory of Open Access Journals (Sweden)

    Berlemann Lars

    2005-01-01

    Full Text Available This paper focuses on the realization and application of a generic protocol stack for reconfigurable wireless communication systems. This focus extends the field of software-defined radios which usually concentrates on the physical layer. The generic protocol stack comprises common protocol functionality and behavior which are extended through specific parts of the targeted radio access technology. This paper considers parameterizable modules of basic protocol functions residing in the data link layer of the ISO/OSI model. System-specific functionality of the protocol software is realized through adequate parameterization and composition of the generic modules. The generic protocol stack allows an efficient realization of reconfigurable protocol software and enables a completely reconfigurable wireless communication system. It is a first step from side-by-side realized, preinstalled modes in a terminal towards a dynamic reconfigurable anymode terminal. The presented modules of the generic protocol stack can also be regarded as a toolbox for the accelerated and cost-efficient development of future communication protocols.

  15. Ancestors protocol for scalable key management

    Directory of Open Access Journals (Sweden)

    Dieter Gollmann

    2010-06-01

    Full Text Available Group key management is an important functional building block for secure multicast architecture. Thereby, it has been extensively studied in the literature. The main proposed protocol is Adaptive Clustering for Scalable Group Key Management (ASGK. According to ASGK protocol, the multicast group is divided into clusters, where each cluster consists of areas of members. Each cluster uses its own Traffic Encryption Key (TEK. These clusters are updated periodically depending on the dynamism of the members during the secure session. The modified protocol has been proposed based on ASGK with some modifications to balance the number of affected members and the encryption/decryption overhead with any number of the areas when a member joins or leaves the group. This modified protocol is called Ancestors protocol. According to Ancestors protocol, every area receives the dynamism of the members from its parents. The main objective of the modified protocol is to reduce the number of affected members during the leaving and joining members, then 1 affects n overhead would be reduced. A comparative study has been done between ASGK protocol and the modified protocol. According to the comparative results, it found that the modified protocol is always outperforming the ASGK protocol.

  16. Escatologia e história em Richard Shaull: a narrativa mítico-teológica entre a memória e o futuro

    Directory of Open Access Journals (Sweden)

    Arnaldo Érico Huff Júnior

    2013-01-01

    Full Text Available Resumo. O texto pretende pensar a produção da teologia da revolução de Richard Shaull no encontro entre escatologia e história. A partir de um breve relato dos anos de Shaull no Brasil, passa-se à análise das principais ideias teológicas que conduziram Shaull à formulação de uma assim chamada teologia da revolução. Finalmente, propõe-se uma chave interpretativa para a história da teologia, a partir de um diálogo com Reinhart Koselleck e Mircea Eliade.

  17. Epistemic Protocols for Distributed Gossiping

    Directory of Open Access Journals (Sweden)

    Krzysztof R. Apt

    2016-06-01

    Full Text Available Gossip protocols aim at arriving, by means of point-to-point or group communications, at a situation in which all the agents know each other's secrets. We consider distributed gossip protocols which are expressed by means of epistemic logic. We provide an operational semantics of such protocols and set up an appropriate framework to argue about their correctness. Then we analyze specific protocols for complete graphs and for directed rings.

  18. Optimising LAN access to grid enabled storage elements

    International Nuclear Information System (INIS)

    Stewart, G A; Dunne, B; Elwell, A; Millar, A P; Cowan, G A

    2008-01-01

    When operational, the Large Hadron Collider experiments at CERN will collect tens of petabytes of physics data per year. The worldwide LHC computing grid (WLCG) will distribute this data to over two hundred Tier-1 and Tier-2 computing centres, enabling particle physicists around the globe to access the data for analysis. Although different middleware solutions exist for effective management of storage systems at collaborating institutes, the patterns of access envisaged for Tier-2s fall into two distinct categories. The first involves bulk transfer of data between different Grid storage elements using protocols such as GridFTP. This data movement will principally involve writing ESD and AOD files into Tier-2 storage. Secondly, once datasets are stored at a Tier-2, physics analysis jobs will read the data from the local SE. Such jobs require a POSIX-like interface to the storage so that individual physics events can be extracted. In this paper we consider the performance of POSIX-like access to files held in Disk Pool Manager (DPM) storage elements, a popular lightweight SRM storage manager from EGEE

  19. Field Triage Decision Scheme: The National Trauma Triage Protocol

    Centers for Disease Control (CDC) Podcasts

    2009-01-22

    In this podcast, Dr. Richard C. Hunt, Director of CDC's Division of Injury Response, provides an overview on the development process and scientific basis for the revised field triage guidelines published in the MMWR Recommendations and Report: Guidelines for Field Triage of Injured Patients, Recommendations of the National Expert Panel on Field Triage.  Created: 1/22/2009 by National Center for Injury Prevention and Control (NCIPC), Division of Injury Response (DIR).   Date Released: 1/22/2009.

  20. Using semantics for representing experimental protocols.

    Science.gov (United States)

    Giraldo, Olga; García, Alexander; López, Federico; Corcho, Oscar

    2017-11-13

    An experimental protocol is a sequence of tasks and operations executed to perform experimental research in biological and biomedical areas, e.g. biology, genetics, immunology, neurosciences, virology. Protocols often include references to equipment, reagents, descriptions of critical steps, troubleshooting and tips, as well as any other information that researchers deem important for facilitating the reusability of the protocol. Although experimental protocols are central to reproducibility, the descriptions are often cursory. There is the need for a unified framework with respect to the syntactic structure and the semantics for representing experimental protocols. In this paper we present "SMART Protocols ontology", an ontology for representing experimental protocols. Our ontology represents the protocol as a workflow with domain specific knowledge embedded within a document. We also present the S ample I nstrument R eagent O bjective (SIRO) model, which represents the minimal common information shared across experimental protocols. SIRO was conceived in the same realm as the Patient Intervention Comparison Outcome (PICO) model that supports search, retrieval and classification purposes in evidence based medicine. We evaluate our approach against a set of competency questions modeled as SPARQL queries and processed against a set of published and unpublished protocols modeled with the SP Ontology and the SIRO model. Our approach makes it possible to answer queries such as Which protocols use tumor tissue as a sample. Improving reporting structures for experimental protocols requires collective efforts from authors, peer reviewers, editors and funding bodies. The SP Ontology is a contribution towards this goal. We build upon previous experiences and bringing together the view of researchers managing protocols in their laboratory work. Website: https://smartprotocols.github.io/ .

  1. Understanding protocol performance: impact of test performance.

    Science.gov (United States)

    Turner, Robert G

    2013-01-01

    This is the second of two articles that examine the factors that determine protocol performance. The objective of these articles is to provide a general understanding of protocol performance that can be used to estimate performance, establish limits on performance, decide if a protocol is justified, and ultimately select a protocol. The first article was concerned with protocol criterion and test correlation. It demonstrated the advantages and disadvantages of different criterion when all tests had the same performance. It also examined the impact of increasing test correlation on protocol performance and the characteristics of the different criteria. To examine the impact on protocol performance when individual tests in a protocol have different performance. This is evaluated for different criteria and test correlations. The results of the two articles are combined and summarized. A mathematical model is used to calculate protocol performance for different protocol criteria and test correlations when there are small to large variations in the performance of individual tests in the protocol. The performance of the individual tests that make up a protocol has a significant impact on the performance of the protocol. As expected, the better the performance of the individual tests, the better the performance of the protocol. Many of the characteristics of the different criteria are relatively independent of the variation in the performance of the individual tests. However, increasing test variation degrades some criteria advantages and causes a new disadvantage to appear. This negative impact increases as test variation increases and as more tests are added to the protocol. Best protocol performance is obtained when individual tests are uncorrelated and have the same performance. In general, the greater the variation in the performance of tests in the protocol, the more detrimental this variation is to protocol performance. Since this negative impact is increased as

  2. Against the Nihilism of Suffering and Death: Richard E. K. Kim and His Works

    Directory of Open Access Journals (Sweden)

    Jooyeon Rhee

    2016-03-01

    Full Text Available This article examines the life and works of Richard E. K. Kim (1932–2009, a first-generation Korean diasporic writer in the United States. It focuses on how Kim struggled to overcome the nihilism of suffering and death that derived from colonialism and the Korean War through his literary works. Kim witnessed firsthand these two major historical events, which caused irrevocable psychological and physical damage to many people of his generation. In his autobiographical fiction, he conveys painful memories of the events by reviving the voices of people in that era. What his works offer us goes beyond vivid memories of the past, however; they also present the power of forgiveness as a condition to overcome the nihilism of suffering and death. Remembrance and forgiveness are, therefore, two major thematic pillars of his works that enable us to connect to these difficult and traumatic times. These themes are portrayed in such a gripping way mainly because Kim tried to maintain a certain distance—an emotional and linguistic distance—from the familiar, in order to elucidate the reality of the human condition: an ontological position of the exile from which he produced his works. This article argues that Kim’s works provide us the possibility to transcend the nihilism of historical trauma through articulating the meaning of remembrance and forgiveness from his self-assumed position of exile.

  3. Static Validation of Security Protocols

    DEFF Research Database (Denmark)

    Bodei, Chiara; Buchholtz, Mikael; Degano, P.

    2005-01-01

    We methodically expand protocol narrations into terms of a process algebra in order to specify some of the checks that need to be made in a protocol. We then apply static analysis technology to develop an automatic validation procedure for protocols. Finally, we demonstrate that these techniques ...... suffice to identify several authentication flaws in symmetric and asymmetric key protocols such as Needham-Schroeder symmetric key, Otway-Rees, Yahalom, Andrew secure RPC, Needham-Schroeder asymmetric key, and Beller-Chang-Yacobi MSR...

  4. The reliability of the German version of the Richards Campbell Sleep Questionnaire.

    Science.gov (United States)

    Krotsetis, Susanne; Richards, Kathy C; Behncke, Anja; Köpke, Sascha

    2017-07-01

    The assessment of sleep quality in critically ill patients is a relevant factor of high-quality care. Despite the fact that sleep disturbances and insufficient sleep management contain an increased risk of severe morbidity for these patients, a translated and applicable instrument to evaluate sleep is not available for German-speaking intensive care settings. This study aimed to translate the Richards Campbell Sleep Questionnaire (RCSQ), a simple and validated instrument eligible for measuring sleep quality in critically ill patients, and subsequently to evaluate the internal consistency of the German version of the RCSQ. Furthermore, it also aimed to inquire into the perception of sleep in a sample of critically ill patients. The RCSQ was translated following established methodological standards. Data were collected cross-sectionally in a sample of 51 patients at 3 intensive care units at a university hospital in Germany. The German version of the RCSQ showed an overall internal consistency (Cronbach's alpha) of 0·88. The mean of the RSCQ in the sample was 47·00 (SD ± 27·57). Depth of sleep was rated the lowest and falling asleep again the highest of the RCSQ sleep items. The study demonstrated very good internal consistency of the German version of the RCSQ, allowing for its application in practice and research in German-speaking countries. Quality of sleep perception was generally low in this sample, emphasizing the need for enhanced care concepts regarding the sleep management of critically ill patients. Relevance to clinical practice Assessment of self-perception of sleep is crucial in order to plan an individually tailored care process. © 2017 British Association of Critical Care Nurses.

  5. Richard Doll and Alice Stewart: reputation and the shaping of scientific "truth".

    Science.gov (United States)

    Greene, Gayle

    2011-01-01

    As the world watched the Fukushima reactors release radionuclides into the ocean and atmosphere, the warnings of Dr. Alice Stewart about radiation risk and the reassurances of Sir Richard Doll assumed renewed relevance. Doll and Stewart, pioneer cancer epidemiologists who made major contributions in the 1950s-he by demonstrating the link between lung cancer and smoking, she by discovering that fetal X-rays double the chance of a childhood cancer-were locked into opposition about low-dose radiation risk. When she went public with the discovery that radiation at a fraction of the dose "known" to be dangerous could kill a child, her reputation plummeted, whereas Doll, foremost among her detractors, was knighted and lauded as "the world's most distinguished medical epidemiologist" for his work. Their lives and careers, so closely intertwined, took contrary courses, he becoming "more of the establishment" (as he said), while she became more oppositional. When it was discovered, after his death, that he'd been taking large sums of money from industries whose chemicals he was clearing of cancer risk, his reputation remained unscathed; it is now enshrined in the "Authorized Biography" (2009) commissioned by the Wellcome Institute, along with Doll's denigration of Stewart as an "embittered" woman and biased scientist. Stewart lived long enough to see radiation science move her way, to see international committees affirm, in the 1990s, that there is no threshold beneath which radiation ceases to be dangerous; recent evidence from Chernobyl is bearing out her warnings. But a look at the making and breaking of these reputations reveals the power of status, position, and image to shape scientific "knowledge" and social policy.

  6. The Road Movies' Space Dynamics in the 70s: Richard C. Sarafian, Monte Hellman and Terrence Malick

    Directory of Open Access Journals (Sweden)

    Filipa Rosário

    2014-07-01

    Full Text Available Vanishing Point (Richard C. Sarafian, 1971, Two-lane Blacktop (Monte Hellmann, 1971 and Badlands (Terrence Malick, 1973 are road movies that incorporate distinctive journeys, which, at a certain moment, become similar. Their heroes act as non-mystical pilgrims to whom the trip is a journey in itself, even if they come up as a chase, a car race or an escape from the police.In a filmic genre built from the spatial element, the road life structures each narrative in each film. In this way, the moment when the journey looses its teleological sense acquires even more relevance, allowing us to understand the genre’s space dynamics with a different depth.In this essay, I will analyse comparatively the ways through which characters and directors relate to the scenery/landscape, in order to identify ideological constraints related to space, i.e., those symbolic limitations the road movie seems to conceal. Easy Rider (Dennis Hopper, 1969 will be a constant presence since, as the inaugural road movie, it has determined the genre’s underlying forces.

  7. [Some remarks on the theory of sets by Richard Dedekind and Stanisław Leśniewski].

    Science.gov (United States)

    Obojska, Lidia

    2014-01-01

    Mereology, is a part-whole theory, also called the theory of collective sets. It was founded in 1916 by Stanisław Leśniewski and this is an alternative theory versus the classical set theory by Georg Cantor. These two theories are usually teamed up together as Leśniewski himself was referring to the concept of the set by Cantor and Cantor is considered the "main" ideologist of the set theory. However, when analyzing the original texts of various authors, it seems that the very concept of a collective set is closer to the idea of Richard Dedekind rather than that of Georg Cantor. It is known that Cantor borrowed some concepts on the notion of set from Dedekind, whose ideas were also known to Leśniewski, however, there is no study on this topic. This work is therefore an attempt to compare some set-theoretical concepts of both of these authors, i.e. S. Leśiewski and R. Dedekind and the presentation of their convergence.

  8. A class-chest for deriving transport protocols

    Energy Technology Data Exchange (ETDEWEB)

    Strayer, W.T.

    1996-10-01

    Development of new transport protocols or protocol algorithms suffers from the complexity of the environment in which they are intended to run. Modeling techniques attempt to avoid this by simulating the environment. Another approach to promoting rapid prototyping of protocols and protocol algorithms is to provide a pre-built infrastructure that is common to transport protocols, so that the focus is placed on the protocol-specific aspects. The Meta-Transport Library is a library of C++ base classes that implement or abstract out the mundane functions of a protocol, new protocol implementations are derived from base classes. The result is a fully viable user- level transport protocol implementation, with emphasis on modularity. The collection of base classes form a ``class-chest`` of tools .from which protocols can be developed and studied with as little change to a normal UNIX environment as possible.

  9. Effective dose comparison between protocols stitched and usual protocols in dental cone beam CT for complete arcade

    International Nuclear Information System (INIS)

    Soares, M. R.; Maia, A. F.; Batista, W. O. G.; Lara, P. A.

    2014-08-01

    To visualization a complete dental radiology dental lives together with two separate proposals: [1] protocols diameter encompassing the entire arch (single) or [2] protocol with multiple fields of view (Fov) which together encompass the entire arch (stitched Fov s). The objective of this study is to evaluate effective dose values in examination protocols for all dental arcade available in different outfits with these two options. For this, a female anthropomorphic phantom manufactured by Radiology Support Devices twenty six thermoluminescent dosimeters inserted in relevant bodies and positions was used. Irradiate the simulator in the clinical conditions. The protocols were averaged and compared: [a] 14.0 cm x 8.5 cm and [b] 8.5 cm x 8.5 cm (Gendex Tomography GXCB 500), [c] protocol stitched for jaw combination of three volumes of 5.0 cm x 3.7 cm (Kodak 9000 3D scanner) [d] protocol stitched Fov s 5.0 cm x 8.0 cm (Planmeca Pro Max 3D) and [e] single technical Fov 14 cm x 8 cm (i-CAT Classical). Our results for the effective dose were: a range between 43.1 and 111.1 micro Sv for technical single Fov and 44.5 and 236.2 for technical stitched Fov s. The protocol presented the highest estimated effective dose was [d] and showed that lowest index was registered [a]. These results demonstrate that the protocol stitched Fov generated in Kodak 9000 3D machine applied the upper dental arch has practically equal value effective dose obtained by protocol extended diameter of, [a], which evaluates in a single image upper and lower arcade. It also demonstrates that the protocol [d] gives an estimate of five times higher than the protocol [a]. Thus, we conclude that in practical terms the protocol [c] stitched Fov s, not presents dosimetric advantages over other protocols. (Author)

  10. Effective dose comparison between protocols stitched and usual protocols in dental cone beam CT for complete arcade

    Energy Technology Data Exchange (ETDEWEB)

    Soares, M. R.; Maia, A. F. [Universidade Federal de Sergipe, Departamento de Fisica, Cidade Universitaria Prof. Jose Aloisio de Campos, Marechal Rondon s/n, Jardim Rosa Elze, 49-100000 Sao Cristovao, Sergipe (Brazil); Batista, W. O. G. [Instituto Federal da Bahia, Rua Emidio dos Santos s/n, Barbalho, Salvador, 40301015 Bahia (Brazil); Lara, P. A., E-mail: wilsonottobatista@gmail.com [Instituto de Pesquisas Energeticas e Nucleares / CNEN, Av. Lineu Prestes 2242, Cidade Universitaria, 05508-000 Sao Paulo (Brazil)

    2014-08-15

    To visualization a complete dental radiology dental lives together with two separate proposals: [1] protocols diameter encompassing the entire arch (single) or [2] protocol with multiple fields of view (Fov) which together encompass the entire arch (stitched Fov s). The objective of this study is to evaluate effective dose values in examination protocols for all dental arcade available in different outfits with these two options. For this, a female anthropomorphic phantom manufactured by Radiology Support Devices twenty six thermoluminescent dosimeters inserted in relevant bodies and positions was used. Irradiate the simulator in the clinical conditions. The protocols were averaged and compared: [a] 14.0 cm x 8.5 cm and [b] 8.5 cm x 8.5 cm (Gendex Tomography GXCB 500), [c] protocol stitched for jaw combination of three volumes of 5.0 cm x 3.7 cm (Kodak 9000 3D scanner) [d] protocol stitched Fov s 5.0 cm x 8.0 cm (Planmeca Pro Max 3D) and [e] single technical Fov 14 cm x 8 cm (i-CAT Classical). Our results for the effective dose were: a range between 43.1 and 111.1 micro Sv for technical single Fov and 44.5 and 236.2 for technical stitched Fov s. The protocol presented the highest estimated effective dose was [d] and showed that lowest index was registered [a]. These results demonstrate that the protocol stitched Fov generated in Kodak 9000 3D machine applied the upper dental arch has practically equal value effective dose obtained by protocol extended diameter of, [a], which evaluates in a single image upper and lower arcade. It also demonstrates that the protocol [d] gives an estimate of five times higher than the protocol [a]. Thus, we conclude that in practical terms the protocol [c] stitched Fov s, not presents dosimetric advantages over other protocols. (Author)

  11. Automatic Validation of Protocol Narration

    DEFF Research Database (Denmark)

    Bodei, Chiara; Buchholtz, Mikael; Degano, Pierpablo

    2003-01-01

    We perform a systematic expansion of protocol narrations into terms of a process algebra in order to make precise some of the detailed checks that need to be made in a protocol. We then apply static analysis technology to develop an automatic validation procedure for protocols. Finally, we...

  12. Efficient secure two-party protocols

    CERN Document Server

    Hazay, Carmit

    2010-01-01

    The authors present a comprehensive study of efficient protocols and techniques for secure two-party computation -- both general constructions that can be used to securely compute any functionality, and protocols for specific problems of interest. The book focuses on techniques for constructing efficient protocols and proving them secure. In addition, the authors study different definitional paradigms and compare the efficiency of protocols achieved under these different definitions.The book opens with a general introduction to secure computation and then presents definitions of security for a

  13. Invertendo a “Passagem Atlântica”: O “regresso” de Richard Wright a África

    Directory of Open Access Journals (Sweden)

    Ana Luísa Saraiva

    2012-10-01

    Full Text Available O texto discute o sentido polémico do “regresso” a África que Richard Wright inscreve em Black Power e a forma como a narrativa da viagem subverte a “Middle Passage”. O sujeito narrativo orienta o leitor através de uma incursão pessoal nos muitos sentidos da modernidade e desdobra a noção de “destino comum”, já apontada em 12 Million Black Voices. Contudo, qualquer sentido de comunidade é aqui necessariamente ambíguo, por estar sempre relacionado com questões de raça e identidade. Black Power é uma narrativa importante para o conceito de modernidade e assinala uma mudança significativa na produção literária de Wright para uma vertente não-ficcional. Esta segunda fase da sua obra contém, no entanto, um paradoxo crucial: enquanto se volta para o exterior, para o mundo mais global, Wright tenta, simultaneamente, inscrever-se como referência sobre o locus do qual nunca poderia demarcar‑se: África. Em Black Power, a duboisiana “color line” desdobra‑se em múltiplas dimensões.

  14. Health Effects Due to Radionuclides Content of Solid Minerals within Port of Richards Bay, South Africa

    Directory of Open Access Journals (Sweden)

    Felix B. Masok

    2016-11-01

    Full Text Available This study assessed the radiological health hazards to various body organs of workers working within Transnet Precinct in Richards Bay in Kwazulu-Natal, South Africa due to radionuclide content of mineral ores often stored within the facility. Thirty samples were collected from five mineral ores (rock phosphate, rutile, zircon, coal and hematite and analyzed for 238U, 234U, 226Ra, 210Pb, 235U, 232Th, 228Ra, 228Th and 40K using delayed neutron activation analysis and low energy gamma spectroscopy. Rutile was found to be the most radioactive mineral ore within the facility with 210Pb concentration of 759.00 ± 106.00 Bq·kg−1. Effective annual dose rate in (mSv·y−1 delivered to different organs of the body: testes, bone marrow, whole body, lungs and ovaries from mineral ores were such that dose from mineral ores decreased in the order coal > rutile > rock phosphate > hematite > zircon. The organs with the highest received dose rate were the testes and this received dose was from coal. However, all of the calculated absorbed dose rates to organs of the body were below the maximum permissible safety limits.

  15. Using Ovsynch protocol versus Cosynch protocol in dairy cows

    Directory of Open Access Journals (Sweden)

    Ion Valeriu Caraba

    2013-10-01

    Full Text Available As a research on the reproductive physiology and endocrinology surrounding the estrous cycle in dairy cattle has been compiled, several estrous synchronization programs have been developed for use with dairy cows. These include several programs that facilitate the mass breeding of all animals at a predetermined time (timed-AI rather than the detection of estrus. We studied on 15 dary cows which were synchronized by Ovsynch and Cosynch programs. The estrus response for cows in Ovsynch protocol was of 63%. Pregnancy per insemination at 60 days was of 25%. Estrus response for cow in Cosynch protocol was of 57%. Pregnancy per insemination at 60 days was of 57%. Synchronization of ovulation using Ovsynch protocols can provide an effective way to manage reproduction in lactating dairy cows by eliminating the need for estrus detection. These are really efficient management programs for TAI of dairy cows that are able to reduce both the labour costs and the extra handling to daily estrus detection and AI.

  16. A family of multi-party authentication protocols

    NARCIS (Netherlands)

    Cremers, C.J.F.; Mauw, S.

    2006-01-01

    We introduce a family of multi-party authentication protocols and discuss six novel protocols, which are members of this family. The first three generalize the well-known Needham-Schroeder-Lowe public-key protocol, the Needham-Schroeder private-key protocol, and the Bilateral Key Exchange protocol.

  17. The IceProd Framework

    DEFF Research Database (Denmark)

    Aartsen, M.G.; Abbasi, R.; Ackermann, M.

    2015-01-01

    of computational resources. IceProd is a distributed management system based on Python, XML-RPC and GridFTP. It is driven by a central database in order to coordinate and admin- ister production of simulations and processing of data produced by the IceCube detector. IceProd runs as a separate layer on top of other...

  18. Who invented the dichotomous key? Richard Waller's watercolors of the herbs of Britain.

    Science.gov (United States)

    Griffing, Lawrence R

    2011-12-01

    On 27 March 1689, Richard Waller, Fellow and Secretary of the Royal Society presented his "Tables of the English Herbs reduced to such an order, as to find the name of them by their external figures and shapes" to his assembled colleagues at a meeting of the Royal Society. These tables were developed for the novice by being color images, composed in pencil and watercolor, of selected plants and their distinguishing characteristics. The botanical watercolors for the tables are now a Turning-the-Pages document online on the website of the Royal Society. However, for the past 320 years, the scientific context for the creation of these outstanding botanical watercolors has remained obscure. These tables were developed by Waller as an image-based dichotomous key, pre-dating by almost 100 years the text-based dichotomous keys in the first edition of Flora Française (1778) by Jean Baptiste Lamarck, who is generally given priority for the development of the dichotomous key. How these large folio images were arranged to illustrate a dichotomous key is unknown, but an arrangement based on Waller's description is illustrated here as leaf-ordering for the separate hierarchical clusters (tables). Although only 24 species of watercolored dicot herbs out of a total of 65 in the set of watercolors (the others being monocots) are used in these tables, they are a "proof of concept", serving as models upon which a method is based, that of using a key composed of dichotomous choices for aiding identification.

  19. A Cryptographic Moving-Knife Cake-Cutting Protocol

    Directory of Open Access Journals (Sweden)

    Yoshifumi Manabe

    2012-02-01

    Full Text Available This paper proposes a cake-cutting protocol using cryptography when the cake is a heterogeneous good that is represented by an interval on a real line. Although the Dubins-Spanier moving-knife protocol with one knife achieves simple fairness, all players must execute the protocol synchronously. Thus, the protocol cannot be executed on asynchronous networks such as the Internet. We show that the moving-knife protocol can be executed asynchronously by a discrete protocol using a secure auction protocol. The number of cuts is n-1 where n is the number of players, which is the minimum.

  20. The Simplest Protocol for Oblivious Transfer

    DEFF Research Database (Denmark)

    Chou, Tung; Orlandi, Claudio

    2015-01-01

    Oblivious Transfer (OT) is the fundamental building block of cryptographic protocols. In this paper we describe the simplest and most efficient protocol for 1-out-of-n OT to date, which is obtained by tweaking the Diffie-Hellman key-exchange protocol. The protocol achieves UC-security against...... active and adaptive corruptions in the random oracle model. Due to its simplicity, the protocol is extremely efficient and it allows to perform m 1-out-of-n OTs using only: - Computation: (n+1)m+2 exponentiations (mn for the receiver, mn+2 for the sender) and - Communication: 32(m+1) bytes (for the group...... optimizations) is at least one order of magnitude faster than previous work. Category / Keywords: cryptographic protocols / Oblivious Transfer, UC Security, Elliptic Curves, Efficient Implementation...

  1. Coded Splitting Tree Protocols

    DEFF Research Database (Denmark)

    Sørensen, Jesper Hemming; Stefanovic, Cedomir; Popovski, Petar

    2013-01-01

    This paper presents a novel approach to multiple access control called coded splitting tree protocol. The approach builds on the known tree splitting protocols, code structure and successive interference cancellation (SIC). Several instances of the tree splitting protocol are initiated, each...... instance is terminated prematurely and subsequently iterated. The combined set of leaves from all the tree instances can then be viewed as a graph code, which is decodable using belief propagation. The main design problem is determining the order of splitting, which enables successful decoding as early...

  2. Playing With Population Protocols

    Directory of Open Access Journals (Sweden)

    Xavier Koegler

    2009-06-01

    Full Text Available Population protocols have been introduced as a model of sensor networks consisting of very limited mobile agents with no control over their own movement: A collection of anonymous agents, modeled by finite automata, interact in pairs according to some rules. Predicates on the initial configurations that can be computed by such protocols have been characterized under several hypotheses. We discuss here whether and when the rules of interactions between agents can be seen as a game from game theory. We do so by discussing several basic protocols.

  3. Model Additional Protocol

    International Nuclear Information System (INIS)

    Rockwood, Laura

    2001-01-01

    Since the end of the cold war a series of events has changed the circumstances and requirements of the safeguards system. The discovery of a clandestine nuclear weapons program in Iraq, the continuing difficulty in verifying the initial report of Democratic People's Republic of Korea upon entry into force of their safeguards agreement, and the decision of the South African Government to give up its nuclear weapons program and join the Treaty on the Non-Proliferation of Nuclear Weapons have all played a role in an ambitious effort by IAEA Member States and the Secretariat to strengthen the safeguards system. A major milestone in this effort was reached in May 1997 when the IAEA Board of Governors approved a Model Protocol Additional to Safeguards Agreements. The Model Additional Protocol was negotiated over a period of less than a year by an open-ended committee of the Board involving some 70 Member States and two regional inspectorates. The IAEA is now in the process of negotiating additional protocols, State by State, and implementing them. These additional protocols will provide the IAEA with rights of access to information about all activities related to the use of nuclear material in States with comprehensive safeguards agreements and greatly expanded physical access for IAEA inspectors to confirm or verify this information. In conjunction with this, the IAEA is working on the integration of these measures with those provided for in comprehensive safeguards agreements, with a view to maximizing the effectiveness and efficiency, within available resources, the implementation of safeguards. Details concerning the Model Additional Protocol are given. (author)

  4. Asymptotic adaptive bipartite entanglement-distillation protocol

    International Nuclear Information System (INIS)

    Hostens, Erik; Dehaene, Jeroen; De Moor, Bart

    2006-01-01

    We present an asymptotic bipartite entanglement-distillation protocol that outperforms all existing asymptotic schemes. This protocol is based on the breeding protocol with the incorporation of two-way classical communication. Like breeding, the protocol starts with an infinite number of copies of a Bell-diagonal mixed state. Breeding can be carried out as successive stages of partial information extraction, yielding the same result: one bit of information is gained at the cost (measurement) of one pure Bell state pair (ebit). The basic principle of our protocol is at every stage to replace measurements on ebits by measurements on a finite number of copies, whenever there are two equiprobable outcomes. In that case, the entropy of the global state is reduced by more than one bit. Therefore, every such replacement results in an improvement of the protocol. We explain how our protocol is organized as to have as many replacements as possible. The yield is then calculated for Werner states

  5. ASSESSMENT OF RIP-V1 AND OSPF-V2 PROTOCOL WITH CONSIDERATION OF CONVERGENCE CRITERIA AND SENDING PROTOCOLS TRAFFIC

    Directory of Open Access Journals (Sweden)

    Hamed Jelodar

    2014-03-01

    Full Text Available Routing Protocols are underlying principles in networks like internet, transport and mobile. Routing Protocols include a series of rules and algorithms that consider routing metric and select the best way for sending healthy data packets from origin to destination. Dynamic routing protocol compatible to topology has a changeable state. RIP and OSPF are dynamic routing protocol that we consider criteria like convergence and sending protocols traffic assessment RIP first version and OSPF second version. By the test we have done on OPNET stimulation we understood that the OSPF protocol was more efficient than RIP protocol.

  6. Objective and automated protocols for the evaluation of biomedical search engines using No Title Evaluation protocols.

    Science.gov (United States)

    Campagne, Fabien

    2008-02-29

    The evaluation of information retrieval techniques has traditionally relied on human judges to determine which documents are relevant to a query and which are not. This protocol is used in the Text Retrieval Evaluation Conference (TREC), organized annually for the past 15 years, to support the unbiased evaluation of novel information retrieval approaches. The TREC Genomics Track has recently been introduced to measure the performance of information retrieval for biomedical applications. We describe two protocols for evaluating biomedical information retrieval techniques without human relevance judgments. We call these protocols No Title Evaluation (NT Evaluation). The first protocol measures performance for focused searches, where only one relevant document exists for each query. The second protocol measures performance for queries expected to have potentially many relevant documents per query (high-recall searches). Both protocols take advantage of the clear separation of titles and abstracts found in Medline. We compare the performance obtained with these evaluation protocols to results obtained by reusing the relevance judgments produced in the 2004 and 2005 TREC Genomics Track and observe significant correlations between performance rankings generated by our approach and TREC. Spearman's correlation coefficients in the range of 0.79-0.92 are observed comparing bpref measured with NT Evaluation or with TREC evaluations. For comparison, coefficients in the range 0.86-0.94 can be observed when evaluating the same set of methods with data from two independent TREC Genomics Track evaluations. We discuss the advantages of NT Evaluation over the TRels and the data fusion evaluation protocols introduced recently. Our results suggest that the NT Evaluation protocols described here could be used to optimize some search engine parameters before human evaluation. Further research is needed to determine if NT Evaluation or variants of these protocols can fully substitute

  7. Morrow, Reiff, Receive 2013 Space Physics and Aeronomy Richard Carrington Awards: Response

    Science.gov (United States)

    Reiff, Patricia H.

    2014-08-01

    It is a special privilege to receive this award honoring Richard Carrington's discovery of what we now call space weather. It is particularly appropriate that this award also recognizes Cherilynn Morrow, who 20 years ago made a presentation to the Space Science Advisory Committee on Jeff Rosendhal's idea of mission-based E/PO. We worked together, bringing that idea to the successful, but threatened, network it is today. For me, learning and teaching go hand in hand—as we publish our findings for our peers, we should also repay the public investment in our research with accurate, understandable results. My interest in space science was sparked by a father-daughter course in astronomy sponsored by the Brownies at the Oklahoma City Planetarium and kindled by the Bell Labs production The Strange Case of the Cosmic Rays directed by Frank Capra. Knowing that planetarium shows and educational movies can change lives, I have devoted a large portion of my last 25 years to creating software, shows, and portable planetariums to inspire and engage youth. This has not been a one-person effort, of course. My work Cherilynn Ann Morrow would have been impossible without the collaboration of Carolyn Sumners, vice president of the Houston Museum of Natural Science. Our museum kiosk and planetarium control software would not have happened without the skill and perseverance of my chief programmer, Colin Law. Jim Burch has been first a mentor and then a colleague on both the research and outreach sides of my career. I share this honor with a long line of highly talented students and postdocs who have contributed science content and outreach efforts. Most importantly, without the support of my husband, Tom Hill, I would not have had the time and freedom to build an educational network while continuing research and raising a family. I thank AGU for bestowing this honor.

  8. Timothy Leary, Richard Alpert (Ram Dass) and the changing definition of psilocybin.

    Science.gov (United States)

    Wark, Colin; Galliher, John F

    2010-05-01

    This research focuses on the events leading to the 1968 U.S. federal prohibition of psilocybin. It is a study of duelling moral entrepreneurs-Timothy Leary and Richard Alpert vs. the Harvard University Administration. The goal is to show how the primary active compound in an ostensibly harmless fungus (the psilocybin mushroom) became controversial in less than a decade. We used books, newspapers, magazine articles and previously unpublished materials (including documents from the Harvard Archives) to analyze Leary and Alpert's lives and careers through the early 1970s. The prohibition of psilocybin in the U.S. was largely a product of Leary and Alpert's involvement in the "Harvard drug scandal" and their transformation from Harvard professors to countercultural icons. They tested the substance on a variety of human subjects and in doing so piqued the interest of Harvard undergraduates while drawing condemnation from other faculty and Harvard administrators. This case is theoretically interesting because unlike most illegal drugs, psilocybin was never linked to a threatening minority group, but to some of the nation's most privileged youth. The Harvard administrators were not really moral entrepreneurs but Leary and Alpert clearly were. Although they were far from being prohibitionists, they were self-righteous crusaders on different but equally holy missions for the good of young and minority Americans. Ironically, due to their successes the possession of psilocybin was criminalized under United States federal law in 1968 (Pub. L. No. 90-639, Stat. 1361 1968 and Boire, 2002). This case study demonstrates that crusaders can be successful in changing culture even when laws are passed in futile attempts to control their behaviour, just as Leary predicted. Copyright 2009 Elsevier B.V. All rights reserved.

  9. USA-USSR protocol

    CERN Multimedia

    1970-01-01

    On 30 November the USA Atomic Energy Commission and the USSR State Committee for the Utilization of Atomic Energy signed, in Washington, a protocol 'on carrying out of joint projects in the field of high energy physics at the accelerators of the National Accelerator Laboratory (Batavia) and the Institute for High Energy Physics (Serpukhov)'. The protocol will be in force for five years and can be extended by mutual agreement.

  10. Perbandingan antara Etika Jürgen Habermas dan Richard Rorty sebagai Prinsip Dasar Bertindak Manusia

    Directory of Open Access Journals (Sweden)

    Dominique Rio Adiwijaya

    2010-10-01

    Full Text Available Ethics without doubt is an issue in every scientific field. Questions on ethics are not merely questions on the responsibility of one or two specific individuals, but rather as what have been defined accurately by Immanuel Kant in Critique of Practical Reason – as question of all humanity as a thinking creature and the freedom of choice on, “what should I do”. From Kant’s definition, we may infer that if human can not think and not free in determining their choice, it would be almost impossible to hope for moral responsibility. However this article does not mean to give a full and historical description on ethics, but a sketch on discourse of contemporary ethics which is represented by two famous philosophers, Jürgen Habermas from the tradition of  Critical Theory from Frankfurt School, dan Richard Rorty with “Neo-Pragmatism”. Habermas proposes “discourse ethics” while Rorty proposes ethic concepts through his “liberal-ironists”. It is hoped that the assembly of readers may gain an insight of the unavoidable ethics problems since every ethical position must be theory laden and the theory itself has historical characteristics (the characteristics, origin and historical context of the schools behind it. Therefore ethics is a neverending reflection although it has been started from 2500 years ago. Ethics invites us from specific sciences to enter its general discourse which unavoidably all-encompassing in its nature. 

  11. [Computerized clinical protocol for occlusion].

    Science.gov (United States)

    Salsench, J; Ferrer, J; Nogueras, J

    1988-11-01

    In making a protocol it is necessary that all members of the team who are going to collect information have the same unity of criterion about the different variables that compose it. The drawing up of this document is as much or more necessary than the protocol itself. In this work we all data collected in the protocol and we give the explanations of each concept.

  12. Bioremediation protocols

    National Research Council Canada - National Science Library

    Sheehan, David

    1997-01-01

    ..., .. . . . . .. ,. . . .. . . . . . . . .. . . . . .. . . .. . .. 3 2 Granular Nina Sludge Christiansen, Consortia lndra for Bioremediation, M. Mathrani, and Birgitte K. Ahring . 23 PART II PROTOCOLS...

  13. ATM and Internet protocol

    CERN Document Server

    Bentall, M; Turton, B

    1998-01-01

    Asynchronous Transfer Mode (ATM) is a protocol that allows data, sound and video being transferred between independent networks via ISDN links to be supplied to, and interpreted by, the various system protocols.ATM and Internet Protocol explains the working of the ATM and B-ISDN network for readers with a basic understanding of telecommunications. It provides a handy reference to everyone working with ATM who may not require the full standards in detail, but need a comprehensive guide to ATM. A substantial section is devoted to the problems of running IP over ATM and there is some discussion o

  14. Group covariant protocols for quantum string commitment

    International Nuclear Information System (INIS)

    Tsurumaru, Toyohiro

    2006-01-01

    We study the security of quantum string commitment (QSC) protocols with group covariant encoding scheme. First we consider a class of QSC protocol, which is general enough to incorporate all the QSC protocols given in the preceding literatures. Then among those protocols, we consider group covariant protocols and show that the exact upperbound on the binding condition can be calculated. Next using this result, we prove that for every irreducible representation of a finite group, there always exists a corresponding nontrivial QSC protocol which reaches a level of security impossible to achieve classically

  15. Families of quantum fingerprinting protocols

    Science.gov (United States)

    Lovitz, Benjamin; Lütkenhaus, Norbert

    2018-03-01

    We introduce several families of quantum fingerprinting protocols to evaluate the equality function on two n -bit strings in the simultaneous message passing model. The original quantum fingerprinting protocol uses a tensor product of a small number of O (logn ) -qubit high-dimensional signals [H. Buhrman et al., Phys. Rev. Lett. 87, 167902 (2001), 10.1103/PhysRevLett.87.167902], whereas a recently proposed optical protocol uses a tensor product of O (n ) single-qubit signals, while maintaining the O (logn ) information leakage of the original protocol [J. M. Arazola and N. Lütkenhaus, Phys. Rev. A 89, 062305 (2014), 10.1103/PhysRevA.89.062305]. We find a family of protocols which interpolate between the original and optical protocols while maintaining the O (logn ) information leakage, thus demonstrating a tradeoff between the number of signals sent and the dimension of each signal. There has been interest in experimental realization of the recently proposed optical protocol using coherent states [F. Xu et al., Nat. Commun. 6, 8735 (2015), 10.1038/ncomms9735; J.-Y. Guan et al., Phys. Rev. Lett. 116, 240502 (2016), 10.1103/PhysRevLett.116.240502], but as the required number of laser pulses grows linearly with the input size n , eventual challenges for the long-time stability of experimental setups arise. We find a coherent state protocol which reduces the number of signals by a factor 1/2 while also reducing the information leakage. Our reduction makes use of a simple modulation scheme in optical phase space, and we find that more complex modulation schemes are not advantageous. Using a similar technique, we improve a recently proposed coherent state protocol for evaluating the Euclidean distance between two real unit vectors [N. Kumar et al., Phys. Rev. A 95, 032337 (2017), 10.1103/PhysRevA.95.032337] by reducing the number of signals by a factor 1/2 and also reducing the information leakage.

  16. In-memory interconnect protocol configuration registers

    Energy Technology Data Exchange (ETDEWEB)

    Cheng, Kevin Y.; Roberts, David A.

    2017-09-19

    Systems, apparatuses, and methods for moving the interconnect protocol configuration registers into the main memory space of a node. The region of memory used for storing the interconnect protocol configuration registers may also be made cacheable to reduce the latency of accesses to the interconnect protocol configuration registers. Interconnect protocol configuration registers which are used during a startup routine may be prefetched into the host's cache to make the startup routine more efficient. The interconnect protocol configuration registers for various interconnect protocols may include one or more of device capability tables, memory-side statistics (e.g., to support two-level memory data mapping decisions), advanced memory and interconnect features such as repair resources and routing tables, prefetching hints, error correcting code (ECC) bits, lists of device capabilities, set and store base address, capability, device ID, status, configuration, capabilities, and other settings.

  17. In-memory interconnect protocol configuration registers

    Science.gov (United States)

    Cheng, Kevin Y.; Roberts, David A.

    2017-09-19

    Systems, apparatuses, and methods for moving the interconnect protocol configuration registers into the main memory space of a node. The region of memory used for storing the interconnect protocol configuration registers may also be made cacheable to reduce the latency of accesses to the interconnect protocol configuration registers. Interconnect protocol configuration registers which are used during a startup routine may be prefetched into the host's cache to make the startup routine more efficient. The interconnect protocol configuration registers for various interconnect protocols may include one or more of device capability tables, memory-side statistics (e.g., to support two-level memory data mapping decisions), advanced memory and interconnect features such as repair resources and routing tables, prefetching hints, error correcting code (ECC) bits, lists of device capabilities, set and store base address, capability, device ID, status, configuration, capabilities, and other settings.

  18. Effectiveness of oxaliplatin desensitization protocols.

    Science.gov (United States)

    Cortijo-Cascajares, Susana; Nacle-López, Inmaculada; García-Escobar, Ignacio; Aguilella-Vizcaíno, María José; Herreros-de-Tejada, Alberto; Cortés-Funes Castro, Hernán; Calleja-Hernández, Miguel-Ángel

    2013-03-01

    Hypersensitivity reaction (HSR) to antineoplastic drugs can force doctors to stop treatment and seek other alternatives. These alternatives may be less effective, not as well tolerated and/or more expensive. Another option is to use desensitization protocols that induce a temporary state of tolerance by gradually administering small quantities of the antineoplastic drug until the therapeutic dosage is reached. The aim of this study is to assess the effectiveness of oxaliplatin desensitization protocols. A retrospective observational study was carried out between January 2006 and May 2011. The inclusion criteria were patients undergoing chemotherapy treatment with oxaliplatin who had developed an HSR to the drug and who were candidates for continuing the treatment using a desensitization protocol. The patients' clinical records were reviewed and variables were gathered relating to the patient, the treatment, the HSR, and the desensitization protocol administered. The data were analysed using version 18.0 of the statistics program SPSS. A total of 53 desensitization protocols were administered to 21 patients. In 89 % of these cases, no new reactions occurred while the drug was being administered. New reactions of mild severity only occurred in 11 % of cases, and none of these reactions were severe enough for treatment to be stopped. All patients were able to complete the desensitization protocol. This study confirms that oxaliplatin desensitization protocols are safe and effective and allow patients to continue with the treatment that initially caused an HSR.

  19. DNA repair protocols

    DEFF Research Database (Denmark)

    Bjergbæk, Lotte

    In its 3rd edition, this Methods in Molecular Biology(TM) book covers the eukaryotic response to genomic insult including advanced protocols and standard techniques in the field of DNA repair. Offers expert guidance for DNA repair, recombination, and replication. Current knowledge of the mechanisms...... that regulate DNA repair has grown significantly over the past years with technology advances such as RNA interference, advanced proteomics and microscopy as well as high throughput screens. The third edition of DNA Repair Protocols covers various aspects of the eukaryotic response to genomic insult including...... recent advanced protocols as well as standard techniques used in the field of DNA repair. Both mammalian and non-mammalian model organisms are covered in the book, and many of the techniques can be applied with only minor modifications to other systems than the one described. Written in the highly...

  20. ‘The Edification of the Church’: Richard Hooker’s Theology of Worship and the Protestant Inward / Outward Disjunction

    Directory of Open Access Journals (Sweden)

    Littlejohn W. Bradford

    2014-06-01

    Full Text Available Sixteenth-century English Protestants struggled with the legacy left them by the Lutheran reformation: a strict disjunction between inward and outward that hindered the development of a robust theology of worship. For Luther, outward forms of worship had more to do with the edification of the neighbour than they did with pleasing God. But what exactly did ‘edification’ mean? On the one hand, English Protestants sought to avoid the Roman Catholic view that certain elements of worship held an intrinsic spiritual value; on the other hand, many did not want to imply that forms of worship were spiritually arbitrary and had a merely civil value. Richard Hooker developed his theology of worship in response to this challenge, seeking to maintain a clear distinction between the inward worship of the heart and the outward forms of public worship, while refusing to disassociate the two. The result was a concept of edification which sought to do justice to both civil and spiritual concerns, without, pace Peter Lake and other scholars, conceding an inch to a Catholic theology of worship

  1. Phase Transition in Protocols Minimizing Work Fluctuations

    Science.gov (United States)

    Solon, Alexandre P.; Horowitz, Jordan M.

    2018-05-01

    For two canonical examples of driven mesoscopic systems—a harmonically trapped Brownian particle and a quantum dot—we numerically determine the finite-time protocols that optimize the compromise between the standard deviation and the mean of the dissipated work. In the case of the oscillator, we observe a collection of protocols that smoothly trade off between average work and its fluctuations. However, for the quantum dot, we find that as we shift the weight of our optimization objective from average work to work standard deviation, there is an analog of a first-order phase transition in protocol space: two distinct protocols exchange global optimality with mixed protocols akin to phase coexistence. As a result, the two types of protocols possess qualitatively different properties and remain distinct even in the infinite duration limit: optimal-work-fluctuation protocols never coalesce with the minimal-work protocols, which therefore never become quasistatic.

  2. Generalized routing protocols for multihop relay networks

    KAUST Repository

    Khan, Fahd Ahmed

    2011-07-01

    Performance of multihop cooperative networks depends on the routing protocols employed. In this paper we propose the last-n-hop selection protocol, the dual path protocol, the forward-backward last-n-hop selection protocol and the forward-backward dual path protocol for the routing of data through multihop relay networks. The average symbol error probability performance of the schemes is analysed by simulations. It is shown that close to optimal performance can be achieved by using the last-n-hop selection protocol and its forward-backward variant. Furthermore we also compute the complexity of the protocols in terms of number of channel state information required and the number of comparisons required for routing the signal through the network. © 2011 IEEE.

  3. Blood, politics, and social science. Richard Titmuss and the Institute of Economic Affairs, 1957-1973.

    Science.gov (United States)

    Fontaine, Philippe

    2002-09-01

    Long before his last book, The Gift Relationship: From Human Blood to Social Policy, was published in early 1971, Richard M. Titmuss (1907-1973), a professor of social administration at the London School of Economics, had been a major figure in the debates over the welfare state. The Gift Relationship was the culmination of an eventful relationship with the Institute of Economic Affairs, a think tank that advocated the extension of rational pricing to social services. By arguing that the British system of blood procurement and distribution, based on free giving within the National Health Service, was more efficient than the partly commercialized American system, Titmuss intended to signal the dangers of the increasing commercialization of society. What made for the impact of his book, however, was not merely its argument that transfusion-transmitted infections were much more common with paid than with voluntary donors, but also its reflections on what it is that holds a society together. And here Titmuss argued that a "socialist" social policy, by encouraging the sense of community, played a central role. The eclecticism of Titmuss's work, together with its strong ethical and political flavor, makes it a rich and original account of the "social" at a time when heated debated over social policy, both in Britain and in the United States, raised the question of the division of labor among the social sciences.

  4. Bioinspired Security Analysis of Wireless Protocols

    DEFF Research Database (Denmark)

    Petrocchi, Marinella; Spognardi, Angelo; Santi, Paolo

    2016-01-01

    work, this paper investigates feasibility of adopting fraglets as model for specifying security protocols and analysing their properties. In particular, we give concrete sample analyses over a secure RFID protocol, showing evolution of the protocol run as chemical dynamics and simulating an adversary...

  5. A security analysis of the 802.11s wireless mesh network routing protocol and its secure routing protocols.

    Science.gov (United States)

    Tan, Whye Kit; Lee, Sang-Gon; Lam, Jun Huy; Yoo, Seong-Moo

    2013-09-02

    Wireless mesh networks (WMNs) can act as a scalable backbone by connecting separate sensor networks and even by connecting WMNs to a wired network. The Hybrid Wireless Mesh Protocol (HWMP) is the default routing protocol for the 802.11s WMN. The routing protocol is one of the most important parts of the network, and it requires protection, especially in the wireless environment. The existing security protocols, such as the Broadcast Integrity Protocol (BIP), Counter with cipher block chaining message authentication code protocol (CCMP), Secure Hybrid Wireless Mesh Protocol (SHWMP), Identity Based Cryptography HWMP (IBC-HWMP), Elliptic Curve Digital Signature Algorithm HWMP (ECDSA-HWMP), and Watchdog-HWMP aim to protect the HWMP frames. In this paper, we have analyzed the vulnerabilities of the HWMP and developed security requirements to protect these identified vulnerabilities. We applied the security requirements to analyze the existing secure schemes for HWMP. The results of our analysis indicate that none of these protocols is able to satisfy all of the security requirements. We also present a quantitative complexity comparison among the protocols and an example of a security scheme for HWMP to demonstrate how the result of our research can be utilized. Our research results thus provide a tool for designing secure schemes for the HWMP.

  6. Maximally efficient protocols for direct secure quantum communication

    Energy Technology Data Exchange (ETDEWEB)

    Banerjee, Anindita [Department of Physics and Materials Science Engineering, Jaypee Institute of Information Technology, A-10, Sector-62, Noida, UP-201307 (India); Department of Physics and Center for Astroparticle Physics and Space Science, Bose Institute, Block EN, Sector V, Kolkata 700091 (India); Pathak, Anirban, E-mail: anirban.pathak@jiit.ac.in [Department of Physics and Materials Science Engineering, Jaypee Institute of Information Technology, A-10, Sector-62, Noida, UP-201307 (India); RCPTM, Joint Laboratory of Optics of Palacky University and Institute of Physics of Academy of Science of the Czech Republic, Faculty of Science, Palacky University, 17. Listopadu 12, 77146 Olomouc (Czech Republic)

    2012-10-01

    Two protocols for deterministic secure quantum communication (DSQC) using GHZ-like states have been proposed. It is shown that one of these protocols is maximally efficient and that can be modified to an equivalent protocol of quantum secure direct communication (QSDC). Security and efficiency of the proposed protocols are analyzed and compared. It is shown that dense coding is sufficient but not essential for DSQC and QSDC protocols. Maximally efficient QSDC protocols are shown to be more efficient than their DSQC counterparts. This additional efficiency arises at the cost of message transmission rate. -- Highlights: ► Two protocols for deterministic secure quantum communication (DSQC) are proposed. ► One of the above protocols is maximally efficient. ► It is modified to an equivalent protocol of quantum secure direct communication (QSDC). ► It is shown that dense coding is sufficient but not essential for DSQC and QSDC protocols. ► Efficient QSDC protocols are always more efficient than their DSQC counterparts.

  7. Physical Therapy Protocols for Arthroscopic Bankart Repair.

    Science.gov (United States)

    DeFroda, Steven F; Mehta, Nabil; Owens, Brett D

    Outcomes after arthroscopic Bankart repair can be highly dependent on compliance and participation in physical therapy. Additionally, there are many variations in physician-recommended physical therapy protocols. The rehabilitation protocols of academic orthopaedic surgery departments vary widely despite the presence of consensus protocols. Descriptive epidemiology study. Level 3. Web-based arthroscopic Bankart rehabilitation protocols available online from Accreditation Council for Graduate Medical Education (ACGME)-accredited orthopaedic surgery programs were included for review. Individual protocols were reviewed to evaluate for the presence or absence of recommended therapies, goals for completion of ranges of motion, functional milestones, exercise start times, and recommended time to return to sport. Thirty protocols from 27 (16.4%) total institutions were identified out of 164 eligible for review. Overall, 9 (30%) protocols recommended an initial period of strict immobilization. Variability existed between the recommended time periods for sling immobilization (mean, 4.8 ± 1.8 weeks). The types of exercises and their start dates were also inconsistent. Goals to full passive range of motion (mean, 9.2 ± 2.8 weeks) and full active range of motion (mean, 12.2 ± 2.8 weeks) were consistent with other published protocols; however, wide ranges existed within the reviewed protocols as a whole. Only 10 protocols (33.3%) included a timeline for return to sport, and only 3 (10%) gave an estimate for return to game competition. Variation also existed when compared with the American Society of Shoulder and Elbow Therapists' (ASSET) consensus protocol. Rehabilitation protocols after arthroscopic Bankart repair were found to be highly variable. They also varied with regard to published consensus protocols. This discrepancy may lead to confusion among therapists and patients. This study highlights the importance of attending surgeons being very clear and specific with

  8. The Network Protocol Analysis Technique in Snort

    Science.gov (United States)

    Wu, Qing-Xiu

    Network protocol analysis is a network sniffer to capture data for further analysis and understanding of the technical means necessary packets. Network sniffing is intercepted by packet assembly binary format of the original message content. In order to obtain the information contained. Required based on TCP / IP protocol stack protocol specification. Again to restore the data packets at protocol format and content in each protocol layer. Actual data transferred, as well as the application tier.

  9. Welfare Quality assessment protocol for laying hens = Welfare Quality assessment protocol voor leghennen

    NARCIS (Netherlands)

    Niekerk, van T.G.C.M.; Gunnink, H.; Reenen, van C.G.

    2012-01-01

    Results of a study on the Welfare Quality® assessment protocol for laying hens. It reports the development of the integration of welfare assessment as scores per criteria as well as simplification of the Welfare Quality® assessment protocol. Results are given from assessment of 122 farms.

  10. Publication trends of study protocols in rehabilitation.

    Science.gov (United States)

    Jesus, Tiago S; Colquhoun, Heather L

    2017-09-04

    Growing evidence points for the need to publish study protocols in the health field. To observe whether the growing interest in publishing study protocols in the broader health field has been translated into increased publications of rehabilitation study protocols. Observational study using publication data and its indexation in PubMed. Not applicable. Not applicable. PubMed was searched with appropriate combinations of Medical Subject Headings up to December 2014. The effective presence of study protocols was manually screened. Regression models analyzed the yearly growth of publications. Two-sample Z-tests analyzed whether the proportion of Systematic Reviews (SRs) and Randomized Controlled Trials (RCTs) among study protocols differed from that of the same designs for the broader rehabilitation research. Up to December 2014, 746 publications of rehabilitation study protocols were identified, with an exponential growth since 2005 (r2=0.981; p<0.001). RCT protocols were the most common among rehabilitation study protocols (83%), while RCTs were significantly more prevalent among study protocols than among the broader rehabilitation research (83% vs. 35.8%; p<0.001). For SRs, the picture was reversed: significantly less common among study protocols (2.8% vs. 9.3%; p<0.001). Funding was more often reported by rehabilitation study protocols than the broader rehabilitation research (90% vs. 53.1%; p<0.001). Rehabilitation journals published a significantly lower share of rehabilitation study protocols than they did for the broader rehabilitation research (1.8% vs.16.7%; p<0.001). Identifying the reasons for these discrepancies and reverting unwarranted disparities (e.g. low rate of publication for rehabilitation SR protocols) are likely new avenues for rehabilitation research and its publication. SRs, particularly those aggregating RCT results, are considered the best standard of evidence to guide rehabilitation clinical practice; however, that standard can be improved

  11. Protocol Fuel Mix reporting

    International Nuclear Information System (INIS)

    2002-07-01

    The protocol in this document describes a method for an Electricity Distribution Company (EDC) to account for the fuel mix of electricity that it delivers to its customers, based on the best available information. Own production, purchase and sale of electricity, and certificates trading are taken into account. In chapter 2 the actual protocol is outlined. In the appendixes additional (supporting) information is given: (A) Dutch Standard Fuel Mix, 2000; (B) Calculation of the Dutch Standard fuel mix; (C) Procedures to estimate and benchmark the fuel mix; (D) Quality management; (E) External verification; (F) Recommendation for further development of the protocol; (G) Reporting examples

  12. Universally composable protocols with relaxed set-up assumptions

    DEFF Research Database (Denmark)

    Barak, Boaz; Canetti, Ran; Nielsen, Jesper Buus

    2004-01-01

    A desirable goal for cryptographic protocols is to guarantee security when the protocol is composed with other protocol instances. Universally composable (UC) protocols provide this guarantee in a strong sense: A protocol remains secure even when composed concurrently with an unbounded number of ...

  13. In silico toxicology protocols.

    Science.gov (United States)

    Myatt, Glenn J; Ahlberg, Ernst; Akahori, Yumi; Allen, David; Amberg, Alexander; Anger, Lennart T; Aptula, Aynur; Auerbach, Scott; Beilke, Lisa; Bellion, Phillip; Benigni, Romualdo; Bercu, Joel; Booth, Ewan D; Bower, Dave; Brigo, Alessandro; Burden, Natalie; Cammerer, Zoryana; Cronin, Mark T D; Cross, Kevin P; Custer, Laura; Dettwiler, Magdalena; Dobo, Krista; Ford, Kevin A; Fortin, Marie C; Gad-McDonald, Samantha E; Gellatly, Nichola; Gervais, Véronique; Glover, Kyle P; Glowienke, Susanne; Van Gompel, Jacky; Gutsell, Steve; Hardy, Barry; Harvey, James S; Hillegass, Jedd; Honma, Masamitsu; Hsieh, Jui-Hua; Hsu, Chia-Wen; Hughes, Kathy; Johnson, Candice; Jolly, Robert; Jones, David; Kemper, Ray; Kenyon, Michelle O; Kim, Marlene T; Kruhlak, Naomi L; Kulkarni, Sunil A; Kümmerer, Klaus; Leavitt, Penny; Majer, Bernhard; Masten, Scott; Miller, Scott; Moser, Janet; Mumtaz, Moiz; Muster, Wolfgang; Neilson, Louise; Oprea, Tudor I; Patlewicz, Grace; Paulino, Alexandre; Lo Piparo, Elena; Powley, Mark; Quigley, Donald P; Reddy, M Vijayaraj; Richarz, Andrea-Nicole; Ruiz, Patricia; Schilter, Benoit; Serafimova, Rositsa; Simpson, Wendy; Stavitskaya, Lidiya; Stidl, Reinhard; Suarez-Rodriguez, Diana; Szabo, David T; Teasdale, Andrew; Trejo-Martin, Alejandra; Valentin, Jean-Pierre; Vuorinen, Anna; Wall, Brian A; Watts, Pete; White, Angela T; Wichard, Joerg; Witt, Kristine L; Woolley, Adam; Woolley, David; Zwickl, Craig; Hasselgren, Catrin

    2018-04-17

    The present publication surveys several applications of in silico (i.e., computational) toxicology approaches across different industries and institutions. It highlights the need to develop standardized protocols when conducting toxicity-related predictions. This contribution articulates the information needed for protocols to support in silico predictions for major toxicological endpoints of concern (e.g., genetic toxicity, carcinogenicity, acute toxicity, reproductive toxicity, developmental toxicity) across several industries and regulatory bodies. Such novel in silico toxicology (IST) protocols, when fully developed and implemented, will ensure in silico toxicological assessments are performed and evaluated in a consistent, reproducible, and well-documented manner across industries and regulatory bodies to support wider uptake and acceptance of the approaches. The development of IST protocols is an initiative developed through a collaboration among an international consortium to reflect the state-of-the-art in in silico toxicology for hazard identification and characterization. A general outline for describing the development of such protocols is included and it is based on in silico predictions and/or available experimental data for a defined series of relevant toxicological effects or mechanisms. The publication presents a novel approach for determining the reliability of in silico predictions alongside experimental data. In addition, we discuss how to determine the level of confidence in the assessment based on the relevance and reliability of the information. Copyright © 2018. Published by Elsevier Inc.

  14. Summary Report on Unconditionally Secure Protocols

    DEFF Research Database (Denmark)

    Damgård, Ivan Bjerre; Salvail, Louis; Cachin, Christian

    This document describes the state of the art snd some of the main open problems in the area of unconditionally secure cryptographic protocols. The most essential part of a cryptographic protocol is not its being secure. Imagine a cryptographic protocol which is secure, but where we do not know...... that it is secure. Such a protocol would do little in providing security. When all comes to all, cryptographic security is done for the sake of people, and the essential part of security is for people what it has always been, namely to feel secure. To feel secure employing a given cryptographic protocol we need...... to know that is is secure. I.e. we need a proof that it is secure. Today the proof of security of essentially all practically employed cryptographic protocols relies on computational assumptions. To prove that currently employed ways to communicate securely over the Internet are secure we e.g. need...

  15. Network-topology-adaptive quantum conference protocols

    International Nuclear Information System (INIS)

    Zhang Sheng; Wang Jian; Tang Chao-Jing; Zhang Quan

    2011-01-01

    As an important application of the quantum network communication, quantum multiparty conference has made multiparty secret communication possible. Previous quantum multiparty conference schemes based on quantum data encryption are insensitive to network topology. However, the topology of the quantum network significantly affects the communication efficiency, e.g., parallel transmission in a channel with limited bandwidth. We have proposed two distinctive protocols, which work in two basic network topologies with efficiency higher than the existing ones. We first present a protocol which works in the reticulate network using Greeberger—Horne—Zeilinger states and entanglement swapping. Another protocol, based on quantum multicasting with quantum data compression, which can improve the efficiency of the network, works in the star-like network. The security of our protocols is guaranteed by quantum key distribution and one-time-pad encryption. In general, the two protocols can be applied to any quantum network where the topology can be equivalently transformed to one of the two structures we propose in our protocols. (general)

  16. Review of Richard Parra, «La tiranía del Inca. El Inca Garcilaso y la escritura política en el Perú colonial (1568-1617», Lima, Ediciones Copé, 2015, 508 pp., ISBN 978-6124-20-221-6

    Directory of Open Access Journals (Sweden)

    Germán Adolfo Morong Reyes

    2016-05-01

    Full Text Available Review of Richard Parra, «La tiranía del Inca. El Inca Garcilaso y la escritura política en el Perú colonial (1568-1617», Lima, Ediciones Copé, 2015, 508 pp., ISBN 978-6124-20-221-6

  17. e-SCP-ECG+ Protocol: An Expansion on SCP-ECG Protocol for Health Telemonitoring—Pilot Implementation

    Directory of Open Access Journals (Sweden)

    George J. Mandellos

    2010-01-01

    Full Text Available Standard Communication Protocol for Computer-assisted Electrocardiography (SCP-ECG provides standardized communication among different ECG devices and medical information systems. This paper extends the use of this protocol in order to be included in health monitoring systems. It introduces new sections into SCP-ECG structure for transferring data for positioning, allergies, and five additional biosignals: noninvasive blood pressure (NiBP, body temperature (Temp, Carbon dioxide (CO2, blood oxygen saturation (SPO2, and pulse rate. It also introduces new tags in existing sections for transferring comprehensive demographic data. The proposed enhanced version is referred to as e-SCP-ECG+ protocol. This paper also considers the pilot implementation of the new protocol as a software component in a Health Telemonitoring System.

  18. Mac protocols for cyber-physical systems

    CERN Document Server

    Xia, Feng

    2015-01-01

    This book provides a literature review of various wireless MAC protocols and techniques for achieving real-time and reliable communications in the context of cyber-physical systems (CPS). The evaluation analysis of IEEE 802.15.4 for CPS therein will give insights into configuration and optimization of critical design parameters of MAC protocols. In addition, this book also presents the design and evaluation of an adaptive MAC protocol for medical CPS, which exemplifies how to facilitate real-time and reliable communications in CPS by exploiting IEEE 802.15.4 based MAC protocols. This book wil

  19. Short Review on Quantum Key Distribution Protocols.

    Science.gov (United States)

    Giampouris, Dimitris

    2017-01-01

    Cryptographic protocols and mechanisms are widely investigated under the notion of quantum computing. Quantum cryptography offers particular advantages over classical ones, whereas in some cases established protocols have to be revisited in order to maintain their functionality. The purpose of this paper is to provide the basic definitions and review the most important theoretical advancements concerning the BB84 and E91 protocols. It also aims to offer a summary on some key developments on the field of quantum key distribution, closely related with the two aforementioned protocols. The main goal of this study is to provide the necessary background information along with a thorough review on the theoretical aspects of QKD, concentrating on specific protocols. The BB84 and E91 protocols have been chosen because most other protocols are similar to these, a fact that makes them important for the general understanding of how the QKD mechanism functions.

  20. Incorporating ethical principles into clinical research protocols: a tool for protocol writers and ethics committees.

    Science.gov (United States)

    Li, Rebecca H; Wacholtz, Mary C; Barnes, Mark; Boggs, Liam; Callery-D'Amico, Susan; Davis, Amy; Digilova, Alla; Forster, David; Heffernan, Kate; Luthin, Maeve; Lynch, Holly Fernandez; McNair, Lindsay; Miller, Jennifer E; Murphy, Jacquelyn; Van Campen, Luann; Wilenzick, Mark; Wolf, Delia; Woolston, Cris; Aldinger, Carmen; Bierer, Barbara E

    2016-04-01

    A novel Protocol Ethics Tool Kit ('Ethics Tool Kit') has been developed by a multi-stakeholder group of the Multi-Regional Clinical Trials Center of Brigham and Women's Hospital and Harvard. The purpose of the Ethics Tool Kit is to facilitate effective recognition, consideration and deliberation of critical ethical issues in clinical trial protocols. The Ethics Tool Kit may be used by investigators and sponsors to develop a dedicated Ethics Section within a protocol to improve the consistency and transparency between clinical trial protocols and research ethics committee reviews. It may also streamline ethics review and may facilitate and expedite the review process by anticipating the concerns of ethics committee reviewers. Specific attention was given to issues arising in multinational settings. With the use of this Tool Kit, researchers have the opportunity to address critical research ethics issues proactively, potentially speeding the time and easing the process to final protocol approval. Published by the BMJ Publishing Group Limited. For permission to use (where not already granted under a licence) please go to http://www.bmj.com/company/products-services/rights-and-licensing/

  1. Large family of quantum weak coin-flipping protocols

    International Nuclear Information System (INIS)

    Mochon, Carlos

    2005-01-01

    Each classical public-coin protocol for coin flipping is naturally associated with a quantum protocol for weak coin flipping. The quantum protocol is obtained by replacing classical randomness with quantum entanglement and by adding a cheat detection test in the last round that verifies the integrity of this entanglement. The set of such protocols defines a family which contains the protocol with bias 0.192 previously found by the author, as well as protocols with bias as low as 1/6 described herein. The family is analyzed by identifying a set of optimal protocols for every number of messages. In the end, tight lower bounds for the bias are obtained which prove that 1/6 is optimal for all protocols within the family

  2. Nonblocking and orphan free message logging protocols

    Science.gov (United States)

    Alvisi, Lorenzo; Hoppe, Bruce; Marzullo, Keith

    1992-12-01

    Currently existing message logging protocols demonstrate a classic pessimistic vs. optimistic tradeoff. We show that the optimistic-pessimistic tradeoff is not inherent to the problem of message logging. We construct a message-logging protocol that has the positive features of both optimistic and pessimistic protocol: our protocol prevents orphans and allows simple failure recovery; however, it requires no blocking in failure-free runs. Furthermore, this protocol does not introduce any additional message overhead as compared to one implemented for a system in which messages may be lost but processes do not crash.

  3. The Kyoto Protocol. An economic appraisal

    International Nuclear Information System (INIS)

    Grubb, M.

    2000-05-01

    This paper examines the overall economics of the Kyoto Protocol on climate change, in three main parts. The first part explores the structure of the Protocol and how this matches against classical economic criteria of an 'optimal' climate change agreement. This discussion also considers the nature of and reasons for shortcomings, and the prospects for its evolution. Given the various flexibilities in the agreement, the Kyoto Protocol is far more economically efficient in its structure than any previous global environmental agreement. The central conclusion is that, from an economic perspective, the Protocol's structure for industrialised country commitments is as good as could reasonably be expected. The second part of the paper explores more closely the economics of the commitments themselves and how they combine with the various flexibilities, briefly reviewing the available literature and using a simple spreadsheet model of how the commitments might combine with trading mechanisms under a range of assumptions. Flexibility is intrinsic and necessary, but it is argued that the allocations to Russia and Ukraine in particular mean that unlimited flexibility could render the Protocol's commitments weaker in their impacts than is economically desirable to address climate change. It is argued that, should this prove to be the case, access to the large surplus in the transition economies could be used as a control valve to limit the costs of the Protocol to within acceptable limits. Finally, the paper considers the issues of developing country involvement in the Kyoto Protocol, and the Protocol's longer-term impact and evolution, including its impact on technological evolution and dissemination and the evolution of future commitments. It is argued that taking account of such issues critically affects views of the Protocol

  4. A Simple XML Producer-Consumer Protocol

    Science.gov (United States)

    Smith, Warren; Gunter, Dan; Quesnel, Darcy; Biegel, Bryan (Technical Monitor)

    2001-01-01

    There are many different projects from government, academia, and industry that provide services for delivering events in distributed environments. The problem with these event services is that they are not general enough to support all uses and they speak different protocols so that they cannot interoperate. We require such interoperability when we, for example, wish to analyze the performance of an application in a distributed environment. Such an analysis might require performance information from the application, computer systems, networks, and scientific instruments. In this work we propose and evaluate a standard XML-based protocol for the transmission of events in distributed systems. One recent trend in government and academic research is the development and deployment of computational grids. Computational grids are large-scale distributed systems that typically consist of high-performance compute, storage, and networking resources. Examples of such computational grids are the DOE Science Grid, the NASA Information Power Grid (IPG), and the NSF Partnerships for Advanced Computing Infrastructure (PACIs). The major effort to deploy these grids is in the area of developing the software services to allow users to execute applications on these large and diverse sets of resources. These services include security, execution of remote applications, managing remote data, access to information about resources and services, and so on. There are several toolkits for providing these services such as Globus, Legion, and Condor. As part of these efforts to develop computational grids, the Global Grid Forum is working to standardize the protocols and APIs used by various grid services. This standardization will allow interoperability between the client and server software of the toolkits that are providing the grid services. The goal of the Performance Working Group of the Grid Forum is to standardize protocols and representations related to the storage and distribution of

  5. Principles of the new quantum cryptography protocols building

    International Nuclear Information System (INIS)

    Kurochkin, V.; Kurochkin, Yu.

    2009-01-01

    The main aim of the quantum cryptography protocols is the maximal secrecy under the conditions of the real experiment. This work presents the result of the new protocol building with the use of the secrecy maximization. While using some well-known approaches this method has allowed one to achieve completely new results in quantum cryptography. The process of the protocol elaboration develops from the standard BB84 protocol upgrading to the building of completely new protocol with arbitrary large bases number. The secrecy proofs of the elaborated protocol appear to be natural continuation of the protocol building process. This approach reveals possibility to reach extremely high parameters of the protocol. It suits both the restrictions of contemporary technologies and requirements for high bit rate while being absolutely secret

  6. Attack strategies on quantum cryptographic protocols

    International Nuclear Information System (INIS)

    Schauer, S.; Suda, M.

    2006-01-01

    Full text: Quantum key distribution (QKD) and quantum authentication (QA) have been a topic of extensive research in the last 20 years. In course of that many attacks on QKD and QA protocols have been studied. Among these, Zhang, Lee and Guo presented an attack on a QKD protocol using entanglement swapping. Based on that strategy we take a look at other protocols to inspect how much information an adversary may get if he shares entanglement with either one or both parties. We will present some protocols where an adversary can even get full information about the key using entanglement. (author)

  7. Network protocols and sockets

    OpenAIRE

    BALEJ, Marek

    2010-01-01

    My work will deal with network protocols and sockets and their use in programming language C#. It will therefore deal programming network applications on the platform .NET from Microsoft and instruments, which C# provides to us. There will describe the tools and methods for programming network applications, and shows a description and sample applications that work with sockets and application protocols.

  8. An analytical solution of Richards' equation providing the physical basis of SCS curve number method and its proportionality relationship

    Science.gov (United States)

    Hooshyar, Milad; Wang, Dingbao

    2016-08-01

    The empirical proportionality relationship, which indicates that the ratio of cumulative surface runoff and infiltration to their corresponding potentials are equal, is the basis of the extensively used Soil Conservation Service Curve Number (SCS-CN) method. The objective of this paper is to provide the physical basis of the SCS-CN method and its proportionality hypothesis from the infiltration excess runoff generation perspective. To achieve this purpose, an analytical solution of Richards' equation is derived for ponded infiltration in shallow water table environment under the following boundary conditions: (1) the soil is saturated at the land surface; and (2) there is a no-flux boundary which moves downward. The solution is established based on the assumptions of negligible gravitational effect, constant soil water diffusivity, and hydrostatic soil moisture profile between the no-flux boundary and water table. Based on the derived analytical solution, the proportionality hypothesis is a reasonable approximation for rainfall partitioning at the early stage of ponded infiltration in areas with a shallow water table for coarse textured soils.

  9. Entre el dios de Paley y el dios de Bonnet - El parco evolucionismo teísta de Richard Owen

    Directory of Open Access Journals (Sweden)

    Gustavo Caponi

    2013-04-01

    Full Text Available http://dx.doi.org/10.5007/1808-1711.2013v17n1p71 En primer lugar, en este artículo se examina el carácter de las putativas referencias a la evolución de las especies que encontramos en las obras que Richard Owen publicó antes de 1858; y luego se analizan las escazas y vagas conjeturas evolucionistas que Owen sin duda formuló con posterioridad a la presentación pública de la Teoría de la Selección Natural.  En lo que respecta a lo primero, el objetivo es subrayar la ambigüedad de esas referencias de Owen; y en lo que respecta a lo segundo lo que interesa es mostrar que, a la hora de explicitar sus tesis evolucionistas, Owen no fue más allá de un pío evolucionismo teísta que, sin postular ningún mecanismo del cambio evolutivo, permanecía fiel a la Teología del diseño preconizada por Paley.

  10. SIP protocol model for OMNET++

    Directory of Open Access Journals (Sweden)

    Jan Kucerak

    2016-01-01

    Full Text Available The article describes our new SIP protocol implementation for the OMNeT++ simulation framework. OMNeT++ simulation framework provides an extensive support of IP related protocols, nevertheless a working SIP protocol implementation is missing. Real measurements were also done using a SIPp traffic generator and the results are compared to those obtained by our new SIP model. Since this work is a part of bigger project concerned strictly on measuring "first response times" over networks with a faulty transmission links, the actually collected statistics are focused only this way.

  11. MR efficiency using automated MRI-desktop eProtocol

    Science.gov (United States)

    Gao, Fei; Xu, Yanzhe; Panda, Anshuman; Zhang, Min; Hanson, James; Su, Congzhe; Wu, Teresa; Pavlicek, William; James, Judy R.

    2017-03-01

    MRI protocols are instruction sheets that radiology technologists use in routine clinical practice for guidance (e.g., slice position, acquisition parameters etc.). In Mayo Clinic Arizona (MCA), there are over 900 MR protocols (ranging across neuro, body, cardiac, breast etc.) which makes maintaining and updating the protocol instructions a labor intensive effort. The task is even more challenging given different vendors (Siemens, GE etc.). This is a universal problem faced by all the hospitals and/or medical research institutions. To increase the efficiency of the MR practice, we designed and implemented a web-based platform (eProtocol) to automate the management of MRI protocols. It is built upon a database that automatically extracts protocol information from DICOM compliant images and provides a user-friendly interface to the technologists to create, edit and update the protocols. Advanced operations such as protocol migrations from scanner to scanner and capability to upload Multimedia content were also implemented. To the best of our knowledge, eProtocol is the first MR protocol automated management tool used clinically. It is expected that this platform will significantly improve the radiology operations efficiency including better image quality and exam consistency, fewer repeat examinations and less acquisition errors. These protocols instructions will be readily available to the technologists during scans. In addition, this web-based platform can be extended to other imaging modalities such as CT, Mammography, and Interventional Radiology and different vendors for imaging protocol management.

  12. SPP: A data base processor data communications protocol

    Science.gov (United States)

    Fishwick, P. A.

    1983-01-01

    The design and implementation of a data communications protocol for the Intel Data Base Processor (DBP) is defined. The protocol is termed SPP (Service Port Protocol) since it enables data transfer between the host computer and the DBP service port. The protocol implementation is extensible in that it is explicitly layered and the protocol functionality is hierarchically organized. Extensive trace and performance capabilities have been supplied with the protocol software to permit optional efficient monitoring of the data transfer between the host and the Intel data base processor. Machine independence was considered to be an important attribute during the design and implementation of SPP. The protocol source is fully commented and is included in Appendix A of this report.

  13. Deterministic secure communication protocol without using entanglement

    OpenAIRE

    Cai, Qing-yu

    2003-01-01

    We show a deterministic secure direct communication protocol using single qubit in mixed state. The security of this protocol is based on the security proof of BB84 protocol. It can be realized with current technologies.

  14. Simulation and Evaluation of CTP and Secure-CTP Protocols

    Directory of Open Access Journals (Sweden)

    P. Pecho

    2010-04-01

    Full Text Available The paper discusses characteristics and qualities of two routing protocols – Collection Tree Protocol and its secure modification. The original protocol, as well as other protocols for wireless sensors, solves only problems of ra- dio communication and limited resources. Our design of the secure protocol tries to solve also the essential security ob- jectives. For the evaluation of properties of our protocol in large networks, a TOSSIM simulator was used. Our effort was to show the influence of the modification of the routing protocol to its behavior and quality of routing trees. We have proved that adding security into protocol design does not necessarily mean higher demands for data transfer, power consumption or worse protocol efficiency. In the paper, we manifest that security in the protocol may be achieved with low cost and may offer similar performance as the original protocol.

  15. The Development of Korea Additional Protocol System

    International Nuclear Information System (INIS)

    Shim, Hye Won; Yeo, Jin Kyun

    2008-01-01

    The Agreement between the Republic of Korea (ROK) and the IAEA for the Application of Safeguards in Connection with the Treaty on the Non-Proliferation of Nuclear Weapons (the Safeguards Agreement) entered into force on 14 November 1975. The Additional Protocol to the Safeguards Agreement (the Additional Protocol) was signed on 21 June 1999 and entered into force on 19 February 2004. ROK has been submitting annual updated reports of initial declaration on every May 15th since August 2004. Additional protocol reports were submitted through Protocol Reporter provided by IAEA. Annual declarations were simply uploaded and stored in the Accounting Information Treatment System of KINAC, which did not provide data analysis and management function. There have been demands for improvement to handle ever-increasing information. KAPS (Korea Additional Protocol System) has been developed to assist and administrate the additional protocol related works effectively. The new system enables integrated management including composition of additional protocol report and version control, periodical update of related information, results of IAEA complementary access to each facility

  16. Developing frameworks for protocol implementation

    NARCIS (Netherlands)

    de Barros Barbosa, C.; de barros Barbosa, C.; Ferreira Pires, Luis

    1999-01-01

    This paper presents a method to develop frameworks for protocol implementation. Frameworks are software structures developed for a specific application domain, which can be reused in the implementation of various different concrete systems in this domain. The use of frameworks support a protocol

  17. Quantum-key-distribution protocol with pseudorandom bases

    Science.gov (United States)

    Trushechkin, A. S.; Tregubov, P. A.; Kiktenko, E. O.; Kurochkin, Y. V.; Fedorov, A. K.

    2018-01-01

    Quantum key distribution (QKD) offers a way for establishing information-theoretical secure communications. An important part of QKD technology is a high-quality random number generator for the quantum-state preparation and for post-processing procedures. In this work, we consider a class of prepare-and-measure QKD protocols, utilizing additional pseudorandomness in the preparation of quantum states. We study one of such protocols and analyze its security against the intercept-resend attack. We demonstrate that, for single-photon sources, the considered protocol gives better secret key rates than the BB84 and the asymmetric BB84 protocols. However, the protocol strongly requires single-photon sources.

  18. First record of the Asian diaptomid Neodiaptomus schmackeri (Poppe & Richard, 1892 (Crustacea: Copepoda: Calanoida in Europe

    Directory of Open Access Journals (Sweden)

    Giuseppe Alfonso

    2014-06-01

    Full Text Available Albania, as well as a great part of the Balkan area in general, still suffers a lack of environmental studies especially in limnological research. The Dumre plateau, in Central Albania, is characterized by an extraordinary high number of karst lakes in a small geographic area. Despite their environmental peculiarity, very few biological data are to date available for these lakes, none on the zooplankton. For this reason, 15 water bodies located in the central area of the plateau were selected for a preliminary limnological survey carried out in the years 2008-2011. Neodiaptomus schmackeri (Poppe & Richard, 1892, a diaptomid calanoid copepod characterized by a South-Eastern Palearctic - Oriental distribution, and the most widely spread Neodiaptomus species in Asia, was found in 8 lakes of the Dumre area. This finding represents the first record of the species, and of the entire genus Neodiaptomus, for Europe. Several environmental variables were measured to characterize the lakes, and the co-occurring planktonic crustaceans were also identified. Taxonomical drawings and descriptions of the main morphological features of both sexes are herein provided in order to compare the Albanian populations of N. schmackeri with those of the native distribution area of the species. The possible causes which determined the occurrence of this non-indigenous species in several Dumre lakes are discussed.

  19. Interoperability and Reliability of Multiplatform MPLS VPN: Comparison of Traffic Engineering with RSVP-TE Protocol and LDP Protocol

    Directory of Open Access Journals (Sweden)

    Nanang Ismail

    2017-10-01

    48% of packet loss per 100 sent packets while on RSVP packet loss percentage is 35.5% per 100 sent packets. Both protocols have interoperability on the third layer of multiplatform MPLS VPN, but on heavy loaded traffic condition, RSVP protocol has better reliability than the LDP protocol.

  20. An Optimal Non-Interactive Message Authentication Protocol

    OpenAIRE

    Pasini, Sylvain; Vaudenay, Serge

    2006-01-01

    Vaudenay recently proposed a message authentication protocol which is interactive and based on short authenticated strings (SAS). We study here SAS-based non-interactive message authentication protocols (NIMAP). We start by the analysis of two popular non-interactive message authentication protocols. The first one is based on a collision-resistant hash function and was presented by Balfanz et al. The second protocol is based on a universal hash function family and was proposed by Gehrmann, Mi...

  1. Nucleic acid protocols: Extraction and optimization

    Directory of Open Access Journals (Sweden)

    Saeed El-Ashram

    2016-12-01

    Full Text Available Yield and quality are fundamental features for any researchers during nucleic acid extraction. Here, we describe a simplified, semi-unified, effective, and toxic material free protocol for extracting DNA and RNA from different prokaryotic and eukaryotic sources exploiting the physical and chemical properties of nucleic acids. Furthermore, this protocol showed that DNA and RNA are under triple protection (i.e. EDTA, SDS and NaCl during lysis step, and this environment is improper for RNase to have DNA liberated of RNA and even for DNase to degrade the DNA. Therefore, the complete removal of RNA under RNase influence is achieved when RNase is added after DNA extraction, which gives optimal quality with any protocols. Similarly, DNA contamination in an isolated RNA is degraded by DNase to obtain high-quality RNA. Our protocol is the protocol of choice in terms of simplicity, recovery time, environmental safety, amount, purity, PCR and RT-PCR applicability.

  2. A Lightweight Buyer-Seller Watermarking Protocol

    Directory of Open Access Journals (Sweden)

    Yongdong Wu

    2008-01-01

    Full Text Available The buyer-seller watermarking protocol enables a seller to successfully identify a traitor from a pirated copy, while preventing the seller from framing an innocent buyer. Based on finite field theory and the homomorphic property of public key cryptosystems such as RSA, several buyer-seller watermarking protocols (N. Memon and P. W. Wong (2001 and C.-L. Lei et al. (2004 have been proposed previously. However, those protocols require not only large computational power but also substantial network bandwidth. In this paper, we introduce a new buyer-seller protocol that overcomes those weaknesses by managing the watermarks. Compared with the earlier protocols, ours is n times faster in terms of computation, where n is the number of watermark elements, while incurring only O(1/lN times communication overhead given the finite field parameter lN. In addition, the quality of the watermarked image generated with our method is better, using the same watermark strength.

  3. Bitcoin-NG: A Scalable Blockchain Protocol

    OpenAIRE

    Eyal, Ittay; Gencer, Adem Efe; Sirer, Emin Gun; van Renesse, Robbert

    2015-01-01

    Cryptocurrencies, based on and led by Bitcoin, have shown promise as infrastructure for pseudonymous online payments, cheap remittance, trustless digital asset exchange, and smart contracts. However, Bitcoin-derived blockchain protocols have inherent scalability limits that trade-off between throughput and latency and withhold the realization of this potential. This paper presents Bitcoin-NG, a new blockchain protocol designed to scale. Based on Bitcoin's blockchain protocol, Bitcoin-NG is By...

  4. A case for evaluating sensor network protocols concurrently

    KAUST Repository

    Gnawali, Omprakash; Guibas, Leonidas; Levis, Philip

    2010-01-01

    Researchers typically evaluate and compare protocols on the testbeds by running them one at a time. This methodology ignores the variation in link qualities and wireless environment across these experiments. These variations can introduce significant noise in the results. Evaluating two protocols concurrently, however, suffers from inter-protocol interactions. These interactions can perturb performance even under very light load, especially timing and timing sensitive protocols. We argue that the benefits of running protocols concurrently greatly outweigh the disadvantages. Protocols rarely run in isolation in real networks, and so considering such interactions is valuable. Although the wireless environment is still uncontrolled, concurrent evaluations make comparisons fair and more statistically sound. Through experiments on two testbeds, we make the case for evaluating and comparing low data-rate sensor network protocols by running them concurrently. Copyright 2010 ACM.

  5. MODELLING AND VERIFICATION OF KITSAT PACKET COMMUNICATION PROTOCOLS

    Directory of Open Access Journals (Sweden)

    Young-Ro Lee

    1996-06-01

    Full Text Available In this paper, in order to verify KITSAT 1/2 packet communication protocols, we model the AX.25 protocol and PACSAT protocol by using an extended Petri net and then verify the correctness, boundedness, liveness and deadlock freeness of packet protocols by utilizing reachability trees.

  6. Game-theoretic perspective of Ping-Pong protocol

    Science.gov (United States)

    Kaur, Hargeet; Kumar, Atul

    2018-01-01

    We analyse Ping-Pong protocol from the point of view of a game. The analysis helps us in understanding the different strategies of a sender and an eavesdropper to gain the maximum payoff in the game. The study presented here characterizes strategies that lead to different Nash equilibriums. We further demonstrate the condition for Pareto optimality depending on the parameters used in the game. Moreover, we also analysed LM05 protocol and compared it with PP protocol from the point of view of a generic two-way QKD game with or without entanglement. Our results provide a deeper understanding of general two-way QKD protocols in terms of the security and payoffs of different stakeholders in the protocol.

  7. Technical Analysis of SSP-21 Protocol

    Energy Technology Data Exchange (ETDEWEB)

    Bromberger, S. [Lawrence Livermore National Lab. (LLNL), Livermore, CA (United States)

    2017-06-09

    As part of the California Energy Systems for the Twenty-First Century (CES-21) program, in December 2016 San Diego Gas and Electric (SDG&E) contracted with Lawrence Livermore National Laboratory (LLNL) to perform an independent verification and validation (IV&V) of a white paper describing their Secure SCADA Protocol for the Twenty-First Century (SSP-21) in order to analyze the effectiveness and propriety of cryptographic protocol use within the SSP-21 specification. SSP-21 is designed to use cryptographic protocols to provide (optional) encryption, authentication, and nonrepudiation, among other capabilities. The cryptographic protocols to be used reflect current industry standards; future versions of SSP-21 will use other advanced technologies to provide a subset of security services.

  8. The case for a network protocol isolation layer

    KAUST Repository

    Il Choi, Jung

    2009-01-01

    Network protocols are typically designed and tested individually. In practice, however, applications use multiple protocols concurrently. This discrepancy can lead to failures from unanticipated interactions between protocols. In this paper, we argue that sensor network communication stacks should have an isolation layer, whose purpose is to make each protocol\\'s perception of the wireless channel independent of what other protocols are running. We identify two key mechanisms the isolation layer must provide: shared collision avoidance and fair channel allocation. We present an example design of an isolation layer that builds on the existing algorithms of grant-to-send and fair queueing. However, the complexities of wireless make these mechanisms insufficient by themselves. We therefore propose two new mechanisms that address these limitations: channel decay and fair cancellation. Incorporating these new mechanisms reduces the increase in end-to-end delivery cost associated with concurrently operating two protocols by more than 60%. The isolation layer improves median protocol fairness from 0.52 to 0.96 in Jain\\'s fairness index. Together, these results show that using an isolation layer makes protocols more efficient and robust. Copyright 2009 ACM.

  9. Formal analysis of a fair payment protocol

    NARCIS (Netherlands)

    J.G. Cederquist; M.T. Dashti (Mohammad)

    2004-01-01

    textabstractWe formally specify a payment protocol. This protocol is intended for fair exchange of time-sensitive data. Here the ?-CRL language is used to formalize the protocol. Fair exchange properties are expressed in the regular alternation-free ?-calculus. These properties are then verified

  10. An Enlightenment proposal for music therapy: Richard Brocklesby on music, spirit, and the passions.

    Science.gov (United States)

    Gouk, Penelope

    2015-01-01

    In 1749, the London physician Richard Brocklesby (1722-1797) published his Reflections on Antient [sic] and Modern Musick, an essay that not only sought to compare these practices in terms of their effects, but also to gather evidence supporting the use of music in treating mania and other mental diseases. As might be expected, Brocklesby's discussion of music therapy has already received attention by authors looking back to the origins of this practice, not least because he offers an account of a successful musical cure that took place in his own time (Rorke, 2001). My chapter, however, seeks to broaden the discussion of the Reflections, in order to show how Brocklesby's projected musical cures fit into his larger worldview, one that was influenced as much by Plato and other ancient philosophers as it was by modern thinkers such as Isaac Newton and his followers. Brocklesby's argument was essentially that music acted as a link between the mind and body and therefore could restore their intrinsic harmony, a connection that was mediated by the animal spirits, which also served as the vehicle of the passions. The movements and proportions of music could arouse or quell the passions by their effect on these (imaginary) spirits, which flowed through the nerves and brain and acted as the agent for the mind or soul. I show how his account of music in antiquity led him to reflect on the way that music was perceived and responded to in his own time, both as a stimulus to mental and bodily action, and as a source of esthetic pleasure through the cultivation of musical taste. © 2015 Elsevier B.V. All rights reserved.

  11. Formal Analysis of a Fair Payment Protocol

    NARCIS (Netherlands)

    Cederquist, J.G.; Dashti, M.T.

    2004-01-01

    We formally specify a payment protocol. This protocol is intended for fair exchange of timesensitive data. Here the μCRL language is used to formalize the protocol. Fair exchange properties are expressed in the regular alternation-free μ-calculus. These properties are then verified using the finite

  12. The comparative cost analysis of EAP Re-authentication Protocol and EAP TLS Protocol

    OpenAIRE

    Seema Mehla; Bhawna Gupta

    2010-01-01

    the Extensible Authentication Protocol (EAP) is a generic framework supporting multiple types of authentication methods. In systems where EAP is used for authentication, it is desirable to not repeat the entire EAP exchange with another authenticator. The EAP reauthentication Protocol provides a consistent, methodindependentand low-latency re-authentication. It is extension to current EAP mechanism to support intradomain handoff authentication. This paper analyzed the performance of the EAP r...

  13. Blockchain Consensus Protocols in the Wild

    OpenAIRE

    Cachin, Christian; Vukolić, Marko

    2017-01-01

    A blockchain is a distributed ledger for recording transactions, maintained by many nodes without central authority through a distributed cryptographic protocol. All nodes validate the information to be appended to the blockchain, and a consensus protocol ensures that the nodes agree on a unique order in which entries are appended. Consensus protocols for tolerating Byzantine faults have received renewed attention because they also address blockchain systems. This work discusses the process o...

  14. Security analysis of session initiation protocol

    OpenAIRE

    Dobson, Lucas E.

    2010-01-01

    Approved for public release; distribution is unlimited The goal of this thesis is to investigate the security of the Session Initiation Protocol (SIP). This was accomplished by researching previously discovered protocol and implementation vulnerabilities, evaluating the current state of security tools and using those tools to discover new vulnerabilities in SIP software. The CVSS v2 system was used to score protocol and implementation vulnerabilities to give them a meaning that was us...

  15. Differential phase-time shifting protocol for QKD (DPTS)

    DEFF Research Database (Denmark)

    Usuga Castaneda, Mario A.; Bacco, Davide; Christensen, Jesper Bjerge

    2016-01-01

    We explore the implementation of a novel protocol for fiber-based high-dimensional quantum key distribution (QKD) which improves over the traditional DPS-QKD and COW protocols.......We explore the implementation of a novel protocol for fiber-based high-dimensional quantum key distribution (QKD) which improves over the traditional DPS-QKD and COW protocols....

  16. Exact and grid-free solutions to the Lighthill-Whitham-Richards traffic flow model with bounded acceleration for a class of fundamental diagrams

    KAUST Repository

    Qiu, Shanwen

    2013-09-01

    In this article, we propose a new exact and grid-free numerical scheme for computing solutions associated with an hybrid traffic flow model based on the Lighthill-Whitham-Richards (LWR) partial differential equation, for a class of fundamental diagrams. In this hybrid flow model, the vehicles satisfy the LWR equation whenever possible, and have a constant acceleration otherwise. We first propose a mathematical definition of the solution as a minimization problem. We use this formulation to build a grid-free solution method for this model based on the minimization of component function. We then derive these component functions analytically for triangular fundamental diagrams, which are commonly used to model traffic flow. We also show that the proposed computational method can handle fixed or moving bottlenecks. A toolbox implementation of the resulting algorithm is briefly discussed, and posted at https://dl.dropbox.com/u/1318701/Toolbox.zip. © 2013 Elsevier Ltd.

  17. Formal Analysis of a Fair Payment Protocol

    NARCIS (Netherlands)

    Cederquist, J.G.; Dashti, Muhammad Torabi; Dimitrakos, Theo; Martinelli, Fabio

    We formally specify a payment protocol described by Vogt et al. This protocol is intended for fair exchange of time-sensitive data. Here the mCRL language is used to formalize the protocol. Fair exchange properties are expressed in the regular alternation-free mu-calculus. These properties are then

  18. The UMTS-AKA Protocols for Intelligent Transportation Systems

    Directory of Open Access Journals (Sweden)

    Hwang Min-Shiang

    2009-01-01

    Full Text Available The integration of communication protocols into transport systems is a much adored research area today. Much of seminal work has been reported on the topic of intelligent transportation systems (ITS in the recent years. Many advanced techniques have been garnered to improve online communication and to promote the security, comfort, and efficiency of ITS. Of primary importance to the effective application of ITS is the communication protocol used. A fascinating development is that the yesterday's Global System for Mobile Communication protocol is being replaced by the Universal Mobile Telecommunication System protocol, which is the third-generation mobile technology. This article attempts to identify a suitable communication system for ITS applications. It is impracticable to substantially modify the original UMTS-IMS-AKA protocol which is in practice because it can disturb the operation of the current system, and thus we explore other possibilities through this research. We investigate a novel protocol to make the original UMTS-IMS-AKA protocol compliant with ITS as well as adaptable into the current UMTS protocol.

  19. Cryptanalysis of the arbitrated quantum signature protocols

    International Nuclear Information System (INIS)

    Gao Fei; Qin Sujuan; Guo Fenzhuo; Wen Qiaoyan

    2011-01-01

    As a new model for signing quantum messages, arbitrated quantum signature (AQS) has recently received a lot of attention. In this paper we study the cryptanalysis of previous AQS protocols from the aspects of forgery and disavowal. We show that in these protocols the receiver, Bob, can realize existential forgery of the sender's signature under known message attack. Bob can even achieve universal forgery when the protocols are used to sign a classical message. Furthermore, the sender, Alice, can successfully disavow any of her signatures by simple attack. The attack strategies are described in detail and some discussions about the potential improvements of the protocols are given. Finally we also present several interesting topics on AQS protocols that can be studied in future.

  20. A Clustering Routing Protocol for Mobile Ad Hoc Networks

    Directory of Open Access Journals (Sweden)

    Jinke Huang

    2016-01-01

    Full Text Available The dynamic topology of a mobile ad hoc network poses a real challenge in the design of hierarchical routing protocol, which combines proactive with reactive routing protocols and takes advantages of both. And as an essential technique of hierarchical routing protocol, clustering of nodes provides an efficient method of establishing a hierarchical structure in mobile ad hoc networks. In this paper, we designed a novel clustering algorithm and a corresponding hierarchical routing protocol for large-scale mobile ad hoc networks. Each cluster is composed of a cluster head, several cluster gateway nodes, several cluster guest nodes, and other cluster members. The proposed routing protocol uses proactive protocol between nodes within individual clusters and reactive protocol between clusters. Simulation results show that the proposed clustering algorithm and hierarchical routing protocol provide superior performance with several advantages over existing clustering algorithm and routing protocol, respectively.

  1. Protocols for second-generation business satellites systems

    Science.gov (United States)

    Evans, B. G.; Coakley, F. P.; El Amin, M. H. M.

    The paper discusses the nature and mix of traffic in business satellite systems and describes the limitations on the protocol imposed by the differing impairments of speech, video, and data. A simple TDMA system protocol is presented which meets the requirements of mixed-service operation. The efficiency of the protocol together with implications for allocation, scheduling and synchronisation are discussed. Future-generation satellites will probably use on-board processing. Some initial work on protocols that make use of on-board processing and the implications for satellite and earth-station equipment are presented.

  2. Tool Supported Analysis of Web Services Protocols

    DEFF Research Database (Denmark)

    Marques, Abinoam P.; Ravn, Anders Peter; Srba, Jiri

    2011-01-01

    We describe an abstract protocol model suitable for modelling of web services and other protocols communicating via unreliable, asynchronous communication channels. The model is supported by a tool chain where the first step translates tables with state/transition protocol descriptions, often used...... e.g. in the design of web services protocols, into an intermediate XML format. We further translate this format into a network of communicating state machines directly suitable for verification in the model checking tool UPPAAL. We introduce two types of communication media abstractions in order...

  3. Radio protocols for LTE and LTE-advanced

    CERN Document Server

    Yi, SeungJune; Lee, YoungDae; Park, SungJun; Jung, SungHoon

    2012-01-01

    Provides a unique focus on radio protocols for LTE and LTE-Advanced (LTE-A) Giving readers a valuable understanding of LTE radio protocols, this book covers LTE (Long-Term Evolution) Layer 2/3 radio protocols as well as new features including LTE-Advanced. It is divided into two sections to differentiate between the two technologies' characteristics. The authors systematically explain the design principles and functions of LTE radio protocols during the development of mobile handsets. The book also provides essential knowledge on the interaction between mobile networks a

  4. Gene probes: principles and protocols

    National Research Council Canada - National Science Library

    Aquino de Muro, Marilena; Rapley, Ralph

    2002-01-01

    ... of labeled DNA has allowed genes to be mapped to single chromosomes and in many cases to a single chromosome band, promoting significant advance in human genome mapping. Gene Probes: Principles and Protocols presents the principles for gene probe design, labeling, detection, target format, and hybridization conditions together with detailed protocols, accom...

  5. New logistics protocols for distributed interactive simulation

    Science.gov (United States)

    Taylor, Darrin; Morrison, John; Katz, Warren; Felton, Erik; Herman, Deborah A.

    1995-06-01

    In today's environment, the transportation and maintenance of military forces is nearly as important as combat operations. Rapid deployment to regions of low-intensity conflict will become a very common training scenario for the U.S. military. Thus it is desirable to apply distributed simulation technology to train logistics personnel in their combat support roles. Currently, distributed interactive simulation (DIS) only contains rudimentary logistics protocols. This paper introduces new protocols designed to handle the logistics problem. The Newtonian protocol takes a physics-based approach to modeling interactions on the simulation network. This protocol consists of a family of protocol data units (PDUs) which are used to communicate forces in different circumstances. The protocol implements a small set of physical relations. This represents a flexible and general mechanism to describe battlefield interactions between network entities. The migratory object protocol (MOP) family addresses the transfer of control. General mechanisms provide the means to simulate resupply, repair, and maintenance of entities at any level of abstraction (individual soldier to division). It can also increase the fidelity of mine laying, enable handover of weapons for terminal guidance, allow for the distribution of aggregate-level simulation entities, provide capabilities for the simulation of personnel, etc.

  6. VANET Routing Protocols: Pros and Cons

    OpenAIRE

    Paul, Bijan; Ibrahim, Md.; Bikas, Md. Abu Naser

    2012-01-01

    VANET (Vehicular Ad-hoc Network) is a new technology which has taken enormous attention in the recent years. Due to rapid topology changing and frequent disconnection makes it difficult to design an efficient routing protocol for routing data among vehicles, called V2V or vehicle to vehicle communication and vehicle to road side infrastructure, called V2I. The existing routing protocols for VANET are not efficient to meet every traffic scenarios. Thus design of an efficient routing protocol h...

  7. Advanced Internet Protocols, Services, and Applications

    CERN Document Server

    Oki, Eiji; Tatipamula, Mallikarjun; Vogt, Christian

    2012-01-01

    Today, the internet and computer networking are essential parts of business, learning, and personal communications and entertainment. Virtually all messages or transactions sent over the internet are carried using internet infrastructure- based on advanced internet protocols. Advanced internet protocols ensure that both public and private networks operate with maximum performance, security, and flexibility. This book is intended to provide a comprehensive technical overview and survey of advanced internet protocols, first providing a solid introduction and going on to discu

  8. Protocol for Communication Networking for Formation Flying

    Science.gov (United States)

    Jennings, Esther; Okino, Clayton; Gao, Jay; Clare, Loren

    2009-01-01

    An application-layer protocol and a network architecture have been proposed for data communications among multiple autonomous spacecraft that are required to fly in a precise formation in order to perform scientific observations. The protocol could also be applied to other autonomous vehicles operating in formation, including robotic aircraft, robotic land vehicles, and robotic underwater vehicles. A group of spacecraft or other vehicles to which the protocol applies could be characterized as a precision-formation- flying (PFF) network, and each vehicle could be characterized as a node in the PFF network. In order to support precise formation flying, it would be necessary to establish a corresponding communication network, through which the vehicles could exchange position and orientation data and formation-control commands. The communication network must enable communication during early phases of a mission, when little positional knowledge is available. Particularly during early mission phases, the distances among vehicles may be so large that communication could be achieved only by relaying across multiple links. The large distances and need for omnidirectional coverage would limit communication links to operation at low bandwidth during these mission phases. Once the vehicles were in formation and distances were shorter, the communication network would be required to provide high-bandwidth, low-jitter service to support tight formation-control loops. The proposed protocol and architecture, intended to satisfy the aforementioned and other requirements, are based on a standard layered-reference-model concept. The proposed application protocol would be used in conjunction with conventional network, data-link, and physical-layer protocols. The proposed protocol includes the ubiquitous Institute of Electrical and Electronics Engineers (IEEE) 802.11 medium access control (MAC) protocol to be used in the datalink layer. In addition to its widespread and proven use in

  9. The case for a network protocol isolation layer

    KAUST Repository

    Il Choi, Jung; Kazandjieva, Maria A.; Jain, Mayank; Levis, Philip

    2009-01-01

    Network protocols are typically designed and tested individually. In practice, however, applications use multiple protocols concurrently. This discrepancy can lead to failures from unanticipated interactions between protocols. In this paper, we argue that sensor network communication stacks should have an isolation layer, whose purpose is to make each protocol's perception of the wireless channel independent of what other protocols are running. We identify two key mechanisms the isolation layer must provide: shared collision avoidance and fair channel allocation. We present an example design of an isolation layer that builds on the existing algorithms of grant-to-send and fair queueing. However, the complexities of wireless make these mechanisms insufficient by themselves. We therefore propose two new mechanisms that address these limitations: channel decay and fair cancellation. Incorporating these new mechanisms reduces the increase in end-to-end delivery cost associated with concurrently operating two protocols by more than 60%. The isolation layer improves median protocol fairness from 0.52 to 0.96 in Jain's fairness index. Together, these results show that using an isolation layer makes protocols more efficient and robust. Copyright 2009 ACM.

  10. A Self-Stabilizing Synchronization Protocol for Arbitrary Digraphs

    Science.gov (United States)

    Malekpour, Mahyar R.

    2011-01-01

    This paper presents a self-stabilizing distributed clock synchronization protocol in the absence of faults in the system. It is focused on the distributed clock synchronization of an arbitrary, non-partitioned digraph ranging from fully connected to 1-connected networks of nodes while allowing for differences in the network elements. This protocol does not rely on assumptions about the initial state of the system, other than the presence of at least one node, and no central clock or a centrally generated signal, pulse, or message is used. Nodes are anonymous, i.e., they do not have unique identities. There is no theoretical limit on the maximum number of participating nodes. The only constraint on the behavior of the node is that the interactions with other nodes are restricted to defined links and interfaces. This protocol deterministically converges within a time bound that is a linear function of the self-stabilization period. We present an outline of a deductive proof of the correctness of the protocol. A bounded model of the protocol was mechanically verified for a variety of topologies. Results of the mechanical proof of the correctness of the protocol are provided. The model checking results have verified the correctness of the protocol as they apply to the networks with unidirectional and bidirectional links. In addition, the results confirm the claims of determinism and linear convergence. As a result, we conjecture that the protocol solves the general case of this problem. We also present several variations of the protocol and discuss that this synchronization protocol is indeed an emergent system.

  11. Extraction protocols for orthodontic treatment: A retrospective study

    Directory of Open Access Journals (Sweden)

    Vaishnevi N Thirunavukkarasu

    2016-01-01

    Full Text Available Background and Objectives: Various extraction protocols have been followed for successful orthodontic treatment. The purpose of this study was to evaluate the extraction protocols in patients who had previously undergone orthodontic treatment and also who had reported for continuing orthodontic treatment from other clinics. Materials and Methods: One hundred thirty eight patients who registered for orthodontic treatment at the Faculty of Dentistry were divided into 10 extraction protocols based on the Orthodontic treatment protocol given by Janson et al. and were evaluated for statistical significance. Results: The descriptive statistics of the study revealed a total of 40 (29% patients in protocol 1, 43 (31.2% in protocol 2, 18 (13% in protocol 3, 16 (11.6% in protocol 5, and 12 (8.7% in Type 3 category of protocol 9. The Type 3 category in protocol 9 was statistically significant compared to other studies. Midline shift and collapse of the arch form were noticed in these individuals. Conclusion: Extraction of permanent teeth such as canine and lateral incisors without rational reasons could have devastating consequences on the entire occlusion. The percentage of cases wherein extraction of permanent teeth in the crowded region was adopted as a treatment option instead of orthodontic treatment is still prevalent in dental practice. The shortage of orthodontists in Malaysia, the long waiting period, and lack of subjective need for orthodontic treatment at an earlier age group were the reasons for the patient's to choose extraction of the mal-aligned teeth such as the maxillary canine or maxillary lateral incisors.

  12. Survey of protocols for the manual segmentation of the hippocampus: preparatory steps towards a joint EADC-ADNI harmonized protocol.

    Science.gov (United States)

    Boccardi, Marina; Ganzola, Rossana; Bocchetta, Martina; Pievani, Michela; Redolfi, Alberto; Bartzokis, George; Camicioli, Richard; Csernansky, John G; de Leon, Mony J; deToledo-Morrell, Leyla; Killiany, Ronald J; Lehéricy, Stéphane; Pantel, Johannes; Pruessner, Jens C; Soininen, H; Watson, Craig; Duchesne, Simon; Jack, Clifford R; Frisoni, Giovanni B

    2011-01-01

    Manual segmentation from magnetic resonance imaging (MR) is the gold standard for evaluating hippocampal atrophy in Alzheimer's disease (AD). Nonetheless, different segmentation protocols provide up to 2.5-fold volume differences. Here we surveyed the most frequently used segmentation protocols in the AD literature as a preliminary step for international harmonization. The anatomical landmarks (anteriormost and posteriormost slices, superior, inferior, medial, and lateral borders) were identified from 12 published protocols for hippocampal manual segmentation ([Abbreviation] first author, publication year: [B] Bartzokis, 1998; [C] Convit, 1997; [dTM] deToledo-Morrell, 2004; [H] Haller, 1997; [J] Jack, 1994; [K] Killiany, 1993; [L] Lehericy, 1994; [M] Malykhin, 2007; [Pa] Pantel, 2000; [Pr] Pruessner, 2000; [S] Soininen, 1994; [W] Watson, 1992). The hippocampi of one healthy control and one AD patient taken from the 1.5T MR ADNI database were segmented by a single rater according to each protocol. The accuracy of the protocols' interpretation and translation into practice was checked with lead authors of protocols through individual interactive web conferences. Semantically harmonized landmarks and differences were then extracted, regarding: (a) the posteriormost slice, protocol [B] being the most restrictive, and [H, M, Pa, Pr, S] the most inclusive; (b) inclusion [C, dTM, J, L, M, Pr, W] or exclusion [B, H, K, Pa, S] of alveus/fimbria; (c) separation from the parahippocampal gyrus, [C] being the most restrictive, [B, dTM, H, J, Pa, S] the most inclusive. There were no substantial differences in the definition of the anteriormost slice. This survey will allow us to operationalize differences among protocols into tracing units, measure their impact on the repeatability and diagnostic accuracy of manual hippocampal segmentation, and finally develop a harmonized protocol.

  13. A secure key agreement protocol based on chaotic maps

    International Nuclear Information System (INIS)

    Wang Xing-Yuan; Luan Da-Peng

    2013-01-01

    To guarantee the security of communication in the public channel, many key agreement protocols have been proposed. Recently, Gong et al. proposed a key agreement protocol based on chaotic maps with password sharing. In this paper, Gong et al.'s protocol is analyzed, and we find that this protocol exhibits key management issues and potential security problems. Furthermore, the paper presents a new key agreement protocol based on enhanced Chebyshev polynomials to overcome these problems. Through our analysis, our key agreement protocol not only provides mutual authentication and the ability to resist a variety of common attacks, but also solve the problems of key management and security issues existing in Gong et al.'s protocol

  14. The protocol amending the 1963 Vienna Convention

    International Nuclear Information System (INIS)

    Lamm, V.

    2006-01-01

    Technically the Vienna Convention was revised by the adoption of the protocol to amend the instrument. and according to Article 19 of the protocol 'A State which is Party to this Protocol but not to the 1963 Vienna Convention shall be bound by the provisions of that Convention as amended by this Protocol in relation to other States Parties hereto, and failing an expression of a different intention by that State at the time of deposit of an instrument referred to in Article 20 shall be bound by the provisions of the 1963 Vienna Convention in relation to States which are only Parties thereto'. This solution has created a special situation, because after the entry into force of the protocol there will be living together or operating in practice 'two' Vienna Conventions, notably the convention's original text of 1963 and its new version as amended by the protocol. After the protocol has come into force, a state may only accede to the amended version, but in the inter se relations of the States Party to the 'old' Vienna Convention the provisions of that convention will remain in force until such time as they have acceded to the new protocol. This rather complicated situation is nevertheless understandable and is fully in accord with Article 40 of the 1969 Vienna Convention on the Law of Treaties, which provides for the amendment of multilateral treaties. In 1989 the negotiations on the revision of the Vienna Convention had begun with the aim of strengthening the existing nuclear liability regime and of improving the situation of potential victims of nuclear accidents. The Protocol to Amend the Vienna Convention serves those purposes; it also reflects a good compromise, since it is the outcome of a negotiation process in which experts from both nuclear and non-nuclear states, from Contacting Parties and non-Contracting Parties were very active. That affords some assurance that the compromise solution reached is acceptable to all States participating in the adoption of

  15. Security Protocol Review Method Analyzer(SPRMAN)

    OpenAIRE

    Navaz, A. S. Syed; Narayanan, H. Iyyappa; Vinoth, R.

    2013-01-01

    This Paper is designed using J2EE (JSP, SERVLET), HTML as front end and a Oracle 9i is back end. SPRMAN is been developed for the client British Telecom (BT) UK., Telecom company. Actually the requirement of BT is, they are providing Network Security Related Products to their IT customers like Virtusa,Wipro,HCL etc., This product is framed out by set of protocols and these protocols are been associated with set of components. By grouping all these protocols and components together, product is...

  16. Energy-Aware RFID Anti-Collision Protocol.

    Science.gov (United States)

    Arjona, Laura; Simon, Hugo Landaluce; Ruiz, Asier Perallos

    2018-06-11

    The growing interest in mobile devices is transforming wireless identification technologies. Mobile and battery-powered Radio Frequency Identification (RFID) readers, such as hand readers and smart phones, are are becoming increasingly attractive. These RFID readers require energy-efficient anti-collision protocols to minimize the tag collisions and to expand the reader's battery life. Furthermore, there is an increasing interest in RFID sensor networks with a growing number of RFID sensor tags. Thus, RFID application developers must be mindful of tag anti-collision protocols. Energy-efficient protocols involve a low reader energy consumption per tag. This work presents a thorough study of the reader energy consumption per tag and analyzes the main factor that affects this metric: the frame size update strategy. Using the conclusion of this analysis, the anti-collision protocol Energy-Aware Slotted Aloha (EASA) is presented to decrease the energy consumption per tag. The frame size update strategy of EASA is configured to minimize the energy consumption per tag. As a result, EASA presents an energy-aware frame. The performance of the proposed protocol is evaluated and compared with several state of the art Aloha-based anti-collision protocols based on the current RFID standard. Simulation results show that EASA, with an average of 15 mJ consumed per tag identified, achieves a 6% average improvement in the energy consumption per tag in relation to the strategies of the comparison.

  17. Symmetric cryptographic protocols

    CERN Document Server

    Ramkumar, Mahalingam

    2014-01-01

    This book focuses on protocols and constructions that make good use of symmetric pseudo random functions (PRF) like block ciphers and hash functions - the building blocks for symmetric cryptography. Readers will benefit from detailed discussion of several strategies for utilizing symmetric PRFs. Coverage includes various key distribution strategies for unicast, broadcast and multicast security, and strategies for constructing efficient digests of dynamic databases using binary hash trees.   •        Provides detailed coverage of symmetric key protocols •        Describes various applications of symmetric building blocks •        Includes strategies for constructing compact and efficient digests of dynamic databases

  18. Event-by-event simulation of quantum cryptography protocols

    NARCIS (Netherlands)

    Zhao, S.; Raedt, H. De

    We present a new approach to simulate quantum cryptography protocols using event-based processes. The method is validated by simulating the BB84 protocol and the Ekert protocol, both without and with the presence of an eavesdropper.

  19. WDM Network and Multicasting Protocol Strategies

    Directory of Open Access Journals (Sweden)

    Pinar Kirci

    2014-01-01

    Full Text Available Optical technology gains extensive attention and ever increasing improvement because of the huge amount of network traffic caused by the growing number of internet users and their rising demands. However, with wavelength division multiplexing (WDM, it is easier to take the advantage of optical networks and optical burst switching (OBS and to construct WDM networks with low delay rates and better data transparency these technologies are the best choices. Furthermore, multicasting in WDM is an urgent solution for bandwidth-intensive applications. In the paper, a new multicasting protocol with OBS is proposed. The protocol depends on a leaf initiated structure. The network is composed of source, ingress switches, intermediate switches, edge switches, and client nodes. The performance of the protocol is examined with Just Enough Time (JET and Just In Time (JIT reservation protocols. Also, the paper involves most of the recent advances about WDM multicasting in optical networks. WDM multicasting in optical networks is given as three common subtitles: Broadcast and-select networks, wavelength-routed networks, and OBS networks. Also, in the paper, multicast routing protocols are briefly summarized and optical burst switched WDM networks are investigated with the proposed multicast schemes.

  20. A More Efficient Contextuality Distillation Protocol

    Science.gov (United States)

    Meng, Hui-xian; Cao, Huai-xin; Wang, Wen-hua; Fan, Ya-jing; Chen, Liang

    2018-03-01

    Based on the fact that both nonlocality and contextuality are resource theories, it is natural to ask how to amplify them more efficiently. In this paper, we present a contextuality distillation protocol which produces an n-cycle box B ∗ B ' from two given n-cycle boxes B and B '. It works efficiently for a class of contextual n-cycle ( n ≥ 4) boxes which we termed as "the generalized correlated contextual n-cycle boxes". For any two generalized correlated contextual n-cycle boxes B and B ', B ∗ B ' is more contextual than both B and B '. Moreover, they can be distilled toward to the maximally contextual box C H n as the times of iteration goes to infinity. Among the known protocols, our protocol has the strongest approximate ability and is optimal in terms of its distillation rate. What is worth noting is that our protocol can witness a larger set of nonlocal boxes that make communication complexity trivial than the protocol in Brunner and Skrzypczyk (Phys. Rev. Lett. 102, 160403 2009), this might be helpful for exploring the problem that why quantum nonlocality is limited.

  1. An one-time-pad key communication protocol with entanglement

    OpenAIRE

    Cai, Qing-yu

    2003-01-01

    We present an one-time-pad key communication protocol that allows secure direct communication with entanglement. Alice can send message to Bob in a deterministic manner by using local measurements and public communication. The theoretical efficiency of this protocol is double compared with BB84 protocol. We show this protocol is unconditional secure under arbitrary quantum attack. And we discuss that this protocol can be perfectly implemented with current technologies.

  2. Prosthesis Prescription Protocol of the Arm (PPP-Arm) : The implementation of a national prosthesis prescription protocol

    NARCIS (Netherlands)

    Wijdenes, Paula; Brouwers, Michael; van der Sluis, Corry K

    BACKGROUND AND AIM: In order to create more uniformity in the prescription of upper limb prostheses by Dutch rehabilitation teams, the development and implementation of a Prosthesis Prescription Protocol of the upper limb (PPP-Arm) was initiated. The aim was to create a national digital protocol to

  3. Improvement In MAODV Protocol Using Location Based Routing Protocol

    Directory of Open Access Journals (Sweden)

    Kaur Sharnjeet

    2016-01-01

    Full Text Available Energy saving is difficult in wireless sensor network (WSN due to limited resources. Each node in WSN is constrained by their limited battery power for their energy. The energy is reduced as the time goes off due to the packet transmission and reception. Energy management techniques are necessary to minimize the total power consumption of all the nodes in the network in order to maximize its life span. Our proposed protocol Location based routing (LBR aimed to find a path which utilizes the minimum energy to transmit the packets between the source and the destination. The required energy for the transmission and reception of data is evaluated in MATLAB. LBR is implemented on Multicast Ad hoc On Demand Distance Vector Routing Protocol (MAODV to manage the energy consumption in the transmission and reception of data. Simulation results of LBR show the energy consumption has been reduced.

  4. Analyzing security protocols in hierarchical networks

    DEFF Research Database (Denmark)

    Zhang, Ye; Nielson, Hanne Riis

    2006-01-01

    Validating security protocols is a well-known hard problem even in a simple setting of a single global network. But a real network often consists of, besides the public-accessed part, several sub-networks and thereby forms a hierarchical structure. In this paper we first present a process calculus...... capturing the characteristics of hierarchical networks and describe the behavior of protocols on such networks. We then develop a static analysis to automate the validation. Finally we demonstrate how the technique can benefit the protocol development and the design of network systems by presenting a series...

  5. Developing security protocols in χ-Spaces

    DEFF Research Database (Denmark)

    Crazzolara, Federico; Milicia, Giuseppe

    2002-01-01

    It is of paramount importance that a security protocol effectively enforces the desired security requirements. The apparent simplicity of informal protocol descriptions hides the inherent complexity of their interactions which, often, invalidate informal correctness arguments and justify the effort...

  6. The rudiments of an Internet-based health plan for consumers: an interview with John Danaher, MD, MBA. Interview by Richard L. Reece.

    Science.gov (United States)

    Danaher, J

    2000-01-01

    Richard L. Reece, MD, interviewed John Danaher, MD, MBA, on August 16, 2000, to discuss how his new company is preparing for the perfect storm--the looming convergence of demanding consumers, defined contributions, and Internet-based health plans. He describes how his firm is putting financial and clinical tools in the hands of consumers and physicians, so consumers can be more enlightened in their health care choices. Danaher says, "We're not about buying goods and services online. We are transforming the way consumers buy health care and seek insurance. We're trying to be a 401 k where people get on, knowing their risk profile and return horizons. We aim to motivate consumers to be proactive in making health care choices. How do we make consumers responsible and motivated enough to take control of managing their health care costs? How well we articulate this call to consumer action will be the key to our success."

  7. Comparison of a new whole-body continuous-table-movement protocol versus a standard whole-body MR protocol for the assessment of multiple myeloma

    International Nuclear Information System (INIS)

    Weckbach, S.; Michaely, H.J.; Schoenberg, S.O.; Dinter, D.J.; Stemmer, A.

    2010-01-01

    To evaluate a whole body (WB) continuous-table-movement (CTM) MR protocol for the assessment of multiple myeloma (MM) in comparison to a step-by-step WB protocol. Eighteen patients with MM were examined at 1.5T using a WB CTM protocol (axial T2-w fs BLADE, T1-w GRE sequence) and a step-by-step WB protocol including coronal/sagittal T1-w SE and STIR sequences as reference. Protocol time was assessed. Image quality, artefacts, liver/spleen assessability, and the ability to depict bone marrow lesions less than or greater than 1 cm as well as diffuse infiltration and soft tissue lesions were rated. Potential changes in the Durie and Salmon Plus stage and the detectability of complications were assessed. Mean protocol time was 6:38 min (CTM) compared to 24:32 min (standard). Image quality was comparable. Artefacts were more prominent using the CTM protocol (P = 0.0039). Organ assessability was better using the CTM protocol (P < 0.001). Depiction of bone marrow and soft tissue lesions was identical without a staging shift. Vertebral fractures were not detected using the CTM protocol. The new protocol allows a higher patient throughput and facilitates the depiction of extramedullary lesions. However, as long as vertebral fractures are not detectable, the protocol cannot be safely used for clinical routine without the acquisition of an additional sagittal sequence. (orig.)

  8. Effectiveness and Limitations of E-Mail Security Protocols

    OpenAIRE

    M. Tariq Banday

    2011-01-01

    Simple Mail Transport Protocol is the most widely adopted protocol for e-mail delivery. However, it lackssecurity features for privacy, authentication of sending party, integrity of e-mail message, nonrepudiationand consistency of e-mail envelope. To make e-mail communication secure and private,e-mail servers incorporate one or more security features using add-on security protocols. The add-onsecurity protocols provide a reasonable security but have several limitations. This paper discussesli...

  9. Quantum Communication Attacks on Classical Cryptographic Protocols

    DEFF Research Database (Denmark)

    Damgård, Ivan Bjerre

    , one can show that the protocol remains secure even under such an attack. However, there are also cases where the honest players are quantum as well, even if the protocol uses classical communication. For instance, this is the case when classical multiparty computation is used as a “subroutine......In the literature on cryptographic protocols, it has been studied several times what happens if a classical protocol is attacked by a quantum adversary. Usually, this is taken to mean that the adversary runs a quantum algorithm, but communicates classically with the honest players. In several cases......” in quantum multiparty computation. Furthermore, in the future, players in a protocol may employ quantum computing simply to improve efficiency of their local computation, even if the communication is supposed to be classical. In such cases, it no longer seems clear that a quantum adversary must be limited...

  10. Quantum Communication Attacks on Classical Cryptographic Protocols

    DEFF Research Database (Denmark)

    Damgård, Ivan Bjerre

    , one can show that the protocol remains secure even under such an attack. However, there are also cases where the honest players are quantum as well, even if the protocol uses classical communication. For instance, this is the case when classical multiparty computation is used as a “subroutine......” in quantum multiparty computation. Furthermore, in the future, players in a protocol may employ quantum computing simply to improve efficiency of their local computation, even if the communication is supposed to be classical. In such cases, it no longer seems clear that a quantum adversary must be limited......In the literature on cryptographic protocols, it has been studied several times what happens if a classical protocol is attacked by a quantum adversary. Usually, this is taken to mean that the adversary runs a quantum algorithm, but communicates classically with the honest players. In several cases...

  11. Search and nonsearch protocols for radiographic consultation

    International Nuclear Information System (INIS)

    Swensson, R.G.; Theodore, G.H.

    1989-01-01

    Six radiologists, acting as film reviewers, used two different consultation protocols to differentiate among 292 ambiguous findings on chest films: 120 simulated nodules and 172 normal findings (previous readers' false-positive reports of nodules). The non-search protocol identified each finding (by location), and reviewers rated its likelihood as a nodule. The search protocol, which asked reviewers to report and rate all locations regarded as possible nodules on each film, assigned a default negative rating to any unreported finding (nodule or normal). Receiver operator characteristic analyses demonstrated a significantly higher accuracy for each reviewer's search- protocol discriminations between these nodules and confusing normal findings

  12. An Authentication Protocol for Future Sensor Networks.

    Science.gov (United States)

    Bilal, Muhammad; Kang, Shin-Gak

    2017-04-28

    Authentication is one of the essential security services in Wireless Sensor Networks (WSNs) for ensuring secure data sessions. Sensor node authentication ensures the confidentiality and validity of data collected by the sensor node, whereas user authentication guarantees that only legitimate users can access the sensor data. In a mobile WSN, sensor and user nodes move across the network and exchange data with multiple nodes, thus experiencing the authentication process multiple times. The integration of WSNs with Internet of Things (IoT) brings forth a new kind of WSN architecture along with stricter security requirements; for instance, a sensor node or a user node may need to establish multiple concurrent secure data sessions. With concurrent data sessions, the frequency of the re-authentication process increases in proportion to the number of concurrent connections. Moreover, to establish multiple data sessions, it is essential that a protocol participant have the capability of running multiple instances of the protocol run, which makes the security issue even more challenging. The currently available authentication protocols were designed for the autonomous WSN and do not account for the above requirements. Hence, ensuring a lightweight and efficient authentication protocol has become more crucial. In this paper, we present a novel, lightweight and efficient key exchange and authentication protocol suite called the Secure Mobile Sensor Network (SMSN) Authentication Protocol. In the SMSN a mobile node goes through an initial authentication procedure and receives a re-authentication ticket from the base station. Later a mobile node can use this re-authentication ticket when establishing multiple data exchange sessions and/or when moving across the network. This scheme reduces the communication and computational complexity of the authentication process. We proved the strength of our protocol with rigorous security analysis (including formal analysis using the BAN

  13. An Exact and Grid-free Numerical Scheme for the Hybrid Two Phase Traffic Flow Model Based on the Lighthill-Whitham-Richards Model with Bounded Acceleration

    KAUST Repository

    Qiu, Shanwen

    2012-07-01

    In this article, we propose a new grid-free and exact solution method for computing solutions associated with an hybrid traffic flow model based on the Lighthill- Whitham-Richards (LWR) partial differential equation. In this hybrid flow model, the vehicles satisfy the LWR equation whenever possible, and have a fixed acceleration otherwise. We first present a grid-free solution method for the LWR equation based on the minimization of component functions. We then show that this solution method can be extended to compute the solutions to the hybrid model by proper modification of the component functions, for any concave fundamental diagram. We derive these functions analytically for the specific case of a triangular fundamental diagram. We also show that the proposed computational method can handle fixed or moving bottlenecks.

  14. FLIP: An Internetwork Protocol for Supporting Distributed Systems

    NARCIS (Netherlands)

    Kaashoek, M.F.; van Renesse, R.; van Staveren, H.; Tanenbaum, A.S.

    1993-01-01

    Most modern network protocols give adequate support for traditional applications such as file transfer and remote login. Distributed applications, however, have different requirements 1993. Instead of using ad hoc protocols to meet each of the new requirements, we have designed a new protocol,

  15. Biometrics based authentication scheme for session initiation protocol.

    Science.gov (United States)

    Xie, Qi; Tang, Zhixiong

    2016-01-01

    Many two-factor challenge-response based session initiation protocol (SIP) has been proposed, but most of them are vulnerable to smart card stolen attacks and password guessing attacks. In this paper, we propose a novel three-factor SIP authentication scheme using biometrics, password and smart card, and utilize the pi calculus-based formal verification tool ProVerif to prove that the proposed protocol achieves security and authentication. Furthermore, our protocol is highly efficient when compared to other related protocols.

  16. Security of the arbitrated quantum signature protocols revisited

    International Nuclear Information System (INIS)

    Kejia, Zhang; Dan, Li; Qi, Su

    2014-01-01

    Recently, much attention has been paid to the study of arbitrated quantum signature (AQS). Among these studies, the cryptanalysis of some AQS protocols and a series of improved ideas have been proposed. Compared with the previous analysis, we present a security criterion, which can judge whether an AQS protocol is able to prevent the receiver (i.e. one participant in the signature protocol) from forging a legal signature. According to our results, it can be seen that most AQS protocols which are based on the Zeng and Keitel (ZK) model are susceptible to a forgery attack. Furthermore, we present an improved idea of the ZK protocol. Finally, some supplement discussions and several interesting topics are provided. (paper)

  17. An electronic specimen collection protocol schema (eSCPS). Document architecture for specimen management and the exchange of specimen collection protocols between biobanking information systems.

    Science.gov (United States)

    Eminaga, O; Semjonow, A; Oezguer, E; Herden, J; Akbarov, I; Tok, A; Engelmann, U; Wille, S

    2014-01-01

    The integrity of collection protocols in biobanking is essential for a high-quality sample preparation process. However, there is not currently a well-defined universal method for integrating collection protocols in the biobanking information system (BIMS). Therefore, an electronic schema of the collection protocol that is based on Extensible Markup Language (XML) is required to maintain the integrity and enable the exchange of collection protocols. The development and implementation of an electronic specimen collection protocol schema (eSCPS) was performed at two institutions (Muenster and Cologne) in three stages. First, we analyzed the infrastructure that was already established at both the biorepository and the hospital information systems of these institutions and determined the requirements for the sufficient preparation of specimens and documentation. Second, we designed an eSCPS according to these requirements. Finally, a prospective study was conducted to implement and evaluate the novel schema in the current BIMS. We designed an eSCPS that provides all of the relevant information about collection protocols. Ten electronic collection protocols were generated using the supplementary Protocol Editor tool, and these protocols were successfully implemented in the existing BIMS. Moreover, an electronic list of collection protocols for the current studies being performed at each institution was included, new collection protocols were added, and the existing protocols were redesigned to be modifiable. The documentation time was significantly reduced after implementing the eSCPS (5 ± 2 min vs. 7 ± 3 min; p = 0.0002). The eSCPS improves the integrity and facilitates the exchange of specimen collection protocols in the existing open-source BIMS.

  18. Establishing treatment protocols for clinical mastitis.

    Science.gov (United States)

    Roberson, Jerry R

    2003-03-01

    Each farm has a unique mix of mastitis pathogens and management procedures that have evolved over time. The herd veterinarian should work with the manager/owner to systematically develop treatment protocols that meet the needs and management of the farm. To establish a mastitis treatment protocol, it is necessary to develop a system to routinely identify clinical mastitis cases, develop a herd-specific severity level assessment system, manage the clinical mastitis cases based on severity level and culture result (when available), avoid antibiotic residues, and monitor the success of the system and alter the protocol as necessary.

  19. The Singapore protocol [for quantum cryptography

    International Nuclear Information System (INIS)

    Englert, B.

    2005-01-01

    The qubit protocol for quantum key distribution presented in this talk is fully tomographic and more efficient than other tomographic protocols. Under ideal circumstances the efficiency is log 2 (4/3) = 0.415 key bits per qubit sent, which is 25% more than the efficiency of 1/3 = 0.333 for the standard 6-state protocol. One can extract 0.4 key bits per qubit by a simple two-way communication scheme, and can so get close to the information-theoretical limit. The noise thresholds for secure key bit generation in the presence of unbiased noise will be reported and discussed. (author)

  20. Securing statically-verified communications protocols against timing attacks

    DEFF Research Database (Denmark)

    Buchholtz, Mikael; Gilmore, Stephen; Hillston, Jane

    2004-01-01

    We present a federated analysis of communication protocols which considers both security properties and timing. These are not entirely independent observations of a protocol; by using timing observations of an executing protocol it is possible to deduce derived information about the nature...... of the communication even in the presence of unbreakable encryption. Our analysis is based on expressing the protocol as a process algebra model and deriving from this process models analysable by the Imperial PEPA Compiler and the LySatool....

  1. Optimized UAV Communication Protocol Based on Prior Locations

    OpenAIRE

    Sboui, Lokman; Rabah, Abdullatif

    2015-01-01

    In this paper, we adopt a new communication protocol between the UAV and fixed on-ground nodes. This protocol tends to reduce communication power consumption by stopping communication if the channel is not good to communicate (i.e. far nodes, obstacles, etc.) The communication is performed using the XBee 868M standard and Libelium wapsmotes. Our designed protocol is based on a new communication model that we propose in this paper. The protocole decides wether to communicate or not after compu...

  2. Decellularization of placentas: establishing a protocol

    Directory of Open Access Journals (Sweden)

    L.C.P.C. Leonel

    2017-11-01

    Full Text Available Biological biomaterials for tissue engineering purposes can be produced through tissue and/or organ decellularization. The remaining extracellular matrix (ECM must be acellular and preserve its proteins and physical features. Placentas are organs of great interest because they are discarded after birth and present large amounts of ECM. Protocols for decellularization are tissue-specific and have not been established for canine placentas yet. This study aimed at analyzing a favorable method for decellularization of maternal and fetal portions of canine placentas. Canine placentas were subjected to ten preliminary tests to analyze the efficacy of parameters such as the type of detergents, freezing temperatures and perfusion. Two protocols were chosen for further analyses using histology, scanning electron microscopy, immunofluorescence and DNA quantification. Sodium dodecyl sulfate (SDS was the most effective detergent for cell removal. Freezing placentas before decellularization required longer periods of incubation in different detergents. Both perfusion and immersion methods were capable of removing cells. Placentas decellularized using Protocol I (1% SDS, 5 mM EDTA, 50 mM TRIS, and 0.5% antibiotic preserved the ECM structure better, but Protocol I was less efficient to remove cells and DNA content from the ECM than Protocol II (1% SDS, 5 mM EDTA, 0.05% trypsin, and 0.5% antibiotic.

  3. Mac protocols for wireless sensor network (wsn): a comparative study

    International Nuclear Information System (INIS)

    Arshad, J.; Akram, Q.; Saleem, Y.

    2014-01-01

    Data communication between nodes is carried out under Medium Access Control (MAC) protocol which is defined at data link layer. The MAC protocols are responsible to communicate and coordinate between nodes according to the defined standards in WSN (Wireless Sensor Networks). The design of a MAC protocol should also address the issues of energy efficiency and transmission efficiency. There are number of MAC protocols that exist in the literature proposed for WSN. In this paper, nine MAC protocols which includes S-MAC, T-MAC, Wise-MAC, Mu-MAC, Z-MAC, A-MAC, D-MAC, B-MAC and B-MAC+ for WSN have been explored, studied and analyzed. These nine protocols are classified in contention based and hybrid (combination of contention and schedule based) MAC protocols. The goal of this comparative study is to provide a basis for MAC protocols and to highlight different mechanisms used with respect to parameters for the evaluation of energy and transmission efficiency in WSN. This study also aims to give reader a better understanding of the concepts, processes and flow of information used in these MAC protocols for WSN. A comparison with respect to energy reservation scheme, idle listening avoidance, latency, fairness, data synchronization, and throughput maximization has been presented. It was analyzed that contention based MAC protocols are less energy efficient as compared to hybrid MAC protocols. From the analysis of contention based MAC protocols in term of energy consumption, it was being observed that protocols based on preamble sampling consume lesser energy than protocols based on static or dynamic sleep schedule. (author)

  4. Verbal protocols as methodological resources: research evidence

    Directory of Open Access Journals (Sweden)

    Alessandra Baldo

    2012-01-01

    Full Text Available This article aims at reflecting on the use of verbal protocols as a methodological resource in qualitative research, more specifically on the aspect regarded as the main limitation of a study about lexical inferencing in L2 (BALDO; VELASQUES, 2010: its subjective trait. The article begins with a brief literature review on protocols, followed by a description of the study in which they were employed as methodological resources. Based on that, protocol subjectivity is illustrated through samples of unparalleled data classification, carried out independently by two researchers. In the final section, the path followed to minimize the problem is presented, intending to contribute to improve efficiency in the use of verbal protocols in future research.

  5. Conflict Without Casualties: Non-Lethal Weapons in Irregular Warfare

    Science.gov (United States)

    2007-09-01

    the body,” and the Geneva Protocol of 1925, bans the use of chemical and biological weapons .11 On 8 April 1975, President Ford issued Executive...E Funding – PE 63851M) (accessed 15 December 2006). The American Journal of Bioethics . “Medical Ethics and Non-Lethal Weapons .” Bioethics.net...CASUALTIES: NON-LETHAL WEAPONS IN IRREGULAR WARFARE by Richard L. Scott September 2007 Thesis Advisor: Robert McNab Second Reader

  6. A STRONG SECURITY PROTOCOL AGAINST FINGERPRINT DATABASE ATTACKS

    Directory of Open Access Journals (Sweden)

    U. Latha

    2013-08-01

    Full Text Available The Biometric data is subject to on-going changes and create a crucial problem in fingerprint database. To deal with this, a security protocol is proposed to protect the finger prints information from the prohibited users. Here, a security protocol is proposed to protect the finger prints information. The proposed system comprised of three phases namely, fingerprint reconstruction, feature extraction and development of trigon based security protocol. In fingerprint reconstruction, the different crack variance level finger prints images are reconstructed by the M-band Dual Tree Complex Wavelet Transform (DTCWT. After that features are extracted by binarization. A set of finger print images are utilized to evaluate the performance of security protocol and the result from this process guarantees the healthiness of the proposed trigon based security protocol. The implementation results show the effectiveness of proposed trigon based security protocol in protecting the finger print information and the achieved improvement in image reconstruction and the security process.

  7. Da Chrétien de Troyes a Shakespeare («The tragedy of King Richard the Third», a. I, sc. 2

    Directory of Open Access Journals (Sweden)

    Alfonso D'Agostino

    2015-07-01

    Full Text Available L’articolo si propone di considerare le somiglianze fra alcune vicende antico-francesi (l’Yvain di Chrétien de Troyes e il fabliau anonimo De celle que se fist foutre sur la fosse son mari con una scena del Riccardo III di Shakespeare. Anche se non si può dire che il dramma inglese dipenda dai testi narrativi oitanici, esso sviluppa lo stesso motivo della vedova consolata e una serie di motivi secondarî, di immagini (il sangue, il diavolo, la seduzione e di espressioni letterarie in modo sintomaticamente affine. The paper aims to evaluate similarities between some Old-French narratives (Chrétien de Troyes’ Yvain and the anonymous fabliau De celle que se fist foutre sur la fosse son mari and a scene from Shakespeare’s Richard III. Although we cannot affirm that Shakespeare’s play derives from the French narratives, it develops the same theme of “comforted widow” along with a series of secondary themes, of images (the blood, the devil, the seduction and literary expressions in a symptomatically, very similar way.

  8. Cryptographic protocol security analysis based on bounded constructing algorithm

    Institute of Scientific and Technical Information of China (English)

    2006-01-01

    An efficient approach to analyzing cryptographic protocols is to develop automatic analysis tools based on formal methods. However, the approach has encountered the high computational complexity problem due to reasons that participants of protocols are arbitrary, their message structures are complex and their executions are concurrent. We propose an efficient automatic verifying algorithm for analyzing cryptographic protocols based on the Cryptographic Protocol Algebra (CPA) model proposed recently, in which algebraic techniques are used to simplify the description of cryptographic protocols and their executions. Redundant states generated in the analysis processes are much reduced by introducing a new algebraic technique called Universal Polynomial Equation and the algorithm can be used to verify the correctness of protocols in the infinite states space. We have implemented an efficient automatic analysis tool for cryptographic protocols, called ACT-SPA, based on this algorithm, and used the tool to check more than 20 cryptographic protocols. The analysis results show that this tool is more efficient, and an attack instance not offered previously is checked by using this tool.

  9. Lustre filesystem for CMS storage element (SE)

    International Nuclear Information System (INIS)

    Wu, Y; Kim, B; Avery, P; Fu, Y; Bourilkov, D; Taylor, C; Prescott, C; Rodriguez, J

    2011-01-01

    This paper presents our effort to integrate the Lustre filesystem with BeStMan, GridFTP and Ganglia to make it a fully functional WLCG SE (Storage Element). We first describe the configuration of our Lustre filesystem at the University of Florida and our integration process. We then present benchmark performance figures and IO rates from the CMS analysis jobs and the WAN data transfer performance that are conducted on the Lustre SE.

  10. Authentication Protocol using Quantum Superposition States

    Energy Technology Data Exchange (ETDEWEB)

    Kanamori, Yoshito [University of Alaska; Yoo, Seong-Moo [University of Alabama, Huntsville; Gregory, Don A. [University of Alabama, Huntsville; Sheldon, Frederick T [ORNL

    2009-01-01

    When it became known that quantum computers could break the RSA (named for its creators - Rivest, Shamir, and Adleman) encryption algorithm within a polynomial-time, quantum cryptography began to be actively studied. Other classical cryptographic algorithms are only secure when malicious users do not have sufficient computational power to break security within a practical amount of time. Recently, many quantum authentication protocols sharing quantum entangled particles between communicators have been proposed, providing unconditional security. An issue caused by sharing quantum entangled particles is that it may not be simple to apply these protocols to authenticate a specific user in a group of many users. An authentication protocol using quantum superposition states instead of quantum entangled particles is proposed. The random number shared between a sender and a receiver can be used for classical encryption after the authentication has succeeded. The proposed protocol can be implemented with the current technologies we introduce in this paper.

  11. Entanglement distillation protocols and number theory

    International Nuclear Information System (INIS)

    Bombin, H.; Martin-Delgado, M.A.

    2005-01-01

    We show that the analysis of entanglement distillation protocols for qudits of arbitrary dimension D benefits from applying basic concepts from number theory, since the set Z D n associated with Bell diagonal states is a module rather than a vector space. We find that a partition of Z D n into divisor classes characterizes the invariant properties of mixed Bell diagonal states under local permutations. We construct a very general class of recursion protocols by means of unitary operations implementing these local permutations. We study these distillation protocols depending on whether we use twirling operations in the intermediate steps or not, and we study them both analytically and numerically with Monte Carlo methods. In the absence of twirling operations, we construct extensions of the quantum privacy algorithms valid for secure communications with qudits of any dimension D. When D is a prime number, we show that distillation protocols are optimal both qualitatively and quantitatively

  12. Saudi Arabia and CERN sign protocol

    CERN Multimedia

    2008-01-01

    On 9 May 2008, Mohammed I. Al Suwaiyel, President of the King Abdulaziz City of Science and Technology, representing the Government of Saudi Arabia, and CERN Director-General, Robert Aymar, signed a protocol to the 2006 cooperation agreement between CERN and Saudi Arabia. Members of the Saudi Arabian Government visit ATLAS.The purpose of the protocol is to define the operational framework needed to carry out various specific tasks provided for in the cooperation agreement in order to promote the development of a high energy particle physics community in Saudi Arabia and its ultimate visible participation as a member of the global CERN community. Signing the protocol, Mohammed I. Al-Suwaiyel said: "The Saudi Arabian Government has taken a number of initiatives to promote R&D in the interests of our country’s development and the advancement of science. Thanks to this protocol, Saudi scientists will be able to work towards this go...

  13. Novel protocol for persister cells isolation.

    Directory of Open Access Journals (Sweden)

    Silvia J Cañas-Duarte

    Full Text Available Bacterial persistence, where a fraction of a population presents a transient resistance to bactericidal substances, has great medical importance due to its relation with the appearance of antibiotic resistances and untreatable bacterial chronic infections. The mechanisms behind this phenomenon remain largely unknown in spite of recent advances, in great part because of the difficulty in isolating the very small fraction of the population that is in this state at any given time. Current protocols for persister isolation have resulted in possible biases because of the induction of this state by the protocol itself. Here we present a novel protocol that allows rapid isolation of persister cells both from exponential and stationary phase. Moreover, it is capable of differentiating between type I and type II persister cells, which should allow the field to move beyond its current state of studying only one type. While this protocol prompts a revision of many of the current results, it should greatly facilitate further advances in the field.

  14. Feeling Is Believing: A Secure Template Exchange Protocol

    NARCIS (Netherlands)

    Buhan, I.R.; Doumen, J.M.; Hartel, Pieter H.; Veldhuis, Raymond N.J.; Lee, Seong-Whan; Li, Stan Z.

    We use grip pattern based biometrics as a secure side channel to achieve pre-authentication in a protocol that sets up a secure channel between two hand held devices. The protocol efficiently calculates a shared secret key from biometric data. The protocol is used in an application where grip

  15. DPM: Future Proof Storage

    Science.gov (United States)

    Alvarez, Alejandro; Beche, Alexandre; Furano, Fabrizio; Hellmich, Martin; Keeble, Oliver; Rocha, Ricardo

    2012-12-01

    The Disk Pool Manager (DPM) is a lightweight solution for grid enabled disk storage management. Operated at more than 240 sites it has the widest distribution of all grid storage solutions in the WLCG infrastructure. It provides an easy way to manage and configure disk pools, and exposes multiple interfaces for data access (rfio, xroot, nfs, gridftp and http/dav) and control (srm). During the last year we have been working on providing stable, high performant data access to our storage system using standard protocols, while extending the storage management functionality and adapting both configuration and deployment procedures to reuse commonly used building blocks. In this contribution we cover in detail the extensive evaluation we have performed of our new HTTP/WebDAV and NFS 4.1 frontends, in terms of functionality and performance. We summarize the issues we faced and the solutions we developed to turn them into valid alternatives to the existing grid protocols - namely the additional work required to provide multi-stream transfers for high performance wide area access, support for third party copies, credential delegation or the required changes in the experiment and fabric management frameworks and tools. We describe new functionality that has been added to ease system administration, such as different filesystem weights and a faster disk drain, and new configuration and monitoring solutions based on the industry standards Puppet and Nagios. Finally, we explain some of the internal changes we had to do in the DPM architecture to better handle the additional load from the analysis use cases.

  16. Optimizing the high-resolution manometry (HRM) study protocol.

    Science.gov (United States)

    Patel, A; Ding, A; Mirza, F; Gyawali, C P

    2015-02-01

    Intolerance of the esophageal manometry catheter may prolong high-resolution manometry (HRM) studies and increase patient distress. We assessed the impact of obtaining the landmark phase at the end of the study when the patient has acclimatized to the HRM catheter. 366 patients (mean age 55.4 ± 0.8 years, 62.0% female) undergoing esophageal HRM over a 1-year period were studied. The standard protocol consisted of the landmark phase, 10 5 mL water swallows 20-30 s apart, and multiple rapid swallows where 4-6 2 mL swallows were administered in rapid succession. The modified protocol consisted of the landmark phase at the end of the study after test swallows. Study duration, technical characteristics, indications, and motor findings were compared between standard and modified protocols. Of the 366 patients, 89.6% underwent the standard protocol (study duration 12.9 ± 0.3 min). In 10.4% with poor catheter tolerance undergoing the modified protocol, study duration was significantly longer (15.6 ± 1.0 min, p = 0.004) despite similar duration of study maneuvers. Only elevated upper esophageal sphincter basal pressures at the beginning of the study segregated modified protocol patients. The 95th percentile time to landmark phase in the standard protocol patients was 6.1 min; as many as 31.4% of modified protocol patients could not obtain their first study maneuver within this period (p = 0.0003). Interpretation was not impacted by shifting the landmark phase to the end of the study. Modification of the HRM study protocol with the landmark phase obtained at the end of the study optimizes study duration without compromising quality. © 2014 John Wiley & Sons Ltd.

  17. Multiprofissional electronic protocol in ophtalmology with enfasis in strabismus

    Directory of Open Access Journals (Sweden)

    CHRISTIE GRAF RIBEIRO

    Full Text Available ABSTRACT Objective: to create and validate an electronic database in ophthalmology focused on strabismus, to computerize this database in the form of a systematic data collection software named Electronic Protocol, and to incorporate this protocol into the Integrated System of Electronic Protocols (SINPE(c. Methods: this is a descriptive study, with the methodology divided into three phases: (1 development of a theoretical ophthalmologic database with emphasis on strabismus; (2 computerization of this theoretical ophthalmologic database using SINPE(c and (3 interpretation of the information with demonstration of results to validate the protocol. We inputed data from the charts of fifty patients with known strabismus through the Electronic Protocol for testing and validation. Results: the new electronic protocol was able to store information regarding patient history, physical examination, laboratory exams, imaging results, diagnosis and treatment of patients with ophthalmologic diseases, with emphasis on strabismus. We included 2,141 items in this master protocol and created 20 new specific electronic protocols for strabismus, each with its own specifics. Validation was achieved through correlation and corroboration of the symptoms and confirmed diagnoses of the fifty included patients with the diagnostic criteria for the twenty new strabismus protocols. Conclusion: a new, validated electronic database focusing on ophthalmology, with emphasis on strabismus, was successfully created through the standardized collection of information, and computerization of the database using proprietary software. This protocol is ready for deployment to facilitate data collection, sorting and application for practitioners and researchers in numerous specialties.

  18. Optical code-division multiple-access protocol with selective retransmission

    Science.gov (United States)

    Mohamed, Mohamed A. A.; Shalaby, Hossam M. H.; El-Badawy, El-Sayed A.

    2006-05-01

    An optical code-division multiple-access (OCDMA) protocol based on selective retransmission technique is proposed. The protocol is modeled using a detailed state diagram and is analyzed using equilibrium point analysis (EPA). Both traditional throughput and average delay are used to examine its performance for several network parameters. In addition, the performance of the proposed protocol is compared to that of the R3T protocol, which is based on a go-back-n technique. Our results show that a higher performance is achieved by the proposed protocol at the expense of system complexity.

  19. Protocol Monitoring Energy Conservation; Protocol Monitoring Energiebesparing

    Energy Technology Data Exchange (ETDEWEB)

    Boonekamp, P.G.M. [ECN Beleidsstudies, Petten (Netherlands); Mannaerts, H. [Centraal Planburea CPB, Den Haag (Netherlands); Tinbergen, W. [Centraal Bureau voor de Statistiek CBS, Den Haag (Netherlands); Vreuls, H.H.J. [Nederlandse onderneming voor energie en milieu Novem, Utrecht (Netherlands); Wesselink, B. [Rijksinstituut voor Volksgezondheid en Milieuhygiene RIVM, Bilthoven (Netherlands)

    2001-12-01

    On request of the Dutch ministry of Economic Affairs five institutes have collaborated to create a 'Protocol Monitoring Energy Conservation', a common method and database to calculate the amount of energy savings realised in past years. The institutes concerned are the Central Bureau of Statistics (CBS), the Netherlands Bureau for Economic Policy Analysis (CPB), the Energy research Centre of the Netherlands (ECN), the National Agency for Energy and Environment (Novem) and the Netherlands Institute of Public Health and the Environment (RIVM). The institutes have agreed upon a clear definition of energy use and energy savings. The demarcation with renewable energy, the saving effects of substitution between energy carriers and the role of import and export of energy have been elaborated. A decomposition method is used to split up the observed change in energy use in a number of effects, on a national and sectoral level. This method includes an analysis of growth effects, effects of structural changes in production and consumption activities and savings on end use or with more efficient conversion processes. To calculate these effects the total energy use is desegregated as much as possible. For each segment a reference energy use is calculated according to the trend in a variable which is supposed to be representative for the use without savings. The difference with the actual energy use is taken as the savings realised. Results are given for the sectors households, industry, agriculture, services and government, transportation and the energy sector; as well as a national figure. A special feature of the protocol method is the application of primary energy use figures in the determination of savings for end users. This means that the use of each energy carrier is increased with a certain amount, according to the conversion losses caused elsewhere in the energy system. The losses concern the base year energy sector and losses abroad for imports of secondary

  20. Sufficient Conditions for Vertical Composition of Security Protocols (Extended Version)

    DEFF Research Database (Denmark)

    Mödersheim, Sebastian Alexander; Viganò, Luca

    a certain kind of channel as a goal and another secure protocol P2 that assumes this kind of channel, can we then derive that their vertical composition P2[P1] is secure? It is well known that protocol composition can lead to attacks even when the individual protocols are all secure in isolation......Vertical composition of security protocols means that an application protocol (e.g., a banking service) runs over a channel established by another protocol (e.g., a secure channel provided by TLS). This naturally gives rise to a compositionality question: given a secure protocol P1 that provides....... In this paper, we formalize seven easy-to-check static conditions that support a large class of channels and applications and that we prove to be su_cient for vertical security protocol composition....

  1. A customised cold-water immersion protocol favours one-size-fits-all protocols in improving acute performance recovery

    NARCIS (Netherlands)

    Zandvoort, Coen S.; de Zwart, Jelmer R.; van Keeken, Brenda L.; Viroux, Patrick J.F.; Tiemessen, Ivo J.H.

    The purpose of the present study was to investigate whether a customised cold-water immersion (CWIc) protocol was more effective in enhancing acute performance recovery than a one-size-fits-all CWI (CWIs) or active recovery (AR) protocol. On three separate testing days, 10 healthy, physically

  2. Security Protocols: Specification, Verification, Implementation, and Composition

    DEFF Research Database (Denmark)

    Almousa, Omar

    An important aspect of Internet security is the security of cryptographic protocols that it deploys. We need to make sure that such protocols achieve their goals, whether in isolation or in composition, i.e., security protocols must not suffer from any aw that enables hostile intruders to break...... results. The most important generalization is the support for all security properties of the geometric fragment proposed by [Gut14]....... their security. Among others, tools like OFMC [MV09b] and Proverif [Bla01] are quite efficient for the automatic formal verification of a large class of protocols. These tools use different approaches such as symbolic model checking or static analysis. Either approach has its own pros and cons, and therefore, we...

  3. The Geneva Protocol of 1925

    International Nuclear Information System (INIS)

    Mc Elroy, R.J.

    1991-01-01

    This paper reports that when President Gerald Ford signed the instruments of ratification for the Geneva Protocol of 1925 on January 22, 1975, a tortured, half-century-long chapter in U.S. arms control policy was brought to a close. Fifty years earlier, at the Geneva Conference for the Control of the International Trade in Arms, Munitions and Implements of War, the United States had played a key role in drafting and reaching agreement on the Protocol for the Prohibition of the Use in War of Asphyxiating, Poisonous or Other Gases and of Bacteriological Methods of Warfare. The protocol, signed by thirty nations, including the United States, on June 17, 1925, prohibits the use in war of asphyxiating, poisonous or other gases, and of all analogous liquids, materials or devices as well as the use of bacteriological methods of warfare

  4. An entanglement concentration protocol for cluster states using ...

    Indian Academy of Sciences (India)

    Permanent link: http://www.ias.ac.in/article/fulltext/pram/086/05/0973-0983 ... The purpose of this paper is a proposal on entanglement concentration protocol forcluster states. The protocol ... We also make a comparative numerical study of the residual entanglement left out after the execution of each step of the protocol.

  5. Breaking Megrelishvili protocol using matrix diagonalization

    Science.gov (United States)

    Arzaki, Muhammad; Triantoro Murdiansyah, Danang; Adi Prabowo, Satrio

    2018-03-01

    In this article we conduct a theoretical security analysis of Megrelishvili protocol—a linear algebra-based key agreement between two participants. We study the computational complexity of Megrelishvili vector-matrix problem (MVMP) as a mathematical problem that strongly relates to the security of Megrelishvili protocol. In particular, we investigate the asymptotic upper bounds for the running time and memory requirement of the MVMP that involves diagonalizable public matrix. Specifically, we devise a diagonalization method for solving the MVMP that is asymptotically faster than all of the previously existing algorithms. We also found an important counterintuitive result: the utilization of primitive matrix in Megrelishvili protocol makes the protocol more vulnerable to attacks.

  6. Overview of the InterGroup protocols

    Energy Technology Data Exchange (ETDEWEB)

    Berket, Karlo [Lawrence Berkeley National Lab. (LBNL), Berkeley, CA (United States); Agarwal, Deborah A. [Lawrence Berkeley National Lab. (LBNL), Berkeley, CA (United States); Melliar-Smith, P. Michael [Univ. of California, Santa Barbara, CA (United States); Moser, Louise E. [Univ. of California, Santa Barbara, CA (United States)

    2001-03-01

    Existing reliable ordered group communication protocols have been developed for local-area networks and do not, in general, scale well to large numbers of nodes and wide-area networks. The InterGroup suite of protocols is a scalable group communication system that introduces a novel approach to handling group membership, and supports a receiver-oriented selection of service. The protocols are intended for a wide-area network, with a large number of nodes, that has highly variable delays and a high message loss rate, such as the Internet. The levels of the message delivery service range from unreliable unordered to reliable group timestamp ordered.

  7. Efficient Communication Protocols for Deciding Edit Distance

    DEFF Research Database (Denmark)

    Jowhari, Hossein

    2012-01-01

    In this paper we present two communication protocols on computing edit distance. In our first result, we give a one-way protocol for the following Document Exchange problem. Namely given x ∈ Σn to Alice and y ∈ Σn to Bob and integer k to both, Alice sends a message to Bob so that he learns x...... or truthfully reports that the edit distance between x and y is greater than k. For this problem, we give a randomized protocol in which Alice transmits at most O ˜ (klog 2 n) bits and each party’s time complexity is O ˜ (nlogn+k 2 log 2 n) . Our second result is a simultaneous protocol for edit distance over...... permutations. Here Alice and Bob both send a message to a third party (the referee) who does not have access to the input strings. Given the messages, the referee decides if the edit distance between x and y is at most k or not. For this problem we give a protocol in which Alice and Bob run a O...

  8. Recommendations for Enhancing Implementation of Additional Protocol Declarations

    International Nuclear Information System (INIS)

    Niina, Toshiaki; Nidaira, Kazuo; Aono, Yosuke

    2010-01-01

    Japan signed the Additional Protocol (hereafter, AP) in December 1998. The domestic law and regulation had been revised to implement the initial and annual declarations for the Agency and the Additional Protocol came into force in December 1999. Since initial declaration in 2000, Japan has submitted the annual declaration in every May. Until 2010, Japan has made 10 annual declarations. This paper gives recommendations to enhance implementation of Additional Protocol declarations based on 10-year experience in Japan and addresses the following: Current status of additional protocol declaration in Japan; Outline of processing method; AP Information Management System; Recommendations for improving quality of declaration. Preparation of additional protocol declaration in NMCC has been conducted in the course of contract with Japan Safeguards Office (hereafter, JSGO) for safeguards information treatment. (author)

  9. Development of IT-based Data Communication Protocol for Nuclear Power Plant

    International Nuclear Information System (INIS)

    Jeong, K. I.; Kim, D. H.; Lee, J. C.

    2009-07-01

    The communication protocol, which provide overall communication rules and methods and give ways how to exchange information, is the most important part and it can affect the overall performance of communication network. Therefore, the first step of development of the communication network of an NPP is its own communication protocol design, which conforms to the requirements and characteristics of an NPP I and C. To manage the protocol development process, we establish development procedure and define detail substantive based on the procedure and we examine the adaptability of existing commercial communication protocols to the communication protocol of an NPP I and C. Existing commercial communication protocols based on Information Technology(IT) can be categorized into 3 groups: general commercial communication protocols, industrial communication protocols, military communication protocols. We analyze the design criteria and performance requirements of popular protocols in each group. And also, we examine the adaptability to the communication protocol of an NPP. Based on these results, we developed our own protocol for NPP I and C, which meet the required specifications through design overall protocol architecture and data frame format, definition of functional requirements and specifications

  10. The Protocol of Choice for Treatment of Snake Bite

    Directory of Open Access Journals (Sweden)

    Afshin Mohammad Alizadeh

    2016-01-01

    Full Text Available The aim of the current study is to compare three different methods of treatment of snake bite to determine the most efficient one. To unify the protocol of snake bite treatment in our center, we retrospectively reviewed files of the snake-bitten patients who had been referred to us between 2010 and 2014. They were contacted for follow-up using phone calls. Demographic and on-arrival characteristics, protocol used for treatment (WHO/Haddad/GF, and outcome/complications were evaluated. Patients were entered into one of the protocol groups and compared. Of a total of 63 patients, 56 (89% were males. Five, 19, and 28 patients were managed by Haddad, WHO, or GF protocols, respectively. Eleven patients had fallen into both GF and WHO protocols and were excluded. Serum sickness was significantly more common when WHO protocol was used while 100% of the compartment syndromes and 71% of deformities had been reported after GF protocol. The most important complications were considered to be deformity, compartment syndrome, and amputation and were more frequent after the use of WHO and GF protocols (23.1% versus 76.9%; none in Haddad; P = NS. Haddad protocol seems to be the best for treatment of snake-bitten patients in our region. However, this cannot be strictly concluded because of the limited sample size and nonsignificant P values.

  11. Supporting Adaptation of Wireless Communication Protocols

    International Nuclear Information System (INIS)

    Dhomeja, L.D.; Soomro, I.A.; Malkani, Y.A.

    2016-01-01

    Pervasive devices such as mobile phones and PDAs (Personal Digital Assistants) come with different wireless communication capabilities, for example, WiFi (Wireless Fidelity), Bluetooth, IrDA (Infrared), etc. In order for pervasive devices to interact with each other, they need to have matching (alike) communication capabilities, otherwise such heterogeneous devices would not be able to interact with each other. In this paper we address this issue and propose a system that makes devices with heterogeneous wireless communication capabilities communicate with each other. The proposed system supports adaptation of wireless communication protocols through a proxy, which sits between a client and a server, and supports adaptation of wireless communication protocols. Its functionality involves intercepting a request made by a client with a different wireless communication capability (e.g. Bluetooth) from what the server has (e.g. WiFi), connecting to the server and then sending results back to the client. We have tested the system by implementing a messaging service application and running it on the system. The proxy supports all Bluetooth protocols, i.e. OBEX (Object Exchange), L2CAP (Logical Link Control and Adaptation Protocol), RFCOM (Radio Frequency Communication) and WiFi protocol and can run on (J2MW (Java 2 Micro Edition) enabled mobile phones which support both Bluetooth and WiFi capabilities. (author)

  12. Two Cheers for the Trafficking Protocol

    Directory of Open Access Journals (Sweden)

    Anne T Gallagher

    2015-04-01

    Full Text Available The Trafficking Protocol makes an easy target for attack. Its origins lie in an attempt to control a particularly exploitative form of migration that was challenging the ability of States to control their own borders. Its parent instrument is a framework agreement to address transnational organised crime. While paying fleeting attention to the rights of victims, the Protocol, with its emphasis on criminalisation and border protection is nowhere near being a human rights treaty. On top of all that it does not even have a credible enforcement mechanism, allowing states parties wide latitude in interpreting and applying their obligations. Strangely, these seemingly insurmountable flaws have not stopped the Protocol’s emergence as perhaps the single most important development in the fight against human trafficking. Without the Protocol, arguments around definitions would have continued to block the evolution of principles and rules. Without the Protocol it is likely that the human rights system would have continued its shameful tradition of sidelining issues such as forced labour, forced sex, forced marriage and the ritual exploitation of migrant workers through debt. Most critically, the Protocol provided the impetus and template for a series of legal and political developments that, over time, have served to ameliorate some of its greatest weaknesses, including the lack of human rights protections and of a credible oversight mechanism.

  13. Immunochemical protocols

    National Research Council Canada - National Science Library

    Pound, John D

    1998-01-01

    ... easy and important refinements often are not published. This much anticipated 2nd edition of Immunochemzcal Protocols therefore aims to provide a user-friendly up-to-date handbook of reliable techniques selected to suit the needs of molecular biologists. It covers the full breadth of the relevant established immunochemical methods, from protein blotting and immunoa...

  14. Authentication Test-Based the RFID Authentication Protocol with Security Analysis

    Directory of Open Access Journals (Sweden)

    Minghui Wang

    2014-08-01

    Full Text Available To the problem of many recently proposed RFID authentication protocol was soon find security holes, we analyzed the main reason, which is that protocol design is not rigorous, and the correctness of the protocol cannot be guaranteed. To this end, authentication test method was adopted in the process of the formal analysis and strict proof to the proposed RFID protocol in this paper. Authentication Test is a new type of analysis and design method of security protocols based on Strand space model, and it can be used for most types of the security protocols. After analysis the security, the proposed protocol can meet the RFID security demand: information confidentiality, data integrity and identity authentication.

  15. Routing protocol extension for resilient GMPLS multi-domain networks

    DEFF Research Database (Denmark)

    Manolova, Anna Vasileva; Ruepp, Sarah Renée; Romeral, Ricardo

    2010-01-01

    This paper evaluates the performance of multi-domain networks under the Generalized Multi-Protocol Label Switching control framework in case of a single inter-domain link failure. We propose and evaluate a routing protocol extension for the Border Gateway Protocol, which allows domains to obtain...... two Autonomous System disjoint paths and use them efficiently under failure conditions. Three main applications for the protocol extension are illustrated: reducing traffic loss on existing connections by xploiting pre-selected backup paths derived with our proposal, applying multi-domain restoration...... as survivability mechanism in case of single link failure, and employing proper failure notification mechanisms for routing of future connection requests under routing protocol re-convergence. Via simulations we illustrate the benefits of utilizing the proposed routing protocol extension for networks employing...

  16. Electronic Voting Protocol Using Identity-Based Cryptography

    Directory of Open Access Journals (Sweden)

    Gina Gallegos-Garcia

    2015-01-01

    Full Text Available Electronic voting protocols proposed to date meet their properties based on Public Key Cryptography (PKC, which offers high flexibility through key agreement protocols and authentication mechanisms. However, when PKC is used, it is necessary to implement Certification Authority (CA to provide certificates which bind public keys to entities and enable verification of such public key bindings. Consequently, the components of the protocol increase notably. An alternative is to use Identity-Based Encryption (IBE. With this kind of cryptography, it is possible to have all the benefits offered by PKC, without neither the need of certificates nor all the core components of a Public Key Infrastructure (PKI. Considering the aforementioned, in this paper we propose an electronic voting protocol, which meets the privacy and robustness properties by using bilinear maps.

  17. Electronic Voting Protocol Using Identity-Based Cryptography.

    Science.gov (United States)

    Gallegos-Garcia, Gina; Tapia-Recillas, Horacio

    2015-01-01

    Electronic voting protocols proposed to date meet their properties based on Public Key Cryptography (PKC), which offers high flexibility through key agreement protocols and authentication mechanisms. However, when PKC is used, it is necessary to implement Certification Authority (CA) to provide certificates which bind public keys to entities and enable verification of such public key bindings. Consequently, the components of the protocol increase notably. An alternative is to use Identity-Based Encryption (IBE). With this kind of cryptography, it is possible to have all the benefits offered by PKC, without neither the need of certificates nor all the core components of a Public Key Infrastructure (PKI). Considering the aforementioned, in this paper we propose an electronic voting protocol, which meets the privacy and robustness properties by using bilinear maps.

  18. Implementation of the Additional Protocol in Japan

    International Nuclear Information System (INIS)

    Ogawa, T.

    2001-01-01

    The Additional Protocol between Japan and the IAEA entered into force in December 1999. To come into force a series of implementation trials of Additional Protocol was carried out at two Japanese representative nuclear research centers, i.e. Tokai Research Establishment of Japan Atomic Energy Research Institute (JAERI) and Oarai Engineering Center of Japan Nuclear Fuel Cycle Development Institute (JNC). These trials were proposed by Japan and were conducted in cooperation with the IAEA Secretariat. In addition, Japan amended 'the Law for the Regulation of Reactors etc.', to collect adequate information to submit to the IAEA, to arrange the surrounding for the complementary access, etc. In addition, Japan Submitted the Initial Declaration of the Additional Protocol within 180 days of the entry into force of the Protocol, in the middle of June, 2000

  19. Energy Efficient Network Protocols for Wireless and Mobile Networks

    National Research Council Canada - National Science Library

    Sivalingam, Krishna

    2001-01-01

    ... (also called power aware) network protocols for wireless and mobile networks. Battery power limitations are a very serious concern, and it is essential to study energy efficient protocol design at different layers of the network protocol stack...

  20. Performance analysis of routing protocols for IoT

    Science.gov (United States)

    Manda, Sridhar; Nalini, N.

    2018-04-01

    Internet of Things (IoT) is an arrangement of advancements that are between disciplinary. It is utilized to have compelling combination of both physical and computerized things. With IoT physical things can have personal virtual identities and participate in distributed computing. Realization of IoT needs the usage of sensors based on the sector for which IoT is integrated. For instance, in healthcare domain, IoT needs to have integration with wearable sensors used by patients. As sensor devices produce huge amount of data, often called big data, there should be efficient routing protocols in place. To the extent remote systems is worried there are some current protocols, for example, OLSR, DSR and AODV. It additionally tosses light into Trust based routing protocol for low-power and lossy systems (TRPL) for IoT. These are broadly utilized remote directing protocols. As IoT is developing round the corner, it is basic to investigate routing protocols that and evaluate their execution regarding throughput, end to end delay, and directing overhead. The execution experiences can help in settling on very much educated choices while incorporating remote systems with IoT. In this paper, we analyzed different routing protocols and their performance is compared. It is found that AODV showed better performance than other routing protocols aforementioned.

  1. Database communication protocol analyses and security detection

    International Nuclear Information System (INIS)

    Luo Qun; Liu Qiushi

    2003-01-01

    In this paper we introduced the analysis of TDS protocol in the communication application between Client and Server about SYBASE and MICROSOFT SQL SERVER and do some test for some bugs existed in the protocol. (authors)

  2. Quantum multi-signature protocol based on teleportation

    International Nuclear Information System (INIS)

    Wen Xiao-jun; Liu Yun; Sun Yu

    2007-01-01

    In this paper, a protocol which can be used in multi-user quantum signature is proposed. The scheme of signature and verification is based on the correlation of Greenberger-Horne-Zeilinger (GHZ) states and the controlled quantum teleportation. Different from the digital signatures, which are based on computational complexity, the proposed protocol has perfect security in the noiseless quantum channels. Compared to previous quantum signature schemes, this protocol can verify the signature independent of an arbitrator as well as realize multi-user signature together. (orig.)

  3. Robust Multi-unit Auction Protocol against False-name Bids

    Science.gov (United States)

    Yokoo, Makoto; Sakurai, Yuko; Matsubara, Shigeo

    This paper presents a new multi-unit auction protocol (IR protocol) that is robust against false-name bids. Internet auctions have become an integral part of Electronic Commerce and a promising field for applying agent and Artificial Intelligence technologies. Although the Internet provides an excellent infrastructure for executing auctions, the possibility of a new type of cheating called false-name bids has been pointed out. A false-name bid is a bid submitted under a fictitious name. A protocol called LDS has been developed for combinatorial auctions of multiple different items and has proven to be robust against false-name bids. Although we can modify the LDS protocol to handle multi-unit auctions, in which multiple units of an identical item are auctioned, the protocol is complicated and requires the auctioneer to carefully pre-determine the combination of bundles to obtain a high social surplus or revenue. For the auctioneer, our newly developed IR protocol is easier to use than the LDS, since the combination of bundles is automatically determined in a flexible manner according to the declared evaluation values of agents. The evaluation results show that the IR protocol can obtain a better social surplus than that obtained by the LDS protocol.

  4. Removing Ambiguities of IP Telephony Traffic Using Protocol Scrubbers

    Directory of Open Access Journals (Sweden)

    Bazara I. A. Barry

    2012-10-01

    Full Text Available Network intrusion detection systems (NIDSs face the serious challenge of attacks such as insertion and evasion attacks that are caused by ambiguous network traffic. Such ambiguity comes as a result of the nature of network traffic which includes protocol implementation variations and errors alongside legitimate network traffic. Moreover, attackers can intentionally introduce further ambiguities in the traffic. Consequently, NIDSs need to be aware of these ambiguities when detection is performed and make sure to differentiate between true attacks and protocol implementation variations or errors; otherwise, detection accuracy can be affected negatively. In this paper we present the design and implementation of tools that are called protocol scrubbers whose main functionality is to remove ambiguities from network traffic before it is presented to the NIDS. The proposed protocol scrubbers are designed for session initiation and data transfer protocols in IP telephony systems. They guarantee that the traffic presented to NIDSs is unambiguous by eliminating ambiguous behaviors of protocols using well-designed protocol state machines, and walking through packet headers of protocols to make sure packets will be interpreted in the desired way by the NIDS. The experimental results shown in this paper demonstrate the good quality and applicability of the introduced scrubbers.

  5. UNA NUEVA ALTERNATIVA NUMÉRICA PARA LA SOLUCIÓN DE LA ECUACIÓN UNIDIMENSIONAL DE RICHARDS: ESTUDIO DE DRENAJE E INFILTRACIÓN DE FLUIDOS EN LA ZONA NO SATURADA

    Directory of Open Access Journals (Sweden)

    Evelyn Álvarez Sierra

    2016-10-01

    Full Text Available En el trabajo se comparan dos métodos numéricos para resolver el modelo unidimensional de infiltración y drenaje de agua en la zona no saturada en medios porosos, el cual es modelado respecto al contenido de humedad utilizando la ecuación no-lineal de Richards. El primer método está basado en el método clásico de Diferencias Finitas y el segundo en el método de Líneas combinado con el código DASSL para la solución de las ecuaciones diferenciales-algebraicas resultantes. Se muestra que el último método proporciona una vía numérica eficiente para la solución de problemas de EDPs que tienen un comportamiento singular de shock u ondas viajeras, como es el caso de la ecuación de Richard, los cuales se pueden resolver numéricamente con éxito sólo utilizando esquemas muy estables. Los métodos numéricos discutidos en el trabajo se aplican a dos tipos de suelos reales: Yolo Light Clay y Brindabella Silty Clay Loam, usando las propiedades hidráulicas referidas en Broadbridge y White [16]. Para validar el modelo, se comparan los perfiles de humedad con los resultados reportados por Warrick, Lomen e Islas [18].Igualmente, se demuestra con datos reales la ventaja de resolver numéricamente el comportamiento del flujo unidimensional en la zona no saturada de un medio poroso. Finalmente, el modelo propuesto y los resultados numéricos obtenidos posibilitan brindar un pronóstico sobre la utilización de recursos hídricos para el caso de riego en agricultura y también para el transporte de contaminantes.

  6. Kyoto Protocol: trade versus the environment

    International Nuclear Information System (INIS)

    Loose, H.

    2001-01-01

    Could the signatories to the Kyoto Protocol find themselves up against the WTO? This paper examines how the climate change agreement could conflict with trade rules, and shows that there are potentially serious conflicts in the interface between the WTO and the Kyoto Protocol. It argues for dialogue and debate before it is too late. (author)

  7. SPIRIT 2013 Statement: defining standard protocol items for clinical trials.

    Science.gov (United States)

    Chan, An-Wen; Tetzlaff, Jennifer M; Altman, Douglas G; Laupacis, Andreas; Gøtzsche, Peter C; Krle A-Jerić, Karmela; Hrobjartsson, Asbjørn; Mann, Howard; Dickersin, Kay; Berlin, Jesse A; Dore, Caroline J; Parulekar, Wendy R; Summerskill, William S M; Groves, Trish; Schulz, Kenneth F; Sox, Harold C; Rockhold, Frank W; Rennie, Drummond; Moher, David

    2015-12-01

    The protocol of a clinical trial serves as the foundation for study planning, conduct, reporting, and appraisal. However, trial protocols and existing protocol guidelines vary greatly in content and quality. This article describes the systematic development and scope of SPIRIT (Standard Protocol Items: Recommendations for Interventional Trials) 2013, a guideline for the minimum content of a clinical trial protocol. The 33-item SPIRIT checklist applies to protocols for all clinical trials and focuses on content rather than format. The checklist recommends a full description of what is planned; it does not prescribe how to design or conduct a trial. By providing guidance for key content, the SPIRIT recommendations aim to facilitate the drafting of high-quality protocols. Adherence to SPIRIT would also enhance the transparency and completeness of trial protocols for the benefit of investigators, trial participants, patients, sponsors, funders, research ethics committees or institutional review boards, peer reviewers, journals, trial registries, policymakers, regulators, and other key stakeholders.

  8. Optimistic protocol for partitioned distributed database systems

    International Nuclear Information System (INIS)

    Davidson, S.B.

    1982-01-01

    A protocol for transaction processing during partition failures is presented which guarantees mutual consistency between copies of data-items after repair is completed. The protocol is optimistic in that transactions are processed without restrictions during the failure; conflicts are detected at repair time using a precedence graph and are resolved by backing out transactions according to some backout strategy. The protocol is then evaluated using simulation and probabilistic modeling. In the simulation, several parameters are varied such as the number of transactions processed in a group, the type of transactions processed, the number of data-items present in the database, and the distribution of references to data-items. The simulation also uses different backout strategies. From these results we note conditions under which the protocol performs well, i.e., conditions under which the protocol backs out a small percentage of the transaction run. A probabilistic model is developed to estimate the expected number of transactions backed out using most of the above database and transaction parameters, and is shown to agree with simulation results. Suggestions are then made on how to improve the performance of the protocol. Insights gained from the simulation and probabilistic modeling are used to develop a backout strategy which takes into account individual transaction costs and attempts to minimize total backout cost. Although the problem of choosing transactions to minimize total backout cost is, in general, NP-complete, the backout strategy is efficient and produces very good results

  9. Comparison of the ultrashort gonadotropin-releasing hormone agonist-antagonist protocol with microdose flare -up protocol in poor responders: a preliminary study.

    Science.gov (United States)

    Berker, Bülent; Duvan, Candan İltemir; Kaya, Cemil; Aytaç, Ruşen; Satıroğlu, Hakan

    2010-01-01

    To determine the potential effect of the ultrashort gonadotropin-releasing hormone (GnRH) agonist/GnRH antagonist protocol versus the microdose GnRH agonist protocol in poor responders undergoing intracytoplasmic sperm injection (ICSI). The patients in the Agonist-Antagonist Group (n=41) were administered the ultrashort GnRH-agonist/ antagonist protocol, while the patients in the Microdose Group (n=41) were stimulated according to the microdose flare-up protocol. The mean number of mature oocytes retrieved was the primary outcome measure. Fertilization rate, implantation rate per embryo and clinical pregnancy rates were secondary outcome measures. There was no differenc between the mean number of mature oocytes retrieved in the two groups. There were also no statistical differences between the two groups in terms of peak serum E2 level, canceled cycles, endometrial thickness on hCG day, number of 2 pronucleus and number of embryos transferred. However, the total gonadotropin consumption and duration of stimulation were significantly higher with the Agonist-Antagonist Group compared with the Microdose Group. The implantation and clinical pregnancy rates were similar between the two groups. Despite the high dose of gonadotropin consumption and longer duration of stimulation with the ultrashort GnRH agonist/ antagonist protocol, it seems that the Agonist-Antagonist Protocol is not inferior to the microdose protocol in poor responders undergoing ICSI.

  10. Controlled Delegation Protocol in Mobile RFID Networks

    Directory of Open Access Journals (Sweden)

    Yang MingHour

    2010-01-01

    Full Text Available To achieve off-line delegation for mobile readers, we propose a delegation protocol for mobile RFID allowing its readers access to specific tags through back-end server. That is to say, reader-tag mutual authentication can be performed without readers being connected to back-end server. Readers are also allowed off-line access to tags' data. Compared with other delegation protocols, our scheme uniquely enables back-end server to limit each reader's reading times during delegation. Even in a multireader situation, our protocol can limit reading times and reading time periods for each of them and therefore makes back-end server's delegation more flexible. Besides, our protocol can prevent authorized readers from transferring their authority to the unauthorized, declining invalid access to tags. Our scheme is proved viable and secure with GNY logic; it is against certain security threats, such as replay attacks, denial of service (DoS attacks, Man-in-the-Middle attacks, counterfeit tags, and breaches of location and data privacy. Also, the performance analysis of our protocol proves that current tags can afford the computation load required in this scheme.

  11. Visiting Richard Serra’s Promenade sculpture improves postural control and judgment of subjective visual vertical.

    Directory of Open Access Journals (Sweden)

    Zoï eKapoula

    2014-12-01

    Full Text Available Body sway while maintaining an upright quiet stance reflects an active process of balance based on the integration of visual, vestibular, somatosensory and proprioceptive inputs. Richard Serra’s Promenade sculpture featured in the 2008 Monumenta exhibition at the Grand Palais in Paris, France is herein hypothesised to have stimulated the body’s vertical and longitudinal axes as it showcased 5 monumental rectangular solids pitched at a 1.69° angle.Using computerised dynamic posturography we measured the body sway of 23 visitors when fixating a cross, or when observing the artwork (fixating it or actively exploring it with eye movements before and after walking around and alongside the sculpture (i.e., before and after a promenade. A first fixation at the sculpture increased medio-lateral stability (in terms of spectral power of body sway. Eye movement exploration in the depth of the sculpture increased antero-posterior stability (in terms of spectral power and cancelling time of body sway at the expense of medio-lateral stability (in terms of cancelling time. Moreover, a medio-lateral instability associated with eye movement exploration before the promenade (in terms of body sway sensu stricto was cancelled after the promenade. Finally, the overall medio-lateral stability (in terms of spectral power increased after the promenade.Fourteen additional visitors were asked to sit in a dark room and adjust a luminous line to what they considered to be the earth-vertical axis. The promenade executed within the sculpted environment afforded by Serra’s monumental statuary works resulted in significantly improved performances on the subjective visual vertical test.We attribute these effects to the sculpted environment provided by the exhibition which may have acted as a kind of physiologic training ground thereby improving the visitors’ overall sense of visual perspective, equilibrium and gravity.

  12. Nursing Music Protocol and Postoperative Pain.

    Science.gov (United States)

    Poulsen, Michael J; Coto, Jeffrey

    2018-04-01

    Pain has always been a major concern for patients and nurses during the postoperative period. Therapies, medicines, and protocols have been developed to improve pain and anxiety but have undesirable risks to the patient. Complementary and alternative medicine therapies have been studied but have not been applied as regular protocols in the hospital setting. Music is one type of complementary and alternative medicine therapy that has been reported to have favorable results on reducing postoperative pain, anxiety, and opioid usage. However, music lacks a protocol that nurses can implement during the perioperative process. This paper is an in-depth literature review assessing a best practice recommendation and protocol that establishes a consensus in the use of music therapy. The results suggest that music therapy may consist of calming, soft tones of 60-80 beats per minute for at least 15-30 minutes at least twice daily during the pre- and postoperative periods. It is suggested that music only be used in conjunction with standards of care and not as the primary intervention of pain or anxiety. This evidence suggests that proper use of music therapy can significantly reduce surgical pain. Implementing these protocols and allowing the freedom of nursing staff to use them may lead to greater reductions in surgical pain and anxiety and a reduction in opioid use. Copyright © 2017 American Society for Pain Management Nursing. Published by Elsevier Inc. All rights reserved.

  13. Compiling symbolic attacks to protocol implementation tests

    Directory of Open Access Journals (Sweden)

    Michael Rusinowitch

    2013-07-01

    Full Text Available Recently efficient model-checking tools have been developed to find flaws in security protocols specifications. These flaws can be interpreted as potential attacks scenarios but the feasability of these scenarios need to be confirmed at the implementation level. However, bridging the gap between an abstract attack scenario derived from a specification and a penetration test on real implementations of a protocol is still an open issue. This work investigates an architecture for automatically generating abstract attacks and converting them to concrete tests on protocol implementations. In particular we aim to improve previously proposed blackbox testing methods in order to discover automatically new attacks and vulnerabilities. As a proof of concept we have experimented our proposed architecture to detect a renegotiation vulnerability on some implementations of SSL/TLS, a protocol widely used for securing electronic transactions.

  14. Data Exchange Protocol in Repsail

    Directory of Open Access Journals (Sweden)

    Gucma Maciej

    2017-12-01

    Full Text Available Article presents implantation and theoretical considerations of data exchange protocol developed for the RepSail project, where main objective was design and building innovative hybrid yacht. One of problems during the design process was improper functioning of data exchange protocols that were available in the commercially available devices to mention navigation purpose NMEA183 or 2000 as well as automation dedicated ones (CAN and similar. Author shows the basis of the dedicated format of exchange for in board devices.

  15. The Groningen protocol: another perspective

    OpenAIRE

    Jotkowitz, A B; Glick, S

    2006-01-01

    The Groningen protocol allows for the euthanasia of severely ill newborns with a hopeless prognosis and unbearable suffering. We understand the impetus for such a protocol but have moral and ethical concerns with it. Advocates for euthanasia in adults have relied on the concept of human autonomy, which is lacking in the case of infants. In addition, biases can potentially influence the decision making of both parents and physicians. It is also very difficult to weigh the element of quality of...

  16. Quantifying the Presence and Activity of Aerobic, Vinyl Chloride-Degrading Microorganisms in Dilute Groundwater Plumes by Using Real-Time PCR

    Science.gov (United States)

    2013-07-01

    nested PCR experiment with etnC primers. The initial PCRs were carried out with environmental DNA and the primers NVC105 and NVC106 (72). Then, 2 μl...natural attenuation, dilute VC plumes Acknowledgements We would like to thank Bill Richard (EST Associates, Inc.), Tim McDougall (OASIS Environmental...these steps, the DNA extraction protocol was carried out as recommended by MoBio. Additional experimentation led us to further refine the Sterivex

  17. A Logical Analysis of Quantum Voting Protocols

    Science.gov (United States)

    Rad, Soroush Rafiee; Shirinkalam, Elahe; Smets, Sonja

    2017-12-01

    In this paper we provide a logical analysis of the Quantum Voting Protocol for Anonymous Surveying as developed by Horoshko and Kilin in (Phys. Lett. A 375, 1172-1175 2011). In particular we make use of the probabilistic logic of quantum programs as developed in (Int. J. Theor. Phys. 53, 3628-3647 2014) to provide a formal specification of the protocol and to derive its correctness. Our analysis is part of a wider program on the application of quantum logics to the formal verification of protocols in quantum communication and quantum computation.

  18. Two-party quantum key agreement protocols under collective noise channel

    Science.gov (United States)

    Gao, Hao; Chen, Xiao-Guang; Qian, Song-Rong

    2018-06-01

    Recently, quantum communication has become a very popular research field. The quantum key agreement (QKA) plays an important role in the field of quantum communication, based on its unconditional security in terms of theory. Among all kinds of QKA protocols, QKA protocols resisting collective noise are widely being studied. In this paper, we propose improved two-party QKA protocols resisting collective noise and present a feasible plan for information reconciliation. Our protocols' qubit efficiency has achieved 26.67%, which is the best among all the two-party QKA protocols against collective noise, thus showing that our protocol can improve the transmission efficiency of quantum key agreement.

  19. IAEA to implement Safeguards Additional Protocols in the EU

    International Nuclear Information System (INIS)

    2004-01-01

    Full text: IAEA Director General Mohamed ElBaradei welcomed the entry into force today of the Additional Protocols for 15 States of the European Union - France, the United Kingdom and the 13 non-nuclear weapon States of the EU - and the European Atomic Energy Community (EURATOM). The Protocols, which provide the Agency with better tools to verify compliance with nuclear non-proliferation commitments, entered into force when the European Commission informed the Agency that EURATOM's own requirements for entry into force had been met. The 15 States had provided similar notifications over the past years since signing the Protocols in 1998. The simultaneous entry into force of Additional Protocols for the 15 EU States is 'a very positive development and a milestone in our efforts to strengthen the verification regime', said Dr. ElBaradei. 'In my view, the Additional Protocol should become the standard for verification under the Treaty on the Non-Proliferation of Nuclear Weapons (NPT).' He added that the Agency had been preparing for the entry into force of the EU protocols and was confident that, in co-operation with the 15 States and EURATOM, it would be able to ensure effective and efficient implementation in the EU States. The Model Additional Protocol was developed following the discovery of Iraq's clandestine nuclear weapons programme to ensure that the IAEA is given the information and access it needs for timely discovery of any similar activities in States that have pledged not to use nuclear material and activities for weapons purposes. In the past year, Additional Protocols entered into force for 22 countries, and the Agency will now implement Additional Protocols in 58 States, which includes the 15 EU States. The 10 countries joining the EU on 1 May 2004 - seven of which already have brought into force Additional Protocols to their respective safeguards agreements - are expected to gradually accede to the Safeguards Agreement and Additional Protocol covering

  20. Symbolic Model Checking and Analysis for E-Commerce Protocol

    Institute of Scientific and Technical Information of China (English)

    WEN Jing-Hua; ZHANG Mei; LI Xiang

    2005-01-01

    A new approach is proposed for analyzing non-repudiation and fairness of e-commerce protocols. The authentication e-mail protocol CMP1 is modeled as finite state machine and analyzed in two vital aspects - non-repudiation and fairness using SMV. As a result, the CMP1 protocol is not fair and we have improved it. This result shows that it is effective to analyze and check the new features of e-commerce protocols using SMV model checker

  1. Re-examining the security of blind quantum signature protocols

    International Nuclear Information System (INIS)

    Wang Mingming; Chen Xiubo; Niu Xinxin; Yang Yixian

    2012-01-01

    Recently, blind quantum signature (BQS) protocols have been proposed with the help of a third-party verifier. However, our research shows that some of the BQS protocols are unable to complete the blind signature task fairly if the verifier is dishonest. Indeed, these protocols can be viewed as variants of the classical digital signature scheme of symmetric-key cryptography. If nobody is trusted in such protocols, digital signature cannot be implemented since disagreements cannot be solved fairly.

  2. A model based security testing method for protocol implementation.

    Science.gov (United States)

    Fu, Yu Long; Xin, Xiao Long

    2014-01-01

    The security of protocol implementation is important and hard to be verified. Since the penetration testing is usually based on the experience of the security tester and the specific protocol specifications, a formal and automatic verification method is always required. In this paper, we propose an extended model of IOLTS to describe the legal roles and intruders of security protocol implementations, and then combine them together to generate the suitable test cases to verify the security of protocol implementation.

  3. Intelligent routing protocol for ad hoc wireless network

    Science.gov (United States)

    Peng, Chaorong; Chen, Chang Wen

    2006-05-01

    A novel routing scheme for mobile ad hoc networks (MANETs), which combines hybrid and multi-inter-routing path properties with a distributed topology discovery route mechanism using control agents is proposed in this paper. In recent years, a variety of hybrid routing protocols for Mobile Ad hoc wireless networks (MANETs) have been developed. Which is proactively maintains routing information for a local neighborhood, while reactively acquiring routes to destinations beyond the global. The hybrid protocol reduces routing discovery latency and the end-to-end delay by providing high connectivity without requiring much of the scarce network capacity. On the other side the hybrid routing protocols in MANETs likes Zone Routing Protocol still need route "re-discover" time when a route between zones link break. Sine the topology update information needs to be broadcast routing request on local zone. Due to this delay, the routing protocol may not be applicable for real-time data and multimedia communication. We utilize the advantages of a clustering organization and multi-routing path in routing protocol to achieve several goals at the same time. Firstly, IRP efficiently saves network bandwidth and reduces route reconstruction time when a routing path fails. The IRP protocol does not require global periodic routing advertisements, local control agents will automatically monitor and repair broke links. Secondly, it efficiently reduces congestion and traffic "bottlenecks" for ClusterHeads in clustering network. Thirdly, it reduces significant overheads associated with maintaining clusters. Fourthly, it improves clusters stability due to dynamic topology changing frequently. In this paper, we present the Intelligent Routing Protocol. First, we discuss the problem of routing in ad hoc networks and the motivation of IRP. We describe the hierarchical architecture of IRP. We describe the routing process and illustrate it with an example. Further, we describe the control manage

  4. Analysis of a security protocol in ?CRL

    NARCIS (Netherlands)

    J. Pang

    2002-01-01

    textabstractNeedham-Schroeder public-key protocol; With the growth and commercialization of the Internet, the security of communication between computers becomes a crucial point. A variety of security protocols based on cryptographic primitives are used to establish secure communication over

  5. Multi-party quantum key agreement protocol secure against collusion attacks

    Science.gov (United States)

    Wang, Ping; Sun, Zhiwei; Sun, Xiaoqiang

    2017-07-01

    The fairness of a secure multi-party quantum key agreement (MQKA) protocol requires that all involved parties are entirely peer entities and can equally influence the outcome of the protocol to establish a shared key wherein no one can decide the shared key alone. However, it is found that parts of the existing MQKA protocols are sensitive to collusion attacks, i.e., some of the dishonest participants can collaborate to predetermine the final key without being detected. In this paper, a multi-party QKA protocol resisting collusion attacks is proposed. Different from previous QKA protocol resisting N-1 coconspirators or resisting 1 coconspirators, we investigate the general circle-type MQKA protocol which can be secure against t dishonest participants' cooperation. Here, t < N. We hope the results of the presented paper will be helpful for further research on fair MQKA protocols.

  6. Protocols for pressure ulcer prevention: are they evidence-based?

    Science.gov (United States)

    Chaves, Lidice M; Grypdonck, Mieke H F; Defloor, Tom

    2010-03-01

    This study is a report of a study to determine the quality of protocols for pressure ulcer prevention in home care in the Netherlands. If pressure ulcer prevention protocols are evidence-based and practitioners use them correctly in practice, this will result a reduction in pressure ulcers. Very little is known about the evidence-based content and quality of the pressure ulcer prevention protocols. In 2008, current pressure ulcer prevention protocols from 24 home-care agencies in the Netherlands were evaluated. A checklist developed and validated by two pressure ulcer prevention experts was used to assess the quality of the protocols, and weighted and unweighted quality scores were computed and analysed using descriptive statistics. The 24 pressure ulcer prevention protocols had a mean weighted quality score of 63.38 points out of a maximum of 100 (sd 5). The importance of observing the skin at the pressure points at least once a day was emphasized in 75% of the protocols. Only 42% correctly warned against the use of materials that were 'less effective or that could potentially cause harm'. Pressure ulcer prevention commands a reasonable amount of attention in home care, but the incidence of pressure ulcers and lack of a consistent, standardized document for use in actual practice indicate a need for systematic implementation of national pressure ulcer prevention standards in the Netherlands to ensure adherence to the established protocols.

  7. An experimental 'Life' for an experimental life: Richard Waller's biography of Robert Hooke (1705).

    Science.gov (United States)

    Moxham, Noah

    2016-03-01

    Richard Waller's 'Life of Dr Robert Hooke', prefixed to his edition of Hooke's Posthumous Works (1705), is an important source for the life of one of the most eminent members of the early Royal Society. It also has the distinction of being one of the earliest biographies of a man of science to be published in English. I argue that it is in fact the first biography to embrace the subject's natural-philosophical work as the centre of his life, and I investigate Waller's reasons for adopting this strategy and his struggle with the problem of how to represent an early experimental philosopher in print. I suggest that Waller eschews the 'Christian philosopher' tradition of contemporary biography - partly because of the unusually diverse and fragmentary nature of Hooke's intellectual output - and draws instead upon the structure of the Royal Society's archive as a means of organizing and understanding Hooke's life. The most quoted phrase from Waller's biography is that Hooke became 'to a crime close and reserved' in later life; this essay argues that Waller's biographical sketch was fashioned in order to undo the effects of that reserve. In modelling his approach very closely on the structure of the society's records he was principally concerned with making Hooke's work and biography accessible, intelligible and useful to the fellowship in a context familiar to them, a context which had provided the institutional framework for most of Hooke's adult life. I argue that Waller's 'Life' was also intended to make the largest claims for Hooke's intellectual standing that the author dared in the context of the enmity between Hooke and Isaac Newton once the latter became president of the Royal Society. However, I also adduce fresh manuscript evidence that Waller actually compiled, but did not publish, a defence of Hooke's claim to have discovered the inverse square law of gravity, allowing us to glimpse a much more assertive biography of Hooke than the published version.

  8. Model checking the HAVi leader election protocol

    NARCIS (Netherlands)

    J.M.T. Romijn (Judi)

    1999-01-01

    textabstractThe HAVi specification proposes an architecture for audio/video interoperability in home networks. Part of the HAVi specification is a distributed leader election protocol. We have modelled this leader election protocol in Promela and Lotos and have checked several properties with the

  9. Auto-Configuration Protocols in Mobile Ad Hoc Networks

    Science.gov (United States)

    Villalba, Luis Javier García; Matesanz, Julián García; Orozco, Ana Lucila Sandoval; Díaz, José Duván Márquez

    2011-01-01

    The TCP/IP protocol allows the different nodes in a network to communicate by associating a different IP address to each node. In wired or wireless networks with infrastructure, we have a server or node acting as such which correctly assigns IP addresses, but in mobile ad hoc networks there is no such centralized entity capable of carrying out this function. Therefore, a protocol is needed to perform the network configuration automatically and in a dynamic way, which will use all nodes in the network (or part thereof) as if they were servers that manage IP addresses. This article reviews the major proposed auto-configuration protocols for mobile ad hoc networks, with particular emphasis on one of the most recent: D2HCP. This work also includes a comparison of auto-configuration protocols for mobile ad hoc networks by specifying the most relevant metrics, such as a guarantee of uniqueness, overhead, latency, dependency on the routing protocol and uniformity. PMID:22163814

  10. RadNet: Open network protocol for radiation data

    International Nuclear Information System (INIS)

    Rees, B.; Olson, K.; Beckes-Talcott, J.; Kadner, S.; Wenderlich, T.; Hoy, M.; Doyle, W.; Koskelo, M.

    1998-01-01

    Safeguards instrumentation is increasingly being incorporated into remote monitoring applications. In the past, vendors of radiation monitoring instruments typically provided the tools for uploading the monitoring data to a host. However, the proprietary nature of communication protocols lends itself to increased computer support needs and increased installation expenses. As a result, a working group of suppliers and customers of radiation monitoring instruments defined an open network protocol for transferring packets on a local area network from radiation monitoring equipment to network hosts. The protocol was termed RadNet. While it is now primarily used for health physics instruments, RadNet's flexibility and strength make it ideal for remote monitoring of nuclear materials. The incorporation of standard, open protocols ensures that future work will not render present work obsolete; because RadNet utilizes standard Internet protocols, and is itself a non-proprietary standard. The use of industry standards also simplifies the development and implementation of ancillary services, e.g. E-main generation or even pager systems

  11. Auto-configuration protocols in mobile ad hoc networks.

    Science.gov (United States)

    Villalba, Luis Javier García; Matesanz, Julián García; Orozco, Ana Lucila Sandoval; Díaz, José Duván Márquez

    2011-01-01

    The TCP/IP protocol allows the different nodes in a network to communicate by associating a different IP address to each node. In wired or wireless networks with infrastructure, we have a server or node acting as such which correctly assigns IP addresses, but in mobile ad hoc networks there is no such centralized entity capable of carrying out this function. Therefore, a protocol is needed to perform the network configuration automatically and in a dynamic way, which will use all nodes in the network (or part thereof) as if they were servers that manage IP addresses. This article reviews the major proposed auto-configuration protocols for mobile ad hoc networks, with particular emphasis on one of the most recent: D2HCP. This work also includes a comparison of auto-configuration protocols for mobile ad hoc networks by specifying the most relevant metrics, such as a guarantee of uniqueness, overhead, latency, dependency on the routing protocol and uniformity.

  12. Development of measurement protocols for quantum magnetometry

    DEFF Research Database (Denmark)

    Stark, Alexander

    and protocols to enhance the lifetime and the coherences of the NV center with the overall goal of enhancing the capabilities of this sensor in the field of magnetometry. In order to realize complex protocols, a sophisticated software control of the measurement setup is required. A general software framework......, is serving as rigorous framework to reduce the complexity of the setup configuration by a fundamental separation of tasks. As a consequence, the general idea of this framework is not limited to experiments with color centers in diamond, but can find application in any laboratory environment. The measurement...... of magnetic fields in the high-frequency GHz regimes is challenging. In this thesis, a continuous dynamical decoupling protocol is developed and implemented, which extends the capabilities of the NV sensor to probe GHz signals with a narrow bandwidth. Moreover, the protocol protects the system from noise...

  13. Language, Semantics, and Methods for Security Protocols

    DEFF Research Database (Denmark)

    Crazzolara, Federico

    events. Methods like strand spaces and the inductive method of Paulson have been designed to support an intensional, event-based, style of reasoning. These methods have successfully tackled a number of protocols though in an ad hoc fashion. They make an informal spring from a protocol to its......-nets. They have persistent conditions and as we show in this thesis, unfold under reasonable assumptions to a more basic kind of nets. We relate SPL-nets to strand spaces and inductive rules, as well as trace languages and event structures so unifying a range of approaches, as well as providing conditions under...... reveal. The last few years have seen the emergence of successful intensional, event-based, formal approaches to reasoning about security protocols. The methods are concerned with reasoning about the events that a security protocol can perform, and make use of a causal dependency that exists between...

  14. Information-theoretic security proof for quantum-key-distribution protocols

    International Nuclear Information System (INIS)

    Renner, Renato; Gisin, Nicolas; Kraus, Barbara

    2005-01-01

    We present a technique for proving the security of quantum-key-distribution (QKD) protocols. It is based on direct information-theoretic arguments and thus also applies if no equivalent entanglement purification scheme can be found. Using this technique, we investigate a general class of QKD protocols with one-way classical post-processing. We show that, in order to analyze the full security of these protocols, it suffices to consider collective attacks. Indeed, we give new lower and upper bounds on the secret-key rate which only involve entropies of two-qubit density operators and which are thus easy to compute. As an illustration of our results, we analyze the Bennett-Brassard 1984, the six-state, and the Bennett 1992 protocols with one-way error correction and privacy amplification. Surprisingly, the performance of these protocols is increased if one of the parties adds noise to the measurement data before the error correction. In particular, this additional noise makes the protocols more robust against noise in the quantum channel

  15. Information-theoretic security proof for quantum-key-distribution protocols

    Science.gov (United States)

    Renner, Renato; Gisin, Nicolas; Kraus, Barbara

    2005-07-01

    We present a technique for proving the security of quantum-key-distribution (QKD) protocols. It is based on direct information-theoretic arguments and thus also applies if no equivalent entanglement purification scheme can be found. Using this technique, we investigate a general class of QKD protocols with one-way classical post-processing. We show that, in order to analyze the full security of these protocols, it suffices to consider collective attacks. Indeed, we give new lower and upper bounds on the secret-key rate which only involve entropies of two-qubit density operators and which are thus easy to compute. As an illustration of our results, we analyze the Bennett-Brassard 1984, the six-state, and the Bennett 1992 protocols with one-way error correction and privacy amplification. Surprisingly, the performance of these protocols is increased if one of the parties adds noise to the measurement data before the error correction. In particular, this additional noise makes the protocols more robust against noise in the quantum channel.

  16. Formalization of Quantum Protocols using Coq

    Directory of Open Access Journals (Sweden)

    Jaap Boender

    2015-11-01

    Full Text Available Quantum Information Processing, which is an exciting area of research at the intersection of physics and computer science, has great potential for influencing the future development of information processing systems. The building of practical, general purpose Quantum Computers may be some years into the future. However, Quantum Communication and Quantum Cryptography are well developed. Commercial Quantum Key Distribution systems are easily available and several QKD networks have been built in various parts of the world. The security of the protocols used in these implementations rely on information-theoretic proofs, which may or may not reflect actual system behaviour. Moreover, testing of implementations cannot guarantee the absence of bugs and errors. This paper presents a novel framework for modelling and verifying quantum protocols and their implementations using the proof assistant Coq. We provide a Coq library for quantum bits (qubits, quantum gates, and quantum measurement. As a step towards verifying practical quantum communication and security protocols such as Quantum Key Distribution, we support multiple qubits, communication and entanglement. We illustrate these concepts by modelling the Quantum Teleportation Protocol, which communicates the state of an unknown quantum bit using only a classical channel.

  17. An Improved 6LoWPAN Hierarchical Routing Protocol

    Directory of Open Access Journals (Sweden)

    Xue Li

    2015-10-01

    Full Text Available IETF 6LoWPAN working group is engaged in the IPv6 protocol stack research work based on IEEE802.15.4 standard. In this working group, the routing protocol is one of the important research contents. In the 6LoWPAN, HiLow is a well-known layered routing protocol. This paper puts forward an improved hierarchical routing protocol GHiLow by improving HiLow parent node selection and path restoration strategy. GHiLow improves the parent node selection by increasing the choice of parameters. Simutaneously, it also improves path recovery by analysing different situations to recovery path. Therefore, GHiLow contributes to the ehancement of network performance and the decrease of network energy consumption.

  18. A Study of Shared-Memory Mutual Exclusion Protocols Using CADP

    Science.gov (United States)

    Mateescu, Radu; Serwe, Wendelin

    Mutual exclusion protocols are an essential building block of concurrent systems: indeed, such a protocol is required whenever a shared resource has to be protected against concurrent non-atomic accesses. Hence, many variants of mutual exclusion protocols exist in the shared-memory setting, such as Peterson's or Dekker's well-known protocols. Although the functional correctness of these protocols has been studied extensively, relatively little attention has been paid to their non-functional aspects, such as their performance in the long run. In this paper, we report on experiments with the performance evaluation of mutual exclusion protocols using Interactive Markov Chains. Steady-state analysis provides an additional criterion for comparing protocols, which complements the verification of their functional properties. We also carefully re-examined the functional properties, whose accurate formulation as temporal logic formulas in the action-based setting turns out to be quite involved.

  19. Examining recombinant human TSH primed 131I therapy protocol in patients with metastatic differentiated thyroid carcinoma: comparison with the traditional thyroid hormone withdrawal protocol

    International Nuclear Information System (INIS)

    Rani, Deepa; Kaisar, Sushma; Awasare, Sushma; Kamaldeep; Abhyankar, Amit; Basu, Sandip

    2014-01-01

    Recombinant human thyroid-stimulating hormone (rhTSH)-based protocol is a promising recent development in the management of differentiated thyroid carcinoma (DTC). The objectives of this prospective study were: (1) to assess the feasibility and efficacy of the rhTSH primed 131 I therapy protocol in patients with DTC with distant metastatic disease, (2) to perform lesional dosimetry in this group of patients compared to the traditional protocol, (3) to document the practical advantages (patient symptoms and hospital stay) of the rhTSH protocol compared to the traditional thyroid hormone withdrawal protocol, (4) to document and record any adverse effect of this strategy, (5) to compare the renal function parameters, and (6) to compare the serum TSH values achieved in either of the protocols in this group of patients. The study included 37 patients with metastatic DTC having lung or skeletal metastases or both. A comparison of lesional radiation absorbed dose, hospital stay, renal function tests, and symptom profile was undertaken between the traditional thyroid hormone withdrawal protocol and rhTSH-based therapy protocol. Dosimetric calculations of metastatic lesions were performed using lesion uptake and survey meter readings for calculation of effective half-life. Non-contrast-enhanced CT was used for assessment of tumor volume. Quality of life was assessed using the European Organization for Research and Treatment of Cancer (EORTC) QOL forms. A comparison of pretreatment withdrawal thyroglobulin (TG) was done with the withdrawal TG level 3 months after treatment. The mean effective half-life of 131 I in metastatic lesions was less during the rhTSH protocol (29.49 h) compared to the thyroid hormone withdrawal protocol (35.48 h), but the difference was not statistically significant (p = 0.056). The mean 24-h % uptake of the lesions during the traditional protocol (4.84 %) was slightly higher than the 24-h % uptake during the rhTSH protocol (3.56 %), but the

  20. Performance Analysis of TDMA Protocol in a Femtocell Network

    Directory of Open Access Journals (Sweden)

    Wanod Kumar

    2014-07-01

    Full Text Available In this paper, we evaluate the performance of TDMA (Time Division Multiple Access protocol using queuing theory in a femtocell network. The fair use of wireless channel among the users of network is carried out using TDMA protocol. The arrival of data packets from M communicating nodes becomes multiple Poisson process. The time slots of TDMA protocol represent c servers to communicate data packets coming from communicating nodes to the input of FAP (Femtocell Access Point. The service time of each server (time slot is exponentially distributed. This complete communication scenario using TDMA protocol is modeled using M/M/c queue. The performance of the protocol is evaluated in terms of mean number in system, average system delay and utilization for varying traffic intensity

  1. Climate Change And The Kyoto Protocol

    International Nuclear Information System (INIS)

    Comsan, M.N.H.

    2007-01-01

    The problem of global warming is addressed. Changes in earth surface temperature, emission of CO 2 and other four major green house gases are presented. Effect of global warming on weather, ocean, and ecosystem is discussed. A brief history of the Kyoto protocol starting from the 151 Earth Summit in 1972 is outlined. An overview of the protocol and a brief summary are given

  2. A Lightweight Protocol for Secure Video Streaming.

    Science.gov (United States)

    Venčkauskas, Algimantas; Morkevicius, Nerijus; Bagdonas, Kazimieras; Damaševičius, Robertas; Maskeliūnas, Rytis

    2018-05-14

    The Internet of Things (IoT) introduces many new challenges which cannot be solved using traditional cloud and host computing models. A new architecture known as fog computing is emerging to address these technological and security gaps. Traditional security paradigms focused on providing perimeter-based protections and client/server point to point protocols (e.g., Transport Layer Security (TLS)) are no longer the best choices for addressing new security challenges in fog computing end devices, where energy and computational resources are limited. In this paper, we present a lightweight secure streaming protocol for the fog computing "Fog Node-End Device" layer. This protocol is lightweight, connectionless, supports broadcast and multicast operations, and is able to provide data source authentication, data integrity, and confidentiality. The protocol is based on simple and energy efficient cryptographic methods, such as Hash Message Authentication Codes (HMAC) and symmetrical ciphers, and uses modified User Datagram Protocol (UDP) packets to embed authentication data into streaming data. Data redundancy could be added to improve reliability in lossy networks. The experimental results summarized in this paper confirm that the proposed method efficiently uses energy and computational resources and at the same time provides security properties on par with the Datagram TLS (DTLS) standard.

  3. Blockchain Consensus Protocols in the Wild (Keynote Talk)

    OpenAIRE

    Cachin, Christian; Vukolic, Marko

    2017-01-01

    A blockchain is a distributed ledger for recording transactions, maintained by many nodes without central authority through a distributed cryptographic protocol. All nodes validate the information to be appended to the blockchain, and a consensus protocol ensures that the nodes agree on a unique order in which entries are appended. Consensus protocols for tolerating Byzantine faults have received renewed attention because they also address blockchain systems. This work discusses the process o...

  4. Implementation of Siemens USS protocol into LabVIEW.

    Science.gov (United States)

    Hosek, P; Diblik, M

    2011-10-01

    This article gives basic overview of the USS protocol as a communication interface to drive Siemens frequency inverters. It presents our implementation of this protocol into LabVIEW, as there was permanent demand from the community of the users to have native LabVIEW implementation of the USS protocol. It also states encountered problems and their solutions. Copyright © 2011 Society for Laboratory Automation and Screening. Published by Elsevier Inc. All rights reserved.

  5. Biometrics based authentication scheme for session initiation protocol

    OpenAIRE

    Xie, Qi; Tang, Zhixiong

    2016-01-01

    Many two-factor challenge-response based session initiation protocol (SIP) has been proposed, but most of them are vulnerable to smart card stolen attacks and password guessing attacks. In this paper, we propose a novel three-factor SIP authentication scheme using biometrics, password and smart card, and utilize the pi calculus-based formal verification tool ProVerif to prove that the proposed protocol achieves security and authentication. Furthermore, our protocol is highly efficient when co...

  6. Symbolic Analysis of Cryptographic Protocols

    DEFF Research Database (Denmark)

    Dahl, Morten

    We present our work on using abstract models for formally analysing cryptographic protocols: First, we present an ecient method for verifying trace-based authenticity properties of protocols using nonces, symmetric encryption, and asymmetric encryption. The method is based on a type system...... of Gordon et al., which we modify to support fully-automated type inference. Tests conducted via an implementation of our algorithm found it to be very ecient. Second, we show how privacy may be captured in a symbolic model using an equivalencebased property and give a formal denition. We formalise...

  7. A two-step quantum secure direct communication protocol with hyperentanglement

    International Nuclear Information System (INIS)

    Gu Bin; Zhang Cheng-Yi; Huang Yu-Gai; Fang Xia

    2011-01-01

    We propose a two-step quantum secure direct communication (QSDC) protocol with hyperentanglement in both the spatial-mode and the polarization degrees of freedom of photon pairs which can in principle be produced with a beta barium borate crystal. The secret message can be encoded on the photon pairs with unitary operations in these two degrees of freedom independently. This QSDC protocol has a higher capacity than the original two-step QSDC protocol as each photon pair can carry 4 bits of information. Compared with the QSDC protocol based on hyperdense coding, this QSDC protocol has the immunity to Trojan horse attack strategies with the process for determining the number of the photons in each quantum signal as it is a one-way quantum communication protocol. (general)

  8. An improved AODV routing protocol based on tower structure

    Directory of Open Access Journals (Sweden)

    Li Yong Qiang

    2016-01-01

    Full Text Available The paper proposed a new routing protocol(IAODV based on tower structure in the Ad Hoc network for the problem which Location Routing Protocol need hardware and Complex algorithm. By the simulation, The complexity of the new routing protocol is reduced without reducing the performance of the network.

  9. Analysis of Security Protocols by Annotations

    DEFF Research Database (Denmark)

    Gao, Han

    . The development of formal techniques, e.g. control flow analyses, that can check various security properties, is an important tool to meet this challenge. This dissertation contributes to the development of such techniques. In this dissertation, security protocols are modelled in the process calculus LYSA......The trend in Information Technology is that distributed systems and networks are becoming increasingly important, as most of the services and opportunities that characterise the modern society are based on these technologies. Communication among agents over networks has therefore acquired a great...... deal of research interest. In order to provide effective and reliable means of communication, more and more communication protocols are invented, and for most of them, security is a significant goal. It has long been a challenge to determine conclusively whether a given protocol is secure or not...

  10. Demarcation of Security in Authentication Protocols

    DEFF Research Database (Denmark)

    Ahmed, Naveed; Jensen, Christian D.

    2011-01-01

    Security analysis of communication protocols is a slippery business; many “secure” protocols later turn out to be insecure. Among many, two complains are more frequent: inadequate definition of security and unstated assumptions in the security model. In our experience, one principal cause...... for such state of affairs is an apparent overlap of security and correctness, which may lead to many sloppy security definitions and security models. Although there is no inherent need to separate security and correctness requirements, practically, such separation is significant. It makes security analysis...... easier, and enables us to define security goals with a fine granularity. We present one such separation, by introducing the notion of binding sequence as a security primitive. A binding sequence, roughly speaking, is the only required security property of an authentication protocol. All other...

  11. A Review of Communications Protocol for Intelligent Remote Terminal Unit Development

    Directory of Open Access Journals (Sweden)

    Mohd Ruddin Ab. Ghani

    2013-11-01

    Full Text Available This paper reviewed all the possible interfacing communication protocols for remote terminal unit (RTU. Supervisory Control and Data Acquisition (SCADA system is a central station that can communicate with other network using the protocol. Fundamentally, the architectures of all networks are based on the seven layers of open system interconnection (OSI and International Standard Organization (ISO. The objective of designing the protocols is to check the status of all the input and output field devices and send the report according to that status. The corresponding protocol and communication parameters between the connecting devices will be included in designing a complex SCADA system. The available protocols to develop the communication of RTU are Modbus/ASCII, distributed network protocol (DNP3, controller area network (CAN, International Electro-technical Commission (IEC 60870, transmission control protocol/internet protocol (TCP/IP.

  12. Protocol to Exploit Waiting Resources for UASNs

    Directory of Open Access Journals (Sweden)

    Li-Ling Hung

    2016-03-01

    Full Text Available The transmission speed of acoustic waves in water is much slower than that of radio waves in terrestrial wireless sensor networks. Thus, the propagation delay in underwater acoustic sensor networks (UASN is much greater. Longer propagation delay leads to complicated communication and collision problems. To solve collision problems, some studies have proposed waiting mechanisms; however, long waiting mechanisms result in low bandwidth utilization. To improve throughput, this study proposes a slotted medium access control protocol to enhance bandwidth utilization in UASNs. The proposed mechanism increases communication by exploiting temporal and spatial resources that are typically idle in order to protect communication against interference. By reducing wait time, network performance and energy consumption can be improved. A performance evaluation demonstrates that when the data packets are large or sensor deployment is dense, the energy consumption of proposed protocol is less than that of existing protocols as well as the throughput is higher than that of existing protocols.

  13. Protocol to co-operation agreement with Iran

    CERN Document Server

    2001-01-01

    A Co-operation Agreement between CERN and Iran will be signed in the coming weeks within the framework of the decisions taken by the Committee of Council and Council in June 1989. In view of implementing this Agreement, a Protocol between CERN and the International Scientific Meetings Office of the Ministry of Science of the Islamic Republic of Iran has been drawn up. It concerns the participation of scientific Institutions of Iran in the CMS Collaboration where CERN is acting on behalf of this Collaboration. This Protocol incorporates the agreement between CMS and ISMO on the Iranese contribution. It does not involve any financial commitment for CERN. The Protocol mainly addresses the status of the Iranese scientists at CERN, the supply by ISMO of the support tables for CMS, as well as the usual provisions concerning delivery and customs, guarantees, responsibilities, intellectual property and disputes. This Protocol is submitted to the Finance Committee for information.

  14. Security of modified Ping-Pong protocol in noisy and lossy channel.

    Science.gov (United States)

    Han, Yun-Guang; Yin, Zhen-Qiang; Li, Hong-Wei; Chen, Wei; Wang, Shuang; Guo, Guang-Can; Han, Zheng-Fu

    2014-05-12

    The "Ping-Pong" (PP) protocol is a two-way quantum key protocol based on entanglement. In this protocol, Bob prepares one maximally entangled pair of qubits, and sends one qubit to Alice. Then, Alice performs some necessary operations on this qubit and sends it back to Bob. Although this protocol was proposed in 2002, its security in the noisy and lossy channel has not been proven. In this report, we add a simple and experimentally feasible modification to the original PP protocol, and prove the security of this modified PP protocol against collective attacks when the noisy and lossy channel is taken into account. Simulation results show that our protocol is practical.

  15. Critical Response Protocol

    Science.gov (United States)

    Ellingson, Charlene; Roehrig, Gillian; Bakkum, Kris; Dubinsky, Janet M.

    2016-01-01

    This article introduces the Critical Response Protocol (CRP), an arts-based technique that engages students in equitable critical discourse and aligns with the "Next Generation Science Standards" vision for providing students opportunities for language learning while advancing science learning (NGSS Lead States 2013). CRP helps teachers…

  16. The micro-step motor controller protocol and driver

    International Nuclear Information System (INIS)

    Hong, Kwang Pyo; Lee, Chang Hee; Moon, Myung Kook; Choi, Bung Hun; Choi, Young Hyun; Cheon, Jong Gu

    2004-11-01

    We developed the communication protocol which is a main kernel of motor control firmware program that is used at HANARO neutron spectrometer now. This protocol driver divide into as a 4 group(Serial protocol, DLL, Active-X, Labview driver), so end-user can control the motor control as easily by PC RS232/422 port and have a merits as follows: Support a Low Level/High level driver, Support a Network Connectivity function by using High level Driver, One Server can services many client request. By using this protocol, The End-user can be easily makes a application motor control program and developed another application system program by using several kinds of programming tools under Widows and Linux based operation systems

  17. EMS Adherence to a Pre-hospital Cervical Spine Clearance Protocol

    Directory of Open Access Journals (Sweden)

    Johnson, David

    2001-10-01

    Full Text Available Purpose: To determine the degree of adherence to a cervical spine (c-spine clearance protocol by pre-hospital Emergency Medical Services (EMS personnel by both self-assessment and receiving hospital assessment, to describe deviations from the protocol, and to determine if the rate of compliance by paramedic self-assessment differed from receiving hospital assessment. Methods: A retrospective sample of pre-hospital (consecutive series and receiving hospital (convenience sample assessments of the compliance with and appropriateness of c-spine immobilization. The c-spine clearance protocol was implemented for Orange County EMS just prior to the April-November 1999 data collection period. Results: We collected 396 pre-hospital and 162 receiving hospital data forms. From the pre-hospital data sheet. the percentage deviation from the protocol was 4.096 (16/396. Only one out of 16 cases that did not comply with the protocol was due to over immobilization (0.2%. The remaining 15 cases were under immobilized, according to protocol. Nine of the under immobilized cases (66% that should have been placed in c-spine precautions met physical assessment criteria in the protocol, while the other five cases met mechanism of injury criteria. The rate of deviations from protocol did not differ over time. The receiving hospital identified 8.0% (13/162; 6/16 over immobilized, 7/16 under immobilized of patients with deviations from the protocol; none was determined to have actual c-spine injury. Conclusion: The implementation of a pre-hospital c-spine clearance protocol in Orange County was associated with a moderate overall adherence rate (96% from the pre-hospital perspective, and 92% from the hospital perspective, p=.08 for the two evaluation methods. Most patients who deviated from protocol were under immobilized, but no c-spine injuries were missed. The rate of over immobilization was better than previously reported, implying a saving of resources.

  18. An Argument Approach to Observation Protocol Validity

    Science.gov (United States)

    Bell, Courtney A.; Gitomer, Drew H.; McCaffrey, Daniel F.; Hamre, Bridget K.; Pianta, Robert C.; Qi, Yi

    2012-01-01

    This article develops a validity argument approach for use on observation protocols currently used to assess teacher quality for high-stakes personnel and professional development decisions. After defining the teaching quality domain, we articulate an interpretive argument for observation protocols. To illustrate the types of evidence that might…

  19. Network Coding Protocols for Smart Grid Communications

    DEFF Research Database (Denmark)

    Prior, Rui; Roetter, Daniel Enrique Lucani; Phulpin, Yannick

    2014-01-01

    We propose a robust network coding protocol for enhancing the reliability and speed of data gathering in smart grids. At the heart of our protocol lies the idea of tunable sparse network coding, which adopts the transmission of sparsely coded packets at the beginning of the transmission process b...

  20. En torno al arte europeo de la segunda mitad del siglo XIX. Aspectos de las relaciones forma–contenido o forma–función en la obra de Lawrence Alma–Tadema, Gottfried Semper y Richard Wagner

    OpenAIRE

    Moreno Dopazo, Ángel

    2011-01-01

    El trabajo se plantea como una reflexión sobre la dificultad actual para apreciar los valores, a menudo denostados, de los ya supuestamente lejanos arte y cultura del siglo XIX. De aquel rico mundo de referentes y asociaciones se destacan aquí las figuras del pintor realista Alma-Tadema, los arquitectos del Ring de Viena, con Semper como singular protagonista, y el músico Richard Wagner. Junto al análisis del complejo universo pictórico del artista holandés afincado en Inglaterra se presenta ...

  1. Topology Discovery Using Cisco Discovery Protocol

    OpenAIRE

    Rodriguez, Sergio R.

    2009-01-01

    In this paper we address the problem of discovering network topology in proprietary networks. Namely, we investigate topology discovery in Cisco-based networks. Cisco devices run Cisco Discovery Protocol (CDP) which holds information about these devices. We first compare properties of topologies that can be obtained from networks deploying CDP versus Spanning Tree Protocol (STP) and Management Information Base (MIB) Forwarding Database (FDB). Then we describe a method of discovering topology ...

  2. Hybrid Long-Distance Entanglement Distribution Protocol

    DEFF Research Database (Denmark)

    Brask, J.B.; Rigas, I.; Polzik, E.S.

    2010-01-01

    We propose a hybrid (continuous-discrete variable) quantum repeater protocol for long-distance entanglement distribution. Starting from states created by single-photon detection, we show how entangled coherent state superpositions can be generated by means of homodyne detection. We show that near......-deterministic entanglement swapping with such states is possible using only linear optics and homodyne detectors, and we evaluate the performance of our protocol combining these elements....

  3. Evaluation of an adult insulin infusion protocol at an academic medical center.

    Science.gov (United States)

    Petrov, Katerina I; Burns, Tammy L; Drincic, Andjela

    2012-05-01

    Acknowledging evidence of possible detrimental effects of tightly controlled blood glucose levels, the American Association of Clinical Endocrinologists and the American Diabetes Association published a consensus statement recommending less strict control for most diabetic patients. As a result of these recommendations, our academic center at Creighton University Medical Center revised its adult insulin infusion protocol to target blood glucose levels ranging from 120 to 180 mg/dL for regular (standard) glycemic control and 80 to 120 mg/dL for tight control; previous targets had ranged from 80 to 180 mg/dL and 70 to 110 mg/dL, respectively. The primary objective was to evaluate the time that blood glucose values were within the target range for patients receiving the new protocol, compared with patients receiving the previous protocol. Our study was designed to evaluate the effectiveness and safety of the revised protocol. Using a retrospective chart review, we collected data for 4 months from patients on the old insulin protocol (May to August 2009) and for 4 months from patients on the new protocol (September to December 2009). Secondary endpoints included the number of hypoglycemic episodes (blood glucose below 70 mg/dL) and severe hypoglycemic episodes (blood glucose 40 mg/dL or lower) experienced by patients receiving the new insulin protocol compared with those receiving the former protocol. Patient characteristics were similar at baseline. Blood glucose values stayed within the target range for a significantly shorter time with the new protocol than with the former protocol (44.6% vs. 56.8%, respectively; P protocol. No statistically significant differences in hypoglycemia were observed after the protocol was changed. Hypoglycemia occurred in 31% of the former-protocol patients compared with 18% of the revised-protocol patients. Severe hypoglycemia was experienced by 2.1% of patients on the old protocol and by 3.1% of patients on the new protocol. Rates of

  4. A Protocol for Advanced Psychometric Assessment of Surveys

    Science.gov (United States)

    Squires, Janet E.; Hayduk, Leslie; Hutchinson, Alison M.; Cranley, Lisa A.; Gierl, Mark; Cummings, Greta G.; Norton, Peter G.; Estabrooks, Carole A.

    2013-01-01

    Background and Purpose. In this paper, we present a protocol for advanced psychometric assessments of surveys based on the Standards for Educational and Psychological Testing. We use the Alberta Context Tool (ACT) as an exemplar survey to which this protocol can be applied. Methods. Data mapping, acceptability, reliability, and validity are addressed. Acceptability is assessed with missing data frequencies and the time required to complete the survey. Reliability is assessed with internal consistency coefficients and information functions. A unitary approach to validity consisting of accumulating evidence based on instrument content, response processes, internal structure, and relations to other variables is taken. We also address assessing performance of survey data when aggregated to higher levels (e.g., nursing unit). Discussion. In this paper we present a protocol for advanced psychometric assessment of survey data using the Alberta Context Tool (ACT) as an exemplar survey; application of the protocol to the ACT survey is underway. Psychometric assessment of any survey is essential to obtaining reliable and valid research findings. This protocol can be adapted for use with any nursing survey. PMID:23401759

  5. Comparison of microdose GnRH agonist protocol with GnRH antagonist / letrazole protocol in patients with poor ovarian response

    Directory of Open Access Journals (Sweden)

    Yiğit Çakıroğlu

    2013-09-01

    Full Text Available Objective: To compare microdose GnRH agonist (MDL protocol with GnRH antagonist/letrazole (AL protocol in patients with poor ovarian response. Design: Randomised clinical trial. Setting: Kocaeli University Assisted Reproductive Centre Interventions: POR was diagnosed according to ESHRE Bologna criteria in case of presence of 2 out of 3 criteria. In the MDL group (n=27, 40µg/0.2 cc subcutaneous leuprolid acetate was given two times a day starting on the first day of menstrual cycle. On the second day of the cycle, gonadotrophin stimulation was started at 450-600 IU and/or 150 IU human menopausal gonadotrophin (hMG along with leuprolid. In the AL group (n=28, 5 mg letrazole was given for 5 days starting on the second day of the spontaneous cycle and after the 5th day of the cycle, 450-600 IU and/or 150 IU hMG was given. Main Outcome Measures: To compare the outcomes of MDL protocol with AL protocol in patients with poor ovarian response. Results: Stimulation days, total gonadotrophin dose (IU, peak E2 (pg/ml levels, and endometrial thickness were found to be statistically significantly lower in the AL group. While no cases of cycle cancellation was detected in the MDL group, statistically significantly higher rates of cycle cancellation (%35.7, p<0.001 was detected in the AL group. No statistically significant differences were detected in total oocyte numbers (3.7±2.9 vs 2.7±2.2, number of transferred embryos (1.4±0.5 vs 1.4±1.9, pregnancy rates (3/27 (%11.1 vs 2/28 (%7.1 and implantation rates (3/36 (%8.3 vs 2/22 (%9.1 in between the groups. Comment: Although AL protocol is not superior to MDL protocol in poor ovarian response patients, it may be used as an alternative protocol.

  6. Development of high-reliable real-time communication network protocol for SMART

    Energy Technology Data Exchange (ETDEWEB)

    Song, Ki Sang; Kim, Young Sik [Korea National University of Education, Chongwon (Korea); No, Hee Chon [Korea Advanced Institute of Science and Technology, Taejon (Korea)

    1999-04-01

    In this research, we first define protocol subsets for SMART(System-integrated Modular Advanced Reactor) communication network based on the requirement of SMART MMIS transmission delay and traffic requirements and OSI(Open System Interconnection) 7 layers' network protocol functions. Also, current industrial purpose LAN protocols are analyzed and the applicability of commercialized protocols are checked. For the suitability test, we have applied approximated SMART data traffic and maximum allowable transmission delay requirement. With the simulation results, we conclude that IEEE 802.5 and FDDI which is an ANSI standard, is the most suitable for SMART. We further analyzed the FDDI and token ring protocols for SMART and nuclear plant network environment including IEEE 802.4, IEEE 802.5, and ARCnet. The most suitable protocol for SMART is FDDI and FDDI MAC and RMT protocol specifications have been verified with LOTOS and the verification results show that FDDI MAC and RMT satisfy the reachability and liveness, but does not show deadlock and livelock. Therefore, we conclude that FDDI MAC and RMT is highly reliable protocol for SMART MMIS network. After that, we consider the stacking fault of IEEE 802.5 token ring protocol and propose a fault tolerant MAM(Modified Active Monitor) protocol. The simulation results show that the MAM protocol improves lower priority traffic service rate when stacking fault occurs. Therefore, proposed MAM protocol can be applied to SMART communication network for high reliability and hard real-time communication purpose in data acquisition and inter channel network. (author). 37 refs., 79 figs., 39 tabs.

  7. IVOA Credential Delegation Protocol Version 1.0

    Science.gov (United States)

    Plante, Raymond; Graham, Matthew; Rixon, Guy; Taffoni, Giuliano; Plante, Raymond; Graham, Matthew

    2010-02-01

    The credential delegation protocol allows a client program to delegate a user's credentials to a service such that that service may make requests of other services in the name of that user. The protocol defines a REST service that works alongside other IVO services to enable such a delegation in a secure manner. In addition to defining the specifics of the service protocol, this document describes how a delegation service is registered in an IVOA registry along with the services it supports. The specification also explains how one can determine from a service registration that it requires the use of a supporting delegation service.

  8. Toward Synthesis, Analysis, and Certification of Security Protocols

    Science.gov (United States)

    Schumann, Johann

    2004-01-01

    Implemented security protocols are basically pieces of software which are used to (a) authenticate the other communication partners, (b) establish a secure communication channel between them (using insecure communication media), and (c) transfer data between the communication partners in such a way that these data only available to the desired receiver, but not to anyone else. Such an implementation usually consists of the following components: the protocol-engine, which controls in which sequence the messages of the protocol are sent over the network, and which controls the assembly/disassembly and processing (e.g., decryption) of the data. the cryptographic routines to actually encrypt or decrypt the data (using given keys), and t,he interface to the operating system and to the application. For a correct working of such a security protocol, all of these components must work flawlessly. Many formal-methods based techniques for the analysis of a security protocols have been developed. They range from using specific logics (e.g.: BAN-logic [4], or higher order logics [12] to model checking [2] approaches. In each approach, the analysis tries to prove that no (or at least not a modeled intruder) can get access to secret data. Otherwise, a scenario illustrating the &tack may be produced. Despite the seeming simplicity of security protocols ("only" a few messages are sent between the protocol partners in order to ensure a secure communication), many flaws have been detected. Unfortunately, even a perfect protocol engine does not guarantee flawless working of a security protocol, as incidents show. Many break-ins and security vulnerabilities are caused by exploiting errors in the implementation of the protocol engine or the underlying operating system. Attacks using buffer-overflows are a very common class of such attacks. Errors in the implementation of exception or error handling can open up additional vulnerabilities. For example, on a website with a log-in screen

  9. Medium Access Control Protocols for Cognitive Radio Ad Hoc Networks: A Survey

    Directory of Open Access Journals (Sweden)

    Mahdi Zareei

    2017-09-01

    Full Text Available New wireless network paradigms will demand higher spectrum use and availability to cope with emerging data-hungry devices. Traditional static spectrum allocation policies cause spectrum scarcity, and new paradigms such as Cognitive Radio (CR and new protocols and techniques need to be developed in order to have efficient spectrum usage. Medium Access Control (MAC protocols are accountable for recognizing free spectrum, scheduling available resources and coordinating the coexistence of heterogeneous systems and users. This paper provides an ample review of the state-of-the-art MAC protocols, which mainly focuses on Cognitive Radio Ad Hoc Networks (CRAHN. First, a description of the cognitive radio fundamental functions is presented. Next, MAC protocols are divided into three groups, which are based on their channel access mechanism, namely time-slotted protocol, random access protocol and hybrid protocol. In each group, a detailed and comprehensive explanation of the latest MAC protocols is presented, as well as the pros and cons of each protocol. A discussion on future challenges for CRAHN MAC protocols is included with a comparison of the protocols from a functional perspective.

  10. Quantum protocols within Spekkens' toy model

    Science.gov (United States)

    Disilvestro, Leonardo; Markham, Damian

    2017-05-01

    Quantum mechanics is known to provide significant improvements in information processing tasks when compared to classical models. These advantages range from computational speedups to security improvements. A key question is where these advantages come from. The toy model developed by Spekkens [R. W. Spekkens, Phys. Rev. A 75, 032110 (2007), 10.1103/PhysRevA.75.032110] mimics many of the features of quantum mechanics, such as entanglement and no cloning, regarded as being important in this regard, despite being a local hidden variable theory. In this work, we study several protocols within Spekkens' toy model where we see it can also mimic the advantages and limitations shown in the quantum case. We first provide explicit proofs for the impossibility of toy bit commitment and the existence of a toy error correction protocol and consequent k -threshold secret sharing. Then, defining a toy computational model based on the quantum one-way computer, we prove the existence of blind and verified protocols. Importantly, these two last quantum protocols are known to achieve a better-than-classical security. Our results suggest that such quantum improvements need not arise from any Bell-type nonlocality or contextuality, but rather as a consequence of steering correlations.

  11. Bidirectional Quantum Secure Direct Communication Network Protocol with Hyperentanglement

    International Nuclear Information System (INIS)

    Gu Bin; Chen Yulin; Huang Yugai; Fang Xia

    2011-01-01

    We propose a bidirectional quantum secure direct communication (QSDC) network protocol with the hyperentanglment in both the spatial-mode ad the polarization degrees of freedom of photon pairs which can in principle be produced with a beta barium borate crystal. The secret message can be encoded on the photon pairs with unitary operations in these two degrees of freedom independently. Compared with other QSDC network protocols, our QSDC network protocol has a higher capacity as each photon pair can carry 4 bits of information. Also, we discuss the security of our QSDC network protocol and its feasibility with current techniques. (general)

  12. Analysis of limiting information characteristics of quantum-cryptography protocols

    International Nuclear Information System (INIS)

    Sych, D V; Grishanin, Boris A; Zadkov, Viktor N

    2005-01-01

    The problem of increasing the critical error rate of quantum-cryptography protocols by varying a set of letters in a quantum alphabet for space of a fixed dimensionality is studied. Quantum alphabets forming regular polyhedra on the Bloch sphere and the continual alphabet equally including all the quantum states are considered. It is shown that, in the absence of basis reconciliation, a protocol with the tetrahedral alphabet has the highest critical error rate among the protocols considered, while after the basis reconciliation, a protocol with the continual alphabet possesses the highest critical error rate. (quantum optics and quantum computation)

  13. Improving the capacity of the ping-pong protocol

    OpenAIRE

    Cai, Qing-yu; Li, Bai-wen

    2003-01-01

    We present a quantum communication protocol which keeps all the properties of the ping-pong protocol [Phys. Rev. Lett. 89, 187902 (2002)] but improves the capacity doubly as the ping-pong protocol. Alice and Bob can use the variable measurement basises in control mode to detect Eve's eavesdropping attack. In message mode, Alice can use one unitary operations to encode two bits information. Bob only needs to perform a Bell type measurement to decode Alice's information. A classical message aut...

  14. Quantum protocol for cheat-sensitive weak coin flipping.

    Science.gov (United States)

    Spekkens, R W; Rudolph, Terry

    2002-11-25

    We present a quantum protocol for the task of weak coin flipping. We find that, for one choice of parameters in the protocol, the maximum probability of a dishonest party winning the coin flip if the other party is honest is 1/sqrt[2]. We also show that if parties restrict themselves to strategies wherein they cannot be caught cheating, their maximum probability of winning can be even smaller. As such, the protocol offers additional security in the form of cheat sensitivity.

  15. A Self-Stabilizing Distributed Clock Synchronization Protocol for Arbitrary Digraphs

    Science.gov (United States)

    Malekpour, Mahyar R.

    2011-01-01

    This report presents a self-stabilizing distributed clock synchronization protocol in the absence of faults in the system. It is focused on the distributed clock synchronization of an arbitrary, non-partitioned digraph ranging from fully connected to 1-connected networks of nodes while allowing for differences in the network elements. This protocol does not rely on assumptions about the initial state of the system, other than the presence of at least one node, and no central clock or a centrally generated signal, pulse, or message is used. Nodes are anonymous, i.e., they do not have unique identities. There is no theoretical limit on the maximum number of participating nodes. The only constraint on the behavior of the node is that the interactions with other nodes are restricted to defined links and interfaces. We present an outline of a deductive proof of the correctness of the protocol. A model of the protocol was mechanically verified using the Symbolic Model Verifier (SMV) for a variety of topologies. Results of the mechanical proof of the correctness of the protocol are provided. The model checking results have verified the correctness of the protocol as they apply to the networks with unidirectional and bidirectional links. In addition, the results confirm the claims of determinism and linear convergence. As a result, we conjecture that the protocol solves the general case of this problem. We also present several variations of the protocol and discuss that this synchronization protocol is indeed an emergent system.

  16. Energy-efficient cooperative protocols for full-duplex relay channels

    KAUST Repository

    Khafagy, Mohammad Galal

    2013-12-01

    In this work, energy-efficient cooperative protocols are studied for full-duplex relaying (FDR) with loopback interference. In these protocols, relay assistance is only sought under certain conditions on the different link outages to ensure effective cooperation. Recently, an energy-efficient selective decode-And-forward protocol was proposed for FDR, and was shown to outperform existing schemes in terms of outage. Here, we propose an incremental selective decode-And-forward protocol that offers additional power savings, while keeping the same outage performance. We compare the performance of the two protocols in terms of the end-to-end signal-to-noise ratio cumulative distribution function via closed-form expressions. Finally, we corroborate our theoretical results with simulation, and show the relative relay power savings in comparison to non-selective cooperation in which the relay cooperates regardless of channel conditions. © 2013 IEEE.

  17. Energy-efficient cooperative protocols for full-duplex relay channels

    KAUST Repository

    Khafagy, Mohammad Galal; Ismail, Amr; Alouini, Mohamed-Slim; Aï ssa, Sonia

    2013-01-01

    In this work, energy-efficient cooperative protocols are studied for full-duplex relaying (FDR) with loopback interference. In these protocols, relay assistance is only sought under certain conditions on the different link outages to ensure effective cooperation. Recently, an energy-efficient selective decode-And-forward protocol was proposed for FDR, and was shown to outperform existing schemes in terms of outage. Here, we propose an incremental selective decode-And-forward protocol that offers additional power savings, while keeping the same outage performance. We compare the performance of the two protocols in terms of the end-to-end signal-to-noise ratio cumulative distribution function via closed-form expressions. Finally, we corroborate our theoretical results with simulation, and show the relative relay power savings in comparison to non-selective cooperation in which the relay cooperates regardless of channel conditions. © 2013 IEEE.

  18. Examining recombinant human TSH primed {sup 131}I therapy protocol in patients with metastatic differentiated thyroid carcinoma: comparison with the traditional thyroid hormone withdrawal protocol

    Energy Technology Data Exchange (ETDEWEB)

    Rani, Deepa; Kaisar, Sushma; Awasare, Sushma; Kamaldeep; Abhyankar, Amit; Basu, Sandip [Bhabha Atomic Research Centre (BARC), Radiation Medicine Centre, Mumbai (India)

    2014-09-15

    Recombinant human thyroid-stimulating hormone (rhTSH)-based protocol is a promising recent development in the management of differentiated thyroid carcinoma (DTC). The objectives of this prospective study were: (1) to assess the feasibility and efficacy of the rhTSH primed {sup 131}I therapy protocol in patients with DTC with distant metastatic disease, (2) to perform lesional dosimetry in this group of patients compared to the traditional protocol, (3) to document the practical advantages (patient symptoms and hospital stay) of the rhTSH protocol compared to the traditional thyroid hormone withdrawal protocol, (4) to document and record any adverse effect of this strategy, (5) to compare the renal function parameters, and (6) to compare the serum TSH values achieved in either of the protocols in this group of patients. The study included 37 patients with metastatic DTC having lung or skeletal metastases or both. A comparison of lesional radiation absorbed dose, hospital stay, renal function tests, and symptom profile was undertaken between the traditional thyroid hormone withdrawal protocol and rhTSH-based therapy protocol. Dosimetric calculations of metastatic lesions were performed using lesion uptake and survey meter readings for calculation of effective half-life. Non-contrast-enhanced CT was used for assessment of tumor volume. Quality of life was assessed using the European Organization for Research and Treatment of Cancer (EORTC) QOL forms. A comparison of pretreatment withdrawal thyroglobulin (TG) was done with the withdrawal TG level 3 months after treatment. The mean effective half-life of {sup 131}I in metastatic lesions was less during the rhTSH protocol (29.49 h) compared to the thyroid hormone withdrawal protocol (35.48 h), but the difference was not statistically significant (p = 0.056). The mean 24-h % uptake of the lesions during the traditional protocol (4.84 %) was slightly higher than the 24-h % uptake during the rhTSH protocol (3.56 %), but

  19. Intelligent Broadcasting in Mobile Ad Hoc Networks: Three Classes of Adaptive Protocols

    Directory of Open Access Journals (Sweden)

    Michael D. Colagrosso

    2006-11-01

    Full Text Available Because adaptability greatly improves the performance of a broadcast protocol, we identify three ways in which machine learning can be applied to broadcasting in a mobile ad hoc network (MANET. We chose broadcasting because it functions as a foundation of MANET communication. Unicast, multicast, and geocast protocols utilize broadcasting as a building block, providing important control and route establishment functionality. Therefore, any improvements to the process of broadcasting can be immediately realized by higher-level MANET functionality and applications. While efficient broadcast protocols have been proposed, no single broadcasting protocol works well in all possible MANET conditions. Furthermore, protocols tend to fail catastrophically in severe network environments. Our three classes of adaptive protocols are pure machine learning, intra-protocol learning, and inter-protocol learning. In the pure machine learning approach, we exhibit a new approach to the design of a broadcast protocol: the decision of whether to rebroadcast a packet is cast as a classification problem. Each mobile node (MN builds a classifier and trains it on data collected from the network environment. Using intra-protocol learning, each MN consults a simple machine model for the optimal value of one of its free parameters. Lastly, in inter-protocol learning, MNs learn to switch between different broadcasting protocols based on network conditions. For each class of learning method, we create a prototypical protocol and examine its performance in simulation.

  20. Intelligent Broadcasting in Mobile Ad Hoc Networks: Three Classes of Adaptive Protocols

    Directory of Open Access Journals (Sweden)

    Colagrosso Michael D

    2007-01-01

    Full Text Available Because adaptability greatly improves the performance of a broadcast protocol, we identify three ways in which machine learning can be applied to broadcasting in a mobile ad hoc network (MANET. We chose broadcasting because it functions as a foundation of MANET communication. Unicast, multicast, and geocast protocols utilize broadcasting as a building block, providing important control and route establishment functionality. Therefore, any improvements to the process of broadcasting can be immediately realized by higher-level MANET functionality and applications. While efficient broadcast protocols have been proposed, no single broadcasting protocol works well in all possible MANET conditions. Furthermore, protocols tend to fail catastrophically in severe network environments. Our three classes of adaptive protocols are pure machine learning, intra-protocol learning, and inter-protocol learning. In the pure machine learning approach, we exhibit a new approach to the design of a broadcast protocol: the decision of whether to rebroadcast a packet is cast as a classification problem. Each mobile node (MN builds a classifier and trains it on data collected from the network environment. Using intra-protocol learning, each MN consults a simple machine model for the optimal value of one of its free parameters. Lastly, in inter-protocol learning, MNs learn to switch between different broadcasting protocols based on network conditions. For each class of learning method, we create a prototypical protocol and examine its performance in simulation.