WorldWideScience

Sample records for gridftp protocol richard

  1. A GridFTP transport driver for Globus XIO

    International Nuclear Information System (INIS)

    Kettimuthu, R.; Wantao, L.; Link, J.; Bresnahan, J.

    2008-01-01

    GridFTP is a high-performance, reliable data transfer protocol optimized for high-bandwidth wide-area networks. Based on the Internet FTP protocol, it defines extensions for high-performance operation and security. The Globus implementation of GridFTP provides a modular and extensible data transfer system architecture suitable for wide area and high-performance environments. GridFTP is the de facto standard in projects requiring secure, robust, high-speed bulk data transport. For example, the high energy physics community is basing its entire tiered data movement infrastructure for the Large Hadron Collider computing Grid on GridFTP; the Laser Interferometer Gravitational Wave Observatory routinely uses GridFTP to move 1 TB a day during production runs; and GridFTP is the recommended data transfer mechanism to maximize data transfer rates on the TeraGrid. Commonly used GridFTP clients include globus-url-copy, uberftp, and the Globus Reliable File Transfer service. In this paper, we present a Globus XIO based client to GridFTP that provides a simple Open/Close/Read/Write (OCRW) interface to the users. Such a client greatly eases the addition of GridFTP support to third-party programs, such as SRB and MPICH-G2. Further, this client provides an easier and familiar interface for applications to efficiently access remote files. We compare the performance of this client with that of globus-url-copy on multiple endpoints in the TeraGrid infrastructure. We perform both memory-to-memory and disk-to-disk transfers and show that the performance of this OCRW client is comparable to that of globus-url-copy. We also show that our GridFTP client significantly outperforms the GPFS WAN on the TeraGrid.

  2. Using Globus GridFTP to Transfer and Share Big Data | Poster

    Science.gov (United States)

    By Ashley DeVine, Staff Writer, and Mark Wance, Guest Writer; photo by Richard Frederickson, Staff Photographer Transferring big data, such as the genomics data delivered to customers from the Center for Cancer Research Sequencing Facility (CCR SF), has been difficult in the past because the transfer systems have not kept pace with the size of the data. However, the situation is changing as a result of the Globus GridFTP project.

  3. On enhancing GridFTP and GPFS performances

    International Nuclear Information System (INIS)

    Cavalli, A; Ciocca, C; Dell'Agnello, L; Ferrari, T; Gregori, D; Martelli, B; Prosperini, A; Ricci, P; Ronchieri, E; Sapunenko, V; Vitlacil, D; Zani, S; Sartirana, A

    2010-01-01

    One of the most demanding tasks which Computing in High Energy Physics has to deal with is reliable and high throughput transfer of large data volumes. Maximization and optimization of the data throughput are therefore key issues which have to be addressed by detailed investigations of the involved infrastructures and services. In this note, we present some transfer performance tests carried out at the INFN-CNAF Tier-1 center, using SLC4 64-bit Grid File Transfer Protocol (GridFTP) servers and a disk storage system based on the General Parallel File System (GPFS) from IBM. We describe the testbed setup and report the measurements of throughput performances in function of some fundamental variables, such as number of parallel file and number of streams per transfer, concurrent read and write activity and size of data blocks transferred. During this activity, we have verified that a significant improvement in performances of the GridFTP server can be obtained using 64bit version of Operating System and GPFS from IBM.

  4. Richard III

    DEFF Research Database (Denmark)

    Lauridsen, Palle Schantz

    2017-01-01

    Kort analyse af Shakespeares Richard III med fokus på, hvordan denne skurk fremstilles, så tilskuere (og læsere) langt henad vejen kan føle sympati med ham. Med paralleller til Netflix-serien "House of Cards"......Kort analyse af Shakespeares Richard III med fokus på, hvordan denne skurk fremstilles, så tilskuere (og læsere) langt henad vejen kan føle sympati med ham. Med paralleller til Netflix-serien "House of Cards"...

  5. Professor Richard Feynman colloquium

    CERN Multimedia

    1965-01-01

    Richard P. Feynman received the Nobel Prize for physics in 1965. Following the ceremony in Stockholm, Feynman gave the colloquium "Development of the space-time view of quantum electrodynamics" at CERN on 17th December.

  6. Richard Halliburton's Bearded Tales

    Science.gov (United States)

    Morris, Charles E., III

    2009-01-01

    Fusing the concept of "the beard" with the genre of the tall tale to theorize bearded tales deepens our understanding of closet eloquence, or rhetorical repertories of sexual passing in U.S. history. An examination of adventurer-writer-lecturer Richard Halliburton's sexual provenance and bestselling travel tale, "The Royal Road to Romance" (1925),…

  7. Richards Bay effluent pipeline

    CSIR Research Space (South Africa)

    Lord, DA

    1986-07-01

    Full Text Available of major concern identified in the effluent are the large volume of byproduct calcium sulphate (phosphogypsum) which would smother marine life, high concentrations of fluoride highly toxic to marine life, heavy metals, chlorinated organic material... ........................ 9 THE RICHARDS BAY PIPELINE ........................................ 16 Environmental considerations ................................... 16 - Phosphogypsum disposal ................................... 16 - Effects of fluoride on locally occurring...

  8. Richard von Volkmann

    Science.gov (United States)

    Willy, Christian; Schneider, Peter; Engelhardt, Michael; Hargens, Alan R.

    2008-01-01

    Richard von Volkmann (1830–1889), one of the most important surgeons of the 19th century, is regarded as one of the fathers of orthopaedic surgery. He was a contemporary of Langenbeck, Esmarch, Lister, Billroth, Kocher, and Trendelenburg. He was head of the Department of Surgery at the University of Halle, Germany (1867–1889). His popularity attracted doctors and patients from all over the world. He was the lead physician for the German military during two wars. From this experience, he compared the mortality of civilian and war injuries and investigated the general poor hygienic conditions in civilian hospitals. This led him to introduce the “antiseptic technique” to Germany that was developed by Lister. His powers of observation and creativity led him to findings and achievements that to this day bear his name: Volkmann’s contracture and the Hueter-Volkmann law. Additionally, he was a gifted writer; he published not only scientific literature but also books of children’s fairy tales and poems under the pen name of Richard Leander, assuring him a permanent place in the world of literature as well as orthopaedics. PMID:18196438

  9. Richard Lavenham on Future Contingents

    DEFF Research Database (Denmark)

    Øhrstrøm, Peter

    1983-01-01

    Richard Lavenham on Future Contingents’, Cahiers de l’Institut du Moyen-âge Grec et Latin, 44 (1983), p.180-186.......‘Richard Lavenham on Future Contingents’, Cahiers de l’Institut du Moyen-âge Grec et Latin, 44 (1983), p.180-186....

  10. In Conversation with Paul Richards

    Science.gov (United States)

    Holman, Andrew

    2013-01-01

    Paul Richards is one of those individuals who make a difference and is as far from institutional as one can be. The author met up with him at the Learning Disability Today conference in London to talk more about his work and life. Paul coordinates the service user involvement across Southdown Housing Association, based in Sussex.

  11. Richard Peters and Valuing Authenticity

    Science.gov (United States)

    Degenhardt, M. A. B.

    2009-01-01

    Richard Peters has been praised for the authenticity of his philosophy, and inquiry into aspects of the development of his philosophy reveals a profound authenticity. Yet authenticity is something he seems not to favour. The apparent paradox is resolved by observing historical changes in the understanding of authenticity as an important value.…

  12. Obituary: Dr. Richard Roland Baker

    Directory of Open Access Journals (Sweden)

    Thornton R

    2014-12-01

    Full Text Available Richard Baker died at Easter 2007 after a very short illness. It is sad that he died so soon after his retirement from the British American Tobacco Company at the end of 2005, and just as he was beginning to enjoy his new life, even though tobacco science still had a part to play.

  13. Richard Mattessich: vida y obra

    OpenAIRE

    Daniel Carrasco Díaz

    2006-01-01

    El texto que se ofrece a continuación constituye el discurso pronunciado por el profesor Daniel Carrasco Díaz, catedrático de Economía Financiera y Contabilidad como padrino del homenajeado, en el solemne acto de investidura del Prof. Dr. Richard Mattessich, profesor emérito de la Sauder School of Commerce, de la University of British Columbia, Vancouver (Canadá), como Doctor honoris causa por la Universidad de Málaga, celebrado el 18 de mayo de 2006.

  14. J. Richard Hackman (1940-2013)

    OpenAIRE

    Wageman, Ruth; Amabile, Teresa M.

    2013-01-01

    When J. Richard Hackman died in Cambridge, Massachusetts, on January 8, 2013, psychology lost a giant. Six and a half feet tall, with an outsize personality to match, Richard was the leading scholar in two distinct areas: work design and team effectiveness. In both domains, his work is foundational. Throughout his career, Richard applied rigorous methods to problems of great social importance, tirelessly championing multi-level analyses of problems that matter. His impact on our field has bee...

  15. Richard's back: death, scoliosis and myth making.

    Science.gov (United States)

    Lund, Mary Ann

    2015-12-01

    The body of a mediaeval monarch was always under scrutiny, and Richard III's was no exception. In death, however, his body became subject to new forms of examination and interpretation: stripped naked after the battle of Bosworth, his corpse was carried to Leicester and exhibited before being buried. In 2012, it was rediscovered. The revelation that Richard suffered from scoliosis prompts this article to re-evaluate the historical sources about Richard's physique and his posthumous reputation. This article argues that Richard's death and his myth as 'crookback' are inextricably linked and traces attitudes to spinal curvature in the early modern period. It also considers how Shakespeare represented Richard as deformed, and aspects of performance history which suggest physical vulnerability. It then considers Richard's scoliosis from the perspective of medical history, reviewing classical accounts of scoliosis and arguing that Richard was probably treated with a mixture of axial traction and pressure. It demonstrates from the evidence of Richard's medical household that he was well placed to receive hands-on therapies and considers in particular the role of his physician and surgeon, William Hobbes. Finally, it shows how the case of Richard III demonstrates the close relationship between politics and medicine in the period and the contorted process of historical myth making. Published by the BMJ Publishing Group Limited. For permission to use (where not already granted under a licence) please go to http://www.bmj.com/company/products-services/rights-and-licensing/

  16. Richard Nixon, 1972-2016 Obituary

    OpenAIRE

    Tom, Brian Dermot; Thompson, Simon Gregory; Duffy, SW; Sweeting, Michael John; Ohlssen, DI

    2017-01-01

    After a year-long journey with cancer, Dr Richard Nixon died on August 26th, 2016, aged only 43 years. He leaves behind his wife of 5 years, Valda, and their 1-year-old baby daughter, Kyra. Richard, a Yorkshireman, was born on September 8th, 1972. He attended Ilkley Grammar School, studied mathematics at Durham University (1991–1994) and was awarded the Diploma in Mathematical Statistics from the University of Cambridge in 1995. Richard then took a career break for a couple of years to...

  17. Theodore William Richards and the Periodic Table

    Science.gov (United States)

    Conant, James B.

    1970-01-01

    Discusses the contribution of Theodore Richards to the accurate determination of atomic weights of copper and other elements; his major contribution was to the building of the definitive periodic table of the elements. (BR)

  18. Richards Barrier LA Reference Design Feature Evaluation

    International Nuclear Information System (INIS)

    N.E. Kramer

    1999-01-01

    The Richards Barrier is one of the design features of the repository to be considered for the License Application (LA), Richards was a soil scientist who first described the diversion of moisture between two materials with different hydrologic properties. In this report, a Richards Barrier is a special type of backfill with a fine-grained material (such as sand) overlaying a coarse-grained material (such as gravel). Water that enters an emplacement drift will first encounter the fine-grained material and be transported around the coarse-grained material covering the waste package, thus protecting the waste package from contact with most of the groundwater. The objective of this report is to discuss the benefits and liabilities to the repository by the inclusion of a Richards Barrier type backfill in emplacement drifts. The Richards Barrier can act as a barrier to water flow, can reduce the waste package material dissolution rate, limit mobilization of the radionuclides, and can provide structural protection for the waste package. The scope of this report is to: (1) Analyze the behavior of barrier materials following the intrusion of groundwater for influxes of 1 to 300 mm per year. The report will demonstrate diversion of groundwater intrusions into the barrier over an extended time period when seismic activity and consolidation may cause the potential for liquefaction and settlement of the Richards Barrier. (2) Review the thermal effects of the Richards Barrier on material behavior. (3) Analyze the effect of rockfall on the performance of the Richards Barrier and the depth of the barrier required to protect waste packages under the barrier. (4) Review radiological and heating conditions on placement of multiple layers of the barrier. Subsurface Nuclear Safety personnel will perform calculations to determine the radiation reduction-time relationship and shielding capacity of the barrier. (5) Evaluate the effects of ventilation on cooling of emplacement drifts and

  19. In conversation with: Professor Richard James

    Directory of Open Access Journals (Sweden)

    John Clarke

    2014-03-01

    Full Text Available In 2011, Richard James wrote in the Foreword to Nelson, Clarke, Kift, and Creagh’s (2012 monograph on Australasian literature on the First Year Experience that:The trend towards universal participation will usher in dramatic changes in the character of the first year in higher education. … (p. iiiIn an interview at the University of Melbourne, Australia in July 2013 between Richard James and John Clarke, Co-editor of the International Journal of the First Year in Higher Education, these and related issues were explored.  The interview picks up where the Foreword left off:  focussing on universal participation.

  20. Quantum Man: Richard Feynman's Life in Science

    CERN Document Server

    CERN. Geneva

    2011-01-01

    It took a man who was willing to break all the rules to tame a theory that breaks all the rules. This talk will be based on my new book Quantum Man: Richard Feynman's life in science. I will try and present a scientific overview of the contributions of Richard Feynman, as seen through the arc of his fascinating life. From Quantum Mechanics to Antiparticles, from Rio de Janeiro to Los Alamos, a whirlwind tour will provide insights into the character, life and accomplishments of one of the 20th centuries most important scientists, and provide an object lesson in scientific integrity.

  1. Obituary: Richard Joseph Elston, 1960-2004

    Science.gov (United States)

    Jannuzi, Buell Tomasson; Bechtold, Jill

    2004-12-01

    Richard Joseph Elston, known for his development of innovative astronomical instrumentation, died on 26 January 2004 in Gainesville, Florida, after a four-year battle with Hodgkin's lymphoma. A professor of astronomy at the University of Florida, Richard had an unusually broad range of interests and skills, and a willingness to share his passion for astronomy with others, which made him a highly valued member of the astronomical community. Born 1 July 1960, in Albuquerque, New Mexico, Richard was the son of a geologist father and journalist mother. His childhood interest in astronomy and instrumentation matured as he majored in physics and astronomy at the University of New Mexico (BS, 1983) under the mentorship of Michael Zeilik. Richard pursued his PhD in astronomy at the University of Arizona and earned his degree in 1988. He pioneered the use of IR arrays for deep imaging surveys of the sky to study galaxy formation, and completed his thesis Search for Rapidly Forming Galaxies at High Redshift under the direction of George Rieke. Richard's graduate work included the first detection of galaxies at intermediate redshifts with evolved populations too red to have been identifiable from optical imaging surveys alone. In the Astrophysical Journal Letters in 1988, he, George Rieke, and Marcia Rieke reported the discovery of this new class of galaxies, now known as EROs (Extremely Red Objects), important as the possible progenitors of present day elliptical galaxies. Following post-doctoral positions at Kitt Peak National Observatory from 1988 to 1991 and at the Observatories of the Carnegie Institution of Washington from 1991 to 1992, Richard joined the scientific staff of Cerro Tololo Inter-American Observatory in Chile, part of the NSF's National Optical Astronomy Observatory. By 1994, he had become head of CTIO's IR instrumentation program and was leading the development of new instruments for the US astronomical community. In 1996, Richard married astronomer

  2. Richard W. Ziolkowski Receives Honorary Doctorate

    DEFF Research Database (Denmark)

    Breinbjerg, Olav

    2012-01-01

    At the annual Commemoration of the Technical University of Denmark (DTU) on April 27, 2012, Prof. Richard W. Ziolkowski, University of Arizona (UoA), received DTU's highest academic degree, the Honorary Doctor degree: Doctor Technices Honoris Causa (Figure 1). Prof. Ziolkowski has been a close...

  3. Potshemu medved rõtshit / Richard Pipes

    Index Scriptorium Estoniae

    Pipes, Richard

    2006-01-01

    Harvardi ülikooli ajalooprofessor Richard Pipes arutleb, miks Venemaa viimase aja käitumises väljendub soovimatus koostööks, sageli ka vaenulikkus. Venemaa võimetus rahvusvahelises kontekstis oma kohta leida, selle ajaloolised juured

  4. Richard A. Werners forskning i pengeskabelse

    DEFF Research Database (Denmark)

    2016-01-01

    Hvilken rolle spiller penge i samfundsøkonomien og hvilken rolle burde penge spille i den økonomiske videnskab? Det forsker Richard Werner i. Han er professor i økonomi ved Southampton University i England, og her præsenteres fire dele af hans forskning i penge: (1) Hvad foregår der egentlig i en...

  5. Recensie "The Great Reset" : Richard Florida

    NARCIS (Netherlands)

    Roy van Dalm

    2010-01-01

    Like the Great Depression and the Long Depression before it, experts have viewed prolonged economic downturns as crises. In The Great Reset , bestselling author Richard Florida argues that we should instead see the recent recession as an opportunity to create entirely new ways of working and living

  6. Richard Florida : loovsektor on majanduskasvu mootor / Richard Florida ; interv. Argo Ideon

    Index Scriptorium Estoniae

    Florida, Richard

    2008-01-01

    USA majandus- ja ühiskonnateadlane Richard Florida loovklassi teooriast, selle osast majanduskasvu tagamisel, seosest ühiskonna tolerantsuse ja ühiskonna majandusliku edukuse vahel, sotsiaalse sidususe takistavast rollist loovuse motiveerimisel

  7. Method of lines solution of Richards` equation

    Energy Technology Data Exchange (ETDEWEB)

    Kelley, C.T.; Miller, C.T.; Tocci, M.D.

    1996-12-31

    We consider the method of lines solution of Richard`s equation, which models flow through porous media, as an example of a situation in which the method can give incorrect results because of premature termination of the nonlinear corrector iteration. This premature termination arises when the solution has a sharp moving front and the Jacobian is ill-conditioned. While this problem can be solved by tightening the tolerances provided to the ODE or DAE solver used for the temporal integration, it is more efficient to modify the termination criteria of the nonlinear solver and/or recompute the Jacobian more frequently. In this paper we continue previous work on this topic by analyzing the modifications in more detail and giving a strategy on how the modifications can be turned on and off in response to changes in the character of the solution.

  8. Richard Weaver's Untraditional Case for Federalism

    OpenAIRE

    Jeremy David Bailey

    2004-01-01

    Although Richard M. Weaver's political writings do not offer a systematic examination of federalism, they include a defense of federalist arrangements. Because Weaver's federalism is central to his conservatism, and because his argument for federalism differs from more common conservative defenses of federalism offered in the twentieth century, his writings allow students of federalism to examine possible connections between federalism and conservative political thought. Copyright 2004, Oxfor...

  9. Richard Wollheim 1923-2003 / Marek Volt

    Index Scriptorium Estoniae

    Volt, Marek

    2004-01-01

    Järelehüüe anglo-ameerika filosoofile Richard Wollheimile (5. V 1923-4. XI 2003), kes huvitus maalist ja psühhoanalüüsist ning kuulub XX sajandi analüütilist kunstifilosoofiat enim kujundanud filosoofide hulka. Tema peamised tööd: "Art and Its Objects" (1968), "Painting As an Art" (1987), "On Painting and the Self" (1992). Ilmunud ka raamatus: Volt, Marek. Esteetikast. Tallinn : Sirp, 2006

  10. Illustrated & Dissected: Professor Richard Sawdon Smith.

    Science.gov (United States)

    2015-06-01

    This Alternative Gallery feature introduces the photographic artist Professor Richard Sawdon Smith. Professor Sawdon Smith's work stems around a fascination with representations of anatomy that have been fuelled by his experience as a hospital patient. The work has allowed him to explore ideas through the use of medical illustrations which include early anatomical drawings, personal medical photography and facial modelling. The work highlights how such imagery can be used in the context of a patient seeking understanding and acceptance of ill health and disease using the body as a canvas on which to translate the experience.

  11. Richard Bright and his neurological studies.

    Science.gov (United States)

    Pearce, J M S

    2009-01-01

    Richard Bright was one of the famous triumvirate of Guy's Hospital physicians in the Victorian era. Remembered for his account of glomerulonephritis (Bright's disease) he also made many important and original contributions to medicine and neurology. These included his work on cortical epileptogenesis, descriptions of simple partial (Jacksonian) seizures, infantile convulsions, and a variety of nervous diseases. Most notable were his reports of neurological studies including papers on traumatic tetanus, syringomyelia, arteries of the brain, contractures of spinal origin, tumours of the base of the brain, and narcolepsy. His career and these contributions are outlined. Copyright 2009 S. Karger AG, Basel.

  12. Richard Feynman a life in science

    CERN Document Server

    Gribbin, John

    1998-01-01

    This text is a portrayal of one of the greatest scientists of the late 20th-century, which also provides a picture of the significant physics of the period. It combines personal anecdotes, writings and recollections with narrative. Richard Feynman's career included: war-time work on the atomic bomb at Los Alamos; a theory of quantum mechanics for which he won the Nobel prize; and major contributions to the sciences of gravity, nuclear physics and particle theory. In 1986, he was able to show that the Challenger disaster was due to the effect of cold on the booster rocket rubber sealings.

  13. Richard Feynman Quarks, Bombs, and Bongos

    CERN Document Server

    Henderson, Harry

    2010-01-01

    Described by his peers as the "finest physicist of his generation," Richard Feynman defied scientist stereotypes. This brash New York-born American physicist startled the more conservative giants of European physics with his endless ability to improvise. Indeed, later in life, Feynman became an accomplished bongo player. Feynman's legacy to physics was his ability to simplify complex equations and clarify fundamental principles through the use of graphs. He developed the theory of quantum electrodynamics, which illustrates the behavior of electrically charged particles, such as elect

  14. An appreciation of Richard Threlkeld Cox

    Science.gov (United States)

    Tribus, Myron

    2002-05-01

    Richard T. Cox's contributions to the foundations of probability theory and inductive logic are not generally appreciated or understood. This paper reviews his life and accomplishments, especially those in his book The Algebra of Probable Inference and his final publication Inference and Inquiry which, in this author's opinion, has the potential to influence in a significant way the design and analysis of self organizing systems which learn from experience. A simple application to the simulation of a neuron is presented as an example of the power of Cox's contribution.

  15. Richard von Volkmann: surgeon and Renaissance man.

    Science.gov (United States)

    Willy, Christian; Schneider, Peter; Engelhardt, Michael; Hargens, Alan R; Mubarak, Scott J

    2008-02-01

    Richard von Volkmann (1830-1889), one of the most important surgeons of the 19(th) century, is regarded as one of the fathers of orthopaedic surgery. He was a contemporary of Langenbeck, Esmarch, Lister, Billroth, Kocher, and Trendelenburg. He was head of the Department of Surgery at the University of Halle, Germany (1867-1889). His popularity attracted doctors and patients from all over the world. He was the lead physician for the German military during two wars. From this experience, he compared the mortality of civilian and war injuries and investigated the general poor hygienic conditions in civilian hospitals. This led him to introduce the "antiseptic technique" to Germany that was developed by Lister. His powers of observation and creativity led him to findings and achievements that to this day bear his name: Volkmann's contracture and the Hueter-Volkmann law. Additionally, he was a gifted writer; he published not only scientific literature but also books of children's fairy tales and poems under the pen name of Richard Leander, assuring him a permanent place in the world of literature as well as orthopaedics.

  16. Seeing Scale: Richard Dunn’s Structuralism

    Directory of Open Access Journals (Sweden)

    Keith Broadfoot

    2012-11-01

    Full Text Available Writing on the occasion of a retrospective of Richard Dunn’s work, Terence Maloon argued that ‘structuralism had an important bearing on virtually all of Richard Dunn’s mature works’, with ‘his modular, “crossed” formats’ being the most obvious manifestation of this. In this article I wish to reconsider this relation, withdrawing from a broad consideration of the framework of structuralism to focus on some of the quite particular ideas that Lacan proposed in response to structuralism. Beginning from a pivotal painting in the 1960s that developed out of Dunn’s experience of viewing the work of Barnett Newman, I wish to suggest a relation between the ongoing exploration of the thematic of scale in Dunn’s work and the idea of the symbolic that Lacan derives from structuralist thought. This relation, I argue, opens up a different way of understanding the art historical transition from Minimalism to Conceptual art.

  17. Conoscenza e etica in Richard Rorty

    Directory of Open Access Journals (Sweden)

    Emilia Romano

    2011-12-01

    Full Text Available The era in which we live, characterized by multiculturalism and complexity, it is a time when it is clear the difficulty of man to orient and to choose their own way. It’s the time of the fall of every certainty, is the era of “post”, after the tradition, after metaphysics, after the truth, and that requires more effort than any other constant reflection. The neopragmatismo seems to be an effective investigative tool for conducting this reflection and a vantage point to carry on a conversation around the issues of education. In particular, the author intended to refer to the work of Richard Rorty, the author who more than others reflected on the encounter between two important pragmatist tradition: that of classical pragmatism and the “continental” or responsible for the development of a new European concept of truth, understood as a critical and interpretative.

  18. El vocabulario sechurano de Richard Spruce

    Directory of Open Access Journals (Sweden)

    Matthias Urban

    2015-12-01

    Full Text Available This paper makes accesible a new transcription of Richard Spruce’s vocabulary of the Sechura language. Collected in the mid-19th century by the British botanist, it constitutes one of only two sources of data for this language of northernmost Peru. A comparison of the original with previously published versions shows serious errors in transcription, in particular in those of Otto von Buchwald and Jacinto Jijón y Camaaño. The article also discusses the probable circumstances of data collection and the publication history of the hitherto known version, and concludes with some first observations on the significance of Spruce’s wordlist for elucidating the linguistic history of the region, in particular with regard to the question of the linguistic situation at Olmos.

  19. Has Richard Rorty a moral philosophy?

    Directory of Open Access Journals (Sweden)

    Mohammad Asghari

    2015-06-01

    Full Text Available I try to show that Richard Rorty, although is not a moral philosopher like Kant, nerveless, has moral philosophy that must be taken seriously. Rorty was not engaged with moral philosophy in the systematic manner common among leading modern and contemporary moral philosophers. This paper has two parts: first part, in brief, is concerned with principles of his philosophy such as anti-essentialism, Darwinism, Freudism, and historicism. Second part which be long and detailed, considers many moral themes in Rorty's thought such as critique of Kantian morality, solidarity, moral progress, cruelty and concept of other, etc. Subsequently, I will try to answer the research question of the article namely, has Rorty a moral philosophy?

  20. 77 FR 21555 - Manning, Richard W.; Notice of Filing

    Science.gov (United States)

    2012-04-10

    ... DEPARTMENT OF ENERGY Federal Energy Regulatory Commission [Docket No. ID-6835-001] Manning, Richard W.; Notice of Filing Take notice that on April 2, 2012, Richard W. Manning submitted for filing... not serve to make protestants parties to the proceeding. Any person wishing to become a party must...

  1. Richard Avedon ja Annie Leibovitz laulsid kaanonit / Marika Alver

    Index Scriptorium Estoniae

    Alver, Marika

    2008-01-01

    Richard Avedoni (1923-2004) retrospektiivnäitusest (fotod aastatest 1946-2004) kuraator Helle Crenzien (Lousiana Kaasaegse Kunsti muuseum Taanis), millega kaasnes ka Helen Whitney film "Richard Avedon : darkness and light" ja Annie Leibovitzi (1949) suurprojektist "A photographer's life 1990-2005" Pariisis

  2. Obituary: Richard D. Schwartz (1941-2011)

    Science.gov (United States)

    Wilking, Bruce

    2011-12-01

    Richard D. Schwartz, Professor Emeritus of Astronomy, died at his home in Sequim, WA, after a nearly 3 year battle against pancreatic cancer. Richard was born in Pretty Prairie, Kansas. He was active in sports and band and graduated in 1959. After completing a BS at Kansas State, and a Master's degree in Divinity at Union Seminary in NY, he further studied astrophysics, receiving his doctorate from University of Washington in 1973. When Dick arrived at the University of Missouri-St. Louis in 1975, he was the only astronomer in the Department of Physics. He built the astronomy program and initiated the B.S. in physics with an astrophysics option that the majority of physics majors choose. Dick was a wonderful teacher and provided outstanding leadership to the campus. He designed and provided oversight on the construction of the campus observatory that was completed in 1981. Since that time the observatory has served as both a teaching and research facility. It is also used for monthly public open houses that draw hundreds of people annually to the campus to view the moon, stars, and planets. Upon his retirement in 2003, the Board of Curators approved naming the campus observatory the "Richard D. Schwartz Observatory" in honor of his distinctive service to the University of Missouri-St. Louis. Just as important as Dick's service to promote public interest in astronomy was his effort to make the campus observatory a research facility. Dick equipped and maintained the observatory with state-of-art detectors that allowed students to get their first taste of scientific research. From 1991-2003, he managed the campus program for the NASA/Missouri Space Grant Consortium and mentored over 30 research students in projects at the observatory. Some of the results have been published in astronomical journals. Many of those students went on to graduate schools and several have achieved tenure and distinction at major universities. In addition to Dick's service to the University

  3. Richard Murphy: a life in writing

    Directory of Open Access Journals (Sweden)

    E. Meihuizen

    2006-07-01

    Full Text Available The Irish poet Richard Murphy published his autobiography “The kick: a life among writers” in 2003. From a slightly different perspective the subtitle of this work could be rewritten as “A life in writing” since it is an account of the agencies that moulded a life devoted to creative writing which forms the book’s essential impetus. The memoir is based on notebooks which Murphy kept throughout his life “to hold the scraps of verse, elusive images, dreams, desires and revelations” to be developed into poetry. Apart from contextualising his poetry by registering the relationships, circumstances and landscapes from which it germinated, Murphy also tells of the creative process itself and the personal poetics underlying this process. This article explores what is regarded as the central determining feature of Murphy’s identity as poet, namely the relationship between the creative self and a particular place, where the concept of “place” is seen as a cultural palimpsest which represents not only physical qualities, but also the shaping and development of the landscape through time according to a certain way of life.

  4. Richard Murphy: Autobiography and the Connemara landscape

    Directory of Open Access Journals (Sweden)

    Elsa Meihuizen

    2015-08-01

    Full Text Available It could be argued that an important feature of Richard Murphy’s work, and of his identity as a poet is the relationship between the creative self and a particular place, where ‘place’ should be understood as referring not just to physical qualities of the natural environment, but in a broader sense to denote an environment in which everything is interrelated and connected, and in which there is no sharp division between the natural and the human. The landscape providing inspiration for Murphy’s poetic imagination is the landscapes and seascapes of Connemara in north-west Ireland. In 1959 he settled in this environment which was to be his base for the next 20 years and from this period and this location emanated the bulk of his poetic oeuvre. For Murphy committing to a life of writing poetry necessarily means being in the Connemara landscape. Returning to this environment in adulthood represents a quest for recovering childhood feelings, of belonging and love, as connected to particular places. Murphy’s Connemara poems could be read as an account of this process of re-placement, as a type of autobiographical text in which the artist creates a ‘double portrait’: in writing about the landscape he also writes about himself, creating a place-portrait which is, at the same time, a self-portrait.

  5. Richard Swedberg, The Art of Social Theory

    DEFF Research Database (Denmark)

    Carleheden, Mikael

    2015-01-01

    to systematic consideration. Swedberg attributes this strange absence to what he sees as the miserable state of contemporary social theory. We must, he claims, avoid two misconceptions: ‘empiricism’ and ‘abstract theory’. In the first case, theory is reduced to the task of summarizing the outcome of empirical......It is a rare event when a new general field of research opens up within sociology. However, with this book, Richard Swedberg intends to do just that. It is not just another book on social theory. It is a book on ‘theorizing’. And that makes all the difference. Swedberg has chosen the term ‘art......’, but also ‘craft’, to emphasize the practical side of doing theory. This topic has been strangely absent, not just in sociology but in the social sciences in general. In order to see this absence, we should ask ourselves how education in sociology is conventionally organized. The answer is by a taken...

  6. Kuues väljasuremine / Richard Leakey, Roger Lewin

    Index Scriptorium Estoniae

    Leakey, Richard

    2002-01-01

    Inimtegevuse hävitavast toimest looduslikule mitmekesisusele, mis tingib loodusliku energiatootmise järsu kahanemise, millest omakorda sõltub inimese enda ellujäämine. Lühidalt Richard Leakey'st

  7. Swearing Used in Richard Wright’s Black Boy

    OpenAIRE

    Giyatmi Giyatmi; Ratih WIjayava; Nunun Tri Widarwati

    2017-01-01

    This research aims at finding the types of swearing expressions and linguistic forms of English swearing used in Richard Wright's Black Boy. This is a descriptive qualitative research since it describes the phenomena of swearing used in the novel. The data of the research are all the conversations or sentences used swearing in the novel written by Richard Wright namely Black Boy as the main data source. The method of collecting data in this research is observation and teknik lanjut catat. Aft...

  8. Obituary: Richard B. Dunn, 1927-2005

    Science.gov (United States)

    Keil, Stephen L.; Dooling, David

    2007-12-01

    Dr. Richard B. Dunn, astronomer emeritus at the National Solar Observatory, died of a heart attack on September 29, 2005. He was recognized as one of the foremost experimental solar physicists. His innovative designs for telescopes and instruments led to many important discoveries in solar physics. Born in Baltimore, Maryland, in 1927 and raised in Minneapolis, Minnesota, Dick's parents were Dr. Halbert L. Dunn and Katherine Brandner. Halbert (MD, Ph.D., F.A.P.H.A.) was an physician who became Chief of the National Office of Vital Statistics, Public Health Service. He published a paper "High Level Wellness for Man and Society" that became the founding paper of the field of wellness health care. After their divorce in 1942, Katherine moved to New York and became a social worker. Dick had two older brothers who died before him, Halbert (born in 1921, who became a civil engineer) and Robert (born in 1924, who became an architect). Dick earned a BS in mechanical engineering and an MS in astronomy at the University of Minnesota. At the end of World War II he served in the United States Army in Japan. For his master's degree, Dick undertook the design and construction of a Lyot-type birefringent filter for observations of solar prominences. This early work led to his acceptance at Harvard, where Professor Donald Menzel encouraged him to continue his work with the 15-inch Cambridge telescope. In 1951 he conducted part of his doctoral thesis work at the fledgling Sacramento Peak Observatory in southern New Mexico. The observatory director, Dr. John Evans, was impressed with Dick's outstanding instrumental talents and invited him to join as one of the first scientific staff members. During his first few years at Sac Peak, Dick developed two more birefringent filter systems including one with an integrated coronagraph. With this system, he produced the best prominence and spicule observations ever obtained. Dick's career was dedicated to obtaining solar observations of the

  9. Success: Richard Dyer on Diana Ross [and Beyond

    NARCIS (Netherlands)

    Kooijman, J.

    2016-01-01

    In June 1982, film scholar Richard Dyer published a two-page essay on African-American star Diana Ross in the journal Marxism Today. Part of Dyer’s essay focuses on the American conception of success and specifically on how Ross is one of the few black artists who has been "allowed" to be such a

  10. Reading 'blackface': A (narrative) introduction to Richard Kearney's ...

    African Journals Online (AJOL)

    Prominent Irish philosopher Richard Kearney's notion of 'carnal hermeneutics' is introduced by applying it to a case study of a recent event that took place at one of South Africa's university campuses. The narrative assists in illuminating some of the core principles of carnal hermeneutics and illustrates the applicability of ...

  11. To Have Been a Student of Richard Feynman

    Indian Academy of Sciences (India)

    Excerpt from Most of the Good Stuff: Memories of Richard Feynman, 1993, ... of Feynman, but while it inspired us to try for originality after we left Cornell, it also lowered our productivity to a point that at times was dangerous to our academic careers. In truth .... (However, my actual thesis topic turned out to be a different one.).

  12. Koht, kust tagasi ei tulda / Mark Jenkins ; fotod Cory Richards

    Index Scriptorium Estoniae

    Jenkins, Mark

    2015-01-01

    National Geographicu ekspeditsiooni, mille koosseisu kuulusid Renan Ozturk, Mark Jenkins, Cory Richards, Emily Harrington ja Kilaree O'Neill, püüdlustest tõusta Kagu-Aasia kõrgeima mäe Hkakabo Razi tippu ning mõõta selle täpset kõrgust GPS-i abil

  13. Whatever Happened to Richard Reid's List of First Programming Languages?

    Science.gov (United States)

    Siegfried, Robert M.; Greco, Daniel M.; Miceli, Nicholas G.; Siegfried, Jason P.

    2012-01-01

    Throughout the 1990s, Richard Reid of Michigan State University maintained a list showing the first programming language used in introductory programming courses taken by computer science and information systems majors; it was updated for several years afterwards by Frances Van Scoy of West Virginia University. However, it has been 5 years since…

  14. In memoriam: Richard (Rick) G. Harrison—benefactor for ...

    Indian Academy of Sciences (India)

    Professor Richard Harrison (1946–2016), a most influential evolutionary biologist of ... were profoundly important in my development as a scientist and a person. ... observations to infer his love of family, but I am going to risk correction by those ...

  15. Astronomical fire: Richard Carrington and the solar flare of 1859.

    Science.gov (United States)

    Clark, Stuart

    2007-09-01

    An explosion on the Sun in 1859, serendipitously witnessed by amateur astronomer Richard Carrington, plunged telegraphic communications into chaos and bathed two thirds of the Earth's skies in aurorae. Explaining what happened to the Sun and how it could affect Earth, 93 million miles away, helped change the direction of astronomy. From being concerned principally with charting the stars to aid navigation, astronomers became increasingly concerned with what the celestial objects were, how they behaved and how they might affect life on Earth.

  16. Drawings of fossils by Robert Hooke and Richard Waller

    Science.gov (United States)

    Kusukawa, Sachiko

    2013-01-01

    The drawings of fossils by Robert Hooke and Richard Waller that were the basis of the engravings in Hooke's Posthumous works (1705) are published here for the first time. The drawings show that both Hooke and Waller were proficient draftsmen with a keen eye for the details of petrified objects. These drawings provided Hooke with a polemic edge in making the case for the organic origins of ‘figured stones’.

  17. Richard Carwardine and Jay Sexton, eds., The Global Lincoln.

    Directory of Open Access Journals (Sweden)

    Hans Krabbendam

    2012-06-01

    Full Text Available Most countries have their export heroes that transcend their national origin: India has its Ghandi, South Africa its Mandela, England its Churchill, and the US has Abraham Lincoln. While particularly known for his role in the American Civil War, he has developed into an international beacon for liberalism and democracy, especially for nationals deprived of this liberties.This collection of essays, edited by Corpus Christi College (Oxford, UK colleagues Richard Carwardine and Jay Sexton, puts...

  18. When Richard Branson wants to build his own facility

    International Nuclear Information System (INIS)

    Cosnard, D.

    2005-01-01

    The capacity of petroleum refineries is today insufficient to meet the demand. In front of this shortage, Sir Richard Branson, the owner of Virgin Atlantic Airways, has decided to invest in the building of a refinery in Europe or in Canada. His new company, Virgin Oil, is already launched. However, the setting up of a new facility is very expensive and raises important problems of permits and public contestation which remain to be solved. Short paper. (J.S.)

  19. Historical Investigations of the Richard B. Russell Multiple Resource Area.

    Science.gov (United States)

    1981-11-01

    period of this project as a contemporary c~lebration and a reiteration of an ancient folk construction, Stonehenge . Appropriately, as this document goes to...55, 56m, 59m, 64m, 65-68, 71- Stonehenge 216 72, 75-76, 79-84, 84m, 91, 94- Sutch, Richard 20 95, 100, lOlm, 102, 103, 121m, Swift, James Y. 195 126

  20. Response to Richard Widdess: Music, Meaning and Culture

    Directory of Open Access Journals (Sweden)

    Jerome Lewis

    2012-09-01

    Full Text Available This commentary discusses the anthropological implications of Richard Widess’ paper by summarizing some anthropological approaches to music, especially focusing on the way musical participation inculcates and transmits an aesthetic orientation that guides action across cultural domains such as politics, economics and religion. The paper ends by suggesting that the heart of human culture is more likely to be an aesthetic orientation than a script or set of rules, and traces out some reasons why music does this so well.

  1. Richard Wright, Toni Morrison, and United States book clubs

    Directory of Open Access Journals (Sweden)

    Mark Madigan

    2004-12-01

    Full Text Available This essay focuses on the influence of commercial book clubs in the United States. It will examine the country's oldest commercial book club, the Book-of-the-Month Club (BOMC, Oprah's Book Club (OBC, which bears the name of its founder, television personality Oprah Winfrey, and their roles in the careers of two African-American authors, Richard Wright and Toni Morrison.

  2. Bridging the Knowledge Gaps between Richards' Equation and Budyko Equation

    Science.gov (United States)

    Wang, D.

    2017-12-01

    The empirical Budyko equation represents the partitioning of mean annual precipitation into evaporation and runoff. Richards' equation, based on Darcy's law, represents the movement of water in unsaturated soils. The linkage between Richards' equation and Budyko equation is presented by invoking the empirical Soil Conservation Service curve number (SCS-CN) model for computing surface runoff at the event-scale. The basis of the SCS-CN method is the proportionality relationship, i.e., the ratio of continuing abstraction to its potential is equal to the ratio of surface runoff to its potential value. The proportionality relationship can be derived from the Richards' equation for computing infiltration excess and saturation excess models at the catchment scale. Meanwhile, the generalized proportionality relationship is demonstrated as the common basis of SCS-CN method, monthly "abcd" model, and Budyko equation. Therefore, the linkage between Darcy's law and the emergent pattern of mean annual water balance at the catchment scale is presented through the proportionality relationship.

  3. System level traffic shaping in disk servers with heterogeneous protocols

    International Nuclear Information System (INIS)

    Cano, Eric; Kruse, Daniele Francesco

    2014-01-01

    Disk access and tape migrations compete for network bandwidth in CASTORs disk servers, over various protocols: RFIO, Xroot, root and GridFTP. As there are a limited number of tape drives, it is important to keep them busy all the time, at their nominal speed. With potentially 100s of user read streams per server, the bandwidth for the tape migrations has to be guaranteed to a controlled level, and not the fair share the system gives by default. Xroot provides a prioritization mechanism, but using it implies moving exclusively to the Xroot protocol, which is not possible in short to mid-term time frame, as users are equally using all protocols. The greatest commonality of all those protocols is not more than the usage of TCP/IP. We investigated the Linux kernel traffic shaper to control TCP/ IP bandwidth. The performance and limitations of the traffic shaper have been understood in test environment, and satisfactory working point has been found for production. Notably, TCP offload engines' negative impact on traffic shaping, and the limitations of the length of the traffic shaping rules were discovered and measured. A suitable working point has been found and the traffic shaping is now successfully deployed in the CASTOR production systems at CERN. This system level approach could be transposed easily to other environments.

  4. When Richard Branson wants to build his own facility; Quand Richard Branson veut construire son propre complexe

    Energy Technology Data Exchange (ETDEWEB)

    Cosnard, D

    2005-10-01

    The capacity of petroleum refineries is today insufficient to meet the demand. In front of this shortage, Sir Richard Branson, the owner of Virgin Atlantic Airways, has decided to invest in the building of a refinery in Europe or in Canada. His new company, Virgin Oil, is already launched. However, the setting up of a new facility is very expensive and raises important problems of permits and public contestation which remain to be solved. Short paper. (J.S.)

  5. Review of Richard Bausch, Hello to the Cannibals

    Directory of Open Access Journals (Sweden)

    Géraldine Chouard

    2006-03-01

    Full Text Available Richard Bausch is credited with five collections of short stories and nine novels that have received various awards in the United States. His latest work, Hello to the Cannibals, blends a historical epic and a more intimate tale. Watch out‑this is a voracious novel.Other CarnageAn ethnologist investigating cannibalistic rites in Africa asks the head of the tribe : « Do you still have cannibals in your tribe ? » « No, we ate the last one yesterday, » answers the head of the tribe. Undoubtedly,...

  6. Richard H. Thaler: Wirtschaftsnobelpreisträger 2017

    OpenAIRE

    Bruttel, Lisa Verena; Stolley, Florian

    2017-01-01

    Der diesjährige Nobelpreisträger Richard H. Thaler ist einer breiteren Öffentlichkeit vor allem durch sein mit Cass R. Sunstein gemeinsam verfasstes Buch zum Nudging bekannt geworden. Tatsächlich hat er in den vergangenen 40 Jahren die Entwicklung der Verhaltensökonomie entscheidend mitgeprägt und vorangebracht. Thaler hat die Annahmen hinter dem Modell des Homo oeconomicus untersucht und die Abweichungen menschlichen Verhaltens von den Rationalitätsannahmen auf zwei wesentliche Ursachen zurü...

  7. [Sir William Richard Gowers: author of the "bible of neurology"].

    Science.gov (United States)

    Hirose, Genjiro

    2014-11-01

    William Richard Gowers is one of the great pioneers in neurology and the author of the well-known neurology textbook, "A Manual of Diseases of the Nervous System." His concepts of neurology are based on meticulously and carefully accumulated knowledge of history, observations, and neurological examinations of patients with various neurological diseases. He is not only a great neurologist but also a great teacher who loves teaching students and physicians through well-prepared lectures. We can glean the essence of the field of neurology through his life story and numerous writings concerning neurological diseases.

  8. "Symposium" by Richard Dawkins, Gerard 't Hooft, Alain Connes

    CERN Multimedia

    Maximilien Brice

    2004-01-01

    Richard Dawkins will speak on biology, Gerard ‘t Hooft will focus on physics, and Alain Connes will discuss mathematics. CERN scientists probe ever-deeper levels of matter and their interactions, but can we say that the patterns they see are truly fundamental? Does the universe obey the same laws throughout? Since mathematical constructions can be true in the absence of any relation to the physical world, is mathematics more fundamental than physics? Extraterrestrial life would probably look much different from that on Earth, but natural selection still be fundamental to their evolution?

  9. Richard Wollheim über die Metapher in der Malerei

    OpenAIRE

    Heinrich, Richard

    1993-01-01

    Es handelt sich um den Text eines Vortrages, den ich Jänner 1993 im Rahmen einer Vortragsreihe am Institut für Kunstgeschichte der Universität Wien gehalten habe. Er ist bisher unpubliziert und nicht redigiert. Das worüber ich spreche ist ein Artikel von Richard Wollheim mit dem Titel "Die Metapher in der Malerei". Diesen Artikel habe ich herausgegeben, gemeinsam mit meinem Kollegen Helmuth Vetter, 1991 in dem Band "Bilder der Philosophie". Ursprünglich handelt es sich um einen Vortrag, d...

  10. Richard Rorty, o la posibilidad de un etnocentrismo universal

    Directory of Open Access Journals (Sweden)

    Isabel Gamero Cabrera

    2010-04-01

    Full Text Available En el presente artículo intentaremos comprender y analizar las implicaciones actuales de dos tesis del filósofo estadounidense Richard Rorty en relación con su etnocentrismo: La expansión global del sistema democrático liberal como horizonte de su teoría política y la restricción de las creencias de importancia última a la esfera privada. Compararemos esta teoría con las aportaciones de otros dos autores: una interpretación antropológica de los juegos de lenguaje de Wittgenstein y la democracia radical de Mouffe.

  11. Free as in Freedom Richard Stallman's Crusade for Free Software

    CERN Document Server

    Williams, Sam

    2011-01-01

    Free as in Freedom interweaves biographical snapshots of GNU project founder Richard Stallman with the political, social and economic history of the free software movement. It examines Stallman's unique personality and how that personality has been at turns a driving force and a drawback in terms of the movement's overall success. Free as in Freedom examines one man's 20-year attempt to codify and communicate the ethics of 1970s era "hacking" culture in such a way that later generations might easily share and build upon the knowledge of their computing forebears. The book documents Stallman'

  12. The Paradox of the Public Realm in Richard Rorty

    Directory of Open Access Journals (Sweden)

    Martha Palacio Avendaño

    2008-12-01

    Full Text Available The concepto of the public sphere in Richard Rorty's philosophy, inherited of liberal tradition, allows be treated as a part of a game of language called democratic liberalism. One of the rules for validating a move in this game consists in taking for granted the distinction between the public and the private spheres. Richard Rorty thought that democratic liberalism did not need any foundation beyond the way to play it; its only criteria would be the game's practices, according an utopia which would allow us to make more movements in the game. That is, democratic liberalism does not require foundations, but just practices for achieving a social hioe inspired on freedom and pluralism. This kind of utopia, based upon the non-cruelty principle, would make possible an inclusive society where everyone would have a place for their own private vocabulary. In this way, Rorty would have linked freedom and solidarity. However, this language-game reveals the paradox of the link which implies the meaning of the public shere. Herein, freedom is not a sufficient condition of solidarity; hence, there is no place for social inclusion in Rorty's language game.

  13. Argument from Design in Richard Baxter's Natural Theology

    Directory of Open Access Journals (Sweden)

    Igor Koshelev

    2017-12-01

    Full Text Available The article deals with the teleological argument, or argument from design, as expounded by a famous English Protestant theologian Richard Baxter, one of the leading 17-th century English Puritans, in his work “The Reasons of the Christian Religion”. Natural theology, providing arguments for the existence of God based on reason and without appeal to the Revelation, has always played a vital role throughout the entire history of theological thought. The most popular was the so called teleological argument, or the argument from design, which stands out among all rational arguments for the existence of the Creator. It is mostly known from the “Fifth Way” of the medieval Scholastic philosopher Thomas Aquinas and a famous work “Natural Theology” by an English 19-th century theologian William Paley. The foundation for the modern research in the area was laid during the age of the Scientific Revolution of the 17th century English nature philosophers and theologians, especially Robert Boyle, who believed the teleological argument to be the key element of Natural Theology. His friend and confessor, Richard Baxter, a prominent representative of the Puritan Natural Theology, mostly known by his theological works, paved the way for Natural Theology both in his own time and the following centuries. His work was thought to be the best collection of the evidences for Christianity.

  14. Prof. Richard Mattessich at 95. His Research Methodology

    Directory of Open Access Journals (Sweden)

    Giuseppe Galassi

    2017-12-01

    Full Text Available This paper is presented as a tribute to prof. Richard Mattessich. It is written “through the eyes” of a researcher who has worked closely with him over a period of 42 years, starting attending his courses of “Income Determination Theory” and “Research Methodology” at the University of British Columbia in 1975. Among his huge scientific research and publications, I intend to underline these three major contributions: (i Accounting metrics and other mathematical instruments which anticipated computer spreadsheet by 30 years; (ii. The preparation of accountants for information economics by means of analytical methods; and (iii The proposition of the “onion model of reality” to distinguish different Kind of reality. Este trabajo se presenta como un tributo al profesor Richard Mattessich. Está escrito “con los ojos” de un investigador que ha trabajado estrechamente con él durante un período de 42 años, comenzando a asistir a sus cursos de " Income Determination Theory" y "Research Methodology" en la Universidad de British Columbia en 1975. Entre su investigación y publicaciones, más importantes pretendo subrayar estas tres contribuciones principales: (i Accounting metrics and other mathematical instruments which anticipated computer spreadsheet by 30 years; (ii The preparation of accountants for information economics by means of analytical methods; y (iii The proposition of the “onion model of reality” to distinguish different Kind of reality.

  15. Swearing Used in Richard Wright’s Black Boy

    Directory of Open Access Journals (Sweden)

    Giyatmi Giyatmi

    2017-07-01

    Full Text Available This research aims at finding the types of swearing expressions and linguistic forms of English swearing used in Richard Wright’s Black Boy. This is a descriptive qualitative research since it describes the phenomena of swearing used in the novel. The data of the research are all the conversations or sentences used swearing in the novel written by Richard Wright namely Black Boy as the main data source. The method of collecting data in this research is observation and teknik lanjut catat. After all the data had been collected then they are coded using the coding system such as data number/title of novel/chapter/page/data. There is no data reduction since all the data are analyzed in this research. This research used theory triangulation. Kind of swearing expressions found in this novel dealing with God and religion terms, name of  animals and plants, part of body, racial terms, stupidity terms, name of occupation, sexual terms, family terms. The linguistic forms of English swearing used in this novel are word, phrase, and clause. The swearing in the form of words consists of (1 noun referring to place, person, occupation, animal, and idea (2 verb and (3 adjective. Phrase consists of (1 noun phrase with swearing functioning as headword, modifier, and both headword and modifier, (2 adjective phrase with swearing functioning as modifier. Swearing expression is also found in the form of sentence.

  16. Review: Lyn Richards (2005. Handling Qualitative Data: A Practical Guide

    Directory of Open Access Journals (Sweden)

    Robert L. Miller

    2006-03-01

    Full Text Available Handling Qualitative Data: A Practical Guide is an introductory textbook covering all stages of qualitative research from the initial conceptualisation of a project, through data collection and analysis, to writing up. The author, Lyn RICHARDS, is a well-known developer of two key qualitative software analysis packages, NUD*IST and NVivo. While RICHARDS clearly advocates the use of qualitative analysis software, the text is "generic" and could be used in tandem with any qualitative software package. The book concentrates on practical advice about the use of software to manage and analyse qualitative data, and provides insights in these areas. The consideration of issues around team-based qualitative research is another strong point. However, due in part to its short length, the overall coverage of topics tends to be superficial. In itself, the book does not provide sufficient detailed support for a student who would like to use it as her/his main source of guidance for carrying out a qualitative research project. URN: urn:nbn:de:0114-fqs0602244

  17. Naturalismo e existencialismo na teoria moral de Richard Hare

    Directory of Open Access Journals (Sweden)

    Marco Antônio Oliveira de Azevedo

    2009-08-01

    Full Text Available http://dx.doi.org/10.5007/1677-2954.2009v8n2p247 Em um artigo de 1966, Amartya Sen procurou mostrar que mesmo Richard Hare, um devoto explícitodo antinaturalismo em ética, ainda que inadvertidamente, incorreu num tipo de naturalismo que Senintitulou de existencial. Neste breve artigo, traço um resumo dessa crítica à teoria de Hare, em especial,da chamada “Lei de Hume”, a qual Sen preferiu apropriadamente intitular “Regra de Hare”. Pretendomostrar como esse tipo peculiar de “existencialismo” nos conduz, ainda que sob o possível protesto deHare e seus seguidores, a conclusões subjetivistas e relativistas sobre a moralidade.

  18. RICHARD WAGNER E O ROMANTISMO ALEMÃO

    Directory of Open Access Journals (Sweden)

    Rainer Câmara Patriota

    2015-07-01

    Full Text Available A cultura musical romântica encontra em Richard Wagner– em sua obra musical e teórica – um de seus maiores protagonistas.A rejeição da Aufklärung e a exaltação da supremacia germânica –elementos constituidores da Weltanschauung romântica alemã –caracterizam fortemente o pensamento e a atitude de Wagner frenteà vida, assumindo conotações ainda mais radicais através de seucontumaz antissemitismo. De modo que pensar Wagner por ocasiãode seu bicentenário também significa retomar uma discussão crucialsobre o romantismo alemão e suas implicações políticas eideológicas.

  19. La paradoja de lo público en Richard Rorty

    Directory of Open Access Journals (Sweden)

    Martha Palacio Avendaño

    2008-01-01

    Full Text Available El concepto de lo público en Richard Rorty, heredero de la tradición liberal, admite ser tratado como parte de un juego del lenguaje denominado liberalismo democrático. En ese sentido, una de las reglas de este juego para saber si una jugada es válida consiste en asumir la distinción entre esfera pública y privada. Richard Rorty pensó que este juego no requería fundamentación más allá de la forma de jugarlo, que el criterio en que se apoyaría estaba en las prácticas que tienen lugar dentro del mismo con arreglo a sostener una utopía que permitiera hacer cada vez más jugadas. Esto es, el liberalismo democrático no requería basarse en algo más allá de las prácticas conducentes a lograr una esperanza social alentada por la libertad en defensa del pluralismo. Su utopía liberal, guiada por el principio de la no-crueldad, haría posible una sociedad inclusiva en la que todos tuvieran espacio para su léxico privado. De este modo, Rorty habría vinculado libertad y solidaridad, pero su juego del lenguaje permite advertir la paradoja del vínculo que implicaría el sentido de lo público. Aquí, la libertad no es condición suficiente de la solidaridad, de modo que la inclusión social no tiene cabida en su juego del lenguaje.

  20. 78 FR 43093 - Richard C. Theuer; Filing of Food Additive Petition and Citizen Petition

    Science.gov (United States)

    2013-07-19

    ... [Docket Nos. FDA-2013-F-0700 and FDA-2013-P-0472] Richard C. Theuer; Filing of Food Additive Petition and... proposing that the food additive regulations be amended to prohibit the use of carrageenan and salts of... that Richard C. Theuer, Ph.D., 7904 Sutterton Ct., Raleigh, NC 27615, has filed a food additive...

  1. 76 FR 10936 - Culturally Significant Objects Imported for Exhibition Determinations: “Richard Serra Drawing: A...

    Science.gov (United States)

    2011-02-28

    ... DEPARTMENT OF STATE [Public Notice: 7348] Culturally Significant Objects Imported for Exhibition Determinations: ``Richard Serra Drawing: A Retrospective'' SUMMARY: Notice is hereby given of the following... objects to be included in the exhibition ``Richard Serra Drawing: A Retrospective,'' imported from abroad...

  2. Travelling wave solutions for the Richards equation incorporating non-equilibrium effects in the capillarity pressure

    NARCIS (Netherlands)

    van Duijn, C. J.; Mitra, K.; Pop, I. S.

    2018-01-01

    The Richards equation is a mathematical model for unsaturated flow through porous media. This paper considers an extension of the Richards equation, where non-equilibrium effects like hysteresis and dynamic capillarity are incorporated in the relationship that relates the water pressure and the

  3. H.E. Mr Richard J. Fredericks, Ambassador of the United States of America to Switzerland

    CERN Document Server

    Patrice Loïez

    2001-01-01

    Photo 01 : Prof. L. Maiani, CERN Director-General, gives a piece of LHC super conducting wire to H.E. Mr. Richard J. Fredericks; Photo 02 : Prof. L. Maiani, CERN Director-General, Mr. Jan van der Boon, CERN Director of Administration and H.E. Mr. J. Richard Fredericks

  4. W. Richard Scott, Institutions and Organizations: Ideas, Interests, and Identities

    DEFF Research Database (Denmark)

    Jakobsen, Michael

    2014-01-01

    Book review of: W. Richard Scott: Institutions and Organizations: Ideas, Interests, and Identities. 4th edition. Thousand Oaks, CA: SAGE Publications, 2014. xiii, 345 pp.......Book review of: W. Richard Scott: Institutions and Organizations: Ideas, Interests, and Identities. 4th edition. Thousand Oaks, CA: SAGE Publications, 2014. xiii, 345 pp....

  5. Transcendence, Taxis, Trust: Richard Kearney and Jacques Derrida

    Directory of Open Access Journals (Sweden)

    Ulrich Schmiedel

    2017-03-01

    Full Text Available Whatever else it takes to drive a taxi, it takes trust. Day after day, the driver has to decide whether the other is or is not trustworthy. I take the taxi as a test case to analyze and assess Richard Kearney’s diacritical hermeneutics of the other. I argue that Kearney functionalizes the concept of transcendence in order to connect the transcendence of the finite other to the transcendence of the infinite other. However, in his central critique of the deconstructionists following Jacques Derrida, Kearney counters his connection. While Kearney’s critique of Derrida’s account of absolute alterity is correct and compelling, I argue that Derrida’s critique of a distinction between the trustworthy other and the non-trustworthy other might be more crucial than Kearney contends. Insisting on openness to the other’s otherness, Derrida provokes any hermeneutic of the other to trust in transcendence. The taxi is taken as a test to illustrate the implications which diacritical and deconstructive drivers might have for evaluating the entanglement of ethics and eschatology—inside and outside the taxi.

  6. Forjando nuestras democracias: entre Richard Rorty y Vladimiro Montesinos

    Directory of Open Access Journals (Sweden)

    Miguel Giusti

    2001-07-01

    Full Text Available This article aims at explaining the recent history of Peru, in an exercise in which it is possible to extract lessons about the way Latin American democracies have been(or have not been forged. The text draws a parallel between the ideas developed by Richard Rorty in his recently published book, Forjar nuestro país. El pensamiento de izquierdas en los Estados Unidos del siglo XX, and the events in Fugimori's and Montesinos' Peru. If, according to what Rorty believes, "national pride is for the countries what self esteem is for individuals ... " how would it be possible to narrate a history in which there are few motives to be proud of? Trying to escape fatalism and sarcasm, the text tries to show that Montesino's political course is, symbolically, a summary of the decomposition process of Peruvian democracy. Secondly, the text analyses the movements of the political left wing and deals with the support the regimen received from inside and outside the country, a support that was largely based on the illusion of political stability. Finally, it states, as Rorty does, that in order to forge democracies it is necessary for us to be deeply committed to the defense of the State of Right.

  7. Juvenile Cosmology; Or Richard Powers’ Post-Global Doughnut

    Directory of Open Access Journals (Sweden)

    Judith Roof

    2010-02-01

    Full Text Available Le roman de Richard Powers, Operation Wandering Soul (1993, présente le lien subtil qui associe un mondialisme déjà usé et vieillissant à l’enfant perçu comme catégorie dominante. Comme les faces serpentines d’un ruban de Möbius lové autour de l’illimité et de l’intemporel, le texte, tendu entre ses deux infinis – l’univers et l’enfant – révise la portée, la conception, la structure et le style du genre romanesque. Délaissant Aristote pour Einstein, Operation Wandering Soul se place sur le terrain de la cosmologie. Le récit, qui rassemble la kyrielle des grands ralliements juvéniles et leurs vains pèlerinages, concentre l’espace-temps dans une présentation qui évoque la « somme des histoires » de Richard Feynman. La contraction de l’espace-temps opérée par le roman ne fait pas de celui-ci un hymne simpliste au global (catégorie déjà aussi datée que celle des malheureux vétérans du Vietnam, mais capte au contraire la conscience grandissante d’une existence sans origine qui s’étend à perte de vue au-delà de ses coordonnées supposées. Le roman s’enroule sur lui-même tout en s’épanchant au dehors, boucle ses cadres et ses détours tout en desserrant leur emprise. Il fait tourner la roue de ses récits comme des planètes en rotation, la ronde d’un système solaire, le tourbillon d’une galaxie. La conscience que présente Operation Wandering Soul ne se résume donc pas au seul point de vue de l’âme errante qu’est le personnage de Kraft, mais consiste en la somme de tous les temps et de tous les lieux, de leurs strates accumulées comme une conscience en acte, complexe et tissée de réseaux, qui n’appartient à personne et est partagée par tous. Cette accumulation organise le jeu des perspectives multiples qui instaurent l’acte de lecture et sont instaurées par lui. À cet égard, lire constitue ici une physique des oubliés.Richard Powers’ novel Operation Wandering

  8. PolyRES: A polygon-based Richards equation solver

    International Nuclear Information System (INIS)

    Hills, R.G.

    1995-12-01

    This document describes the theory, implementation, and use of a software package designed to solve the transient, two-dimensional, Richards equation for water flow in unsaturated-saturated soils. This package was specifically designed to model complex geometries with minimal input from the user and to simulate groundwater flow related to assessment of low-level radioactive waste disposal sites and engineered facilities. The spatial variation of the hydraulic properties can be defined across individual polygon-shaped subdomains, called objects. These objects combine to form a polygon-shaped model domain. Each object can have its own distribution of hydraulic parameters. The resulting model domain and polygon-shaped internal objects are mapped onto a rectangular, finite-volume, computational grid by a preprocessor. This allows the user to specify model geometry independently of the underlying grid and greatly simplifies user input for complex geometries. In addition, this approach significantly reduces the computational requirements since complex geometries are actually modeled on a rectangular grid. This results in well-structured, finite difference-like systems of equations that require minimal storage and are very efficient to solve. The documentation for this software package includes a user's manual, a detailed description of the underlying theory, and a detailed discussion of program flow. Several example problems are presented that show the use and features of the software package. The water flow predictions for several of these example problems are compared to those of another algorithm to test for prediction equivalency

  9. [Richard Koch's life in national socialism and in Soviet emigration].

    Science.gov (United States)

    Boltres, Daniela; Töpfer, Frank; Wiesing, Urban

    2006-01-01

    The Jewish historian and theorist of medicine, Richard Koch, teaching in Frankfurt/Main, fled in 1936 from National Socialist Germany to the USSR where he lived in the Caucasian spa Essentuki until his death in 1949. Here he worked as a doctor and continued his scientific work, especially on the foundations of medicine in natural philosophy. None of his works of this time were published. Koch was a scientific outsider in the USSR, and he was aware of this. However, he tried to make his views compatible with official doctrines. In 1947 he lost his employment at the medical clinic of Essentuki, and his material situation grew worse. It is still an open question whether this development was related to an increasingly anti-Jewish atmosphere in the USSR that was linked with the Stalinist "purges", as Koch himself appeared to believe. Before his flight from Germany Koch did not show any tendency towards communism or the political left at all. His attitude towards Soviet society and Stalin was mixed: cautious criticism was accompanied by strong expressions of commitment to Stalin and Koch's new Socialist home. The question to what extent Koch's comments showed his true convictions must remain without a definite answer. At least in part they can be understood as precautions in threatening circumstances. The opportunity of a remigration to Germany after 1945, however, was turned down by Koch.

  10. Perception of Leitmotives in Richard Wagner's Der Ring des Nibelungen

    Directory of Open Access Journals (Sweden)

    David J. Baker

    2017-05-01

    Full Text Available The music of Richard Wagner tends to generate very diverse judgments indicative of the complex relationship between listeners and the sophisticated musical structures in Wagner's music. This paper presents findings from two listening experiments using the music from Wagner's Der Ring des Nibelungen that explores musical as well as individual listener parameters to better understand how listeners are able to hear leitmotives, a compositional device closely associated with Wagner's music. Results confirm findings from a previous experiment showing that specific expertise with Wagner's music can account for a greater portion of the variance in an individual's ability to recognize and remember musical material compared to measures of generic musical training. Results also explore how acoustical distance of the leitmotives affects memory recognition using a chroma similarity measure. In addition, we show how characteristics of the compositional structure of the leitmotives contributes to their salience and memorability. A final model is then presented that accounts for the aforementioned individual differences factors, as well as parameters of musical surface and structure. Our results suggest that that future work in music perception may consider both individual differences variables beyond musical training, as well as symbolic features and audio commonly used in music information retrieval in order to build robust models of musical perception and cognition.

  11. Failed Mothers, Monster Sons. Reading Shakespeare’S Richard Iii as a Fairy Tale

    Directory of Open Access Journals (Sweden)

    Percec Dana

    2014-03-01

    Full Text Available The paper looks at Shakespeare’s historical play Richard III and its fairy tale-like character given by the configuration of the main character as an arch-villain and the presence of motifs and patterns typically associated with the fairy tale genre. More specifically, it considers the mother-son relationship between the Duchess of York and Richard in the light of the motif of monstrous birth. It is not a coincidence that the emergence of such motifs coincides with the historical contexts of the early modern period. Reading Richard III in this key is related to the revisionist approach to chronicle plays.

  12. Stand diameter distribution modelling and prediction based on Richards function.

    Directory of Open Access Journals (Sweden)

    Ai-guo Duan

    Full Text Available The objective of this study was to introduce application of the Richards equation on modelling and prediction of stand diameter distribution. The long-term repeated measurement data sets, consisted of 309 diameter frequency distributions from Chinese fir (Cunninghamia lanceolata plantations in the southern China, were used. Also, 150 stands were used as fitting data, the other 159 stands were used for testing. Nonlinear regression method (NRM or maximum likelihood estimates method (MLEM were applied to estimate the parameters of models, and the parameter prediction method (PPM and parameter recovery method (PRM were used to predict the diameter distributions of unknown stands. Four main conclusions were obtained: (1 R distribution presented a more accurate simulation than three-parametric Weibull function; (2 the parameters p, q and r of R distribution proved to be its scale, location and shape parameters, and have a deep relationship with stand characteristics, which means the parameters of R distribution have good theoretical interpretation; (3 the ordinate of inflection point of R distribution has significant relativity with its skewness and kurtosis, and the fitted main distribution range for the cumulative diameter distribution of Chinese fir plantations was 0.4∼0.6; (4 the goodness-of-fit test showed diameter distributions of unknown stands can be well estimated by applying R distribution based on PRM or the combination of PPM and PRM under the condition that only quadratic mean DBH or plus stand age are known, and the non-rejection rates were near 80%, which are higher than the 72.33% non-rejection rate of three-parametric Weibull function based on the combination of PPM and PRM.

  13. AD-1 with research pilot Richard E. Gray

    Science.gov (United States)

    1982-01-01

    Standing in front of the AD-1 Oblique Wing research aircraft is research pilot Richard E. Gray. Richard E. Gray joined National Aeronautics and Space Administration's Johnson Space Center, Houston, Texas, in November 1978, as an aerospace research pilot. In November 1981, Dick joined the NASA's Ames-Dryden Flight Research Facility, Edwards, California, as a research pilot. Dick was a former Co-op at the NASA Flight Research Center (a previous name of the Ames-Dryden Flight Research Facility), serving as an Operations Engineer. At Ames-Dryden, Dick was a pilot for the F-14 Aileron Rudder Interconnect Program, AD-1 Oblique Wing Research Aircraft, F-8 Digital Fly-By-Wire and Pilot Induced Oscillations investigations. He also flew the F-104, T-37, and the F-15. On November 8, 1982, Gray was fatally injured in a T-37 jet aircraft while making a pilot proficiency flight. Dick graduated with a Bachelors degree in Aeronautical Engineering from San Jose State University in 1969. He joined the U.S. Navy in July 1969, becoming a Naval Aviator in January 1971, when he was assigned to F-4 Phantoms at Naval Air Station (NAS) Miramar, California. In 1972, he flew 48 combat missions in Vietnam in F-4s with VF-111 aboard the USS Coral Sea. After making a second cruise in 1973, Dick was assigned to Air Test and Evaluation Squadron Four (VX-4) at NAS Point Mugu, California, as a project pilot on various operational test and evaluation programs. In November 1978, Dick retired from the Navy and joined NASA's Johnson Space Center. At JSC Gray served as chief project pilot on the WB-57F high-altitude research projects and as the prime television chase pilot in a T-38 for the landing portion of the Space Shuttle orbital flight tests. Dick had over 3,000 hours in more than 30 types of aircraft, an airline transport rating, and 252 carrier arrested landings. He was a member of the Society of Experimental Test Pilots serving on the Board of Directors as Southwest Section Technical Adviser in

  14. Lendab nagu kotkas üle maailmas kogutud tarkuse / Richard Aroksaar ; intervjueerinud Ene Riet

    Index Scriptorium Estoniae

    Aroksaar, Richard

    2014-01-01

    Intervjuu eestlase Richard Aroksaarega, kes õppinud psühholoogiat ja raamatukogundust, töötab USA Rahvusparkide Ühenduse raamatukogus (National Park Service Library, NPS) süsteemi raamatukoguhoidja ja administraatorina

  15. Richard Kelly: Pioneirismo na iluminação da arquitetura moderna

    Directory of Open Access Journals (Sweden)

    Fernanda Brito Bandeira

    2018-04-01

    Full Text Available Livros resenhado: NEUMANN, Dietrich; STERN, Robert A. M. The structure of light: Richard Kelly and the illumination of modern architecture. New York: Yale University Press, 2010, 214 p. ISBN: 978-0-300-16370-4

  16. EDITORIAL: Richard Palmer: celebrating 37 years with Journal of Physics: Condensed Matter Richard Palmer: celebrating 37 years with Journal of Physics: Condensed Matter

    Science.gov (United States)

    Ferry, David

    2009-01-01

    It is with a great deal of both happiness and sadness that I have to announce that we are losing one of the real strengths of the Journal of Physics: Condensed Matter (JPCM). Dr Richard Palmer, our Senior Publisher, announced his retirement, and this issue marks the first without his involvement. Of course, we are happy that he will get to enjoy his retirement, but we are sad to lose such a valuable member of our team. Richard first started work at IOP Publishing in March 1971 as an Editorial Assistant with Journal of Physics B: Atomic and Molecular Physics. After a few months, he transferred to Journal of Physics C: Solid State Physics. During his first year, he was sent on a residential publishing training course and asked to sign an undertaking to stay at IOP Publishing for at least two years. Although Richard refused to sign, as he did not want to commit himself, he has remained with the journal since then. The following year, the Assistant Editor of Journal of Physics C: Solid State Physics, Malcolm Haines, walked out without notice in order to work on his family vineyard in France, and Richard stepped into the breach. In those days, external editors had a much more hands-on role in IOP Publishing and he had to travel to Harwell to be interviewed by Alan Lidiard, the Honorary Editor of Journal of Physics C: Solid State Physics, before being given the job of Assistant Editor permanently. I am told that in those days the job consisted mainly of editing and proofreading and peer review. There was no journal development work. At some point in the early 1980s, production and peer review were split into separate departments and Richard then headed a group of journals consisting of Journal of Physics C: Solid State Physics, Journal of Physics D: Applied Physics and Journal of Physics F: Metal Physics, Semiconductor Science and Technology, Superconductor Science and Technology, Plasma Physics and Controlled Fusion, and later Nanotechnology and Modelling and Simulation

  17. Obituary: Richard L. (Dick) Walker, Jr., 1938-2005

    Science.gov (United States)

    Pier, Jeffrey R.; Mason, Brian

    2005-12-01

    Koch Center for Science, Math, and Technology at Deerfield Academy in Massachusetts. He also consulted with James Turrell, providing astronomical position information for the design of the Roden Crater Project outside of Flagstaff. While he will be remembered for his significant scientific contributions to the field of astronomy, those who knew Dick, both scientists and non-scientists alike, will probably remember him best for his humility, his humanity, and his loyal and abiding friendship. He was a man with a terrific sense of humor and an infectious laugh. It was always an honor and pleasure to be in his company. Richard L. Walker, Jr. is survived by his wife, Patricia, two daughters from his first marriage: Brenda Walker of Las Vegas, NV, and Pamela Hepburn of Holland, OH, as well as four children from Patricia's first marriage: Doug Browning of Lake Havasu City, AZ, Michael Browning of Kingman, AZ, Kim Bructo of Orient, OH, and Jennifer Brown of Lake Havasu City, AZ. He is also survived by ten grandchildren and three great-grandchildren. He was preceded in death by his father Richard, mother Mary, and daughter, Paula Jean Elizabeth Stone.

  18. Trochanteric fractures. Classification and mechanical stability in McLaughlin, Ender and Richard osteosynthesis

    Energy Technology Data Exchange (ETDEWEB)

    Herrlin, K.; Stroemberg, T.; Lidgren, L.; Walloee, A.; Pettersson, H.

    Four hundred and thirty trochanteric factures operated upon with McLaughlin, Ender or Richard's osteosynthesis were divided into 6 different types based on their radiographic appearance before and immediately after reposition with special reference to the medial cortical support. A significant correlation was found between the fracture type and subsequent mechanical complications where types 1 and 2 gave less, and types 4 and 5 more complications. A comparison of the various osteosyntheses showed that Richard's had significantly fewer complications than either the Ender or McLaughlin types. For Richard's osteosynthesis alone no correlation to fracture type could be made because of the small number of complications in this group.

  19. Bioremediation protocols

    National Research Council Canada - National Science Library

    Sheehan, David

    1997-01-01

    ..., .. . . . . .. ,. . . .. . . . . . . . .. . . . . .. . . .. . .. 3 2 Granular Nina Sludge Christiansen, Consortia lndra for Bioremediation, M. Mathrani, and Birgitte K. Ahring . 23 PART II PROTOCOLS...

  20. Quasi-constitutional change without intent : A response to Richard Albert

    NARCIS (Netherlands)

    Passchier, Reijer

    2017-01-01

    Recently, Buffalo Law Review published Richard Albert’s article on “quasi-constitutional amendments.” These are, in Albert’s words, “sub-constitutional changes that do not possess the same legal status as a constitutional amendment, that are formally susceptible to statutory repeal or revision, but

  1. Ripples from a Passing Ship: Memories; and a Legacy of Richard Peters

    Science.gov (United States)

    Harris, Kevin

    2013-01-01

    This paper outlines aspects and dimensions of my "relationship" with Richard Peters from 1966 onward. The underlying suggestion is that, while Peters' contribution to philosophy of education was undeniably of major proportions, both that contribution and his legacy are institutional rather than substantive. (Contains 15 notes.)

  2. Racial Shame and the Pleasure of Transformation: Richard Rodriguez's Queer Aesthetics of Assimilation

    Science.gov (United States)

    Beltran, Cristina

    2012-01-01

    This essay analyzes Latino conservative thought by rethinking the logics of assimilation through a simultaneous exploration of aesthetic possibility and negative affect. Focusing on the writings of Richard Rodriguez, the essay considers how creative forms of self-individuation and political agency cannot easily be decoupled from negative forms of…

  3. Richard Rorty's Conception of Philosophy of Education Revisited

    Science.gov (United States)

    Noaparast, Khosrow Bagheri

    2014-01-01

    In this essay Khosrow Bagheri Noaparast argues that, by focusing on acculturation and edification, Richard Rorty has provided a promising view for education because without acculturation, education turns into a destructive endeavor, and without edification, education risks the danger of being repetitive and reproductive. However, Rorty's view…

  4. Richard Wright's Thematic Treatment of Women in "Uncle Tom's Children,""Black Boy," and "Native Son."

    Science.gov (United States)

    Brewton, Butler E.

    Richard Wright's literary work emphasizes a contrast between black women and white women. Although both are "givers" to black boys, the nature of what they give is different. The black woman gives physical life, feeds it, and protects it at the expense of spiritual or creative vitality. Her goal is to survive bodily, to breathe, to have…

  5. Understanding Richard Wright's "Black Boy": A Student Casebook to Issues, Sources, and Historical Documents.

    Science.gov (United States)

    Felgar, Robert

    In "Black Boy," Richard Wright triumphs over an ugly, racist world by fashioning an inspiring, powerful, beautiful, and fictionalized autobiography. To help students understand and appreciate his story in the cultural, political, racial, social, and literary contexts of its time, this casebook provides primary historical documents,…

  6. Süütuse kaotamine / Richard Branson ; intervjueerinud Peter Fisk ; tõlkinud Endrik Randoja

    Index Scriptorium Estoniae

    Branson, Richard

    2009-01-01

    Turunduskirjanik Peter Fiski intervjuu Suurbritannia ärimagnaadi Sir Richard Bransoniga, milles arutletakse ettevõtja suurimate saavutuste ja suurimate pettuste üle, uuritakse Bransoni võimet juhtida oma 450 ettevõtet, tema suhtumist konkurentsi ning uutesse äriideedesse, samuti tema ajakasutust

  7. Transforming Faith: H. Richard Niebuhr and Paulo Freire on Moral Education

    Science.gov (United States)

    Daniel, Joshua Leonard

    2013-01-01

    Through a contextual comparison of the theological ethics of H. Richard Niebuhr and the educational theory of Paulo Freire, I argue that socialization, while an essential task of moral education, is an insufficient aim. The proper aim of moral education is individual development. The intention of my argument is address tendencies towards…

  8. Resisting Biopolitics through “Diaphanous Wonder”: Richard Flanagan's Gould's Book of Fish

    NARCIS (Netherlands)

    Wiese, Doro|info:eu-repo/dai/nl/304842699

    2014-01-01

    In Gould's Book of Fish (2003), author Richard Flanagan manages to invent a format in which content and style account for historical events on Sarah Island, Tasmania in the 1820s, yet he does so in a manner that is not in the least objective, disinterested or fact-orientated. The perspective of

  9. Somaesthetic Training, Aesthetics, Ethics, and the Politics of Difference in Richard Shusterman's "Body Consciousness"

    Science.gov (United States)

    Powell, Kimberly

    2010-01-01

    In this essay, the author first addresses the theme of disciplined somatic training and its relationship to self-awareness and transformation. Her attention is focused specifically on the chapter on Ludwig Wittgenstein, in which Richard Shusterman presents and then elaborates upon the philosopher's connections between conscious bodily feelings and…

  10. Astronaut Richard H. Truly in training session RMS for STS-2 bldg 9A

    Science.gov (United States)

    1981-01-01

    Astronaut Richard H. Truly in training session with the Remote Manipulator System (RMS) for STS-2 bldg 9A. Views show Truly working at the command console while watching out the windows. Karen Ehlers, an RMS procedures specialist, can be seen at left side of frame (34314); view from behind Truly as he trains at the RMS console (34315).

  11. Strauss, Richard. Ariane a Naxos: opera seulement, integrale. Miliza Korjus / Michel Parouty

    Index Scriptorium Estoniae

    Parouty, Michel

    1995-01-01

    Uuest heliplaadist "Strauss, Richard. Ariane a Naxos: opera seulement, integrale. Miliza Korjus (Najade). Orchestre de l'Opea l'Efat de Vienne" Arlecchino ARL 14-16, distribution Dante (3 CD: 390 F). 1935, 1944. TT: 3h 46'17"

  12. Fluid flow in porous media using image-based modelling to parametrize Richards' equation.

    Science.gov (United States)

    Cooper, L J; Daly, K R; Hallett, P D; Naveed, M; Koebernick, N; Bengough, A G; George, T S; Roose, T

    2017-11-01

    The parameters in Richards' equation are usually calculated from experimentally measured values of the soil-water characteristic curve and saturated hydraulic conductivity. The complex pore structures that often occur in porous media complicate such parametrization due to hysteresis between wetting and drying and the effects of tortuosity. Rather than estimate the parameters in Richards' equation from these indirect measurements, image-based modelling is used to investigate the relationship between the pore structure and the parameters. A three-dimensional, X-ray computed tomography image stack of a soil sample with voxel resolution of 6 μm has been used to create a computational mesh. The Cahn-Hilliard-Stokes equations for two-fluid flow, in this case water and air, were applied to this mesh and solved using the finite-element method in COMSOL Multiphysics. The upscaled parameters in Richards' equation are then obtained via homogenization. The effect on the soil-water retention curve due to three different contact angles, 0°, 20° and 60°, was also investigated. The results show that the pore structure affects the properties of the flow on the large scale, and different contact angles can change the parameters for Richards' equation.

  13. Making the Road While Walking It: A Conversation with Richard Simpson

    Science.gov (United States)

    Zabel, Robert H.; Kaff, Marilyn; Teagarden, James

    2016-01-01

    Richard Simpson is professor of special education at the University of Kansas (KU). Dr. Simpson's duties at KU have included roles of staff psychologist, teaching associate, assistant professor, project director, associate professor, professor, and chairperson for the Department of Special Education. He has directed numerous University of Kansas…

  14. 75 FR 53730 - Culturally Significant Objects Imported for Exhibition Determinations: “Richard Hawkins-Third Mind”

    Science.gov (United States)

    2010-09-01

    ... DEPARTMENT OF STATE [Public Notice 7148] Culturally Significant Objects Imported for Exhibition Determinations: ``Richard Hawkins--Third Mind'' SUMMARY: Notice is hereby given of the following determinations... the exhibition ``Richard Hawkins--Third Mind,'' imported from abroad for temporary exhibition within...

  15. Technical realization of a closure concept for a chamber-system in the underground Richard repository in the Czech Republic

    International Nuclear Information System (INIS)

    Kucerka, Miroslav

    2006-01-01

    The Phare project CZ 632.02.04 'Realization of closure of a chamber in the Richard repository as input for establishing a safety case' is a follow up implementation phase of the Phare project, CZ 01.14.03 'Solution for closure of a chamber in the Richard repository'. Main objective of both projects is to propose and realize a disposal system in selected chambers of the Richard repository, which will eliminate burden from the past practices in waste management during the first phase of the Richard repository operation (1965 - 1980) and which will improve its overall long term safety. This objective will be assured by realization of the concept of so called 'hydraulic cage', which technical solution was developed by DBE Technology within the Phare project CZ 01.14.03. The solution is described in the previous presentation 'Hydraulic Cage Concept for Waste Chambers and its Technical Implementation for the Underground Richard Repository, Litomerice, Czech Republic'. (author)

  16. Richard III in Russian Theatre at the Twilight of the "Thaw"

    OpenAIRE

    Sokolyansky, Mark

    2007-01-01

    Richard III was very rarely staged in Russian theatre in tsarist and Stalin’s times, because the story of inhuman tyranny provoked associations with Russian political reality. In the period of the so-called “Thaw” (1954ß1964) the play became very popular in the USSR and several scenic productions of it were real events in Russian (and Soviet) theatrical life. In the essay three most original and successful performances (in Kujbyshev, Gorkij and Erevan) are discussed and compare...

  17. Missing Kettles and Too Few Toasters: The Forecasting Methodology at Morphy Richards

    OpenAIRE

    Lane, D; Hughes, D

    2002-01-01

    Faced with problems in forecasting at Morphy Richards, this research represents an investigation into their forecasting methodology following the hypothesis that the current forecasting system was no longer sufficient to ensure guaranteed supply to customers, or to enable forward planning.\\ud \\ud The purpose of the research was to identify any requirements for change within the forecasting system and to identify the ‘best practice’ within the industry. Primary research was carried out using a...

  18. Richard J. Bernstein on Ethics and Philosophy between the Linguistic and the Pragmatic Turn

    OpenAIRE

    Marchetti, Sarin

    2017-01-01

    1. In his compelling article American Pragmatism: The Conflict of Narratives, Richard Bernstein quotes a perceptive line by Alasdair MacIntyre that goes [A] tradition not only embodies the narrative of an argument, but is only recovered by an argumentative retelling of that narrative which will itself be in conflict with other argumentative retellings. Bernstein, in the essay mentioned, works through MacIntyre’s passage in order to “engage in the ‘argumentative retelling’ of a metanarrative –...

  19. Il concetto di medium artistico: Richard Wollheim interprete di Ludwig Wittgenstein

    OpenAIRE

    Maistrello, Andrea

    2016-01-01

    The aim of the dissertation is twofold: (i) analyzing the notion (well known by aestheticians, but not so intensively studied) of artistic medium; (ii) showing the relevance of such notion for aesthetics through the examination of some relevant aspects of Richard Wollheim’s philosophy of art, maybe the main figure in Anglo-American philosophy as for considering artistic medium central in art-theorizing. Artistic media, according to Wollheim, can develop only if properly connected to a cultura...

  20. Selfish memes: An update of Richard Dawkins’ bibliometric analysis of key papers in sociobiology

    OpenAIRE

    Aaen-Stockdale, Craig

    2017-01-01

    This is an Open Access journal available from http://www.mdpi.com/ In the second edition of The Selfish Gene, Richard Dawkins included a short bibliometric analysis of key papers instrumental to the sociobiological revolution, the intention of which was to support his proposal that ideas spread within a population in an epidemiological manner. In his analysis, Dawkins primarily discussed the influence of an article by British evolutionary biologist William Donald Hamilton which had introdu...

  1. Metaforos populiarojo mokslo literatūroje: Richard Dawkins knygos analizė

    OpenAIRE

    Urbanavičiūtė, Dovilė

    2017-01-01

    The following paper discusses metaphor usage in the genre of popular science. The object of this analysis is a chapter called ‘Immortal coils’ taken from Richard Dawkins’ book The Selfish Gene. The study discusses the impact of creative conceptual metaphors on the construction of the overall meaning of the text, as well as the significance of their linguistic manifestations and context. In focusing on the genre of popular science, it also makes an attempt at defining potential difficulties of...

  2. Pimping climate change: Richard Branson, global warming, and the performance of green capitalism

    OpenAIRE

    Scott Prudham

    2009-01-01

    On 21 September 2006 UK über-entrepreneur and Virgin Group Chairman Richard Branson pledged approximately £1.6 billion, the equivalent of all the profits from Virgin Atlantic and Virgin Trains for the next ten years, to fighting climate change. Since then, Branson has restated his commitment to action on global warming, including investment in technologies for sequestering carbon dioxide from the atmosphere. In this paper, I critically examine and engage with Branson’s announcements as a spec...

  3. Richard Watson.

    Science.gov (United States)

    Wright, Ian; Bevin, William

    2017-11-25

    An inspirational equine veterinary surgeon with a keen interest in racing, to whom horses were a way of life. He took much pride in the success of his homebred racehorses. British Veterinary Association.

  4. Richard Rorty

    DEFF Research Database (Denmark)

    Hjermitslev, Hans Henrik

    2016-01-01

    dekonstruktion forlod han Princeton og blev han i 1982 udnævnt til professor i humaniora ved University of Virginia. Her skrev han i 1989 sit andet hovedværk Contingency, Irony, and Solidarity, der med originale læsninger af Heidegger, Derrida, Orwell, Nabokov, Freud og andre blev modtaget med stor interesse...

  5. Book Review of Relational Patterns, Therapeutic Presence: Concepts and practice of Integrative Psychotherapy by Richard G. Erskine

    Directory of Open Access Journals (Sweden)

    Marye O'Reilly-Knapp

    2015-12-01

    Full Text Available Book Review of Relational Patterns, Therapeutic Presence: Concepts and practice of Integrative Psychotherapy by Richard G. Erskine. Published by Karnac Books: London, 2015 Paperback, Pages 366, ISBN 13: 978-1-78220-190-8

  6. Book Review of Relational Patterns, Therapeutic Presence: Concepts and practice of Integrative Psychotherapy by Richard G. Erskine

    OpenAIRE

    Marye O'Reilly-Knapp

    2015-01-01

    Book Review of Relational Patterns, Therapeutic Presence: Concepts and practice of Integrative Psychotherapy by Richard G. Erskine. Published by Karnac Books: London, 2015 Paperback, Pages 366, ISBN 13: 978-1-78220-190-8

  7. Cryptographic Protocols:

    DEFF Research Database (Denmark)

    Geisler, Martin Joakim Bittel

    cryptography was thus concerned with message confidentiality and integrity. Modern cryptography cover a much wider range of subjects including the area of secure multiparty computation, which will be the main topic of this dissertation. Our first contribution is a new protocol for secure comparison, presented...... implemented the comparison protocol in Java and benchmarks show that is it highly competitive and practical. The biggest contribution of this dissertation is a general framework for secure multiparty computation. Instead of making new ad hoc implementations for each protocol, we want a single and extensible...... in Chapter 2. Comparisons play a key role in many systems such as online auctions and benchmarks — it is not unreasonable to say that when parties come together for a multiparty computation, it is because they want to make decisions that depend on private information. Decisions depend on comparisons. We have...

  8. Richard Rufus's theory of mixture: a medieval explanation of chemical combination.

    Science.gov (United States)

    Weisberg, Michael; Wood, Rega

    2003-05-01

    Richard Rufus of Cornwall offered a novel solution to the problem of mixture raised by Aristotle. The puzzle is that mixts or mixed bodies (blood, flesh, wood, etc.) seem to be unexplainable through logic, even though the world is full of them. Rufus's contribution to this long-standing theoretical debate is the development of a modal interpretation of certain Averroistic doctrines. Rufus's account, which posits that the elemental forms in a mixt are in accidental potential, avoids many of the problems that plagued non-atomistic medieval theories of mixture. This paper is an initial examination of Rufus' account.

  9. An experimental ‘Life’ for an experimental life : Richard Waller's biography of Robert Hooke (1705)

    OpenAIRE

    Moxham, Noah

    2016-01-01

    Richard Waller's ‘Life of Dr Robert Hooke’, prefixed to his edition of Hooke's Posthumous Works (1705), is an important source for the life of one of the most eminent members of the early Royal Society. It also has the distinction of being one of the earliest biographies of a man of science to be published in English. I argue that it is in fact the first biography to embrace the subject's natural-philosophical work as the centre of his life, and I investigate Waller's reasons for adopting thi...

  10. Of poetics and possibility: Richard Kearney’s post-metaphysical God

    Directory of Open Access Journals (Sweden)

    Yolande Steenkamp

    2017-11-01

    Full Text Available This article provides an overview of Richard Kearney’s attempt at re-imagining God post-metaphysically. In the context of a continental dialogue on the topic, Kearney has responded to onto-theology with a hermeneutic and phenomenologically informed attempt to rethink God post-metaphysically. This eschatological understanding of God is expounded in the article and is placed in relation to Kearney’s more recent concept of Anatheism. The article closes with a few remarks on what may be gained by Kearney’s work, as well as outlining a few critical questions.

  11. Popular science - common ground. A literary critique of Richard Dawkins's The Selfish Gene

    OpenAIRE

    Nilsen, Helene

    2012-01-01

    This thesis aims to perform a literary reading of Richard Dawkins's The Selfish Gene from a perspective situated outside of the 'battle of the two cultures'. Chapter 1 takes Foucault's article What is an author?" as its point of departure. After discussing how Dawkins may be seen as a reader of Darwin, I will go on to discuss Foucault's concept of the author-function, before I move on to consider some different readings of and approaches to The Selfish Gene. With reference to a polemic bet...

  12. Diagnosis and treatment of polycystic ovary syndrome (PCOS): an interview with Richard Legro.

    Science.gov (United States)

    Legro, Richard

    2015-03-27

    In this podcast, we talk to Professor Richard Legro about the recommendations for the diagnosis and treatment of polycystic ovary syndrome (PCOS) based on clinical practice guidelines and discuss the challenges of diagnosis PCOS at specific age groups. The controversies associated with treatment of PCOS, including therapies for infertility as this is a problem commonly observed in PCOS subjects, are highlighted together with future directions on the topic. The podcast for this interview is available at. http://www.biomedcentral.com/content/supplementary/s12916-015-0299-2-s1.mp3.

  13. Immunochemical protocols

    National Research Council Canada - National Science Library

    Pound, John D

    1998-01-01

    ... easy and important refinements often are not published. This much anticipated 2nd edition of Immunochemzcal Protocols therefore aims to provide a user-friendly up-to-date handbook of reliable techniques selected to suit the needs of molecular biologists. It covers the full breadth of the relevant established immunochemical methods, from protein blotting and immunoa...

  14. Leachate flow around a well in MSW landfill: Analysis of field tests using Richards model.

    Science.gov (United States)

    Slimani, R; Oxarango, L; Sbartai, B; Tinet, A-J; Olivier, F; Dias, D

    2017-05-01

    During the lifespan of a Municipal Solid Waste landfill, its leachate drainage system may get clogged. Then, as a consequence of rainfall, leachate generation and possibly leachate injection, the moisture content in the landfill increases to the point that a leachate mound could be created. Therefore, pumping the leachate becomes a necessary solution. This paper presents an original analysis of leachate pumping and injection in an instrumented well. The water table level around the well is monitored by nine piezometers which allow the leachate flow behaviour to be captured. A numerical model based on Richards equation and an exponential relationship between saturated hydraulic conductivity and depth is used to analyze the landfill response to pumping and injection. Decreasing permeability with depth appears to have a major influence on the behaviour of the leachate flow. It could have a drastic negative impact on the pumping efficiency with a maximum quasi-stationary pumping rate limited to approximately 1m 3 /h for the tested well and the radius of influence is less than 20m. The numerical model provides a reasonable description of both pumping and injection tests. However, an anomalous behaviour observed at the transition between pumping and recovery phases is observed. This could be due to a limitation of the Richards model in that it neglects the gas phase behaviour and other double porosity heterogeneous effects. Copyright © 2016 Elsevier Ltd. All rights reserved.

  15. Wooing-Scenes in “Richard III”: A Parody of Courtliness?

    Directory of Open Access Journals (Sweden)

    Agnieszka Stępkowska

    2009-11-01

    Full Text Available In the famous opening soliloquy of Shakespeare’s Richard III, Richard mightily voices his repugnance to “fair well-spoken days” and their “idle pleasures”. He realizes his physical deformity and believes that it sets him apart from others. He openly admits that he is “not shaped for sportive tricks, nor made to court an amorous looking-glass”. Yet, his monstrosity constitutes more perhaps of his aggressive masculine exceptionality rather than of his deformity. Richard’s bullying masculinity manifests itself in his contempt for women. In the wooing scenes we clearly see his pugnacious pursuit of power over effeminate contentment by reducing women to mere objects. Additionally, those scenes are interesting from a psychological viewpoint as they brim over with conflicting emotions. Therefore, the paper explores two wooing encounters of the play, which belong the best examples of effective persuasion and also something we may refer to as ‘the power of eloquence’.

  16. Construction of Fluid - solid Coupling Model with Improved Richards - BP & Its Engineering Application

    Science.gov (United States)

    Xie, Chengyu; Jia, Nan; Shi, Dongping; Lu, Hao

    2017-10-01

    In order to study the slurry diffusion law during grouting, Richards unsaturated-saturated model was introduced, the definition of the grouting model is clear, the Richards model control equation was established, And the BP neural network was introduced, the improved fluid-solid coupling model was constructed, Through the use of saturated - unsaturated seepage flow model, As well as the overflow boundary iterative solution of the mixed boundary conditions, the free surface is calculated. Engineering practice for an example, with the aid of multi - field coupling analysis software, the diffusion law of slurry was simulated numerically. The results show that the slurry diffusion rule is affected by grouting material, initial pressure and other factors. When the slurry starts, it flows in the cracks along the upper side of the grouting hole, when the pressure gradient is reduced to the critical pressure, that is, to the lower side of the flow, when the slurry diffusion stability, and ultimately its shape like an 8. The slurry is spread evenly from the overall point of view, from the grouting mouth toward the surrounding evenly spread, it gradually reaches saturation by non-saturation, and it is not a purely saturated flow, when the slurry spread and reach a saturated state, the diffusion time is the engineering grouting time.

  17. Gamma radiation and radon concentration levels at the radioactive waste repositories 'Richard' and 'Bratrstvi'

    International Nuclear Information System (INIS)

    Berka, Z.; Sabol, J.; Janu, M.

    1998-01-01

    Owing to the fact that cosmic rays are shielded off, the photon equivalent dose rates in the corridors of the Richard repository are usually slightly lower than outside. However, in points close to barrels containing radioactive waste, the dose rates can reach values as high as tens of μSv/h. Because of high concentrations of natural radionuclides, the dose rates in the Bratrstvi repository is generally considerably higher, as much as 5 times the normal background value. Radon concentrations exhibit specific time variations which are modified by ventilation. Where ventilation is poor or absent, the radon concentrations are extremely high, viz. up to 30 and 300 kBq/m 3 in the Richard and Bratrstvi repositories, respectively. Personal exposure of workers depend on the total time spent underground and on the ventilation rate. While the contribution from photons can be kept below the relevant limits, the radon-related doses may be significant and even exceed the professional limits if no precautions are taken. (P.A.)

  18. The 1D Richards' equation in two layered soils: a Filippov approach to treat discontinuities

    Science.gov (United States)

    Berardi, Marco; Difonzo, Fabio; Vurro, Michele; Lopez, Luciano

    2018-05-01

    The infiltration process into the soil is generally modeled by the Richards' partial differential equation (PDE). In this paper a new approach for modeling the infiltration process through the interface of two different soils is proposed, where the interface is seen as a discontinuity surface defined by suitable state variables. Thus, the original 1D Richards' PDE, enriched by a particular choice of the boundary conditions, is first approximated by means of a time semidiscretization, that is by means of the transversal method of lines (TMOL). In such a way a sequence of discontinuous initial value problems, described by a sequence of second order differential systems in the space variable, is derived. Then, Filippov theory on discontinuous dynamical systems may be applied in order to study the relevant dynamics of the problem. The numerical integration of the semidiscretized differential system will be performed by using a one-step method, which employs an event driven procedure to locate the discontinuity surface and to adequately change the vector field.

  19. Quantum mechanics in the cold war; Quantenmechanik im Kalten Krieg. David Bohm und Richard Feynman

    Energy Technology Data Exchange (ETDEWEB)

    Forstner, C.

    2007-07-01

    In the middle of the 20th century David Bohm and Richard Feynman developed two fundamentally different approaches of modern quantum mechanics: Bohm a realistic interpretation by means of hidden parameters and Feynman the path-integral formalism. This is by this more remarakable, because both physicists started from similar conditions and originated from similar connections. By its comparing approach this study presents more than a contribution to the history of the quantum theory. By the question for the social and cultural conditions of the formation of theories it is furthermore of science-sociological and science-theoretical interest. The in the beginning similar and later different binding of both scientists into the scientific community allows furthermore to study, which adapting pressure each group puts on the individual scientist and the fundamental parts of his research, and which new degrees of freedom in the formation of theories arise, when this constraint is cancelled.

  20. Richard Arwed Pfeifer - a pioneer of 'medical pedagogy' and an opponent of Paul Schroder.

    Science.gov (United States)

    Steinberg, Holger; Carius, Dirk; Himmerich, Hubertus

    2013-12-01

    Richard Arwed Pfeifer (1877-1957) was one of the initiators and foster fathers of the renowned child-psychiatric and special needs education workgroup at Leipzig University under Paul Schröder (1873-1941) in the 1920s and 1930s. This paper is an account of their dispute concerning the interrelations between child and adolescent psychiatry and special needs education, as well as their disagreement about whether adolescent psychopaths should be admitted to specialized child psychiatric wards or elsewhere. Moreover, Pfeifer questioned the practical relevance of the separation of constitutional and environmentally-based psychopathy and fought eugenic research, which he found incompatible with the ethics of his profession as a remedial teacher and child psychiatrist.

  1. Destruction of the Phoenix/Hibiscus and Barringtonia racemosa Communities at Richards Bay, Natal, South Africa

    Directory of Open Access Journals (Sweden)

    P. J. Weisser

    1982-10-01

    Full Text Available The destruction of the Phoenix!Hibiscus and Barringtonia racemosa Communities described by Venter in 1972 on the southern shores of Richards Bay is reported. The cause was the artificial openingof a new mouth about 5,5 km south of the original mouth, which increased tidal range and salinity. These swamp communities occupied a narrow band about 6 ha in area behind the Bruguiera gymnorrhiza Community. An estimated 95 % of the communities was affected and only on the landward border were some isolated remnants of species such as Acrostichum aureum, Hibiscus tiliaceus and Phoenix reclinata detected .Young stands of  Phragmites australis, seedlings of  Bruguiera gymnorrhiza and Avicennia marina and epipelic algae are recoIonizing the affected area.

  2. Marie-Christine Agosto. Richard Brautigan. Les fleurs de néant.

    Directory of Open Access Journals (Sweden)

    Jean-Bernard Basse

    2006-04-01

    Full Text Available Richard Brautigan, si on lui reconnaît un certain humour, est souvent associé avec condescendance au phénomène hippy et considéré comme un auteur démodé, superficiel. Celui qui écrivait dans Cahier d’un Retour de Troie : « Les mots sont des fleurs de néant » est pourtant l’un de ces écrivains que l’on pourrait qualifier de mineurs essentiels, et seuls ceux qui l’ont peu ou mal lu s’étonneront de ce que Marie-Christine Agosto ait choisi de donner comme sous-titre « Les fleurs de néant » au pet...

  3. Harmonic analysis, partial differential equations and applications in honor of Richard L. Wheeden

    CERN Document Server

    Franchi, Bruno; Lu, Guozhen; Perez, Carlos; Sawyer, Eric

    2017-01-01

    This is a collection of contributed papers by many eminent Harmonic Analysts and specialists of Partial Differential equations. The papers focus on weighted norm equalities for singular integrals, focusing wave equations, degenerate elliptic equations, Navier-Stokes flow in two dimensions and Poincare-Sobolev inequalities in the setting of metric spaces equipped with measures among others. Many topics considered in this volume stem from the interests of Richard L. Wheeden whose contributions to Potential Theory, singular integral theory and degenerate elliptic PDE theory this volume honors. Luis Caffarelli, Sagun Chanillo, Bruno Franchi, Cristian Guttierez, Xiaojun Huang, Carlos Kenig, Ermanno Lanconelli, Eric Sawyer and Alexander Volberg, are some of the many contributors to this volume. .

  4. A critical review of Richard Lynn's reports on reaction time and race.

    Science.gov (United States)

    Thomas, Drew M

    2011-01-01

    In the early 1990s, psychologist Richard Lynn published papers documenting average reaction times and decision times in samples of nine-year-olds taken from across the world. After summarizing these data, Lynn interpreted his results as evidence of national and racial differences in decision time and general intelligence. Others have also interpreted Lynn's data as evidence of racial differences in decision time and intelligence. However, comparing Lynn's summaries with his original reports shows that Lynn misreported and omitted some of his own data. Once these errors are fixed the rankings of nations in Lynn's datasets are unstable across different decision time measures. This instability, as well as within-race heterogeneity and between-race overlap in decision times, implies that Lynn's reaction time data do not permit generalizations about the decision times and intelligence of people of different races.

  5. Analytical and grid-free solutions to the Lighthill-Whitham-Richards traffic flow model

    KAUST Repository

    Mazaré , Pierre Emmanuel; Dehwah, Ahmad H.; Claudel, Christian G.; Bayen, Alexandre M.

    2011-01-01

    In this article, we propose a computational method for solving the Lighthill-Whitham-Richards (LWR) partial differential equation (PDE) semi-analytically for arbitrary piecewise-constant initial and boundary conditions, and for arbitrary concave fundamental diagrams. With these assumptions, we show that the solution to the LWR PDE at any location and time can be computed exactly and semi-analytically for a very low computational cost using the cumulative number of vehicles formulation of the problem. We implement the proposed computational method on a representative traffic flow scenario to illustrate the exactness of the analytical solution. We also show that the proposed scheme can handle more complex scenarios including traffic lights or moving bottlenecks. The computational cost of the method is very favorable, and is compared with existing algorithms. A toolbox implementation available for public download is briefly described, and posted at http://traffic.berkeley.edu/project/downloads/lwrsolver. © 2011 Elsevier Ltd.

  6. Richard Wrangham. Catching fire. How cooking made us Human. Basic Books (Perseus Books Group

    Directory of Open Access Journals (Sweden)

    Claude-Marcel Hladik

    2009-11-01

    Full Text Available L’histoire de l’émergence de l’homme est remise en cause par cet ouvrage puisque jusqu’à présent la plupart des anthropologues et des paléontologues s’accordaient pour faire remonter à environ 500.000 ans les premières utilisations du feu pour la cuisson des aliments par le genre Homo. Les arguments présentés par Richard Wrangham dans son dernier ouvrage nous font remonter aux deux derniers millions d’années. Wrangham et ses collègues avaient publié, dès 1999, les résultats de fouilles au cou...

  7. Analytical and grid-free solutions to the Lighthill-Whitham-Richards traffic flow model

    KAUST Repository

    Mazaré, Pierre Emmanuel

    2011-12-01

    In this article, we propose a computational method for solving the Lighthill-Whitham-Richards (LWR) partial differential equation (PDE) semi-analytically for arbitrary piecewise-constant initial and boundary conditions, and for arbitrary concave fundamental diagrams. With these assumptions, we show that the solution to the LWR PDE at any location and time can be computed exactly and semi-analytically for a very low computational cost using the cumulative number of vehicles formulation of the problem. We implement the proposed computational method on a representative traffic flow scenario to illustrate the exactness of the analytical solution. We also show that the proposed scheme can handle more complex scenarios including traffic lights or moving bottlenecks. The computational cost of the method is very favorable, and is compared with existing algorithms. A toolbox implementation available for public download is briefly described, and posted at http://traffic.berkeley.edu/project/downloads/lwrsolver. © 2011 Elsevier Ltd.

  8. Book review: Unholy trinity: The IMF, World Bank and WTO Richard Peet

    Directory of Open Access Journals (Sweden)

    M Breitenbach

    2014-05-01

    Full Text Available In this timely book Richard Peet and his team lay the foundation with an excellent analysis of the process of globalisation and the resultant emergence of the global economy. The authors are especially critical of the increasing influence of institutions like the International Monetary Fund (IMF, World Bank and World Trade Organisation (WTO on the economy and the consequences experienced by peoples, cultures and the environment. The single ideology of neo-liberalism is blamed for the undesirable outcomes. This book considers concepts of power, political interest, hegemony, discourse, responsibility and the power of practicality, in critically examining the IMF, World Bank and WTO. The conclusion is reached that “all three institutions play roles greatly different from those originally agreed to under the charters that set them up”.

  9. Femineidad y ficción en la obra operística de Richard Strauss

    Directory of Open Access Journals (Sweden)

    María José Sánchez Usón

    2014-01-01

    Full Text Available Tras la muerte de Wagner y Brahms, Richard Straussemergió como uno de los compositores más importantesy populares de la música del siglo XX. Su trayectoria vitaly profesional, azarosa y turbulenta, al igual que las décadasque vivió, estuvo marcada por la realidad femenina.Es innegable que las mujeres de la vida de Strauss, todasde fuerte y distintiva personalidad, dejaron en él huellastan hondas que fue necesario llevarlas a escena, no sólocomo una aportación valiosa a la tipología caracterológicafemenina, sino también como un ejercicio terapéuticopersonal. Así, mujeres reales y mujeres ficticias se confundenen sus obras en un proceso creativo único: el delhombre-artista.

  10. BACK TO THE ORIGINS OF THE REPUDIATION OF WUNDT: OSWALD KÜLPE AND RICHARD AVENARIUS.

    Science.gov (United States)

    Russo Krauss, Chiara

    2017-01-01

    This essay provides a fresh account of the break between Oswald Külpe and his master Wilhelm Wundt. Kurt Danziger's reconstruction of the "repudiation" of Wundt, which has become the canon for this significant episode of history of psychology, focused on the supposed influence of Ernst Mach on this set of events, overshadowing the other exponent of Empiriocriticism: Richard Avenarius. Analyzing archival documents and examining anew the primary sources, the paper shows that Avenarius was himself a member of Wundt's circle, and that his "repudiation" of the master paved the way for Külpe. The essay points out the original anti-Wundtian aspects of Avenarius' notion of psychology, thus showing how they were then adopted by Külpe. © 2016 Wiley Periodicals, Inc.

  11. Lucien Cuénot, Richard Goldschmidt y Miquel Crusafont Pairó

    Directory of Open Access Journals (Sweden)

    Casinos, Adrià

    2016-06-01

    Full Text Available An unpublished text, corresponding to a communication done by Crusafont Pairó is analysed. The communication is strongly critical with Cuénot’s necrology published previously by Goldschmidt, where he regrets the teleological ideas on evolution that Cuénot maintained in the last years of his life.Se analiza un texto inédito de Miquel Crusafont Pairó, correspondiente a comunicación que llevó a cabo en la Fundació Bosch i Cardellach, sobre la necrológica de Lucien Cuénot publicada por Richard Goldschmidt. La comunicación es un fuerte ataque a Goldschmidt por sus críticas a la deriva teleológica de Cuénot en los últimos años de su vida.

  12. Nothing Risked, Nothing Gained: Richard Powers' Gain and the Horizon of Risk

    Directory of Open Access Journals (Sweden)

    Aaron Jaffe

    2010-02-01

    Full Text Available Cet article interprète Gain, sixième roman de Richard Powers, à la lumière du concept de « seconde modernité » proposé par le sociologue allemand Ulrich Beck. Ce concept souligne la dissémination du risque et la manière dont celle-ci invalide les marchés conclus par la « première modernité » entre l’avenir et le présent, entre l’intérieur du corps et l’extérieur. Cet article entend montrer que Beck fournit un cadre interprétatif utile à la compréhension de ces rapports, hors des impasses catégorielles que suscite l’opposition entre les deux régimes narratifs à l’œuvre dans le texte : le récit biographique, local et individuel, de la maladie de Laura Rowen Bodey, et l’histoire collective de l’entreprise Clare devenue conglomérat.This essay interprets Richard Powers' sixth novel Gain with reference to the German sociologist Ulrich Beck's concept of “second modernity.” The concept underscores the dispersal of risk and how it shreds promissory notes understood in “first modernity” between the future and present and the insides and outsides of the body. It argues that Beck supplies an apt interpretive framework for understanding these relationships and overcoming the categorical impasses between the two narrative words at work in Power's novel, the biographical situatedness of Laura Rowen Bodey's illness and the corporate history of the Clare conglomerate.

  13. Newtonian nudging for a Richards equation-based distributed hydrological model

    Science.gov (United States)

    Paniconi, Claudio; Marrocu, Marino; Putti, Mario; Verbunt, Mark

    The objective of data assimilation is to provide physically consistent estimates of spatially distributed environmental variables. In this study a relatively simple data assimilation method has been implemented in a relatively complex hydrological model. The data assimilation technique is Newtonian relaxation or nudging, in which model variables are driven towards observations by a forcing term added to the model equations. The forcing term is proportional to the difference between simulation and observation (relaxation component) and contains four-dimensional weighting functions that can incorporate prior knowledge about the spatial and temporal variability and characteristic scales of the state variable(s) being assimilated. The numerical model couples a three-dimensional finite element Richards equation solver for variably saturated porous media and a finite difference diffusion wave approximation based on digital elevation data for surface water dynamics. We describe the implementation of the data assimilation algorithm for the coupled model and report on the numerical and hydrological performance of the resulting assimilation scheme. Nudging is shown to be successful in improving the hydrological simulation results, and it introduces little computational cost, in terms of CPU and other numerical aspects of the model's behavior, in some cases even improving numerical performance compared to model runs without nudging. We also examine the sensitivity of the model to nudging term parameters including the spatio-temporal influence coefficients in the weighting functions. Overall the nudging algorithm is quite flexible, for instance in dealing with concurrent observation datasets, gridded or scattered data, and different state variables, and the implementation presented here can be readily extended to any of these features not already incorporated. Moreover the nudging code and tests can serve as a basis for implementation of more sophisticated data assimilation

  14. Study protocol

    DEFF Research Database (Denmark)

    Smith, Benjamin E; Hendrick, Paul; Bateman, Marcus

    2017-01-01

    avoidance behaviours, catastrophising, self-efficacy, sport and leisure activity participation, and general quality of life. Follow-up will be 3 and 6 months. The analysis will focus on descriptive statistics and confidence intervals. The qualitative components will follow a thematic analysis approach....... DISCUSSION: This study will evaluate the feasibility of running a definitive large-scale trial on patients with patellofemoral pain, within the NHS in the UK. We will identify strengths and weaknesses of the proposed protocol and the utility and characteristics of the outcome measures. The results from...... this study will inform the design of a multicentre trial. TRIAL REGISTRATION: ISRCTN35272486....

  15. Kitchenette: Hell or Home? Different"Kitchenette"Images Created by Richard Wright and Gwendolyn Brooks%Kitchenette:Hell or Home?Different"Kitchenette"Images Created by Richard Wright and Gwendolyn Brooks

    Institute of Scientific and Technical Information of China (English)

    肖志宏

    2017-01-01

    How the southern black migrants navigate and survive the northern urban space is a question profoundly explored and realistically documented in many migration narratives in African American literature. This paper concentrates on the image of Chicago"kitchenette"in the works of Richard Wright and Gwendolyn Brooks, in an attempt to demonstrate the different inter-pretations of migrant spaces on the urban landscape.

  16. Richard J. Hill, Picturing Scotland through the Waverley Novels: Walter Scott and the Origins of the Victorian Illustrated Novel.

    Directory of Open Access Journals (Sweden)

    Jacqueline Irene Cannata

    2012-10-01

    Full Text Available Richard J. Hill, Picturing Scotland through the Waverley Novels: Walter Scott and the Origins of the Victorian Illustrated Novel . Farnham, Surrey, and Burlington, VT: Ashgate, 2010. Pp. 236. ISBN 978-0-7546-6806-0. US$99.99.

  17. Dr. Richard J. Whelan: Seeing the Field of Emotional and Behavior Disorders through the Lens of a Pioneer

    Science.gov (United States)

    Kaff, Marilyn S.; Teagarden, Jim; Zabel, Robert H.

    2011-01-01

    Dr. Richard J. Whelan is a distinguished professor emeritus at the University of Kansas. His earliest professional experiences were at the Children's Hospital (Southard School) of the Menninger Clinic, where he served as a recreational therapist, teacher, and director of education. During his career at the University of Kansas and the KU Medical…

  18. A soil moisture accounting-procedure with a Richards' equation-based soil texture-dependent parameterization

    Science.gov (United States)

    Given a time series of potential evapotranspiration and rainfall data, there are at least two approaches for estimating vertical percolation rates. One approach involves solving Richards' equation (RE) with a plant uptake model. An alternative approach involves applying a simple soil moisture accoun...

  19. Richards Bay Mesometeorological Data – Vertical profiles of air temperature and wind velocity and surface wind statistics.

    CSIR Research Space (South Africa)

    Scholtz, MT

    1978-03-01

    Full Text Available This report details the experimental methods and data obtained in the course of a study of the movement of stable air over a complex region. The field work was carried out in the Richards Bay area on the Natal Coast during the period May to August...

  20. Muusikamaailm : Suur klaveripidu Ruhrimaal. Kissingeni festival tippudega. Sulasoli 80. aastapäev. Richard Rodgers 100 / Priit Kuusk

    Index Scriptorium Estoniae

    Kuusk, Priit, 1938-

    2002-01-01

    6. juuni-17. augustini Ruhrimaal toimuvast klaverifestivalist. Bad Kissingenis toimuvatest suvepidustustest. Soome Lauljate ja Mängijate Liit tähistab asutamise 80. aastapäeva. Helilooja Richard Rodgersi sünnist möödub 100 aastat

  1. Efficacy Quotient Tindakan ESWL Piezolith Richard Wolf 3000 pada Penderita Batu Ureter di RSUPN Dr. Cipto Mangunkusumo, 2008–2011

    Directory of Open Access Journals (Sweden)

    Vinny Verdini

    2017-01-01

    Full Text Available Extracorporeal shockwave lithotripsy (ESWL saat ini telah menjadi metode yang paling umum dalam tatalaksana aktif batu ureter. Sejak Maret 2008, RSCM telah menggunakan mesin ESWL piezolith 3000 richard wolf dan belum diketahui nilai efficacy quotient (EQ. Penelitian ini bertujuan untuk menentukan nilai EQ dari tindakan ESWL menggunakan mesin piezolith richard wolf 3000 pada batu ureter dan hubungan angka bebas batu dengan lokasi batu, jumlah batu, beban batu, opasitas batu, obstruksi, dan fungsi ginjal. Studi cross sectional ini dilakukan pada bulan Januari 2008-Desember 2011 dan data dianalisis dengan statistik multivariat. Terdapat 113 (95 % dari 119 pasien yang dinyatakan bebas batu setelah tindakan ESWL pertama. Didapatkan nilai EQ 0,89. Hanya ukuran batu yang mempengaruhi angka bebas batu dalam penelitian ini (p<0,05. Disimpulkan bahwa prosedur ESWL menggunakan mesin richard wolf piezolith 3000 memiliki nilai EQ dan angka bebas batu yang lebih baik daripada mesin-mesin sebelumnya dan mesin lain yang sejenis. Faktor yang mempengaruhi keberhasilan adalah ukuran batu ureter yang ditatalaksana.Kata Kunci: batu ureter, ESWL, efficacy quotient, angka bebas batu. Efficacy Quotient of ESWL Piezolith Richard Wolf 3000 Machine in Patientswith Ureteral Stones in Dr. Cipto MangunkusumoNational Hospital 2008 - 2011AbstractExtracorporeal shockwave lithotripsy (ESWL is the most common method of ureteral stone management. Since 2008, RSCM has ben using ESWL piezolith 3000 richard wolf and efficacy quotient (EQ value have not yet studied. The study aims was to determine the efficacy quotient (EQ of ESWL using piezolith richard wolf 3000 machine for ureteral stone by analyzing free-stone rate with location of stones, number of stones, stone burden, stone opacity, obstruction and kidney function. This cross sectional study was carried out in January 2008-December 2011, with multivariate analytical study. Ninety five percent (n=113 of 119 patients were

  2. Beyond protocols

    DEFF Research Database (Denmark)

    Vanderhoeven, Sonia; Branquart, Etienne; Casaer, Jim

    2017-01-01

    Risk assessment tools for listing invasive alien species need to incorporate all available evidence and expertise. Beyond the wealth of protocols developed to date, we argue that the current way of performing risk analysis has several shortcomings. In particular, lack of data on ecological impact...... information on risk and the exploration of improved methods for decision making on biodiversity management. This is crucial for efficient conservation resource allocation and uptake by stakeholders and the public......., transparency and repeatability of assessments as well as the incorporation of uncertainty should all be explicitly considered. We recommend improved quality control of risk assessments through formalized peer review with clear feedback between assessors and reviewers. Alternatively, a consensus building...

  3. PREFACE: Celebrating 20 years of Journal of Physics: Condensed Matter—in honour of Richard Palmer Celebrating 20 years of Journal of Physics: Condensed Matter—in honour of Richard Palmer

    Science.gov (United States)

    Ferry, David; Dowben, Peter; Inglesfield, John

    2009-11-01

    This year marks the 20th anniversary of the launch of Journal of Physics: Condensed Matter in 1989. The journal was formed from the merger of Journal of Physics C: Solid State Physics and Journal of Physics F: Metal Physics which had separated in 1971. In the 20 years since its launch, Journal of Physics: Condensed Matter has more than doubled in size, while raising standards. Indeed, Journal of Physics: Condensed Matter has become one of the leading scientific journals for our field. This could not have occurred without great leadership at the top. No one has been more responsible for this growth in both size and quality than our Senior Publisher, Richard Palmer. Richard first started work at IOP in March 1971 as an Editorial Assistant with J. Phys. B After a few months, he transferred to J. Phys.C The following year, the Assistant Editor of J. Phys. C, Malcolm Haines, left suddenly in order to work on his family vineyard in France, and Richard stepped into the breach. In those days, external editors had a much more hands-on role in IOP Publishing and he had to travel to Harwell to be interviewed by Alan Lidiard, the Honorary Editor of J. Phys. C, before being given the job of Assistant Editor permanently. Since J. Phys. C and J. Phys. F re-merged to form Journal of Physics: Condensed Matter, Richard gradually shed his other journal responsibilities, except for Reports on Progress in Physics, to build up Journal of Physics: Condensed Matter. He has worked closely with four Editors-in-Chief of J. Phys. C and five of Journal of Physics: Condensed Matter. When Richard announced his retirement this past winter, we met it with a great deal of both happiness and sadness. Of course, we are happy that he is going to be allowed to enjoy his retirement, but we remain very sad to lose such a valuable member of our team, especially the one who had provided the heart and soul of the journal over its 20 years. We will be able to rely upon the team which Richard ably trained as

  4. Richards growth model and viability indicators for populations subject to interventions

    Directory of Open Access Journals (Sweden)

    Selene Loibel

    2010-12-01

    Full Text Available In this work we study the problem of modeling identification of a population employing a discrete dynamic model based on the Richards growth model. The population is subjected to interventions due to consumption, such as hunting or farming animals. The model identification allows us to estimate the probability or the average time for a population number to reach a certain level. The parameter inference for these models are obtained with the use of the likelihood profile technique as developed in this paper. The identification method here developed can be applied to evaluate the productivity of animal husbandry or to evaluate the risk of extinction of autochthon populations. It is applied to data of the Brazilian beef cattle herd population, and the the population number to reach a certain goal level is investigated.Neste trabalho estudamos o problema de identificação do modelo de uma população utilizando um modelo dinâmico discreto baseado no modelo de crescimento de Richards. A população é submetida a intervenções devido ao consumo, como no caso de caça ou na criação de animais. A identificação do modelo permite-nos estimar a probabilidade ou o tempo médio de ocorrência para que se atinja um certo número populacional. A inferência paramétrica dos modelos é obtida através da técnica de perfil de máxima verossimilhança como desenvolvida neste trabalho. O método de identificação desenvolvido pode ser aplicado para avaliar a produtividade de criação animal ou o risco de extinção de uma população autóctone. Ele foi aplicado aos dados da população global de gado de corte bovino brasileiro, e é utilizado na investigação de a população atingir um certo número desejado de cabeças.

  5. Who invented the dichotomous key? Richard Waller's watercolors of the herbs of Britain.

    Science.gov (United States)

    Griffing, Lawrence R

    2011-12-01

    On 27 March 1689, Richard Waller, Fellow and Secretary of the Royal Society presented his "Tables of the English Herbs reduced to such an order, as to find the name of them by their external figures and shapes" to his assembled colleagues at a meeting of the Royal Society. These tables were developed for the novice by being color images, composed in pencil and watercolor, of selected plants and their distinguishing characteristics. The botanical watercolors for the tables are now a Turning-the-Pages document online on the website of the Royal Society. However, for the past 320 years, the scientific context for the creation of these outstanding botanical watercolors has remained obscure. These tables were developed by Waller as an image-based dichotomous key, pre-dating by almost 100 years the text-based dichotomous keys in the first edition of Flora Française (1778) by Jean Baptiste Lamarck, who is generally given priority for the development of the dichotomous key. How these large folio images were arranged to illustrate a dichotomous key is unknown, but an arrangement based on Waller's description is illustrated here as leaf-ordering for the separate hierarchical clusters (tables). Although only 24 species of watercolored dicot herbs out of a total of 65 in the set of watercolors (the others being monocots) are used in these tables, they are a "proof of concept", serving as models upon which a method is based, that of using a key composed of dichotomous choices for aiding identification.

  6. Símbolo y forma: los hermanos Grimm en Richard Wagner

    Directory of Open Access Journals (Sweden)

    Miguel Salmerón Infante

    2015-05-01

    Full Text Available Este escrito estudia el cómo y el porqué de la presencia de los Cuentos de los Hermanos Grimm en la obra de Richard Wagner. Para dar un enfoque más concreto a esta reflexión el análisis se centra en Sigfrido, el drama musical de Wagner con más atmósfera de cuento, y las influencias y préstamos temáticos, formales y lingüísticos que le aportan los KHM. El artículo entiende que hay dos elementos que aprovecha Wagner de los Grimm para sus dramas musicales. El símbolo para su proyecto de tejido de la identidad alemana. Y la forma del cuento con sus temas y fórmulas recurrentes que el aplicó a su música y muy concretamente al Leitmotiv. Todo ello sin olvidar la muy frecuente presencia de la figura del huérfano tanto en Wagner como en los Grimm.  

  7. Staging Unincorporated Power: Richard Harding Davis and the Critique of Imperial News

    Directory of Open Access Journals (Sweden)

    Nirmal Trivedi

    2011-12-01

    Full Text Available This essay contextualizes the work of war correspondent Richard Harding Davis within an evolving “imperial news apparatus” that would culminate in his reporting of the Spanish-American War. Critics have conventionally framed Davis squarely within the imperial cause, associating him with his admirer Roosevelt and naval admiral Alfred T. Mahan. Contrary to readings of Davis as an apologist for US imperialism, Trivedi contends that Davis understood how US imperial power relied on an information apparatus to communicate to an increasingly media-conscious American public through culture, that is, via familiar narratives, symbols, and objects—what Trivedi calls “imperial news.” The essay follows Davis’s development from his fictional representation of the new war correspondent in “The Reporter Who Made Himself King” to his own war correspondence before and after the Spanish-American War as collected in the memoirs A Year from a Reporter’s Notebook (1897, Cuba in War Time (1897, and Notes of a War Correspondent (1912. Davis’s war correspondence and fictional work effectively stage US imperialism as “unincorporated power”: that is, as power reliant on a developing news-making apparatus that deploys particular discursive strategies to validate its political claims. This staging critiques strategies of US imperial sovereignty—specifically its “privatization of knowledge” and its promotion of the war correspondent as nothing more than a spectator and purveyor of massacres.

  8. Meeting to honor F. Richard Stephenson on his 70th birthday

    CERN Document Server

    Green, David; Strom, Richard

    2015-01-01

    This book contains papers from a conference held to celebrate the 70th birthday of one of the world’s foremost astronomical historians, Professor F. Richard Stephenson, the latest recipient of the American Astronomical Society’s highest award for research in astronomical history, the LeRoy Doggett Prize. Reflecting Professor Stephenson’s extensive research portfolio, this book brings together under one cover papers on four different areas of scholarship: applied historical astronomy (which Stephenson founded); Islamic astronomy; Oriental astronomy; and amateur astronomy.  These papers are penned by astronomers from Canada, China, England, France, Georgia, Iran, Japan, Lebanon, the Netherlands, Portugal, Thailand and the USA. Its diverse coverage represents a wide cross-section of the history of astronomy community.  Under discussion are ways in which recent research using historical data has provided new insights into auroral and solar activity, supernovae and changes in the rotation rate of the E...

  9. Against the Nihilism of Suffering and Death: Richard E. K. Kim and His Works

    Directory of Open Access Journals (Sweden)

    Jooyeon Rhee

    2016-03-01

    Full Text Available This article examines the life and works of Richard E. K. Kim (1932–2009, a first-generation Korean diasporic writer in the United States. It focuses on how Kim struggled to overcome the nihilism of suffering and death that derived from colonialism and the Korean War through his literary works. Kim witnessed firsthand these two major historical events, which caused irrevocable psychological and physical damage to many people of his generation. In his autobiographical fiction, he conveys painful memories of the events by reviving the voices of people in that era. What his works offer us goes beyond vivid memories of the past, however; they also present the power of forgiveness as a condition to overcome the nihilism of suffering and death. Remembrance and forgiveness are, therefore, two major thematic pillars of his works that enable us to connect to these difficult and traumatic times. These themes are portrayed in such a gripping way mainly because Kim tried to maintain a certain distance—an emotional and linguistic distance—from the familiar, in order to elucidate the reality of the human condition: an ontological position of the exile from which he produced his works. This article argues that Kim’s works provide us the possibility to transcend the nihilism of historical trauma through articulating the meaning of remembrance and forgiveness from his self-assumed position of exile.

  10. Providing the physical basis of SCS curve number method and its proportionality relationship from Richards' equation

    Science.gov (United States)

    Hooshyar, M.; Wang, D.

    2016-12-01

    The empirical proportionality relationship, which indicates that the ratio of cumulative surface runoff and infiltration to their corresponding potentials are equal, is the basis of the extensively used Soil Conservation Service Curve Number (SCS-CN) method. The objective of this paper is to provide the physical basis of the SCS-CN method and its proportionality hypothesis from the infiltration excess runoff generation perspective. To achieve this purpose, an analytical solution of Richards' equation is derived for ponded infiltration in shallow water table environment under the following boundary conditions: 1) the soil is saturated at the land surface; and 2) there is a no-flux boundary which moves downward. The solution is established based on the assumptions of negligible gravitational effect, constant soil water diffusivity, and hydrostatic soil moisture profile between the no-flux boundary and water table. Based on the derived analytical solution, the proportionality hypothesis is a reasonable approximation for rainfall partitioning at the early stage of ponded infiltration in areas with a shallow water table for coarse textured soils.

  11. Unreliability and the Animal Narrator in Richard Adams’s The Plague Dogs

    Directory of Open Access Journals (Sweden)

    Anja Höing

    2017-03-01

    Full Text Available Richard Adams’s talking animal story The Plague Dogs (1978, with its deeply genre-atypical mode of narration, offers a multiplicity of avenues to explore the literary animal as animal. The story draws much of its power from the psychological complexity and related unreliability of both canine narrators, two research lab escapees gone feral. Both the terrier Snitter and the black mongrel Rowf are mentally ill and experience a highly subjective, part-fantastic world. In episodes of zero focalization, a sarcastic voice comments on the plot from the off, aggressively attacking a thoroughly anthropocentric superstructure the protagonists themselves are oblivious of, and presenting all that is normally constructed as “rational” in the implied reader’s world as a carnivalesque farce. Combining these equally unreliable narratives, The Plague Dogs creates a unique mixture of what Phelan (2007 calls “estranging” and “bonding” unreliability and brings to light the devastating consequences of anthropocentrism. The Plague Dogs not only defamiliarizes a genre usually committed to conventional means of storytelling, but the dominant Western conception of the status of animals in the world, showing that once we start to read the animal as animal, this sets into motion an avalanche of other concepts in need of re-reading, among them the very ones making up the fundamental pillars of Western societies’ anthropocentric self-conception.

  12. Perbandingan antara Etika Jürgen Habermas dan Richard Rorty sebagai Prinsip Dasar Bertindak Manusia

    Directory of Open Access Journals (Sweden)

    Dominique Rio Adiwijaya

    2010-10-01

    Full Text Available Ethics without doubt is an issue in every scientific field. Questions on ethics are not merely questions on the responsibility of one or two specific individuals, but rather as what have been defined accurately by Immanuel Kant in Critique of Practical Reason – as question of all humanity as a thinking creature and the freedom of choice on, “what should I do”. From Kant’s definition, we may infer that if human can not think and not free in determining their choice, it would be almost impossible to hope for moral responsibility. However this article does not mean to give a full and historical description on ethics, but a sketch on discourse of contemporary ethics which is represented by two famous philosophers, Jürgen Habermas from the tradition of  Critical Theory from Frankfurt School, dan Richard Rorty with “Neo-Pragmatism”. Habermas proposes “discourse ethics” while Rorty proposes ethic concepts through his “liberal-ironists”. It is hoped that the assembly of readers may gain an insight of the unavoidable ethics problems since every ethical position must be theory laden and the theory itself has historical characteristics (the characteristics, origin and historical context of the schools behind it. Therefore ethics is a neverending reflection although it has been started from 2500 years ago. Ethics invites us from specific sciences to enter its general discourse which unavoidably all-encompassing in its nature. 

  13. Richard Rorty:From Anti-metaphysical Neo-Pragmatism to Rejection of Philosophy

    Directory of Open Access Journals (Sweden)

    M. Akrami

    2010-01-01

    Full Text Available Richard Rorty is a neo-Pragmatist philosopher. For three decades, he has attacked the traditional philosophy (from Plato to Kant as well as any other epistemology searching for truth or claiming to mirror the nature in his philosophical works. Rorty holds that, according to the history of philosophy in his reading, there is no final answer to the traditional questions concerning knowledge, truth, and representation. These questions, therefore, should be dissolved and denied. He maintains that knowledge is justified belief, justification, however, being not the consequence of some correspondence between the theory or the statement, but the consequence of conversation, social practice, group consensus, and social solidarity. Rorty also thinks that democracy has priority on philosophy, disagreeing with the thesis that philosophy is the foundation of the rest of culture.Despite of usefulness of some elements and implications of Rorty’s metaphilosophy (such as his emphasis on freedom, democracy, and pluralism as well as his insisting on philosophical humility and avoiding scientific pride, it is faced with several problems, including 1 ignoring the referential and realist features of language, 2 confusing interpretation and reality, 3 eliminating the border between objectivity and subjectivity, 4 interfering of public and private life, and 5 ignoring the need of science, culture, technology and, in particular, politics, in philosophy. The authors try to show and analyze some elements of these problems.

  14. Has David Howden Vindicated Richard von Mises’s Definition of Probability?

    Directory of Open Access Journals (Sweden)

    Mark R. Crovelli

    2009-11-01

    Full Text Available In my recent article on these pages (Crovelli 2009 I argued that members of the Austrian School of economics have adopted and defended a faulty definition of probability. I argued that the definition of probability necessarily depends upon the nature of the world in which we live. I claimed that if the nature of the world is such that every event and phenomenon which occurs has a cause of some sort, then probability must be defined subjectively; that is, “as a measure of our uncertainty about the likelihood of occurrence of some event or phenomenon, based upon evidence that need not derive solely from past frequencies of ‘collectives’ or ‘classes.’” I further claimed that the nature of the world is indeed such that all events and phenomena have prior causes, and that this fact compels us to adopt a subjective definition of probability.David Howden has recently published what he claims is a refutation of my argument in his article “Single Trial Probability Applications: Can Subjectivity Evade Frequency Limitations” (Howden 2009. Unfortunately, Mr. Howden appears to not have understood my argument, and his purported refutation of my subjective definition consequently amounts to nothing more than a concatenation of confused and fallacious ideas that are completely irrelevant to my argument. David Howden has thus failed in his attempt to vindicate Richard von Mises’s definition of probability.

  15. Blood, politics, and social science. Richard Titmuss and the Institute of Economic Affairs, 1957-1973.

    Science.gov (United States)

    Fontaine, Philippe

    2002-09-01

    Long before his last book, The Gift Relationship: From Human Blood to Social Policy, was published in early 1971, Richard M. Titmuss (1907-1973), a professor of social administration at the London School of Economics, had been a major figure in the debates over the welfare state. The Gift Relationship was the culmination of an eventful relationship with the Institute of Economic Affairs, a think tank that advocated the extension of rational pricing to social services. By arguing that the British system of blood procurement and distribution, based on free giving within the National Health Service, was more efficient than the partly commercialized American system, Titmuss intended to signal the dangers of the increasing commercialization of society. What made for the impact of his book, however, was not merely its argument that transfusion-transmitted infections were much more common with paid than with voluntary donors, but also its reflections on what it is that holds a society together. And here Titmuss argued that a "socialist" social policy, by encouraging the sense of community, played a central role. The eclecticism of Titmuss's work, together with its strong ethical and political flavor, makes it a rich and original account of the "social" at a time when heated debated over social policy, both in Britain and in the United States, raised the question of the division of labor among the social sciences.

  16. First record of the Asian diaptomid Neodiaptomus schmackeri (Poppe & Richard, 1892 (Crustacea: Copepoda: Calanoida in Europe

    Directory of Open Access Journals (Sweden)

    Giuseppe Alfonso

    2014-06-01

    Full Text Available Albania, as well as a great part of the Balkan area in general, still suffers a lack of environmental studies especially in limnological research. The Dumre plateau, in Central Albania, is characterized by an extraordinary high number of karst lakes in a small geographic area. Despite their environmental peculiarity, very few biological data are to date available for these lakes, none on the zooplankton. For this reason, 15 water bodies located in the central area of the plateau were selected for a preliminary limnological survey carried out in the years 2008-2011. Neodiaptomus schmackeri (Poppe & Richard, 1892, a diaptomid calanoid copepod characterized by a South-Eastern Palearctic - Oriental distribution, and the most widely spread Neodiaptomus species in Asia, was found in 8 lakes of the Dumre area. This finding represents the first record of the species, and of the entire genus Neodiaptomus, for Europe. Several environmental variables were measured to characterize the lakes, and the co-occurring planktonic crustaceans were also identified. Taxonomical drawings and descriptions of the main morphological features of both sexes are herein provided in order to compare the Albanian populations of N. schmackeri with those of the native distribution area of the species. The possible causes which determined the occurrence of this non-indigenous species in several Dumre lakes are discussed.

  17. Health Effects Due to Radionuclides Content of Solid Minerals within Port of Richards Bay, South Africa

    Directory of Open Access Journals (Sweden)

    Felix B. Masok

    2016-11-01

    Full Text Available This study assessed the radiological health hazards to various body organs of workers working within Transnet Precinct in Richards Bay in Kwazulu-Natal, South Africa due to radionuclide content of mineral ores often stored within the facility. Thirty samples were collected from five mineral ores (rock phosphate, rutile, zircon, coal and hematite and analyzed for 238U, 234U, 226Ra, 210Pb, 235U, 232Th, 228Ra, 228Th and 40K using delayed neutron activation analysis and low energy gamma spectroscopy. Rutile was found to be the most radioactive mineral ore within the facility with 210Pb concentration of 759.00 ± 106.00 Bq·kg−1. Effective annual dose rate in (mSv·y−1 delivered to different organs of the body: testes, bone marrow, whole body, lungs and ovaries from mineral ores were such that dose from mineral ores decreased in the order coal > rutile > rock phosphate > hematite > zircon. The organs with the highest received dose rate were the testes and this received dose was from coal. However, all of the calculated absorbed dose rates to organs of the body were below the maximum permissible safety limits.

  18. “This World Is Not My Home”: Richard Mouw and Christian Nationalism

    Directory of Open Access Journals (Sweden)

    Aaron Pattillo-Lunt

    2016-12-01

    Full Text Available American evangelicalism has often been punctuated by dual commitments to the United States and to God. Those commitments were strongest within politically conservative evangelicalism. Though representing a solid majority among professing evangelicals, conservatives could not speak for the movement as a whole. Politically progressive evangelicals, beginning in the 1960s, formed a dissenting opinion of the post-World War II revival of Christian nationalism. They dared to challenge American action abroad, noticeably during the Vietnam War. Their critique of Christian nationalism and conservative evangelicals’ close ties to the Republican Party led them to seek refuge in either progressive policies or the Democratic Party. A third, underexplored subgroup of evangelicalism rooted in reformed theology becomes important to consider in this regard. These reformed evangelicals sought to contextualize nationalism in biblical rather than partisan or political terms. This goal is championed well by Richard Mouw, resulting in a nuanced look at evangelical Christians’ difficult dual role as both citizens of the Kingdom of God and the United States.

  19. Poets/Trump/Philosophers: Reflections on Richard Rorty’s Liberalism, Ten Years after His Death

    Directory of Open Access Journals (Sweden)

    Giorgio Baruchello

    2017-08-01

    Full Text Available Starting with a prescient 1998 quote on the impending decline of US liberal democracy into right-wing, strong-man-based demagogy, this paper outlines Richard Rorty’s political philosophy, which I believe can help us understand perplexing political trends in today’s political reality well beyond the US alone. Specifically, I tackle three key-terms encapsulating the thrust of Rorty’s political philosophy, i.e. “liberalism of fear”, “bourgeois” and “postmodernism”. Also, I address a contraposition that explains how Rorty would approach and attempt to defend liberal democracy from contemporary right-wing, strong-man-based degenerations, namely the priority of “poetry” over “philosophy”. Essentially, if one wishes to win in the political arena, she must be armed with the most effective rhetorical weaponry, however good, solid and well-argued her political views may be. Finally, some remarks are offered on the role that “philosophy” can still play within the same arena.

  20. Arctic observers: Richard King, monogenism and the historicisation of Inuit through travel narratives.

    Science.gov (United States)

    Sera-Shriar, Efram

    2015-06-01

    In 1848 the ethnologist, surgeon and Arctic explorer Richard King (1810-1876) published a three-part series on Inuit in the Journal of the Ethnological Society of London. This series provided a detailed history of Inuit from the eleventh century to the early nineteenth century. It incorporated a mixture of King's personal observations from his experience travelling to the Arctic as a member of George Back's expedition (1833-1835), and the testimonies of other contemporary and historical actors who had written on the subject. The aim was to historicise Inuit through the use of travel reports and show persistent features among the race. King was a monogenist and his sensitive recasting of Inuit was influenced by his participation in a research community actively engaged in humanitarian and abolitionist causes. The physician and ethnologist Thomas Hodgkin (1798-1866) argued that King's research on Inuit was one of the best ethnological approaches to emulate and that it set the standard for the nascent discipline. If we are to take seriously Hodgkin's claim, we should look at how King constructed his depiction of Inuit. There is much to be gained by investigating the practices of nineteenth-century ethnologists because it strengthens our knowledge of the discipline's past and shows how modern understandings of races were formed. Copyright © 2015 Elsevier Ltd. All rights reserved.

  1. X-ray cross-sections and crossroads (The International Radiation Physics Society) - Richard Pratt's contributions to both

    International Nuclear Information System (INIS)

    Hubbell, J.H.

    2000-01-01

    Some examples of the impact of the theoretical contributions by Richard Pratt and his collaborators on photon cross section compilations at NBS/NIST and elsewhere over the past several decades are presented. Both the theoretical and measurement works which combine to provide this data base, and the contact with the varied user groups in medical applications, nuclear engineering, crystallography and X-ray astronomy, have formed a global crossroads of researchers now embodied in the International Radiation Physics Society (IRPS). Since the founding of the IRPS at the 3 rd International Symposium on Radiation Physics (ISRP-3) in Ferrara, Italy, in 1985, the Secretariat for this 'global radiation physics family' (the IRPS) has resided at the University of Pittsburgh under the direction of Richard Pratt. A brief account of the origins and history of the IRPS, beginning with ISRP-1 in Calcutta in 1974, is presented.

  2. X-ray cross-sections and crossroads (The International Radiation Physics Society) - Richard Pratt's contributions to both

    Science.gov (United States)

    Hubbell, J. H.

    2000-08-01

    Some examples of the impact of the theoretical contributions by Richard Pratt and his collaborators on photon cross section compilations at NBS/NIST and elsewhere over the past several decades are presented. Both the theoretical and measurement works which combine to provide this data base, and the contact with the varied user groups in medical applications, nuclear engineering, crystallography and X-ray astronomy, have formed a global crossroads of researchers now embodied in the International Radiation Physics Society (IRPS). Since the founding of the IRPS at the 3rd International Symposium on Radiation Physics (ISRP-3) in Ferrara, Italy, in 1985, the Secretariat for this ``global radiation physics family'' (the IRPS) has resided at the University of Pittsburgh under the direction of Richard Pratt. A brief account of the origins and history of the IRPS, beginning with ISRP-1 in Calcutta in 1974, is presented.

  3. Why Was General Richard O’Connor’s Command in Northwest Europe Less Effective Than Expected?

    Science.gov (United States)

    2011-03-01

    Commander of 7 Division and Military Governor of Jerusalem , September 1938- August 1939. ______. Papers of General Sir Richard O’Connor KT, GCB, DSO, MC...Montgomery, Brian. A Field Marshall in the Family: A Personal Biography of Montgomery of Alamein. New York: Taplinger, 1973. Montgomery, Field...Commanders: A Composite Biography . Combat Studies Institute publications, Fort Leavenworth, Kansas: U.S. Army Command and General Staff College, 1989

  4. Sufi, Christian or Buddhist? Richard Francis Burton’s “Parameters of Belief”

    Directory of Open Access Journals (Sweden)

    John Wallen

    2013-09-01

    Full Text Available Richard Burton has been interpreted and misinterpreted by literary critics as eminent as Edward Said and Louisa Pratt as well as by others such as Rana Kabbani and Reina Lewis. Biographers like Fawn Brody, Edward Rice, Mary Lovell and Jon Godsall have also had their say. Burton has been variously described as imperialist, sexist, gay, obssessed with pornography, racist, plagiarist, sexual libertine, scatologist, expert sociologist, profoundly deceitful and impotent. In spite of this negative press, interest in Burton is always high as his life and times are relevant to many scholars interested in the 19th century origins of modern thought and postcolonial ideas. In this paper presentation I will attempt to get beyond the confused and contradictory portrayals of Burton over the last 50 or so years by looking in some detail at Burton’s two long poems: Stone Talk and The Kasidah. In these works, published 15 years apart, Burton writes under pseudonyms and, as I will argue, is able to express many of his deepest beliefs, especially in The Kasidah where he is playing the part of Hadji Abu Al Yezid, a Sufi like-wise man who possesses some startling similarities to Burton himself. What emerges from this close examination of the texts is a sensitive relativist who, while adhering to the scientific method in all his practical dealings, is yet able to consider the possibility that everything we see around us and all our experience of the world might be, finally, nothing more than Maya and illusion.

  5. The Effect of Richard Wagner's Music and Beliefs on Hitler's Ideology

    Directory of Open Access Journals (Sweden)

    Carolyn S. Ticker

    2016-09-01

    Full Text Available The Holocaust will always be remembered as one of the most horrific and evil events in all of history. One question that has been so pervasive in regards to this historical event is the question of why. Why exactly did Hitler massacre the Jewish people? Why did he come to the conclusion that the Jews were somehow lesser than him, and that it was okay to kill them? What and who were his influences and how did they help form Hitler’s opinions leading up to the Holocaust? Although more than one situation or person influenced Hitler, I believe that one man in particular really helped contribute to Hitler’s ideas, especially about the Jewish people. This man is the famous musician Richard Wagner. While musicologists admit that Wagner was a musical genius, one aspect of his career that is hard to ignore is his strong antisemitism. In addition to speaking about his hatred for the Jews, he also wrote about it in his music, making it hard to glance over. Hitler had been close to the Wagner family, and had an obsessive, cult-like infatuation with Wagner’s music beginning in his childhood. This infatuation with Wagner’s music and his closeness to his later family helped facilitate and solidify his negative views about the Jewish people. In this paper I will explore the antisemitism that is within Wagner’s music and writing, and then I will discuss how Wagner’s antisemitism helped inform, influence, and shape Hitler’s ideas, indirectly assisting in the propagation of the Holocaust.

  6. Visiting Richard Serra’s Promenade sculpture improves postural control and judgment of subjective visual vertical.

    Directory of Open Access Journals (Sweden)

    Zoï eKapoula

    2014-12-01

    Full Text Available Body sway while maintaining an upright quiet stance reflects an active process of balance based on the integration of visual, vestibular, somatosensory and proprioceptive inputs. Richard Serra’s Promenade sculpture featured in the 2008 Monumenta exhibition at the Grand Palais in Paris, France is herein hypothesised to have stimulated the body’s vertical and longitudinal axes as it showcased 5 monumental rectangular solids pitched at a 1.69° angle.Using computerised dynamic posturography we measured the body sway of 23 visitors when fixating a cross, or when observing the artwork (fixating it or actively exploring it with eye movements before and after walking around and alongside the sculpture (i.e., before and after a promenade. A first fixation at the sculpture increased medio-lateral stability (in terms of spectral power of body sway. Eye movement exploration in the depth of the sculpture increased antero-posterior stability (in terms of spectral power and cancelling time of body sway at the expense of medio-lateral stability (in terms of cancelling time. Moreover, a medio-lateral instability associated with eye movement exploration before the promenade (in terms of body sway sensu stricto was cancelled after the promenade. Finally, the overall medio-lateral stability (in terms of spectral power increased after the promenade.Fourteen additional visitors were asked to sit in a dark room and adjust a luminous line to what they considered to be the earth-vertical axis. The promenade executed within the sculpted environment afforded by Serra’s monumental statuary works resulted in significantly improved performances on the subjective visual vertical test.We attribute these effects to the sculpted environment provided by the exhibition which may have acted as a kind of physiologic training ground thereby improving the visitors’ overall sense of visual perspective, equilibrium and gravity.

  7. Staging Unincorporated Power: Richard Harding Davis and the Critique of Imperial News

    Directory of Open Access Journals (Sweden)

    Nirmal Trivedi

    2011-12-01

    Full Text Available This essay contextualizes the work of war correspondent Richard Harding Davis within an evolving “imperial news apparatus” that would culminate in his reporting of the Spanish-American War. Critics have conventionally framed Davis squarely within the imperial cause, associating him with his admirer Roosevelt and naval admiral Alfred T. Mahan. Contrary to readings of Davis as an apologist for US imperialism, Trivedi contends that Davis understood how US imperial power relied on an information apparatus to communicate to an increasingly media-conscious American public through culture, that is, via familiar narratives, symbols, and objects—what Trivedi calls “imperial news.” The essay follows Davis’s development from his fictional representation of the new war correspondent in “The Reporter Who Made Himself King” to his own war correspondence before and after the Spanish-American War as collected in the memoirs A Year from a Reporter’s Notebook (1897, Cuba in War Time (1897, and Notes of a War Correspondent (1912. Davis’s war correspondence and fictional work effectively stage US imperialism as “unincorporated power”: that is, as power reliant on a developing news-making apparatus that deploys particular discursive strategies to validate its political claims. This staging critiques strategies of US imperial sovereignty—specifically its “privatization of knowledge” and its promotion of the war correspondent as nothing more than a spectator and purveyor of massacres.

  8. Charles Darwin, Richard Owen, and Natural Selection: A Question of Priority.

    Science.gov (United States)

    Johnson, Curtis N

    2018-05-03

    No single author presented Darwin with a more difficult question about his priority in discovering natural selection than the British comparative anatomist and paleontologist Richard Owen. Owen was arguably the most influential biologist in Great Britain in Darwin's time. Darwin wanted his approbation for what he believed to be his own theory of natural selection. Unfortunately for Darwin, when Owen first commented in publication about Darwin's theory of descent he was openly hostile (Edinb. Rev. vol. 111, Article VIII, 1860, pp. 487-533, anonymous). Darwin was taken off-guard. In private meetings and correspondence prior to 1860 Owen had been nothing but polite and friendly, even helping Darwin in cataloguing and analyzing Darwin's zoological specimens from the Beagle voyage. Every early indication predicted a life-long friendship and collaboration. But that was not to be. Owen followed his slashing review with a mounting campaign in the 1860s to denounce and discredit both Darwin and his small but ascendant circle of friends and supporters. But that was not enough for Owen. Starting in 1866, perhaps by now realizing Darwin had landed the big fish, Owen launched a new campaign, to claim the discovery of "Darwin's theory" for himself. Darwin naturally fought back, mainly in the "Historical Sketch" that he prefaced to Origin starting in 1861. But when we peel back the layers of personal animus and escalating vituperation we discover in fact their quarrel was generated more by mutual misunderstanding than scientific disagreement. The battle ended only when Darwin finally penetrated to the crux of the matter and put an end to the rivalry in 1872, in the final version of the Sketch.

  9. Morrow, Reiff, Receive 2013 Space Physics and Aeronomy Richard Carrington Awards: Response

    Science.gov (United States)

    Reiff, Patricia H.

    2014-08-01

    It is a special privilege to receive this award honoring Richard Carrington's discovery of what we now call space weather. It is particularly appropriate that this award also recognizes Cherilynn Morrow, who 20 years ago made a presentation to the Space Science Advisory Committee on Jeff Rosendhal's idea of mission-based E/PO. We worked together, bringing that idea to the successful, but threatened, network it is today. For me, learning and teaching go hand in hand—as we publish our findings for our peers, we should also repay the public investment in our research with accurate, understandable results. My interest in space science was sparked by a father-daughter course in astronomy sponsored by the Brownies at the Oklahoma City Planetarium and kindled by the Bell Labs production The Strange Case of the Cosmic Rays directed by Frank Capra. Knowing that planetarium shows and educational movies can change lives, I have devoted a large portion of my last 25 years to creating software, shows, and portable planetariums to inspire and engage youth. This has not been a one-person effort, of course. My work Cherilynn Ann Morrow would have been impossible without the collaboration of Carolyn Sumners, vice president of the Houston Museum of Natural Science. Our museum kiosk and planetarium control software would not have happened without the skill and perseverance of my chief programmer, Colin Law. Jim Burch has been first a mentor and then a colleague on both the research and outreach sides of my career. I share this honor with a long line of highly talented students and postdocs who have contributed science content and outreach efforts. Most importantly, without the support of my husband, Tom Hill, I would not have had the time and freedom to build an educational network while continuing research and raising a family. I thank AGU for bestowing this honor.

  10. The reliability of the German version of the Richards Campbell Sleep Questionnaire.

    Science.gov (United States)

    Krotsetis, Susanne; Richards, Kathy C; Behncke, Anja; Köpke, Sascha

    2017-07-01

    The assessment of sleep quality in critically ill patients is a relevant factor of high-quality care. Despite the fact that sleep disturbances and insufficient sleep management contain an increased risk of severe morbidity for these patients, a translated and applicable instrument to evaluate sleep is not available for German-speaking intensive care settings. This study aimed to translate the Richards Campbell Sleep Questionnaire (RCSQ), a simple and validated instrument eligible for measuring sleep quality in critically ill patients, and subsequently to evaluate the internal consistency of the German version of the RCSQ. Furthermore, it also aimed to inquire into the perception of sleep in a sample of critically ill patients. The RCSQ was translated following established methodological standards. Data were collected cross-sectionally in a sample of 51 patients at 3 intensive care units at a university hospital in Germany. The German version of the RCSQ showed an overall internal consistency (Cronbach's alpha) of 0·88. The mean of the RSCQ in the sample was 47·00 (SD ± 27·57). Depth of sleep was rated the lowest and falling asleep again the highest of the RCSQ sleep items. The study demonstrated very good internal consistency of the German version of the RCSQ, allowing for its application in practice and research in German-speaking countries. Quality of sleep perception was generally low in this sample, emphasizing the need for enhanced care concepts regarding the sleep management of critically ill patients. Relevance to clinical practice Assessment of self-perception of sleep is crucial in order to plan an individually tailored care process. © 2017 British Association of Critical Care Nurses.

  11. An Enlightenment proposal for music therapy: Richard Brocklesby on music, spirit, and the passions.

    Science.gov (United States)

    Gouk, Penelope

    2015-01-01

    In 1749, the London physician Richard Brocklesby (1722-1797) published his Reflections on Antient [sic] and Modern Musick, an essay that not only sought to compare these practices in terms of their effects, but also to gather evidence supporting the use of music in treating mania and other mental diseases. As might be expected, Brocklesby's discussion of music therapy has already received attention by authors looking back to the origins of this practice, not least because he offers an account of a successful musical cure that took place in his own time (Rorke, 2001). My chapter, however, seeks to broaden the discussion of the Reflections, in order to show how Brocklesby's projected musical cures fit into his larger worldview, one that was influenced as much by Plato and other ancient philosophers as it was by modern thinkers such as Isaac Newton and his followers. Brocklesby's argument was essentially that music acted as a link between the mind and body and therefore could restore their intrinsic harmony, a connection that was mediated by the animal spirits, which also served as the vehicle of the passions. The movements and proportions of music could arouse or quell the passions by their effect on these (imaginary) spirits, which flowed through the nerves and brain and acted as the agent for the mind or soul. I show how his account of music in antiquity led him to reflect on the way that music was perceived and responded to in his own time, both as a stimulus to mental and bodily action, and as a source of esthetic pleasure through the cultivation of musical taste. © 2015 Elsevier B.V. All rights reserved.

  12. An experimental 'Life' for an experimental life: Richard Waller's biography of Robert Hooke (1705).

    Science.gov (United States)

    Moxham, Noah

    2016-03-01

    Richard Waller's 'Life of Dr Robert Hooke', prefixed to his edition of Hooke's Posthumous Works (1705), is an important source for the life of one of the most eminent members of the early Royal Society. It also has the distinction of being one of the earliest biographies of a man of science to be published in English. I argue that it is in fact the first biography to embrace the subject's natural-philosophical work as the centre of his life, and I investigate Waller's reasons for adopting this strategy and his struggle with the problem of how to represent an early experimental philosopher in print. I suggest that Waller eschews the 'Christian philosopher' tradition of contemporary biography - partly because of the unusually diverse and fragmentary nature of Hooke's intellectual output - and draws instead upon the structure of the Royal Society's archive as a means of organizing and understanding Hooke's life. The most quoted phrase from Waller's biography is that Hooke became 'to a crime close and reserved' in later life; this essay argues that Waller's biographical sketch was fashioned in order to undo the effects of that reserve. In modelling his approach very closely on the structure of the society's records he was principally concerned with making Hooke's work and biography accessible, intelligible and useful to the fellowship in a context familiar to them, a context which had provided the institutional framework for most of Hooke's adult life. I argue that Waller's 'Life' was also intended to make the largest claims for Hooke's intellectual standing that the author dared in the context of the enmity between Hooke and Isaac Newton once the latter became president of the Royal Society. However, I also adduce fresh manuscript evidence that Waller actually compiled, but did not publish, a defence of Hooke's claim to have discovered the inverse square law of gravity, allowing us to glimpse a much more assertive biography of Hooke than the published version.

  13. Timothy Leary, Richard Alpert (Ram Dass) and the changing definition of psilocybin.

    Science.gov (United States)

    Wark, Colin; Galliher, John F

    2010-05-01

    This research focuses on the events leading to the 1968 U.S. federal prohibition of psilocybin. It is a study of duelling moral entrepreneurs-Timothy Leary and Richard Alpert vs. the Harvard University Administration. The goal is to show how the primary active compound in an ostensibly harmless fungus (the psilocybin mushroom) became controversial in less than a decade. We used books, newspapers, magazine articles and previously unpublished materials (including documents from the Harvard Archives) to analyze Leary and Alpert's lives and careers through the early 1970s. The prohibition of psilocybin in the U.S. was largely a product of Leary and Alpert's involvement in the "Harvard drug scandal" and their transformation from Harvard professors to countercultural icons. They tested the substance on a variety of human subjects and in doing so piqued the interest of Harvard undergraduates while drawing condemnation from other faculty and Harvard administrators. This case is theoretically interesting because unlike most illegal drugs, psilocybin was never linked to a threatening minority group, but to some of the nation's most privileged youth. The Harvard administrators were not really moral entrepreneurs but Leary and Alpert clearly were. Although they were far from being prohibitionists, they were self-righteous crusaders on different but equally holy missions for the good of young and minority Americans. Ironically, due to their successes the possession of psilocybin was criminalized under United States federal law in 1968 (Pub. L. No. 90-639, Stat. 1361 1968 and Boire, 2002). This case study demonstrates that crusaders can be successful in changing culture even when laws are passed in futile attempts to control their behaviour, just as Leary predicted. Copyright 2009 Elsevier B.V. All rights reserved.

  14. Richard Doll and Alice Stewart: reputation and the shaping of scientific "truth".

    Science.gov (United States)

    Greene, Gayle

    2011-01-01

    As the world watched the Fukushima reactors release radionuclides into the ocean and atmosphere, the warnings of Dr. Alice Stewart about radiation risk and the reassurances of Sir Richard Doll assumed renewed relevance. Doll and Stewart, pioneer cancer epidemiologists who made major contributions in the 1950s-he by demonstrating the link between lung cancer and smoking, she by discovering that fetal X-rays double the chance of a childhood cancer-were locked into opposition about low-dose radiation risk. When she went public with the discovery that radiation at a fraction of the dose "known" to be dangerous could kill a child, her reputation plummeted, whereas Doll, foremost among her detractors, was knighted and lauded as "the world's most distinguished medical epidemiologist" for his work. Their lives and careers, so closely intertwined, took contrary courses, he becoming "more of the establishment" (as he said), while she became more oppositional. When it was discovered, after his death, that he'd been taking large sums of money from industries whose chemicals he was clearing of cancer risk, his reputation remained unscathed; it is now enshrined in the "Authorized Biography" (2009) commissioned by the Wellcome Institute, along with Doll's denigration of Stewart as an "embittered" woman and biased scientist. Stewart lived long enough to see radiation science move her way, to see international committees affirm, in the 1990s, that there is no threshold beneath which radiation ceases to be dangerous; recent evidence from Chernobyl is bearing out her warnings. But a look at the making and breaking of these reputations reveals the power of status, position, and image to shape scientific "knowledge" and social policy.

  15. Exact and grid-free solutions to the Lighthill-Whitham-Richards traffic flow model with bounded acceleration for a class of fundamental diagrams

    KAUST Repository

    Qiu, Shanwen; Abdelaziz, Mohamed Ewis; Abdel Latif, Fadl Hicham Fadl; Claudel, Christian G.

    2013-01-01

    In this article, we propose a new exact and grid-free numerical scheme for computing solutions associated with an hybrid traffic flow model based on the Lighthill-Whitham-Richards (LWR) partial differential equation, for a class of fundamental

  16. Süüme sundis vabrikujuhti palgatööliseks jääma / Richard Mutso ; interv. Jüri Saar

    Index Scriptorium Estoniae

    Mutso, Richard, 1933-

    2003-01-01

    Intervjuu Võru mööblitehase Wermo peadirektorina töötanud, praeguse tehase nõukogu liikme Richard Mutsoga tehase juhtimisest, euroreferendumist, eraelust. Kommenteerivad: Silva Mutso, Veljo Ipits

  17. Justiça e sociedade liberal em Richard Rorty: justiça como lealdade e o projeto social de uma utopia

    Directory of Open Access Journals (Sweden)

    Marcelo de Almeida Silva

    2014-07-01

    Full Text Available O presente texto pretende explorar o conceito de justiça de Richard Rorty e a proposta da Utopia Liberal que o autor apresenta. Para tanto, explora, dentro da obra de Richard Rorty e de alguns autores com quem dialoga, contribuições para o debate da concepção do termo Justiça como um senso de lealdade ampliada e de sua proposta para uma sociedade mais justa, igualitária e inclusiva.   Abstract: This paper aims to explore the concept of justice from Richard Rorty and his proposal about the idea of a Liberal Utopia. With this goal we seek, within the work of Richard Rorty, and some authors with whom he converses, contributions to the discussion of the conception of justice as an expanded sense of loyalty and his proposal for a fairer, equitable and inclusive society.   Resumen: Este trabajo se propone explorar el concepto de justicia de Richard Rorty y la propuesta de liberal utopía que el autor presenta. Con este objetivo, vamos a buscar en la obra de Richard Rorty, y algunos autores con los que conversa, contribuciones a la discusión sobre la concepción de la justicia como un sentido más amplio de la lealtad y su propuesta de una sociedad más justa, equitativa e incluyente.

  18. Vertical Protocol Composition

    DEFF Research Database (Denmark)

    Groß, Thomas; Mödersheim, Sebastian Alexander

    2011-01-01

    The security of key exchange and secure channel protocols, such as TLS, has been studied intensively. However, only few works have considered what happens when the established keys are actually used—to run some protocol securely over the established “channel”. We call this a vertical protocol.......e., that the combination cannot introduce attacks that the individual protocols in isolation do not have. In this work, we prove a composability result in the symbolic model that allows for arbitrary vertical composition (including self-composition). It holds for protocols from any suite of channel and application...

  19. The effects of coal dust on photosynthetic performance of the mangrove, Avicennia marina in Richards Bay, South Africa

    International Nuclear Information System (INIS)

    Naidoo, G.; Chirkoot, D.

    2004-01-01

    Richards Bay, on the northern KwaZulu-Natal coast, is the largest coal exporting port in South Africa. The coal is stored at the Richards Bay Coal Terminal (RBCT) prior to export. Dust from coal operations is a major problem in the Richards Bay area. In this study, we tested the hypothesis that coal dust adversely affects photosynthetic performance of Avicennia marina (Forssk.) Vierh., the dominant mangrove species in the harbour. Photosynthetic performance was determined on 10 trees by measuring carbon dioxide uptake and chlorophyll fluorescence parameters at two elevation sites and on upper and lower leaf surfaces that were covered or uncovered with coal dust. Measurements were made on five clear, sunny days at saturating light (>1000 μmol m -2 s -1 ) and high temperature (28-30 deg. C). Coal dust significantly reduced carbon dioxide exchange of upper and lower leaf surfaces by 17-39%, the reduction being generally greater on the lower leaf surface that is covered by a dense mat of trichomes and salt glands. The reduction in carbon dioxide exchange by coal dust was higher at the high elevation site that supported isolated dwarfed trees. The chlorophyll fluorescence data indicated that leaves coated with dust exhibited significantly lower photosystem II (PS II) quantum yield, lower electron transport rate (ETR) through PSII and reduced quantum efficiency of PSII (F v F m ). The chlorophyll fluorescence data supported the gas exchange measurements and are consistent with reduced photosynthetic performance of leaves coated with coal dust. - Coal dust reduced photosynthetic performance of the mangrove, Avicennia marina

  20. O ateísmo de Richard Dawkins nas fronteiras da ciência evolucionista e do senso comum

    OpenAIRE

    Franco, Clarissa de

    2014-01-01

    O objeto de estudo consiste nas principais ideias ateístas de Richard Dawkins e na recepção destas por parte dos ateus inseridos na cultura brasileira. Dawkins é um dos principais divulgadores e militantes do movimento ateísta da atualidade, e a despeito de sua faceta pública divulgada em sites mundiais e em livros de reconhecido sucesso existem debates do autor, concernentes aos espaços acadêmicos e restritos a cientistas, que nem sempre se apresentam congruentes às suas e...

  1. Genetics and the origin of species: the continuing synthesis a symposium in honor of Richard G. Harrison

    Science.gov (United States)

    Grosberg, Richard K.; Rand, David M.; Normark, Benjamin B.

    2013-01-01

    This is a special issue of Genetica that has its origins in a symposium held in honor of Richard G. Harrison at Ithaca, New York on July 22–23. Former students of Rick Harrison organized the symposium and most of the speakers were former students, as well. The quality and breadth of the talks were a testament to Rick’s influence as a thinker, synthesizer, and mentor and it is only appropriate to reflect on Rick’s contributions to the fields of evolutionary ecology, systematics, and genetics in this preface to the symposium articles. PMID:21152955

  2. The ISS flight of Richard Garriott: a template for medicine and science investigation on future spaceflight participant missions.

    Science.gov (United States)

    Jennings, Richard T; Garriott, Owen K; Bogomolov, Valery V; Pochuev, Vladimir I; Morgun, Valery V; Garriott, Richard A

    2010-02-01

    A total of eight commercial spaceflight participants have launched to the International Space Station (ISS) on Soyuz vehicles. Based on an older mean age compared to career astronauts and an increased prevalence of medical conditions, spaceflight participants have provided the opportunity to learn about the effect of space travel on crewmembers with medical problems. The 12-d Soyuz TMA-13/12 ISS flight of spaceflight participant Richard Garriott included medical factors that required preflight intervention, risk mitigation strategies, and provided the opportunity for medical study on-orbit. Equally important, Mr. Garriott conducted extensive medical, scientific, and educational payload operations during the flight. These included 7 medical experiments and a total of 15 scientific projects such as protein crystal growth, Earth observations/photography, educational projects with schools, and amateur radio. The medical studies included the effect of microgravity on immune function, sleep, bone loss, corneal refractive surgery, low back pain, motion perception, and intraocular pressure. The overall mission success resulted from non-bureaucratic agility in mission planning, cooperation with investigators from NASA, ISS, International Partners, and the Korean Aerospace Research Institute, in-flight support and leadership from a team with spaceflight and Capcom experience, and overall mission support from the ISS program. This article focuses on science opportunities that suborbital and orbital spaceflight participant flights offer and suggests that the science program on Richard Garriott's flight be considered a model for future orbital and suborbital missions. The medical challenges are presented in a companion article.

  3. The French dosimetry protocol

    International Nuclear Information System (INIS)

    Dutreix, A.

    1985-01-01

    After a general introduction the protocol is divided in five sections dealing with: determination of the quality of X-ray, γ-ray and electron beams; the measuring instrument; calibration of the reference instrument; determination of the reference absorbed dose in the user's beams; determination of the absorbed dose in water at other points, in other conditions. The French protocol is not essentially different from the Nordic protocol and it is based on the experience gained in using both the American and the Nordic protocols. Therefore, only the main difference with the published protocols are discussed. (Auth.)

  4. Protocol Implementation Generator

    DEFF Research Database (Denmark)

    Carvalho Quaresma, Jose Nuno; Probst, Christian W.

    2010-01-01

    Users expect communication systems to guarantee, amongst others, privacy and integrity of their data. These can be ensured by using well-established protocols; the best protocol, however, is useless if not all parties involved in a communication have a correct implementation of the protocol and a...... Generator framework based on the LySatool and a translator from the LySa language into C or Java....... necessary tools. In this paper, we present the Protocol Implementation Generator (PiG), a framework that can be used to add protocol generation to protocol negotiation, or to easily share and implement new protocols throughout a network. PiG enables the sharing, verification, and translation...

  5. Shakespeare for all Seasons ? Richard II en Avignon : de Jean Vilar (1957 à Ariane Mnouchkine (1982 Shakespeare for All Seasons? Richard II at the Avignon Festival: from Jean Vilar (1957 to Ariane Mnouchkine (1982

    Directory of Open Access Journals (Sweden)

    Isabelle Schwartz-Gastine

    2009-06-01

    Full Text Available Richard II has not often been performed on the French stage; however, in the 20th century, within a period of 35 years, two productions premiered at the same venue (the Cour d’Honneur at the open-air Avignon Festival, were so successful that they became emblematic of their times. In 1947 Jean Vilar opened the first Avignon Festival with an ascetic, charismatic eponymous hero who came to an inner knowledge of himself in his bare prison cell; in 1982 Ariane Mnouchkine offered a splendid visual display by transposing the play into the kabuki tradition; this offered the audience breath-taking and dynamic tableaux of elaborate court ceremonies and rebellious lords.At such a distance in time, the English medieval code of honour was dealt with according to completely different theatrical principles of ethics and aesthetics, mirroring the changes in perspective within French society.

  6. Entre el Dios de Paley y el Dios de Bonnet: El Parco Evolucionismo Teísta de Richard Owen

    Directory of Open Access Journals (Sweden)

    Gustavo Caponi

    2013-04-01

    Full Text Available Firstly, in this article it is examined the nature of the putative remarks concerning evolution of species that are found in the works that Richard Owen published before 1858; and then it is made the same thing with the few and vague evolutionist conjectures that Owen certainly made after the public presentation of Natural Selection Theory. Regarding the former topic, the goal will be to highlight the ambiguity of those Owen’s remarks, and concerning the latter topic what is looked for is to show that, when he explained his transmutationist thesis, Owen didn’t go beyond a pious theistic evolutionism, without postulating any mechanism of evolutionary change and remaining faithful to Design Theology praised by Paley.

  7. Entre el Dios de Paley y el Dios de Bonnet: El Parco Evolucionismo Teísta de Richard Owen

    OpenAIRE

    Gustavo Caponi

    2013-01-01

    http://dx.doi.org/10.5007/1808-1711.2013v17n1p71En primer lugar, en este artículo se examina el carácter de las putativas referencias a la evolución de las especies que encontramos en las obras que Richard Owen publicó antes de 1858; y luego se analizan las escazas y vagas conjeturas evolucionistas que Owen sin duda formuló con posterioridad a la presentación pública de la Teoría de la Selección Natural.  En lo que respecta a lo primero, el objetivo es subrayar la ambigüedad de esas referenci...

  8. Exact solutions to traffic density estimation problems involving the Lighthill-Whitham-Richards traffic flow model using mixed integer programming

    KAUST Repository

    Canepa, Edward S.; Claudel, Christian G.

    2012-01-01

    This article presents a new mixed integer programming formulation of the traffic density estimation problem in highways modeled by the Lighthill Whitham Richards equation. We first present an equivalent formulation of the problem using an Hamilton-Jacobi equation. Then, using a semi-analytic formula, we show that the model constraints resulting from the Hamilton-Jacobi equation result in linear constraints, albeit with unknown integers. We then pose the problem of estimating the density at the initial time given incomplete and inaccurate traffic data as a Mixed Integer Program. We then present a numerical implementation of the method using experimental flow and probe data obtained during Mobile Century experiment. © 2012 IEEE.

  9. Exact solutions to traffic density estimation problems involving the Lighthill-Whitham-Richards traffic flow model using mixed integer programming

    KAUST Repository

    Canepa, Edward S.

    2012-09-01

    This article presents a new mixed integer programming formulation of the traffic density estimation problem in highways modeled by the Lighthill Whitham Richards equation. We first present an equivalent formulation of the problem using an Hamilton-Jacobi equation. Then, using a semi-analytic formula, we show that the model constraints resulting from the Hamilton-Jacobi equation result in linear constraints, albeit with unknown integers. We then pose the problem of estimating the density at the initial time given incomplete and inaccurate traffic data as a Mixed Integer Program. We then present a numerical implementation of the method using experimental flow and probe data obtained during Mobile Century experiment. © 2012 IEEE.

  10. HOW CAN LOVE BE VIOLENT? REFLECTIONS ON RICHARD OF ST.VICTOR’S ON THE FOUR DEGREES OF VIOLENT LOVE

    Directory of Open Access Journals (Sweden)

    MARIUS TALOŞ

    2012-05-01

    Full Text Available The following article focuses on Richard of St. Victor´s most original treatise: On the Four Degrees of Violent Love. Although the topic of violence within the Christian view on ethics, politics and theology was not at all new by 1173, the major contribution of this short but dense mystical writing consists in developing systematically the violence as an inherent consequence of the infinite charity. The love is so powerful that it “wounds, binds, languishes and brings on a faint”, but the same force may have different effects: if these four steps appear to be destructive when oriented to satisfy the “profane” desires, their infinite strength show providential effects when turned to the divine source of the charity.

  11. Memoria y Estudios Culturales : un acercamiento al relato sobre la propia historia de vida en Raymond Williams y Richard Hoggart

    Directory of Open Access Journals (Sweden)

    Sebastián Matías Stra

    2018-01-01

    Full Text Available [es] Este trabajo intentará recuperar, de forma parcial y fragmentaria, las maneras en que el testimonio en primera persona articulado en el formato de memorias de la propia historia de vida tiene un posible valor metodológico en algunos textos seminales de la conformación de los estudios culturales ingleses. Hablamos particularmente del libro de 1957, The Uses of Literacy: Aspects of Working-class Life, with Special Reference to Publications and Entertainments, de Richard Hoggart y del tradicional artículo Culture is Ordinary de Raymond Williams, publicado en 1958 y que incluye de forma más rudimentaria algunas definiciones que conformaron la primera parte de la obra del autor galés, constituida por los libros Culture and Society y The Long Revolution. [en] This work will attempt to partially and fragmentarily recover the ways in which the testimony in first person articulated in the format of memories of the own history of life has a possible methodological value in some seminal texts of the conformation of the english cultural studies. We refer in special to the 1957 book, The Uses of Literacy: Aspects of Working-class Life, with Special Reference to Publications and Entertainments, by Richard Hoggart and the Raymond Williams' article Culture is Ordinary, published in 1958, which includes, in an incipient way, some of the definitions that formed the first part of the work of the Welsh author, made up of the books Culture and Society and The Long Revolution.

  12. The relationship between ethics and human rights in the thought of Richard Rorty

    Directory of Open Access Journals (Sweden)

    Mohammad Taghi Qezelsofla

    2014-04-01

    Full Text Available In general, two theories or school of thoughts had been prevailed in modern moral philosophies until recently. Ethical school of thought of "task-oriented", in which the emphasis is on the nature of the action. At first, this school of thought was considered by Immanuel Kant. Accordingly, doing or will to do every action should be such that become a universal moral law. In contrast, another ethical school of thought known as "utilitarianism ethics" was introduced by Jeremy Bentham and John Stuart Mill. Here, we give priority to those moral actions that can bring the greatest happiness for most people. In three or four recent decades, coinciding with the linguistic and cognitive turn, which has become known as the transition from positivism to post-positivism, another challenge has been raised in discussing philosophy of ethics by Richard Rorty which is related to his claim regarding the requirements of the current multiple world. This claim can make a new relation between morality and human rights. Hence, the main hypothesis of this paper is to clarify the point that Rorty has raised his claim by combining the theory of pragmatism and postmodern Ethics. To prove this hypothesis, this article has been set in two sections, in the first section in order to become familiar with Rorty's creed-breaker thought, the foundations of the philosophy of ethics is discussed. In the second section and under the discussion of ethics based on the rights of human, some of its characteristics will be analyzed. This article has been prepared by a descriptive method through the content analysis of various works of Rorty. Theoretical support for this article is a critical-normative approach. به طور کلی در فلسفه‌های اخلاق مدرن تا این اواخر دو نگره یا مکتب حاکم بوده است. مکتب اخلاق «وظیفه‌گرا»که در آن بر ماهیت کنش تأکید می‌شود. این مکتب ابتدا

  13. Network protocols and sockets

    OpenAIRE

    BALEJ, Marek

    2010-01-01

    My work will deal with network protocols and sockets and their use in programming language C#. It will therefore deal programming network applications on the platform .NET from Microsoft and instruments, which C# provides to us. There will describe the tools and methods for programming network applications, and shows a description and sample applications that work with sockets and application protocols.

  14. HealthSouth's most wanted. Founder and former chairman and CEO Richard Scrushy is indicted for 85 counts of conspiracy, fraud and money laundering.

    Science.gov (United States)

    Piotrowski, Julie

    2003-11-10

    Wake-up call for the industry or an isolated case of corporate chicanery? Healthcare experts are divided on the import of Richard Scrushy's indictment on 85 counts last week in connection with the financial scandal at HealthSouth Corp. The indictment alleges the company founder relied on electronic and telephone surveillance, threats and intimidation to control his accomplices.

  15. Hamilton on surnud, tema mõju mitte : in memoriam Richard Hamilton (24. II 1922 - 13. IX 2011) / Kadri Karro ; kommenteerinud Eha Komissarov, Sirje Helme, Jaak Kangilaski

    Index Scriptorium Estoniae

    Karro,Kadri

    2011-01-01

    Briti kunstniku Richard Hamiltoni (1922 - 2011) loomingust eesti kunstiteadlaste Eha Komissarovi, Sirje Helme ja Jaak Kangilaski pilgu läbi. Lähemalt 1956. aastal valminud kollaažist "Mis teeb tänapäeva kodud nii eriliseks, nii meeldivaks?"

  16. Protocol Fuel Mix reporting

    International Nuclear Information System (INIS)

    2002-07-01

    The protocol in this document describes a method for an Electricity Distribution Company (EDC) to account for the fuel mix of electricity that it delivers to its customers, based on the best available information. Own production, purchase and sale of electricity, and certificates trading are taken into account. In chapter 2 the actual protocol is outlined. In the appendixes additional (supporting) information is given: (A) Dutch Standard Fuel Mix, 2000; (B) Calculation of the Dutch Standard fuel mix; (C) Procedures to estimate and benchmark the fuel mix; (D) Quality management; (E) External verification; (F) Recommendation for further development of the protocol; (G) Reporting examples

  17. Coded Splitting Tree Protocols

    DEFF Research Database (Denmark)

    Sørensen, Jesper Hemming; Stefanovic, Cedomir; Popovski, Petar

    2013-01-01

    This paper presents a novel approach to multiple access control called coded splitting tree protocol. The approach builds on the known tree splitting protocols, code structure and successive interference cancellation (SIC). Several instances of the tree splitting protocol are initiated, each...... instance is terminated prematurely and subsequently iterated. The combined set of leaves from all the tree instances can then be viewed as a graph code, which is decodable using belief propagation. The main design problem is determining the order of splitting, which enables successful decoding as early...

  18. Playing With Population Protocols

    Directory of Open Access Journals (Sweden)

    Xavier Koegler

    2009-06-01

    Full Text Available Population protocols have been introduced as a model of sensor networks consisting of very limited mobile agents with no control over their own movement: A collection of anonymous agents, modeled by finite automata, interact in pairs according to some rules. Predicates on the initial configurations that can be computed by such protocols have been characterized under several hypotheses. We discuss here whether and when the rules of interactions between agents can be seen as a game from game theory. We do so by discussing several basic protocols.

  19. ATM and Internet protocol

    CERN Document Server

    Bentall, M; Turton, B

    1998-01-01

    Asynchronous Transfer Mode (ATM) is a protocol that allows data, sound and video being transferred between independent networks via ISDN links to be supplied to, and interpreted by, the various system protocols.ATM and Internet Protocol explains the working of the ATM and B-ISDN network for readers with a basic understanding of telecommunications. It provides a handy reference to everyone working with ATM who may not require the full standards in detail, but need a comprehensive guide to ATM. A substantial section is devoted to the problems of running IP over ATM and there is some discussion o

  20. You Don't Need Richards'... A New General 1-D Vadose Zone Solution Method that is Reliable

    Science.gov (United States)

    Ogden, F. L.; Lai, W.; Zhu, J.; Steinke, R. C.; Talbot, C. A.

    2015-12-01

    Hydrologic modelers and mathematicians have strived to improve 1-D Richards' equation (RE) solution reliability for predicting vadose zone fluxes. Despite advances in computing power and the numerical solution of partial differential equations since Richards first published the RE in 1931, the solution remains unreliable. That is to say that there is no guarantee that for a particular set of soil constitutive relations, moisture profile conditions, or forcing input that a numerical RE solver will converge to an answer. This risk of non-convergence renders prohibitive the use of RE solvers in hydrological models that need perhaps millions of infiltration solutions. In lieu of using unreliable numerical RE solutions, researchers have developed a wide array of approximate solutions that more-or-less mimic the behavior of the RE, with some notable deficiencies such as parameter insensitivity or divergence over time. The improved Talbot-Ogden (T-O) finite water-content scheme was shown by Ogden et al. (2015) to be an extremely good approximation of the 1-D RE solution, with a difference in cumulative infiltration of only 0.2 percent over an 8 month simulation comparing the improved T-O scheme with a RE numerical solver. The reason is that the newly-derived fundamental flow equation that underpins the improved T-O method is equivalent to the RE minus a term that is equal to the diffusive flux divided by the slope of the wetting front. Because the diffusive flux has zero mean, this term is not important in calculating the mean flux. The wetting front slope is near infinite (sharp) in coarser soils that produce more significant hydrological interactions between surface and ground waters, which also makes this missing term 1) disappear in the limit, and, 2) create stability challenges for the numerical solution of RE. The improved T-O method is a replacement for the 1-D RE in soils that can be simulated as homogeneous layers, where the user is willing to neglect the effects

  1. Mobile Internet Protocol Analysis

    National Research Council Canada - National Science Library

    Brachfeld, Lawrence

    1999-01-01

    ...) and User Datagram Protocol (UDP). Mobile IP allows mobile computers to send and receive packets addressed with their home network IP address, regardless of the IP address of their current point of attachment on the Internet...

  2. USA-USSR protocol

    CERN Multimedia

    1970-01-01

    On 30 November the USA Atomic Energy Commission and the USSR State Committee for the Utilization of Atomic Energy signed, in Washington, a protocol 'on carrying out of joint projects in the field of high energy physics at the accelerators of the National Accelerator Laboratory (Batavia) and the Institute for High Energy Physics (Serpukhov)'. The protocol will be in force for five years and can be extended by mutual agreement.

  3. Entre el dios de Paley y el dios de Bonnet - El parco evolucionismo teísta de Richard Owen

    Directory of Open Access Journals (Sweden)

    Gustavo Caponi

    2013-04-01

    Full Text Available http://dx.doi.org/10.5007/1808-1711.2013v17n1p71 En primer lugar, en este artículo se examina el carácter de las putativas referencias a la evolución de las especies que encontramos en las obras que Richard Owen publicó antes de 1858; y luego se analizan las escazas y vagas conjeturas evolucionistas que Owen sin duda formuló con posterioridad a la presentación pública de la Teoría de la Selección Natural.  En lo que respecta a lo primero, el objetivo es subrayar la ambigüedad de esas referencias de Owen; y en lo que respecta a lo segundo lo que interesa es mostrar que, a la hora de explicitar sus tesis evolucionistas, Owen no fue más allá de un pío evolucionismo teísta que, sin postular ningún mecanismo del cambio evolutivo, permanecía fiel a la Teología del diseño preconizada por Paley.

  4. The Road Movies' Space Dynamics in the 70s: Richard C. Sarafian, Monte Hellman and Terrence Malick

    Directory of Open Access Journals (Sweden)

    Filipa Rosário

    2014-07-01

    Full Text Available Vanishing Point (Richard C. Sarafian, 1971, Two-lane Blacktop (Monte Hellmann, 1971 and Badlands (Terrence Malick, 1973 are road movies that incorporate distinctive journeys, which, at a certain moment, become similar. Their heroes act as non-mystical pilgrims to whom the trip is a journey in itself, even if they come up as a chase, a car race or an escape from the police.In a filmic genre built from the spatial element, the road life structures each narrative in each film. In this way, the moment when the journey looses its teleological sense acquires even more relevance, allowing us to understand the genre’s space dynamics with a different depth.In this essay, I will analyse comparatively the ways through which characters and directors relate to the scenery/landscape, in order to identify ideological constraints related to space, i.e., those symbolic limitations the road movie seems to conceal. Easy Rider (Dennis Hopper, 1969 will be a constant presence since, as the inaugural road movie, it has determined the genre’s underlying forces.

  5. An analytical solution of Richards' equation providing the physical basis of SCS curve number method and its proportionality relationship

    Science.gov (United States)

    Hooshyar, Milad; Wang, Dingbao

    2016-08-01

    The empirical proportionality relationship, which indicates that the ratio of cumulative surface runoff and infiltration to their corresponding potentials are equal, is the basis of the extensively used Soil Conservation Service Curve Number (SCS-CN) method. The objective of this paper is to provide the physical basis of the SCS-CN method and its proportionality hypothesis from the infiltration excess runoff generation perspective. To achieve this purpose, an analytical solution of Richards' equation is derived for ponded infiltration in shallow water table environment under the following boundary conditions: (1) the soil is saturated at the land surface; and (2) there is a no-flux boundary which moves downward. The solution is established based on the assumptions of negligible gravitational effect, constant soil water diffusivity, and hydrostatic soil moisture profile between the no-flux boundary and water table. Based on the derived analytical solution, the proportionality hypothesis is a reasonable approximation for rainfall partitioning at the early stage of ponded infiltration in areas with a shallow water table for coarse textured soils.

  6. Invertendo a “Passagem Atlântica”: O “regresso” de Richard Wright a África

    Directory of Open Access Journals (Sweden)

    Ana Luísa Saraiva

    2012-10-01

    Full Text Available O texto discute o sentido polémico do “regresso” a África que Richard Wright inscreve em Black Power e a forma como a narrativa da viagem subverte a “Middle Passage”. O sujeito narrativo orienta o leitor através de uma incursão pessoal nos muitos sentidos da modernidade e desdobra a noção de “destino comum”, já apontada em 12 Million Black Voices. Contudo, qualquer sentido de comunidade é aqui necessariamente ambíguo, por estar sempre relacionado com questões de raça e identidade. Black Power é uma narrativa importante para o conceito de modernidade e assinala uma mudança significativa na produção literária de Wright para uma vertente não-ficcional. Esta segunda fase da sua obra contém, no entanto, um paradoxo crucial: enquanto se volta para o exterior, para o mundo mais global, Wright tenta, simultaneamente, inscrever-se como referência sobre o locus do qual nunca poderia demarcar‑se: África. Em Black Power, a duboisiana “color line” desdobra‑se em múltiplas dimensões.

  7. ‘The Edification of the Church’: Richard Hooker’s Theology of Worship and the Protestant Inward / Outward Disjunction

    Directory of Open Access Journals (Sweden)

    Littlejohn W. Bradford

    2014-06-01

    Full Text Available Sixteenth-century English Protestants struggled with the legacy left them by the Lutheran reformation: a strict disjunction between inward and outward that hindered the development of a robust theology of worship. For Luther, outward forms of worship had more to do with the edification of the neighbour than they did with pleasing God. But what exactly did ‘edification’ mean? On the one hand, English Protestants sought to avoid the Roman Catholic view that certain elements of worship held an intrinsic spiritual value; on the other hand, many did not want to imply that forms of worship were spiritually arbitrary and had a merely civil value. Richard Hooker developed his theology of worship in response to this challenge, seeking to maintain a clear distinction between the inward worship of the heart and the outward forms of public worship, while refusing to disassociate the two. The result was a concept of edification which sought to do justice to both civil and spiritual concerns, without, pace Peter Lake and other scholars, conceding an inch to a Catholic theology of worship

  8. [Some remarks on the theory of sets by Richard Dedekind and Stanisław Leśniewski].

    Science.gov (United States)

    Obojska, Lidia

    2014-01-01

    Mereology, is a part-whole theory, also called the theory of collective sets. It was founded in 1916 by Stanisław Leśniewski and this is an alternative theory versus the classical set theory by Georg Cantor. These two theories are usually teamed up together as Leśniewski himself was referring to the concept of the set by Cantor and Cantor is considered the "main" ideologist of the set theory. However, when analyzing the original texts of various authors, it seems that the very concept of a collective set is closer to the idea of Richard Dedekind rather than that of Georg Cantor. It is known that Cantor borrowed some concepts on the notion of set from Dedekind, whose ideas were also known to Leśniewski, however, there is no study on this topic. This work is therefore an attempt to compare some set-theoretical concepts of both of these authors, i.e. S. Leśiewski and R. Dedekind and the presentation of their convergence.

  9. In silico toxicology protocols.

    Science.gov (United States)

    Myatt, Glenn J; Ahlberg, Ernst; Akahori, Yumi; Allen, David; Amberg, Alexander; Anger, Lennart T; Aptula, Aynur; Auerbach, Scott; Beilke, Lisa; Bellion, Phillip; Benigni, Romualdo; Bercu, Joel; Booth, Ewan D; Bower, Dave; Brigo, Alessandro; Burden, Natalie; Cammerer, Zoryana; Cronin, Mark T D; Cross, Kevin P; Custer, Laura; Dettwiler, Magdalena; Dobo, Krista; Ford, Kevin A; Fortin, Marie C; Gad-McDonald, Samantha E; Gellatly, Nichola; Gervais, Véronique; Glover, Kyle P; Glowienke, Susanne; Van Gompel, Jacky; Gutsell, Steve; Hardy, Barry; Harvey, James S; Hillegass, Jedd; Honma, Masamitsu; Hsieh, Jui-Hua; Hsu, Chia-Wen; Hughes, Kathy; Johnson, Candice; Jolly, Robert; Jones, David; Kemper, Ray; Kenyon, Michelle O; Kim, Marlene T; Kruhlak, Naomi L; Kulkarni, Sunil A; Kümmerer, Klaus; Leavitt, Penny; Majer, Bernhard; Masten, Scott; Miller, Scott; Moser, Janet; Mumtaz, Moiz; Muster, Wolfgang; Neilson, Louise; Oprea, Tudor I; Patlewicz, Grace; Paulino, Alexandre; Lo Piparo, Elena; Powley, Mark; Quigley, Donald P; Reddy, M Vijayaraj; Richarz, Andrea-Nicole; Ruiz, Patricia; Schilter, Benoit; Serafimova, Rositsa; Simpson, Wendy; Stavitskaya, Lidiya; Stidl, Reinhard; Suarez-Rodriguez, Diana; Szabo, David T; Teasdale, Andrew; Trejo-Martin, Alejandra; Valentin, Jean-Pierre; Vuorinen, Anna; Wall, Brian A; Watts, Pete; White, Angela T; Wichard, Joerg; Witt, Kristine L; Woolley, Adam; Woolley, David; Zwickl, Craig; Hasselgren, Catrin

    2018-04-17

    The present publication surveys several applications of in silico (i.e., computational) toxicology approaches across different industries and institutions. It highlights the need to develop standardized protocols when conducting toxicity-related predictions. This contribution articulates the information needed for protocols to support in silico predictions for major toxicological endpoints of concern (e.g., genetic toxicity, carcinogenicity, acute toxicity, reproductive toxicity, developmental toxicity) across several industries and regulatory bodies. Such novel in silico toxicology (IST) protocols, when fully developed and implemented, will ensure in silico toxicological assessments are performed and evaluated in a consistent, reproducible, and well-documented manner across industries and regulatory bodies to support wider uptake and acceptance of the approaches. The development of IST protocols is an initiative developed through a collaboration among an international consortium to reflect the state-of-the-art in in silico toxicology for hazard identification and characterization. A general outline for describing the development of such protocols is included and it is based on in silico predictions and/or available experimental data for a defined series of relevant toxicological effects or mechanisms. The publication presents a novel approach for determining the reliability of in silico predictions alongside experimental data. In addition, we discuss how to determine the level of confidence in the assessment based on the relevance and reliability of the information. Copyright © 2018. Published by Elsevier Inc.

  10. La France au Tsar : chanson patriotique créée par Marius Richard à la Scala, Henri Helme à Ba-ta-clan [illustration couleurs Donjean

    OpenAIRE

    François Bigot Éditeur , .; Daphy , Éliane

    2010-01-01

    La France au Tsar : chanson patriotique créée par Marius Richard à la Scala, Henri Helme à Ba-ta-clan ; paroles de Lucien Colonge, Musique de J. Claudel. [Illustration couleurs signée] Donjean. A la chanson populaire, Maison Bigot éditeur (sans cotage, sans ©, datation recherche en cours). Titre inconnu du catalogue BNF. Datation provisoire par année de dépôt médihal (2010)

  11. Business protocol in integrated Europe

    OpenAIRE

    Pavelová, Nina

    2009-01-01

    The first chapter devotes to definitions of basic terms such as protocol or business protocol, to differences between protocol and etiquette, and between social etiquette and business etiquette. The second chapter focuses on the factors influencing the European business protocol. The third chapter is devoted to the etiquette of business protocol in the European countries. It touches the topics such as punctuality and planning of business appointment, greeting, business cards, dress and appear...

  12. Security Protocols in a Nutshell

    OpenAIRE

    Toorani, Mohsen

    2016-01-01

    Security protocols are building blocks in secure communications. They deploy some security mechanisms to provide certain security services. Security protocols are considered abstract when analyzed, but they can have extra vulnerabilities when implemented. This manuscript provides a holistic study on security protocols. It reviews foundations of security protocols, taxonomy of attacks on security protocols and their implementations, and different methods and models for security analysis of pro...

  13. DNA repair protocols

    DEFF Research Database (Denmark)

    Bjergbæk, Lotte

    In its 3rd edition, this Methods in Molecular Biology(TM) book covers the eukaryotic response to genomic insult including advanced protocols and standard techniques in the field of DNA repair. Offers expert guidance for DNA repair, recombination, and replication. Current knowledge of the mechanisms...... that regulate DNA repair has grown significantly over the past years with technology advances such as RNA interference, advanced proteomics and microscopy as well as high throughput screens. The third edition of DNA Repair Protocols covers various aspects of the eukaryotic response to genomic insult including...... recent advanced protocols as well as standard techniques used in the field of DNA repair. Both mammalian and non-mammalian model organisms are covered in the book, and many of the techniques can be applied with only minor modifications to other systems than the one described. Written in the highly...

  14. Leo Tolstoy, Mikhail Artsybashev, and Richard Wagner: About One Case of Polemics in Tolstoy’s The Circle of Reading

    Directory of Open Access Journals (Sweden)

    Anastasia A. Tulyakova

    2017-12-01

    Full Text Available The article deals with a case from the creative history of Leo Tolstoy’s The Circle of Reading (1908, when Tolstoy included the revised story of Guy de Maupassant’s Le Port under the title “Sisters” in the second edition of the book. The author proves that the reason for Tolstoy’s decision was his polemic with “saninstvo” as one of the most fashionable ethical trends of the first decade of the 1900s. The key component of Sanin’s behavior and hedonistic philosophy in Mikhail Artsybashev’s novel was incest. Maupassant’s novella is based on the same plot. On the basis of Tolstoy’s nonfictional texts of the 1890s, including the treatise What Is Art? (1898, the article reconstructs the writer’s view on the forms and boundaries of the representation of incest in Richard Wagner’s operas and in Friedrich Nietzsche’s philosophy, with which Tolstoy also polemicized and in connection with which he stated the ethical potential of art and its permissiveness. From this perspective, Tolstoy’s reaction to Artsybashev’s novel, combining the motives of incest and extreme individualism, turns out to be a new phase of the old dispute. Tolstoy included the story “Sisters” in the second edition of The Circle of Reading as a response to the philosophy of “saninstvo.” Thus, Tolstoy’s collection of wise thoughts can be considered not only as didactic, but also as a polemical text, and deeply rooted in the ideological context of the 1890s‒1900s.

  15. Funding Student Scholarships to the Richard Tapia Celebration of Diversity in Computing Conference 2013, February 7-10, 2013

    Energy Technology Data Exchange (ETDEWEB)

    Tapia, Richard

    2013-02-07

    This Basic Award allowed for the funding of student scholarships to the Richard Tapia Celebration of Diversity in Computing Conference which took place in Washington, D.C. from February 7-10, 2013. The conference was the seventh in a series and included a stellar array of invited speakers, compelling panel discussions, a student poster competition, a daylong Doctoral Consortium, a session featuring a choice of attractions unique to Washington, D.C., a gala banquet and dance, and many exciting networking opportunities. The conference created a welcoming environment for STEM students, especially underrepresented minority and female students, who were provided the highest quality of learning, networking, and social experiences to empower their educational experience and enhance their ability to succeed with a rigorous STEM degree. The networking and mentoring opportunities available at the conference were also designed to empower students to succeed in STEM careers and ultimately serve in leadership in industry and the professoriate. A key step in attracting underrepresented students into STEM fields and paving the way for their success in influential positions is to create a nurturing and supportive network and community for them to rely upon. It is also critical to educate leaders in corporations, government and academia about the benefits to be gained from increasing the percentage of STEM professionals from underrepresented groups. To this end, The Tapia Conference serves both functions, as it connects STEM students with STEM professionals, leaders, and academics who share the vision of a STEM workforce and community that is truly representative of the community in which we live.

  16. Evaluation of the Ross fast solution of Richards' equation in unfavourable conditions for standard finite element methods

    International Nuclear Information System (INIS)

    Crevoisier, D.; Voltz, M.; Chanzy, A.

    2009-01-01

    Ross [Ross PJ. Modeling soil water and solute transport - fast, simplified numerical solutions. Agron J 2003;95:1352-61] developed a fast, simplified method for solving Richards' equation. This non-iterative 1D approach, using Brooks and Corey [Brooks RH, Corey AT. Hydraulic properties of porous media. Hydrol. papers, Colorado St. Univ., Fort Collins: 1964] hydraulic functions, allows a significant reduction in computing time while maintaining the accuracy of the results. The first aim of this work is to confirm these results in a more extensive set of problems, including those that would lead to serious numerical difficulties for the standard numerical method. The second aim is to validate a generalisation of the Ross method to other mathematical representations of hydraulic functions. The Ross method is compared with the standard finite element model, Hydrus-1D [Simunek J, Sejna M, Van Genuchten MTh. The HYDRUS-1D and HYDRUS-2D codes for estimating unsaturated soil hydraulic and solutes transport parameters. Agron Abstr 357; 1999]. Computing time, accuracy of results and robustness of numerical schemes are monitored in 1D simulations involving different types of homogeneous soils, grids and hydrological conditions. The Ross method associated with modified Van Genuchten hydraulic functions [Vogel T, Cislerova M. On the reliability of unsaturated hydraulic conductivity calculated from the moisture retention curve. Transport Porous Media 1988:3:1-15] proves in every tested scenario to be more robust numerically, and the compromise of computing time/accuracy is seen to be particularly improved on coarse grids. Ross method run from 1.25 to 14 times faster than Hydrus-1D. (authors)

  17. ‘By Force of Participation and Conjunction in Him’: John Jewel and Richard Hooker on Union with Christ

    Directory of Open Access Journals (Sweden)

    Gazal André A.

    2014-06-01

    Full Text Available The author of a Christian Letter cited a passage from John Jewel’s A Reply to Harding’s Answer in which the first major apologist of the Elizabethan Settlement spoke of the role of faith and the sacraments in union with Christ. Andrew Willet, the likely author of this work, quoted it against Richard Hooker in order to show how the latter contravened the sacramental theology of the national Church as interpreted by Jewel as one of the foremost expositors of its doctrine. Jewel, however, in his Reply to Harding’s Answer, enumerates four means of the Christian’s union with Christ: the Incarnation, faith, baptism, and the Eucharist-a fact overlooked in A Christian Letter by its author in his endeavor to impeach Hooker’s orthodoxy. Proceeding from the observation that both Jewel and Hooker believed that the locus of Christian salvation is union with Christ, this essay compares the two divines’ respective views of this union by examining the manner in which they understand the role of each of these means forming and maintaining this union. On the basis of this comparison, the essay argues that A Christian Letter misrepresented Jewel’s position and that Hooker’s view of union with Christ was essentially the same as the late bishop of Salisbury’s, notwithstanding some differences in detail and emphases. The article concludes with the opinion that Hooker represents continuity of a particular soteriological emphasis in the Elizabethan Church that can possibly be traced back to Jewel as a representative of the Reformed tradition stressing this doctrine.

  18. Protocol Monitoring Energy Conservation; Protocol Monitoring Energiebesparing

    Energy Technology Data Exchange (ETDEWEB)

    Boonekamp, P.G.M. [ECN Beleidsstudies, Petten (Netherlands); Mannaerts, H. [Centraal Planburea CPB, Den Haag (Netherlands); Tinbergen, W. [Centraal Bureau voor de Statistiek CBS, Den Haag (Netherlands); Vreuls, H.H.J. [Nederlandse onderneming voor energie en milieu Novem, Utrecht (Netherlands); Wesselink, B. [Rijksinstituut voor Volksgezondheid en Milieuhygiene RIVM, Bilthoven (Netherlands)

    2001-12-01

    On request of the Dutch ministry of Economic Affairs five institutes have collaborated to create a 'Protocol Monitoring Energy Conservation', a common method and database to calculate the amount of energy savings realised in past years. The institutes concerned are the Central Bureau of Statistics (CBS), the Netherlands Bureau for Economic Policy Analysis (CPB), the Energy research Centre of the Netherlands (ECN), the National Agency for Energy and Environment (Novem) and the Netherlands Institute of Public Health and the Environment (RIVM). The institutes have agreed upon a clear definition of energy use and energy savings. The demarcation with renewable energy, the saving effects of substitution between energy carriers and the role of import and export of energy have been elaborated. A decomposition method is used to split up the observed change in energy use in a number of effects, on a national and sectoral level. This method includes an analysis of growth effects, effects of structural changes in production and consumption activities and savings on end use or with more efficient conversion processes. To calculate these effects the total energy use is desegregated as much as possible. For each segment a reference energy use is calculated according to the trend in a variable which is supposed to be representative for the use without savings. The difference with the actual energy use is taken as the savings realised. Results are given for the sectors households, industry, agriculture, services and government, transportation and the energy sector; as well as a national figure. A special feature of the protocol method is the application of primary energy use figures in the determination of savings for end users. This means that the use of each energy carrier is increased with a certain amount, according to the conversion losses caused elsewhere in the energy system. The losses concern the base year energy sector and losses abroad for imports of secondary

  19. Lt Richard Gueli

    African Journals Online (AJOL)

    Win98SE

    reality, conflicts in Africa (and other parts of the world), often fuelled by deep- ... Often, confusion exists between what is meant by human rights law and .... assist peoples in their right to self-determination; as a result of a state formally consenting ...... As regional 'superpower', it could be argued that South Africa should take a.

  20. Richard Phillips Feynman

    Indian Academy of Sciences (India)

    ARTICLE-IN-A-BOX. 797. RESONANCE │ September 2011. The war years interrupted the efforts of both Feynman and Schwinger to tackle the divergence problems in quantum electrodynamics, another of Dirac's pioneering creations from 1927. In 1965 the Physics Nobel Prize was shared by the two of them and Sin-Ichiro ...

  1. Richard Phillips Feynman

    Indian Academy of Sciences (India)

    While the two relativity theories were largely the creation of Albert Einstein, the quantum ... of what may lie in store for anyone who dares to follow the beat of a different drum. ... saw Feynman's exceptional talents and in a special lecture explained to him the beautiful principle ... The Character of Physical Law – 1965. c).

  2. Immunocytochemical methods and protocols

    National Research Council Canada - National Science Library

    Javois, Lorette C

    1999-01-01

    ... monoclonal antibodies to study cell differentiation during embryonic development. For a select few disciplines volumes have been published focusing on the specific application of immunocytochemical techniques to that discipline. What distinguished Immunocytochemical Methods and Protocols from earlier books when it was first published four years ago was i...

  3. Critical Response Protocol

    Science.gov (United States)

    Ellingson, Charlene; Roehrig, Gillian; Bakkum, Kris; Dubinsky, Janet M.

    2016-01-01

    This article introduces the Critical Response Protocol (CRP), an arts-based technique that engages students in equitable critical discourse and aligns with the "Next Generation Science Standards" vision for providing students opportunities for language learning while advancing science learning (NGSS Lead States 2013). CRP helps teachers…

  4. Linear Logical Voting Protocols

    DEFF Research Database (Denmark)

    DeYoung, Henry; Schürmann, Carsten

    2012-01-01

    Current approaches to electronic implementations of voting protocols involve translating legal text to source code of an imperative programming language. Because the gap between legal text and source code is very large, it is difficult to trust that the program meets its legal specification. In r...

  5. Principles of Protocol Design

    DEFF Research Database (Denmark)

    Sharp, Robin

    This is a new and updated edition of a book first published in 1994. The book introduces the reader to the principles used in the construction of a large range of modern data communication protocols, as used in distributed computer systems of all kinds. The approach taken is rather a formal one...

  6. [Richard C. M. Mole: The Baltic states from the Soviet Union to the European Union. Identity, discourse and power in the post-communist transition of Estonia, Latvia and Lithuania] / Karsten Brüggemann

    Index Scriptorium Estoniae

    Brüggemann, Karsten, 1965-

    2014-01-01

    Arvustus: Mole, Richard C. M. The Baltic States from the Soviet Union to the European Union : identity, discourse and power in the post-communist transition of Estonia, Latvia and Lithuania. London ; New York : Routledge, 2012, 2013

  7. Model Additional Protocol

    International Nuclear Information System (INIS)

    Rockwood, Laura

    2001-01-01

    Since the end of the cold war a series of events has changed the circumstances and requirements of the safeguards system. The discovery of a clandestine nuclear weapons program in Iraq, the continuing difficulty in verifying the initial report of Democratic People's Republic of Korea upon entry into force of their safeguards agreement, and the decision of the South African Government to give up its nuclear weapons program and join the Treaty on the Non-Proliferation of Nuclear Weapons have all played a role in an ambitious effort by IAEA Member States and the Secretariat to strengthen the safeguards system. A major milestone in this effort was reached in May 1997 when the IAEA Board of Governors approved a Model Protocol Additional to Safeguards Agreements. The Model Additional Protocol was negotiated over a period of less than a year by an open-ended committee of the Board involving some 70 Member States and two regional inspectorates. The IAEA is now in the process of negotiating additional protocols, State by State, and implementing them. These additional protocols will provide the IAEA with rights of access to information about all activities related to the use of nuclear material in States with comprehensive safeguards agreements and greatly expanded physical access for IAEA inspectors to confirm or verify this information. In conjunction with this, the IAEA is working on the integration of these measures with those provided for in comprehensive safeguards agreements, with a view to maximizing the effectiveness and efficiency, within available resources, the implementation of safeguards. Details concerning the Model Additional Protocol are given. (author)

  8. Satellite Communications Using Commercial Protocols

    Science.gov (United States)

    Ivancic, William D.; Griner, James H.; Dimond, Robert; Frantz, Brian D.; Kachmar, Brian; Shell, Dan

    2000-01-01

    NASA Glenn Research Center has been working with industry, academia, and other government agencies in assessing commercial communications protocols for satellite and space-based applications. In addition, NASA Glenn has been developing and advocating new satellite-friendly modifications to existing communications protocol standards. This paper summarizes recent research into the applicability of various commercial standard protocols for use over satellite and space- based communications networks as well as expectations for future protocol development. It serves as a reference point from which the detailed work can be readily accessed. Areas that will be addressed include asynchronous-transfer-mode quality of service; completed and ongoing work of the Internet Engineering Task Force; data-link-layer protocol development for unidirectional link routing; and protocols for aeronautical applications, including mobile Internet protocol routing for wireless/mobile hosts and the aeronautical telecommunications network protocol.

  9. Epistemic Protocols for Distributed Gossiping

    Directory of Open Access Journals (Sweden)

    Krzysztof R. Apt

    2016-06-01

    Full Text Available Gossip protocols aim at arriving, by means of point-to-point or group communications, at a situation in which all the agents know each other's secrets. We consider distributed gossip protocols which are expressed by means of epistemic logic. We provide an operational semantics of such protocols and set up an appropriate framework to argue about their correctness. Then we analyze specific protocols for complete graphs and for directed rings.

  10. Symmetric cryptographic protocols

    CERN Document Server

    Ramkumar, Mahalingam

    2014-01-01

    This book focuses on protocols and constructions that make good use of symmetric pseudo random functions (PRF) like block ciphers and hash functions - the building blocks for symmetric cryptography. Readers will benefit from detailed discussion of several strategies for utilizing symmetric PRFs. Coverage includes various key distribution strategies for unicast, broadcast and multicast security, and strategies for constructing efficient digests of dynamic databases using binary hash trees.   •        Provides detailed coverage of symmetric key protocols •        Describes various applications of symmetric building blocks •        Includes strategies for constructing compact and efficient digests of dynamic databases

  11. Diplomacy and Diplomatic Protocol

    Directory of Open Access Journals (Sweden)

    Lect. Ph.D Oana Iucu

    2008-12-01

    Full Text Available The present study aims to observe relationships and determining factors between diplomacyand diplomatic protocol as outlined by historical and contextual analyses. The approach is very dynamic,provided that concepts are able to show their richness, antiquity and polyvalence at the level of connotations,semantics, grammatical and social syntax. The fact that this information is up to date determines anattitude of appreciation and a state of positive contamination.

  12. Automatic Validation of Protocol Narration

    DEFF Research Database (Denmark)

    Bodei, Chiara; Buchholtz, Mikael; Degano, Pierpablo

    2003-01-01

    We perform a systematic expansion of protocol narrations into terms of a process algebra in order to make precise some of the detailed checks that need to be made in a protocol. We then apply static analysis technology to develop an automatic validation procedure for protocols. Finally, we...

  13. Dysphonia risk screening protocol

    Directory of Open Access Journals (Sweden)

    Katia Nemr

    2016-03-01

    Full Text Available OBJECTIVE: To propose and test the applicability of a dysphonia risk screening protocol with score calculation in individuals with and without dysphonia. METHOD: This descriptive cross-sectional study included 365 individuals (41 children, 142 adult women, 91 adult men and 91 seniors divided into a dysphonic group and a non-dysphonic group. The protocol consisted of 18 questions and a score was calculated using a 10-cm visual analog scale. The measured value on the visual analog scale was added to the overall score, along with other partial scores. Speech samples allowed for analysis/assessment of the overall degree of vocal deviation and initial definition of the respective groups and after six months, the separation of the groups was confirmed using an acoustic analysis. RESULTS: The mean total scores were different between the groups in all samples. Values ranged between 37.0 and 57.85 in the dysphonic group and between 12.95 and 19.28 in the non-dysphonic group, with overall means of 46.09 and 15.55, respectively. High sensitivity and specificity were demonstrated when discriminating between the groups with the following cut-off points: 22.50 (children, 29.25 (adult women, 22.75 (adult men, and 27.10 (seniors. CONCLUSION: The protocol demonstrated high sensitivity and specificity in differentiating groups of individuals with and without dysphonia in different sample groups and is thus an effective instrument for use in voice clinics.

  14. Dysphonia risk screening protocol

    Science.gov (United States)

    Nemr, Katia; Simões-Zenari, Marcia; da Trindade Duarte, João Marcos; Lobrigate, Karen Elena; Bagatini, Flavia Alves

    2016-01-01

    OBJECTIVE: To propose and test the applicability of a dysphonia risk screening protocol with score calculation in individuals with and without dysphonia. METHOD: This descriptive cross-sectional study included 365 individuals (41 children, 142 adult women, 91 adult men and 91 seniors) divided into a dysphonic group and a non-dysphonic group. The protocol consisted of 18 questions and a score was calculated using a 10-cm visual analog scale. The measured value on the visual analog scale was added to the overall score, along with other partial scores. Speech samples allowed for analysis/assessment of the overall degree of vocal deviation and initial definition of the respective groups and after six months, the separation of the groups was confirmed using an acoustic analysis. RESULTS: The mean total scores were different between the groups in all samples. Values ranged between 37.0 and 57.85 in the dysphonic group and between 12.95 and 19.28 in the non-dysphonic group, with overall means of 46.09 and 15.55, respectively. High sensitivity and specificity were demonstrated when discriminating between the groups with the following cut-off points: 22.50 (children), 29.25 (adult women), 22.75 (adult men), and 27.10 (seniors). CONCLUSION: The protocol demonstrated high sensitivity and specificity in differentiating groups of individuals with and without dysphonia in different sample groups and is thus an effective instrument for use in voice clinics. PMID:27074171

  15. J.M. Gratale on Tore T. Petersen’s Richard Nixon, Great Britain and the Anglo-American Alignment in the Persian Gulf and Arabian Peninsula

    Directory of Open Access Journals (Sweden)

    2009-09-01

    Full Text Available Tore T. Petersen. Richard Nixon, Great Britain and the Anglo-American Alignment in the Persian Gulf and Arabian Peninsula: Making Allies out of Clients. Sussex Academic Press, 2009.  172pp.  978-1-84519-277-8.Since the events of 9-11 there has been a sizeable quantity of books published on American foreign policy in broad terms, as well as more focused studies on contemporary developments in southwest Asia, more commonly referred to as the Middle East. Many of these volumes are highly politic...

  16. Espíritos cheios de bichos: A fauna nas viagens de Louis Agassiz e Richard Francis Burton pelo Brasil oitocentista

    Directory of Open Access Journals (Sweden)

    Janaina Zito Losada

    2015-04-01

    Full Text Available O Brasil do século XIX foi alvo de inúmeras viagens realizadas por cientistas estrangeiros. O objetivo deste artigo é analisar as impressões sobre a fauna brasileira presentes nos relatos das viagens realizadas pelo naturalista suíço Louis Agassiz, em 1865, e pelo explorador inglês Richard Francis Burton, em 1868. Destes relatos privilegiam-se as descrições do meio natural de diferentes regiões brasileiras e das particularidades da fauna silvestre por eles encontrada.

  17. Três décadas de genes egoístas: Discutindo algumas premissas do best seller de Richard Dawkins

    OpenAIRE

    Vieira, Eduardo Paiva de Pontes; Chaves, Silvia Nogueira

    2011-01-01

    O presente trabalho resgata algumas idéias do biólogo evolucionista Richard Dawkins, apresentadas pela primeira vez em seu best-seller O Gene Egoísta (The Selfish Gene), de 1976. O caráter polêmico de algumas concepções ultradarwinistas e sociobiológicas da obra é campo fértil para o embate de idéias, revelando um universo rico para discussões em diversas frentes, especialmente aquelas que podem se desenvolver na formação crítica de alguns profissionais vinculados á ciências biológicas, socio...

  18. Escatologia e história em Richard Shaull: a narrativa mítico-teológica entre a memória e o futuro

    Directory of Open Access Journals (Sweden)

    Arnaldo Érico Huff Júnior

    2013-01-01

    Full Text Available Resumo. O texto pretende pensar a produção da teologia da revolução de Richard Shaull no encontro entre escatologia e história. A partir de um breve relato dos anos de Shaull no Brasil, passa-se à análise das principais ideias teológicas que conduziram Shaull à formulação de uma assim chamada teologia da revolução. Finalmente, propõe-se uma chave interpretativa para a história da teologia, a partir de um diálogo com Reinhart Koselleck e Mircea Eliade.

  19. Thinking through war: the social thought of Richard T. Ely, John R. Commons, and Edward A. Ross during the First World War.

    Science.gov (United States)

    Herzberg, D L

    2001-01-01

    This paper examines the social thought of University of Wisconsin professors Richard T. Ely, John R. Commons, and Edward A. Ross during World War I. Like many of their fellow scholars, these three were actively involved in the pro-war effort. Although their support for the war was strongly conditioned by personal and occupational considerations, the impact of their wartime service was not restricted to those realms. Their social thought, which they impressed into service explaining and justifying the war, was itself altered in subtle and sometimes surprising ways by the forceful positions they took on the political, economic, and racial significance of the conflict. Copyright 2001 John Wiley & Sons, Inc.

  20. O neopragmatismo de Richard Rorty e a reflexão política contemporânea

    Directory of Open Access Journals (Sweden)

    Sérgio Eduardo Ferraz

    2014-03-01

    Full Text Available Este artigo examina o pensamento filosófico de Richard Rorty e, em particular, sua dimensão política, delineando seu tratamento original e crítico de temas centrais à teoria política contemporânea. O objetivo do texto é triplo: chamar a atenção para a fertilidade das ideias de um autor ainda pouco lido no Brasil (i, assinalar as notáveis consequências corrosivas da abordagem rortyana para pressupostos e pretensões fundantes de importantes vertentes da teoria política (ii, e, numa ótica mais positiva, apontar o potencial inspirador dos escritos desse autor para a reflexão sobre novos modos de justificação da democracia (iii. Salientam-se também, nesse último caso, os limites impostos a esse tipo de empreitada político-intelectual. A abordagem empregada consiste em demarcar os contornos gerais do projeto filosófico do autor, seguindo-se uma apresentação dos tópicos mais propriamente políticos da obra de Rorty. Mais especificamente, o artigo explora a proposta rortyana de substituição da noção de verdade pela de justificação, assinalando-se suas consequências para pretensões de verdade, objetividade e universalismo, presentes em diversas linhas da teoria política. Nesse veio, o artigo discute as eventuais implicações relativistas das teses rortyanas, chegando-se, por essa rota, às ideias de contingência, imaginação e persuasão, núcleos conceituais vitais à reflexão em tela. Um breve contraste com posições de autores como Habermas e Rawls, caros ao próprio Rorty, é esboçado no propósito de tornar mais clara a especificidade da abordagem rortyana da política. Transitando, do modo assinalado, por esses tópicos, o texto resulta em um panorama sintético da perspectiva rortyana acerca do que vem a ser, contemporaneamente, uma "política democrática", liberta de "universalismos" e "objetividades", na qual ganham estatuto decisivo questões de justificação, tolerância e coexist

  1. FRENCH PROTOCOL CARDS

    CERN Multimedia

    Division du Personnel

    1999-01-01

    Senior officials, holders of FRENCH PROTOCOL cards (blue cards) due to expire on 31.12.1999, are requested to return these cards and those of family members, for extension to:Bureau des cartes, bâtiment 33.1-025Should the 3 spaces for authentication on the back of the card be full, please enclose 2 passport photographs for a new card.In the case of children aged 14 and over, an attestation of dependency and a school certificate should be returned with the card.Personnel DivisionTel. 79494/74683

  2. FRENCH PROTOCOL CARDS

    CERN Multimedia

    Human Resources Division

    2000-01-01

    Senior officials, holders of FRENCH PROTOCOL cards (blue cards) due to expire on 31.12.2000, are requested to return these cards and those of family members, for extension to: Bureau des cartes, Bât 33.1-009/1-015 Should the three spaces for authentication on the back of the card be full, please enclose two passport photographs for a new card. In the case of children aged 14 and over, an attestation of dependency and a school certificate should be returned with the card.

  3. Sincalide - the final protocol

    International Nuclear Information System (INIS)

    Clarke, E.A.; Notghi, A.; Hesslewood, S.R.; Harding, L.K.

    2002-01-01

    Full text: HIDA biliary studies examine the gallbladder (GB) to give a percentage ejection fraction (EF). Porcine CCK was an accepted agent for stimulating the GB prior to being withdrawn in the UK from 1998. Sincalide (a synthetic CCK) was the suggested replacement. We have tried many administration regimes in an attempt to get results comparable with our established CCK protocols. Dose concentration and length of infusion times have been studied. Initially a dose of 10 ngm/kg/min given over 2 minutes (manufacturer's recommended dose) was used. This gave falsely low ejection fractions. The dose was reduced to 3 ngm/kg/min over 3 minutes as it was felt the higher dose may be causing constriction of the sphincter of Oddi. This gave a slight improvement with 22 % of patients having normal EF (>35 %). The length of infusion was extended to 15 minutes and the dose concentration reduced again to 0.6 ngm/kg/min. 62 % of patients had a normal EF. However, on many of the curves the gallbladder was still contracting on completion of the 15 minute infusion and began to refill immediately after stopping Sincalide. A further change of protocol was indicated. The infusion time was extended to 30 minutes and the dose concentration per minute kept the same. Imaging began at 30 minutes post HIDA injection and continued for a total of 50 minutes. Sincalide infusion began at 35 minutes if a GB was visualized. This protocol has been performed on 17 patients. 53 % of these had a normal result (comparable with a normal rate of 40 % previously established with CCK) with a mean EF of 60 %. The mean EF of patients with abnormal studies was 15 %. Curves showed a plateau by 30 minutes in 94 % of patients indicating that gallbladder contraction was complete. No normal range is available so results were compared with ultrasound (US). All patients who had an abnormal US scan also had abnormal HIDA results. Three patients had a normal US scan and abnormal HIDA study. These are currently

  4. Distributed Network Protocols

    Science.gov (United States)

    1980-07-01

    MONITORING AGENCY NAME & ADDRESS(II different from Controlting Office) IS. SECURITY CLASS. (of this report) S Office of Naval Research Unclassified...All protocols are extended to networks with changing. topology. S80 8 4 246 DD0I iA 1473 EDITION OF INOV 65 IS OBSOLETE 8 0 24 SECURITY CLASSIFICATION...to the netowrk . f) Each node knows its adjacent links, but not necessarily the identity of its neighbors, i.e. the nodes at the other end of the links

  5. The Mysterious Fall of Soeharto: A Genre Analysis of Richard Mann’s Plots and Schemes that Brought Down Soeharto (PSBDS

    Directory of Open Access Journals (Sweden)

    Sugeng Purwanto

    2012-12-01

    Full Text Available The real cause of Soeharto’s fall from the Indonesian presidency remains a mystery. Richard Mann (1998 launched three significant rhetorical questions: (a Was President Soeharto toppled by student demonstrators and people’s power? (b Was he brought down by the withdrawal of support from the United States? (c Or, was his sudden fall brought about by all of the two plus large doses of Oriental plotting and scheming? This article attempts to analyze Richard Mann’s PSBDS in terms of its macrostructure in order to find out the real cause of Soeharto’s fall. The analysis is substantiated by different resources as linguistic evidences, to justify the validity of the findings. The study revealed a proposition that critical reading is the key to successful comprehension of a text which may include a crosschecking with other resources, a careful identification of the generic structure of a text, and paying attention to how an author positions his or her readers. The article concludes, that in fact, Soeharto resigned from presidency on his own wisdom in order to avoid more bloodshed in Indonesian dreamland.

  6. Security and SCADA protocols

    International Nuclear Information System (INIS)

    Igure, V. M.; Williams, R. D.

    2006-01-01

    Supervisory control and data acquisition (SCADA) networks have replaced discrete wiring for many industrial processes, and the efficiency of the network alternative suggests a trend toward more SCADA networks in the future. This paper broadly considers SCADA to include distributed control systems (DCS) and digital control systems. These networks offer many advantages, but they also introduce potential vulnerabilities that can be exploited by adversaries. Inter-connectivity exposes SCADA networks to many of the same threats that face the public internet and many of the established defenses therefore show promise if adapted to the SCADA differences. This paper provides an overview of security issues in SCADA networks and ongoing efforts to improve the security of these networks. Initially, a few samples from the range of threats to SCADA network security are offered. Next, attention is focused on security assessment of SCADA communication protocols. Three challenges must be addressed to strengthen SCADA networks. Access control mechanisms need to be introduced or strengthened, improvements are needed inside of the network to enhance security and network monitoring, and SCADA security management improvements and policies are needed. This paper discusses each of these challenges. This paper uses the Profibus protocol as an example to illustrate some of the vulnerabilities that arise within SCADA networks. The example Profibus security assessment establishes a network model and an attacker model before proceeding to a list of example attacks. (authors)

  7. [Computerized clinical protocol for occlusion].

    Science.gov (United States)

    Salsench, J; Ferrer, J; Nogueras, J

    1988-11-01

    In making a protocol it is necessary that all members of the team who are going to collect information have the same unity of criterion about the different variables that compose it. The drawing up of this document is as much or more necessary than the protocol itself. In this work we all data collected in the protocol and we give the explanations of each concept.

  8. Static Validation of Security Protocols

    DEFF Research Database (Denmark)

    Bodei, Chiara; Buchholtz, Mikael; Degano, P.

    2005-01-01

    We methodically expand protocol narrations into terms of a process algebra in order to specify some of the checks that need to be made in a protocol. We then apply static analysis technology to develop an automatic validation procedure for protocols. Finally, we demonstrate that these techniques ...... suffice to identify several authentication flaws in symmetric and asymmetric key protocols such as Needham-Schroeder symmetric key, Otway-Rees, Yahalom, Andrew secure RPC, Needham-Schroeder asymmetric key, and Beller-Chang-Yacobi MSR...

  9. Unconditionally Secure Protocols

    DEFF Research Database (Denmark)

    Meldgaard, Sigurd Torkel

    This thesis contains research on the theory of secure multi-party computation (MPC). Especially information theoretically (as opposed to computationally) secure protocols. It contains results from two main lines of work. One line on Information Theoretically Secure Oblivious RAMS, and how....... We construct an oblivious RAM that hides the client's access pattern with information theoretic security with an amortized $\\log^3 N$ query overhead. And how to employ a second server that is guaranteed not to conspire with the first to improve the overhead to $\\log^2 N$, while also avoiding...... they are used to speed up secure computation. An Oblivious RAM is a construction for a client with a small $O(1)$ internal memory to store $N$ pieces of data on a server while revealing nothing more than the size of the memory $N$, and the number of accesses. This specifically includes hiding the access pattern...

  10. Protocols for Scholarly Communication

    CERN Document Server

    Pepe, Alberto; Pepe, Alberto; Yeomans, Joanne

    2007-01-01

    CERN, the European Organization for Nuclear Research, has operated an institutional preprint repository for more than 10 years. The repository contains over 850,000 records of which more than 450,000 are full-text OA preprints, mostly in the field of particle physics, and it is integrated with the library's holdings of books, conference proceedings, journals and other grey literature. In order to encourage effective propagation and open access to scholarly material, CERN is implementing a range of innovative library services into its document repository: automatic keywording, reference extraction, collaborative management tools and bibliometric tools. Some of these services, such as user reviewing and automatic metadata extraction, could make up an interesting testbed for future publishing solutions and certainly provide an exciting environment for e-science possibilities. The future protocol for scientific communication should naturally guide authors towards OA publication and CERN wants to help reach a full...

  11. Kalman filters for assimilating near-surface observations into the Richards equation - Part 2: A dual filter approach for simultaneous retrieval of states and parameters

    Science.gov (United States)

    Medina, H.; Romano, N.; Chirico, G. B.

    2014-07-01

    This study presents a dual Kalman filter (DSUKF - dual standard-unscented Kalman filter) for retrieving states and parameters controlling the soil water dynamics in a homogeneous soil column, by assimilating near-surface state observations. The DSUKF couples a standard Kalman filter for retrieving the states of a linear solver of the Richards equation, and an unscented Kalman filter for retrieving the parameters of the soil hydraulic functions, which are defined according to the van Genuchten-Mualem closed-form model. The accuracy and the computational expense of the DSUKF are compared with those of the dual ensemble Kalman filter (DEnKF) implemented with a nonlinear solver of the Richards equation. Both the DSUKF and the DEnKF are applied with two alternative state-space formulations of the Richards equation, respectively differentiated by the type of variable employed for representing the states: either the soil water content (θ) or the soil water matric pressure head (h). The comparison analyses are conducted with reference to synthetic time series of the true states, noise corrupted observations, and synthetic time series of the meteorological forcing. The performance of the retrieval algorithms are examined accounting for the effects exerted on the output by the input parameters, the observation depth and assimilation frequency, as well as by the relationship between retrieved states and assimilated variables. The uncertainty of the states retrieved with DSUKF is considerably reduced, for any initial wrong parameterization, with similar accuracy but less computational effort than the DEnKF, when this is implemented with ensembles of 25 members. For ensemble sizes of the same order of those involved in the DSUKF, the DEnKF fails to provide reliable posterior estimates of states and parameters. The retrieval performance of the soil hydraulic parameters is strongly affected by several factors, such as the initial guess of the unknown parameters, the wet or dry

  12. Arte y política: un estudio comparativo de Jacques Rancière y Nelly Richard para el arte latinoamericano

    Directory of Open Access Journals (Sweden)

    Verónica Capasso

    2016-01-01

    Full Text Available En este artículo se indagan y comparan las teorías de Jacques Rancière y Nelly Richard sobre la relación entre arte y política desde el pensamiento posfundacional, y se producen reflexiones y análisis de manifestaciones artísticas latinoamericanas vanguardistas o críticas en diálogo con ambas. Para ello, se parte de una presentación de las teorías de Rancière y Richard en términos generales, se focaliza en las ideas que dichos autores tienen de la política y, específicamente, en la conceptualización que hacen del arte y su relación con la política. Al mismo tiempo, se desarrolla una interpretación de producciones artísticas desde una mirada centrada en sus diversas conexiones con lo político, más allá del contenido temático de estas. Se utiliza la perspectiva metodológica cualitativa transdisciplinaria, que articula distintas áreas de conocimiento (filosofía política, sociología, historia del arte. En el caso de los desarrollos de Jacques Rancière, se recurre a herramientas teóricas metropolitanas para resituarlas y repensarlas en función del arte de Latinoamérica. En este sentido, se trata de potenciar sus ideas en el análisis de casos locales. En cuanto a la teoría de Nelly Richard, sus conceptos de arte crítico y vanguardista se ponen en relación con el arte latinoamericano. Finalmente, se propone una comparación en la cual se destacan similitudes y diferencias conceptuales entre ambos en combinación con análisis de casos para abrir el panorama analítico e interpretativo que vincule teorías actuales con estudios de manifestaciones artísticas locales.

  13. Gene probes: principles and protocols

    National Research Council Canada - National Science Library

    Aquino de Muro, Marilena; Rapley, Ralph

    2002-01-01

    ... of labeled DNA has allowed genes to be mapped to single chromosomes and in many cases to a single chromosome band, promoting significant advance in human genome mapping. Gene Probes: Principles and Protocols presents the principles for gene probe design, labeling, detection, target format, and hybridization conditions together with detailed protocols, accom...

  14. Developing frameworks for protocol implementation

    NARCIS (Netherlands)

    de Barros Barbosa, C.; de barros Barbosa, C.; Ferreira Pires, Luis

    1999-01-01

    This paper presents a method to develop frameworks for protocol implementation. Frameworks are software structures developed for a specific application domain, which can be reused in the implementation of various different concrete systems in this domain. The use of frameworks support a protocol

  15. Exact and grid-free solutions to the Lighthill-Whitham-Richards traffic flow model with bounded acceleration for a class of fundamental diagrams

    KAUST Repository

    Qiu, Shanwen

    2013-09-01

    In this article, we propose a new exact and grid-free numerical scheme for computing solutions associated with an hybrid traffic flow model based on the Lighthill-Whitham-Richards (LWR) partial differential equation, for a class of fundamental diagrams. In this hybrid flow model, the vehicles satisfy the LWR equation whenever possible, and have a constant acceleration otherwise. We first propose a mathematical definition of the solution as a minimization problem. We use this formulation to build a grid-free solution method for this model based on the minimization of component function. We then derive these component functions analytically for triangular fundamental diagrams, which are commonly used to model traffic flow. We also show that the proposed computational method can handle fixed or moving bottlenecks. A toolbox implementation of the resulting algorithm is briefly discussed, and posted at https://dl.dropbox.com/u/1318701/Toolbox.zip. © 2013 Elsevier Ltd.

  16. Richard Bradley: a unified, living agent theory of the cause of infectious diseases of plants, animals, and humans in the first decades of the 18th century.

    Science.gov (United States)

    Santer, Melvin

    2009-01-01

    During the years 1714 to 1721, Richard Bradley, who was later to become the first Professor of Botany at Cambridge University, proposed a unified, unique, living agent theory of the cause of infectious diseases of plants and animals and the plague of humans. Bradley's agents included microscopic organisms, revealed by the studies of Robert Hooke and Antony van Leeuwenhoek. His theory derived from his experimental studies of plants and their diseases and from microscopic observation of animalcules in different naturally occurring and artificial environments. He concluded that there was a microscopic world of "insects" that lived and reproduced under the appropriate conditions, and that infectious diseases of plants were caused by such "insects." Since there are structural and functional similarities between plants and animals, Bradley concluded that microscopic organisms caused human and animal infectious diseases as well. However, his living agent cause of infectious diseases was not accepted by the contemporary scientific society.

  17. An Exact and Grid-free Numerical Scheme for the Hybrid Two Phase Traffic Flow Model Based on the Lighthill-Whitham-Richards Model with Bounded Acceleration

    KAUST Repository

    Qiu, Shanwen

    2012-07-01

    In this article, we propose a new grid-free and exact solution method for computing solutions associated with an hybrid traffic flow model based on the Lighthill- Whitham-Richards (LWR) partial differential equation. In this hybrid flow model, the vehicles satisfy the LWR equation whenever possible, and have a fixed acceleration otherwise. We first present a grid-free solution method for the LWR equation based on the minimization of component functions. We then show that this solution method can be extended to compute the solutions to the hybrid model by proper modification of the component functions, for any concave fundamental diagram. We derive these functions analytically for the specific case of a triangular fundamental diagram. We also show that the proposed computational method can handle fixed or moving bottlenecks.

  18. The rudiments of an Internet-based health plan for consumers: an interview with John Danaher, MD, MBA. Interview by Richard L. Reece.

    Science.gov (United States)

    Danaher, J

    2000-01-01

    Richard L. Reece, MD, interviewed John Danaher, MD, MBA, on August 16, 2000, to discuss how his new company is preparing for the perfect storm--the looming convergence of demanding consumers, defined contributions, and Internet-based health plans. He describes how his firm is putting financial and clinical tools in the hands of consumers and physicians, so consumers can be more enlightened in their health care choices. Danaher says, "We're not about buying goods and services online. We are transforming the way consumers buy health care and seek insurance. We're trying to be a 401 k where people get on, knowing their risk profile and return horizons. We aim to motivate consumers to be proactive in making health care choices. How do we make consumers responsible and motivated enough to take control of managing their health care costs? How well we articulate this call to consumer action will be the key to our success."

  19. Richard Francis Burton e a inserÃÃo do kama-sutras como um manual sexual entre os vitorianos (Inglaterra, 1883)

    OpenAIRE

    Felipe Salvador Weissheimer

    2014-01-01

    Dentre os vÃrios âKama-sutrasâ difundidos no mercado, a versÃo clÃssica foi escrita por Vatsyayana (sÃculo I-IV, aproximadamente) e publicada na Inglaterra em 1883 pela Sociedade Hindu Kama-Shastra. Richard Francis Burton foi o membro de maior importÃncia na Sociedade Hindu Kama-Shastra, pois, alÃm de fomentar a publicaÃÃo, auxiliou na traduÃÃo, editou e enunciou vÃrios comentÃrios ao longo da obra. Em seus comentÃrios, percebemos que o projeto da traduÃÃo e publicaÃÃo do Kama-sutras visava e...

  20. Imitating Jesus, yes – but which Jesus? A critical engagement with the ethics of Richard Burridge in Imitating Jesus: An inclusive approach to New Testament ethics (2007

    Directory of Open Access Journals (Sweden)

    Jonathan A. Draper

    2009-08-01

    Full Text Available This paper examines the attempt by Richard Burridge in his recent book, Imitating Jesus: An inclusive approach to New Testament ethics (2007, to build an engaged Christian ethics starting with the historical Jesus but taking full account of the insights into the perspectives of the four gospels in their own right, based on their genre as Greek bioi. While Burridge’s approach is applauded and regarded as a major step forward, it is critiqued here on his selectivity in his presentation of the results of two decades of research into the Jesus of history. Burridge’s selection of the South African experience in the struggle against apartheid as his ‘test case’ is also questioned, since the issues in such struggles for justice appear more straightforward to outsiders than they do to insiders and his analysis raises more questions than it answers.

  1. Je suis un zombie : Études récentes sur Richard Matheson et le mort-vivant

    OpenAIRE

    Ransom, Amy J.; Trudel, Jean-Louis

    2013-01-01

    Dans ce texte nous résumons quatre essais récents sur le phénomène actuel du zombie ainsi qu’un collectif sur l’œuvre de Richard Matheson dont la première version filmique du roman Je suis une légende a servi d’inspiration à l’ur-film de zombies, La nuit des morts vivants de George A. Romero. Tandis que Pierre Cassou-Noguès et Maxime Coulombe signent des traitements plus philosophiques du zombie, leurs ouvrages diffèrent beaucoup dans leur forme et leur fonction. Pour leur part, Amélie Pépin ...

  2. Protocols for Scholarly Communication

    Science.gov (United States)

    Pepe, A.; Yeomans, J.

    2007-10-01

    CERN, the European Organization for Nuclear Research, has operated an institutional preprint repository for more than 10 years. The repository contains over 850,000 records of which more than 450,000 are full-text OA preprints, mostly in the field of particle physics, and it is integrated with the library's holdings of books, conference proceedings, journals and other grey literature. In order to encourage effective propagation and open access to scholarly material, CERN is implementing a range of innovative library services into its document repository: automatic keywording, reference extraction, collaborative management tools and bibliometric tools. Some of these services, such as user reviewing and automatic metadata extraction, could make up an interesting testbed for future publishing solutions and certainly provide an exciting environment for e-science possibilities. The future protocol for scientific communication should guide authors naturally towards OA publication, and CERN wants to help reach a full open access publishing environment for the particle physics community and related sciences in the next few years.

  3. Effectiveness of oxaliplatin desensitization protocols.

    Science.gov (United States)

    Cortijo-Cascajares, Susana; Nacle-López, Inmaculada; García-Escobar, Ignacio; Aguilella-Vizcaíno, María José; Herreros-de-Tejada, Alberto; Cortés-Funes Castro, Hernán; Calleja-Hernández, Miguel-Ángel

    2013-03-01

    Hypersensitivity reaction (HSR) to antineoplastic drugs can force doctors to stop treatment and seek other alternatives. These alternatives may be less effective, not as well tolerated and/or more expensive. Another option is to use desensitization protocols that induce a temporary state of tolerance by gradually administering small quantities of the antineoplastic drug until the therapeutic dosage is reached. The aim of this study is to assess the effectiveness of oxaliplatin desensitization protocols. A retrospective observational study was carried out between January 2006 and May 2011. The inclusion criteria were patients undergoing chemotherapy treatment with oxaliplatin who had developed an HSR to the drug and who were candidates for continuing the treatment using a desensitization protocol. The patients' clinical records were reviewed and variables were gathered relating to the patient, the treatment, the HSR, and the desensitization protocol administered. The data were analysed using version 18.0 of the statistics program SPSS. A total of 53 desensitization protocols were administered to 21 patients. In 89 % of these cases, no new reactions occurred while the drug was being administered. New reactions of mild severity only occurred in 11 % of cases, and none of these reactions were severe enough for treatment to be stopped. All patients were able to complete the desensitization protocol. This study confirms that oxaliplatin desensitization protocols are safe and effective and allow patients to continue with the treatment that initially caused an HSR.

  4. Deterministic secure communication protocol without using entanglement

    OpenAIRE

    Cai, Qing-yu

    2003-01-01

    We show a deterministic secure direct communication protocol using single qubit in mixed state. The security of this protocol is based on the security proof of BB84 protocol. It can be realized with current technologies.

  5. SIP protocol model for OMNET++

    Directory of Open Access Journals (Sweden)

    Jan Kucerak

    2016-01-01

    Full Text Available The article describes our new SIP protocol implementation for the OMNeT++ simulation framework. OMNeT++ simulation framework provides an extensive support of IP related protocols, nevertheless a working SIP protocol implementation is missing. Real measurements were also done using a SIPp traffic generator and the results are compared to those obtained by our new SIP model. Since this work is a part of bigger project concerned strictly on measuring "first response times" over networks with a faulty transmission links, the actually collected statistics are focused only this way.

  6. The HPA photon protocol and proposed electron protocol

    International Nuclear Information System (INIS)

    Pitchford, W.G.

    1985-01-01

    The Hospital Physicists Association (HPA) photon dosimetry protocol has been produced and was published in 1983. Revised values of some components of Csub(lambda) and refinements introduced into the theory in the last few years have enabled new Csub(lambda) values to be produced. The proposed HPA electron protocol is at present in draft form and will be published shortly. Both protocels are discussed. (Auth.)

  7. Antibody engineering: methods and protocols

    National Research Council Canada - National Science Library

    Chames, Patrick

    2012-01-01

    "Antibody Engineering: Methods and Protocols, Second Edition was compiled to give complete and easy access to a variety of antibody engineering techniques, starting from the creation of antibody repertoires and efficient...

  8. Implementation of postoperative handoff protocol

    African Journals Online (AJOL)

    Background: Standardised handoff protocols have become necessary patient ... improve the perioperative handoff communications from the cardiac operating theatres to the ICU. ..... as you can imagine, there was push-back to the change.

  9. Data Exchange Protocol in Repsail

    Directory of Open Access Journals (Sweden)

    Gucma Maciej

    2017-12-01

    Full Text Available Article presents implantation and theoretical considerations of data exchange protocol developed for the RepSail project, where main objective was design and building innovative hybrid yacht. One of problems during the design process was improper functioning of data exchange protocols that were available in the commercially available devices to mention navigation purpose NMEA183 or 2000 as well as automation dedicated ones (CAN and similar. Author shows the basis of the dedicated format of exchange for in board devices.

  10. The Groningen protocol: another perspective

    OpenAIRE

    Jotkowitz, A B; Glick, S

    2006-01-01

    The Groningen protocol allows for the euthanasia of severely ill newborns with a hopeless prognosis and unbearable suffering. We understand the impetus for such a protocol but have moral and ethical concerns with it. Advocates for euthanasia in adults have relied on the concept of human autonomy, which is lacking in the case of infants. In addition, biases can potentially influence the decision making of both parents and physicians. It is also very difficult to weigh the element of quality of...

  11. The Richard C. Schneider Lecture. New dimensions of neurosurgery in the realm of high technology: possibilities, practicalities, realities.

    Science.gov (United States)

    Apuzzo, M L

    1996-04-01

    Fueled by a buoyant economy, popular attitudes and demands, and parallel progress in transferable technical and biological areas, neurosurgery has enjoyed a remarkable quarter of a century of progress. Developmental trends in the discipline have included the following: 1) a refinement of preoperative definition of the structural substrate, 2) miniaturization of operative corridors, 3) reduction of operative trauma, 4) increased effectiveness at the target site, and 5) incorporation of improved technical adjuvants and physical operative tools into treatment protocols. In particular, the computer has become a formidable ally in diagnostic and surgical events. Trends in technical development indicate that we are entering an exciting era of advanced surgery of the human cerebrum, which is heralded by the following: 1) current developments in areas of imaging, sensors, and visualization; 2) new devices for localization and navigation; 3) new capabilities for action at the target point; and 4) innovative concepts related to advanced operative venues. Imaging has provided structurally based surgical maps, which now are being given the new dimension of function in complex and integrated formats for preoperative planning and intraoperative tactical direction. Cerebral localization and navigation based on these advances promise to provide further refinement to the field of stereotactic neurosurgery, as linked systems are superseded by more flexible nonlinked methodologies in functionally defined volume-oriented navigational databases. Target point action now includes not only ablative capabilities through micro-operative methods and the use of stereotactically directed high-energy forms but also the emergence of restorative capabilities through applications of principles of genetic engineering in the areas of molecular and cellular neurosurgery. Complex, dedicated, and self-contained operative venues will be required to optimize the emergence and development of these

  12. Monoclonal antibodies technology. Protocols

    International Nuclear Information System (INIS)

    Acevado Castro, B.E.

    1997-01-01

    Full text: Immunization. The first step in preparing useful monoclonal antibodies (MAbs) is to immunize an animal (Balb/c for example) with an appropriate antigen. Methods (only for soluble antigen): Solubilize selected antigen in Phosphate buffer solution (PBS) at pH 7.2-7.4, ideally at a final concentration per animal between 10 to 50 μg/ml. It is recommended that the antigen under consideration be incorporated into the emulsion adjuvants in 1:1 volumetric relation. We commonly use Frend's adjuvant (FA) to prepared immunized solution. The first immunization should be prepared with complete FA, and the another could be prepared with incomplete FA. It is recommended to inject mice with 0.2 ml intraperitoneal (ip) or subcutaneous (sc). Our experience suggests the sc route is the preferred route. A minimum protocol for immunizing mice to generate cells for preparing hybridomas is s follows: immunize sc on day 0, boost sc on day 21, take a trial bleeding on day 26; if antibody titters are satisfactory, boost ip on day 35 with antigen only, and remove the spleen to obtain cells for fusion on day 38. Fusion protocol. The myeloma cell line we are using is X63 Ag8.653. At the moment of fusion myeloma cells need a good viability (at least a 95%). 1. Remove the spleen cells from immunized mice using sterile conditions. An immune spleen should yield between 7 a 10x10 7 nucleated cells. 2. Place the spleen in 20 ml of serum-free RPMI 1640 in a Petri dish. Using a needle and syringe, inject the spleen with medium to distend and disrupt the spleen stroma and free the nucleated cells. 3. Flush the cell suspension with a Pasteur pipet to disperse clumps of cells. 4. Centrifuge the spleen cell suspension at 250g for 10 min. Resuspend the pellet in serum-free RPMI 1640. Determine cell concentration using Neuhabuer chamber. 5. Mix the myeloma cells and spleen cells in a conical 50-ml tube in serum-free RPMI 1640, 1 x10 7 spleen cells to 1x10 6 myeloma cells (ratio 10:1). Centrifuge

  13. Families of quantum fingerprinting protocols

    Science.gov (United States)

    Lovitz, Benjamin; Lütkenhaus, Norbert

    2018-03-01

    We introduce several families of quantum fingerprinting protocols to evaluate the equality function on two n -bit strings in the simultaneous message passing model. The original quantum fingerprinting protocol uses a tensor product of a small number of O (logn ) -qubit high-dimensional signals [H. Buhrman et al., Phys. Rev. Lett. 87, 167902 (2001), 10.1103/PhysRevLett.87.167902], whereas a recently proposed optical protocol uses a tensor product of O (n ) single-qubit signals, while maintaining the O (logn ) information leakage of the original protocol [J. M. Arazola and N. Lütkenhaus, Phys. Rev. A 89, 062305 (2014), 10.1103/PhysRevA.89.062305]. We find a family of protocols which interpolate between the original and optical protocols while maintaining the O (logn ) information leakage, thus demonstrating a tradeoff between the number of signals sent and the dimension of each signal. There has been interest in experimental realization of the recently proposed optical protocol using coherent states [F. Xu et al., Nat. Commun. 6, 8735 (2015), 10.1038/ncomms9735; J.-Y. Guan et al., Phys. Rev. Lett. 116, 240502 (2016), 10.1103/PhysRevLett.116.240502], but as the required number of laser pulses grows linearly with the input size n , eventual challenges for the long-time stability of experimental setups arise. We find a coherent state protocol which reduces the number of signals by a factor 1/2 while also reducing the information leakage. Our reduction makes use of a simple modulation scheme in optical phase space, and we find that more complex modulation schemes are not advantageous. Using a similar technique, we improve a recently proposed coherent state protocol for evaluating the Euclidean distance between two real unit vectors [N. Kumar et al., Phys. Rev. A 95, 032337 (2017), 10.1103/PhysRevA.95.032337] by reducing the number of signals by a factor 1/2 and also reducing the information leakage.

  14. The Network Protocol Analysis Technique in Snort

    Science.gov (United States)

    Wu, Qing-Xiu

    Network protocol analysis is a network sniffer to capture data for further analysis and understanding of the technical means necessary packets. Network sniffing is intercepted by packet assembly binary format of the original message content. In order to obtain the information contained. Required based on TCP / IP protocol stack protocol specification. Again to restore the data packets at protocol format and content in each protocol layer. Actual data transferred, as well as the application tier.

  15. Understanding protocol performance: impact of test performance.

    Science.gov (United States)

    Turner, Robert G

    2013-01-01

    This is the second of two articles that examine the factors that determine protocol performance. The objective of these articles is to provide a general understanding of protocol performance that can be used to estimate performance, establish limits on performance, decide if a protocol is justified, and ultimately select a protocol. The first article was concerned with protocol criterion and test correlation. It demonstrated the advantages and disadvantages of different criterion when all tests had the same performance. It also examined the impact of increasing test correlation on protocol performance and the characteristics of the different criteria. To examine the impact on protocol performance when individual tests in a protocol have different performance. This is evaluated for different criteria and test correlations. The results of the two articles are combined and summarized. A mathematical model is used to calculate protocol performance for different protocol criteria and test correlations when there are small to large variations in the performance of individual tests in the protocol. The performance of the individual tests that make up a protocol has a significant impact on the performance of the protocol. As expected, the better the performance of the individual tests, the better the performance of the protocol. Many of the characteristics of the different criteria are relatively independent of the variation in the performance of the individual tests. However, increasing test variation degrades some criteria advantages and causes a new disadvantage to appear. This negative impact increases as test variation increases and as more tests are added to the protocol. Best protocol performance is obtained when individual tests are uncorrelated and have the same performance. In general, the greater the variation in the performance of tests in the protocol, the more detrimental this variation is to protocol performance. Since this negative impact is increased as

  16. Will the real Robert Neville please, come out? Vampirism, the ethics of queer monstrosity, and capitalism in Richard Matheson's I am legend?

    Science.gov (United States)

    Khader, Jamil

    2013-01-01

    In this article, I argue that Richard Matheson's (1954) vampire novella, I Am Legend, encodes the protagonist's, Robert Neville, traumatic recognition of his queer sexuality in its monstrosity (the unspeakability of male penetrability). Neville's identification with and desire for his undead neighbor, Ben Cortman, are symbolically codified through three different registers: intertextual references to vampiric conventions and codes, the semiotics of queer subculture, and a structure of doubling that links Neville to the queer vampire. Although Neville avoids encountering his unspeakable queer desire, which could be represented only at the level of the Lacanian Real, he must still confront Cortman's obsessive exhortations for him to come out. Only when he symbolically codifies his abnormality in its own monstrosity, by viewing himself through mutant vampires' eyes, can Neville reconfigure the ethical relationship between self and other, humans and mutant humans-vampires. However progressive Matheson's novella is in its advocacy of minority sexual rights, it still renders capitalism's problematic relationship with queer subjectivity invisible. Although capitalism overdetermines every aspect of the social field and makes Neville's daily life possible in its surplus enjoyment, the fundamental antagonism (class struggle) in capitalism is obscured by the assertion of identity politics.

  17. Kalman filters for assimilating near-surface observations in the Richards equation - Part 2: A dual filter approach for simultaneous retrieval of states and parameters

    Science.gov (United States)

    Medina, H.; Romano, N.; Chirico, G. B.

    2012-12-01

    We present a dual Kalman Filter (KF) approach for retrieving states and parameters controlling soil water dynamics in a homogenous soil column by using near-surface state observations. The dual Kalman filter couples a standard KF algorithm for retrieving the states and an unscented KF algorithm for retrieving the parameters. We examine the performance of the dual Kalman Filter applied to two alternative state-space formulations of the Richards equation, respectively differentiated by the type of variable employed for representing the states: either the soil water content (θ) or the soil matric pressure head (h). We use a synthetic time-series series of true states and noise corrupted observations and a synthetic time-series of meteorological forcing. The performance analyses account for the effect of the input parameters, the observation depth and the assimilation frequency as well as the relationship between the retrieved states and the assimilated variables. We show that the identifiability of the parameters is strongly conditioned by several factors, such as the initial guess of the unknown parameters, the wet or dry range of the retrieved states, the boundary conditions, as well as the form (h-based or θ-based) of the state-space formulation. State identifiability is instead efficient even with a relatively coarse time-resolution of the assimilated observation. The accuracy of the retrieved states exhibits limited sensitivity to the observation depth and the assimilation frequency.

  18. Protocorms of an epiphytic orchid (Epidendrum amphistomum A. Richard recovered in situ, and subsequent identification of associated mycorrhizal fungi using molecular markers

    Directory of Open Access Journals (Sweden)

    Lawrence W. Zettler

    2012-02-01

    Full Text Available Epiphytic orchids have received considerable study, yet little has been published on their germination requirements in situ involving mycorrhizal fungi. Such research has been hampered by the small, dust-like size of seeds and leafless seedlings (protocorms which are difficult to pinpoint on natural substrates, especially those on arboreal substrates (tree limbs. We report a novel seed sowing and retrieval method, modified from one applied to terrestrial orchids, used in the acquisition of epiphytic orchid protocorms from the Florida Panther National Wildlife Refuge. Seeds from two epiphytic orchid species (Epidendrum amphistomum A. Richard, E. nocturnum Jacquin were placed in separate nylon mesh packets secured within 35 mm plastic slide mounts, and affixed to tree bark using gutter mesh and a staple gun. To confirm that the embryos were viable, some seeds were also sown on asymbiotic media in the laboratory which subsequently germinated after 52 days incubation. Of 60 packets distributed among 18 tree limb sites, one packet – harboring seeds of E. amphistomum affixed to pop ash (Fraxinus caroliniana Mill. on a moss substrate – harbored protocorms after 267 days. Using molecular markers, a fungus assignable to the Ceratobasidiaceae, appears to be the mycorrhizal associate of these protocorms suggesting that this fungus may be associated with the germination process in situ.

  19. Da Chrétien de Troyes a Shakespeare («The tragedy of King Richard the Third», a. I, sc. 2

    Directory of Open Access Journals (Sweden)

    Alfonso D'Agostino

    2015-07-01

    Full Text Available L’articolo si propone di considerare le somiglianze fra alcune vicende antico-francesi (l’Yvain di Chrétien de Troyes e il fabliau anonimo De celle que se fist foutre sur la fosse son mari con una scena del Riccardo III di Shakespeare. Anche se non si può dire che il dramma inglese dipenda dai testi narrativi oitanici, esso sviluppa lo stesso motivo della vedova consolata e una serie di motivi secondarî, di immagini (il sangue, il diavolo, la seduzione e di espressioni letterarie in modo sintomaticamente affine. The paper aims to evaluate similarities between some Old-French narratives (Chrétien de Troyes’ Yvain and the anonymous fabliau De celle que se fist foutre sur la fosse son mari and a scene from Shakespeare’s Richard III. Although we cannot affirm that Shakespeare’s play derives from the French narratives, it develops the same theme of “comforted widow” along with a series of secondary themes, of images (the blood, the devil, the seduction and literary expressions in a symptomatically, very similar way.

  20. Energy world governance. Review of the conference which was held at IFRI, 26 March 2009, with Tatsuo Masuda, Andre Mernier et Richard H. Jones

    International Nuclear Information System (INIS)

    Schulke, Ch.

    2009-01-01

    The conference was related with some of the major questions concerning global energy governance today, the role of the different international organizations dealing with energy, the rules of the game between market and state players, the efforts to deal with climate change, and the integration of emerging countries in global energy governance, the roles of the different international organizations dealing with energy (will we see further fragmentation or more cooperation between them?). Tatsuo Masuda in his contribution discussed global energy governance from an oil perspective. Andre Mernier noted the particular nature of the Energy Charter, which, as it is founded upon an international treaty, is unlike other organizations in being legally binding. The legal basis of the organization means that agreements are especially powerful. Then Richard H. Jones underlined that last summer's volatility in oil markets, the ensuing financial and economic crisis, the major disruption in gas supplies to European markets this winter and the upcoming climate change negotiations have led to increasing calls for a stronger global dialogue on energy issues. This dialogue should deal with prices and investment, energy security and climate change

  1. The Geneva Protocol of 1925

    International Nuclear Information System (INIS)

    Mc Elroy, R.J.

    1991-01-01

    This paper reports that when President Gerald Ford signed the instruments of ratification for the Geneva Protocol of 1925 on January 22, 1975, a tortured, half-century-long chapter in U.S. arms control policy was brought to a close. Fifty years earlier, at the Geneva Conference for the Control of the International Trade in Arms, Munitions and Implements of War, the United States had played a key role in drafting and reaching agreement on the Protocol for the Prohibition of the Use in War of Asphyxiating, Poisonous or Other Gases and of Bacteriological Methods of Warfare. The protocol, signed by thirty nations, including the United States, on June 17, 1925, prohibits the use in war of asphyxiating, poisonous or other gases, and of all analogous liquids, materials or devices as well as the use of bacteriological methods of warfare

  2. The Kyoto protocol development; La viabilite du protocole de Kyoto

    Energy Technology Data Exchange (ETDEWEB)

    Cooper, R. [Harvard Univ., Barrow, AK (United States); Guesneris, R. [College de France, 75 - Paris (France)

    2002-04-01

    From the author R. Cooper point of view the Kyoto Protocol is a flawed concept. The reasons for dropping Kyoto are presented in this paper insisting that rejecting Kyoto not means to imply that global climate change is not a serious problem. After a presentation of the US policy facing the Climatic Change, some concluding propositions are proposed. (A.L.B.)

  3. Symbolic Analysis of Cryptographic Protocols

    DEFF Research Database (Denmark)

    Dahl, Morten

    We present our work on using abstract models for formally analysing cryptographic protocols: First, we present an ecient method for verifying trace-based authenticity properties of protocols using nonces, symmetric encryption, and asymmetric encryption. The method is based on a type system...... of Gordon et al., which we modify to support fully-automated type inference. Tests conducted via an implementation of our algorithm found it to be very ecient. Second, we show how privacy may be captured in a symbolic model using an equivalencebased property and give a formal denition. We formalise...

  4. La chiesa di Richard Meier a Tor Tre Teste e il suo contributo al consolidamento identitario dei nuovi quartieri romani oltre il GRA / The church designed by Richard Meier in Tor Tre Teste and the identity consolidation in the new roman neighbourhoods beyond the Great Circular Road

    Directory of Open Access Journals (Sweden)

    Giuseppe Bonaccorso

    2014-06-01

    Full Text Available Il contributo proposto ha l’obiettivo di analizzare alcuni significativi brani del tessuto urbano della periferia est di Roma, adottando metodi interpretativi legati alla storia, alla società, alla programmazione urbanistica e alla costruzione. Gli aspetti salienti del quadrante orientale della periferia romana verranno così delineati partendo “dal di dentro”, sottolineandone i percorsi, gli spazi e i nuclei compositivi che sono all’origine della struttura e della forma stessa dei quartieri disposti a cavallo del Grande Raccordo Anulare. In questo ambito, si pone l’attenzione su alcuni episodi chiave che vedono protagoniste le nuove chiese che riescono a creare una centralità all’interno dei quartieri periferici sostituendo le biblioteche, le piazze e i centri commerciali.  Analizzando da vicino questi esempi, si scopre come di recente sono state realizzate chiese firmate da architetti di fama internazionale proprio allo scopo di rafforzare, o meglio di costruire, un fattore identitario per ciascun quartiere ubicato nel settore orientale della città. Partendo quindi dal generale si arriva a indagare una chiesa e un quartiere che possono essere considerati un modello da seguire per tutta la periferia a ridosso del GRA: la chiesa giubilare di Dio Padre Misericordioso progettata da Richard Meier nel quartiere di Tor Tre Teste. La sequenzialità degli eventi che hanno contraddistinto il concorso per la progettazione della chiesa, la scelta della proposta di Richard Meier, la complessità del cantiere, l’analisi tecnica, stilistica e simbolica della realizzazione finale sono quindi analizzate nell’ambito del rapporto con il quartiere e del tentativo di realizzare (attraverso di essa un centro di attrazione per tutta la periferia.   The article analyses some significant parts of the urban tissue at the eastern periphery of Rome, using the interpretative methods inherent to history, society, urban programming and construction

  5. Petri Nets in Cryptographic Protocols

    DEFF Research Database (Denmark)

    Crazzolara, Federico; Winskel, Glynn

    2001-01-01

    A process language for security protocols is presented together with a semantics in terms of sets of events. The denotation of process is a set of events, and as each event specifies a set of pre and postconditions, this denotation can be viewed as a Petri net. By means of an example we illustrate...

  6. Improving the DGK comparison protocol

    NARCIS (Netherlands)

    Veugen, P.J.M.

    2012-01-01

    When processing signals in the encrypted domain, homomorphic encryption can be used to enable linear operations on encrypted data. Comparison of encrypted data however requires an additional protocol between the parties and will be relatively expensive. A well-known and frequently used comparison

  7. Performance Evaluation of Security Protocols

    DEFF Research Database (Denmark)

    Bodei, Chiara; Buchholtz, Mikael; Curti, Michele

    2005-01-01

    We use a special operational semantics which drives us in inferring quantitative measures on systems describing cryptographis cryptographic protocols. We assign rates to transitions by only looking at these labels. The rates reflect the distributed architecture running applications and the use...... of possibly different cryptosystems. We then map transition systems to Markov chains and evaluate performance of systems, using standard tools....

  8. Art. 1 Eerste Protocol EVRM

    NARCIS (Netherlands)

    Poelmann, E.

    2014-01-01

    Het recht op bezit is niet in het Europees Verdrag ter bescherming van de rechten van de mens en de fundamentele vrijheden (hierna: EVRM) neergelegd, maar in het Eerste Protocol daarbij (hierna: EP), dat in 1954 in werking is getreden. Het is van belang voor ogen te houden dat de Tweede Wereldoorlog

  9. Bundle Security Protocol for ION

    Science.gov (United States)

    Burleigh, Scott C.; Birrane, Edward J.; Krupiarz, Christopher

    2011-01-01

    This software implements bundle authentication, conforming to the Delay-Tolerant Networking (DTN) Internet Draft on Bundle Security Protocol (BSP), for the Interplanetary Overlay Network (ION) implementation of DTN. This is the only implementation of BSP that is integrated with ION.

  10. Affinity biosensors: techniques and protocols

    National Research Council Canada - National Science Library

    Rogers, Kim R; Mulchandani, Ashok

    1998-01-01

    ..., and government to begin or expand their biosensors research. This volume, Methods in Biotechnology vol. 7: Affinity Biosensors: Techniques and Protocols, describes a variety of classical and emerging transduction technologies that have been interfaced to bioaffinity elements (e.g., antibodies and receptors). Some of the reas...

  11. High Entropy Random Selection Protocols

    NARCIS (Netherlands)

    H. Buhrman (Harry); M. Christandl (Matthias); M. Koucky (Michal); Z. Lotker (Zvi); B. Patt-Shamir; M. Charikar; K. Jansen; O. Reingold; J. Rolim

    2007-01-01

    textabstractIn this paper, we construct protocols for two parties that do not trust each other, to generate random variables with high Shannon entropy. We improve known bounds for the trade off between the number of rounds, length of communication and the entropy of the outcome.

  12. A Student Teamwork Induction Protocol

    Science.gov (United States)

    Kamau, Caroline; Spong, Abigail

    2015-01-01

    Faulty group processes have harmful effects on performance but there is little research about intervention protocols to pre-empt them in higher education. This naturalistic experiment compared a control cohort with an inducted cohort. The inducted cohort attended a workshop, consultations, elected a leader and used tools (a group log and group…

  13. Cognitive Communications Protocols for SATCOM

    Science.gov (United States)

    2017-10-20

    communications protocols for satellite and space communications with possible broad applications in defense, homeland-security as well as consumer ...communications with possible broad applications in defense, homeland-security, and civilian as well as consumer telecommunications. Such cognitive...vulnerable against smart jammers that may attempt to learn the cognitive radios own behavior . In response, our second class of proposed algorithms

  14. Group covariant protocols for quantum string commitment

    International Nuclear Information System (INIS)

    Tsurumaru, Toyohiro

    2006-01-01

    We study the security of quantum string commitment (QSC) protocols with group covariant encoding scheme. First we consider a class of QSC protocol, which is general enough to incorporate all the QSC protocols given in the preceding literatures. Then among those protocols, we consider group covariant protocols and show that the exact upperbound on the binding condition can be calculated. Next using this result, we prove that for every irreducible representation of a finite group, there always exists a corresponding nontrivial QSC protocol which reaches a level of security impossible to achieve classically

  15. Improvement In MAODV Protocol Using Location Based Routing Protocol

    Directory of Open Access Journals (Sweden)

    Kaur Sharnjeet

    2016-01-01

    Full Text Available Energy saving is difficult in wireless sensor network (WSN due to limited resources. Each node in WSN is constrained by their limited battery power for their energy. The energy is reduced as the time goes off due to the packet transmission and reception. Energy management techniques are necessary to minimize the total power consumption of all the nodes in the network in order to maximize its life span. Our proposed protocol Location based routing (LBR aimed to find a path which utilizes the minimum energy to transmit the packets between the source and the destination. The required energy for the transmission and reception of data is evaluated in MATLAB. LBR is implemented on Multicast Ad hoc On Demand Distance Vector Routing Protocol (MAODV to manage the energy consumption in the transmission and reception of data. Simulation results of LBR show the energy consumption has been reduced.

  16. Multisource data assimilation in a Richards equation-based integrated hydrological model: a real-world application to an experimental hillslope

    Science.gov (United States)

    Camporese, M.; Botto, A.

    2017-12-01

    Data assimilation is becoming increasingly popular in hydrological and earth system modeling, as it allows for direct integration of multisource observation data in modeling predictions and uncertainty reduction. For this reason, data assimilation has been recently the focus of much attention also for integrated surface-subsurface hydrological models, whereby multiple terrestrial compartments (e.g., snow cover, surface water, groundwater) are solved simultaneously, in an attempt to tackle environmental problems in a holistic approach. Recent examples include the joint assimilation of water table, soil moisture, and river discharge measurements in catchment models of coupled surface-subsurface flow using the ensemble Kalman filter (EnKF). Although the EnKF has been specifically developed to deal with nonlinear models, integrated hydrological models based on the Richards equation still represent a challenge, due to strong nonlinearities that may significantly affect the filter performance. Thus, more studies are needed to investigate the capabilities of EnKF to correct the system state and identify parameters in cases where the unsaturated zone dynamics are dominant. Here, the model CATHY (CATchment HYdrology) is applied to reproduce the hydrological dynamics observed in an experimental hillslope, equipped with tensiometers, water content reflectometer probes, and tipping bucket flow gages to monitor the hillslope response to a series of artificial rainfall events. We assimilate pressure head, soil moisture, and subsurface outflow with EnKF in a number of assimilation scenarios and discuss the challenges, issues, and tradeoffs arising from the assimilation of multisource data in a real-world test case, with particular focus on the capability of DA to update the subsurface parameters.

  17. Beyond the Soundtrack: Representing Music in Cinema, a cura di Daniel Goldmark, Lawrence Kramer e Richard Leppert, Berkeley, University of California Press, 2007

    Directory of Open Access Journals (Sweden)

    Francesco Finocchiaro

    2012-11-01

    Full Text Available Beyond the Soundtrack: Representing Music in Cinema (edited by Daniel Goldmark, Lawrence Kramer and Richard Leppert, Berkeley, University of California Press, 2007, viii-324 pp. offers sixteen essays of various authors about film music. These papers were presented in 2004 in a study congress at the University of Minnesota. In introducing the book, the editors assert an assumption, today broadly accepted: indeed they affirm, that music has traditionally been regarded as a subordinate element in cinematographic text: film music literature still has a marginal position in the much larger field of film studies which focuses on image, narrative, film history. In this theoretical and historiographic context, the expression “Beyond the Soundtrack” is meant to be more than a title: it is the manifesto of a conceptual shift. We can summarize this change in reconsidering the importance of film music, in order to understand a movie not only as a visual, but also as a musical medium. The change of paradigm brings renewed questions and completely new issues. If we abandon the assumption, at this point obsolete, that film music has a mere functional role, it will be necessary to ask not how to conceptualize the use of music in film, but rather how the film conceptualizes music: how films imagine music, how films represent music as an artistic and social phenomenon, and how films position music as an integral parts of a fictional world. Such questions aim to consider film music not as an atmospheric expedient, but «as an agent, a force, and an object engaged in ongoing negotiations with image, narrative, and context», as the editors assert at the very beginning of their book.

  18. Flinging a New Star: “Fire and Cloud” and “Bright and Morning Star” as Reflections of Richard Wright’s Changing Relationship with Communism

    Directory of Open Access Journals (Sweden)

    April Conley Kilinski

    2012-10-01

    Full Text Available Richard Wright's collection of short novella's, Uncle Tom's Children, was originally published in 1938; in 1940, after the success of Native Son, a new printing of the text appeared with two additions. The first was the introductory essay entitled "The Ethics of Living Jim Crow," which was written in 1937, and later served as part of Black Boy. The second was the novella "Bright and Morning Star." Michel Fabre notes that Harper's Magazine rejected this story, "but since it fit Party specifications even better than had the four previous stories, New Masses published it as part of a special literary supplement on May 10, [1938]" (164 . In fact, perhaps because New Masses originally published the final story, critical attention to the revised edition of book almost exclusively posits that the 1940 edition reflects Wright's commitment to Communism at the time. However, several of Wright's other writings-including the introductory essay to the 1940 edition, "The Ethics of Living Jim Crow;" "Blue print for Negro Writing," first published in New Challenge in the fall of 1937; "I Tried to be a Communist," first published in Atlantic Monthly in August and September 1944; and his responses to the Communist party's review of Native Son in 1940-also indicate that his focus in the late 1930s was more on the development of an individual black consciousness than on advancing the causes of the Communist party. By juxtaposing the final two stories, "Fire and Cloud" and "Bright and Morning Star," and considering them in terms of the other writings indicated above, I argue that the 1940 edition of Uncle Tom's Children (with the two additions demonstrates Wright's growing ambivalence with the Communist Party between the years of 1937 and 1940.

  19. Charles Richard de Beauregard and the treatment of blennorrhagic urethral stenosis in Madrid in the 18th century: Advertising, secrecy and deception.

    Science.gov (United States)

    Gómiz, J J; Galindo, I

    2015-12-01

    Describe the introduction of the treatment for blennorrhagic urethral stenosis in the city of Madrid in the 18th century by the French surgeon Charles de Beauregard, the formulations employed in the preparation of his personal «bougies», the advertising in the press, their marketing and distribution. Nonsystematic review of the Madrid newspaper Gaceta de Madrid y Diario curioso, erudito, económico y comercial (Madrid Gazette, curious, erudite, financial and commercial) between 1759 and 1790. Review of the medical literature of the 18th century preserved in the Fondo Antiguo of the Biblioteca Histórica of Universidad Complutense de Madrid (Historical Resource of the Historical Library of the Complutense University of Madrid). A Google search of «Charles Richard de Beauregard». Charles de Beauregard focused his professional work mainly on the treatment of the urethral sequela of blennorrhagia, phimosis and paraphimosis. He introduced to 18th century Spanish society (with purported originality and clear commercial interests) therapeutic methods based on lead acetate that had already been developed in France by Thomas Goulard. The urethral sequela of diseases such as blennorrhagic urethritis, stenotic phimosis and paraphimosis were highly prevalent in 18th century Madrid and required complex solutions for the practice of urology of that era. Charles de Beauregard introduced innovative but not original treatments that were invasive but not bloody and that provided him with fame and social prestige. He advertised his professional activity and marketed his therapeutic products through advertisements submitted to the daily press (Madrid Gazette, Gaceta de Madrid). Copyright © 2015 AEU. Publicado por Elsevier España, S.L.U. All rights reserved.

  20. Digging into the Past, Exploring the Present: Richard Flanagan’s Gould’s Book of Fish: A Novel in Twelve Fish

    Directory of Open Access Journals (Sweden)

    Maria Renata Dolce

    2015-07-01

    Full Text Available Abstract – This paper will analyze the ‘historical’ novel Gould’s Book of Fish (2001 by the Tasmanian writer Richard Flanagan with the aim of reflecting upon the power of the creative word as a means to forge reality, shape identities, mask or unmask truths, and also to prefigure a different, alternative world order based on commonly negotiated and thus shared values. The postmodernist revisiting of the traditional genre of the historical novel does not compromise the postcolonial commitment of the writer: Flanagan’s incursions into the Australian colonial past are informed by his concern for urgent social and political causes which has characterized his unswerving fight against all systems of inequality and exploitation. In his novel, the subversion of the linear causal relation of events which calls into question the truthfulness and objectivity of history, together with the foregrounded metanarrative reflection on the art of writing, contribute to the revisiting and re-discussing of the myth of progress and the cult of rationality at the very roots of Western civilization and of its imperialistic enterprise. Flanagan’s ‘anti-historical’ historical novel tackles urgent questions about modernity interrogating the founding narratives of the Australian national identity, in order to explore the uncontrollable and shifting areas of the contemporary ‘transnation’ in which the traditional categories shaping subjectivities are disrupted. As the paper will demonstrate, the writer digs into the past of his nation not simply in order to unravel its hidden histories but to detect the profound, inextricable interconnections with the present across different times and spaces. Feelings and experiences that exist above and beyond historical contingencies and cultural differences represent the writer’s privileged area of investigation as they trespass upon conventional and artificial boundaries revealing what it is that makes us all

  1. Genetic Diversity and Population Structure of Two Freshwater Copepods (Copepoda: Diaptomidae, Neodiaptomus schmackeri (Poppe and Richard, 1892 and Mongolodiaptomus birulai (Rylov, 1922 from Taiwan

    Directory of Open Access Journals (Sweden)

    Shuh-Sen Young

    2013-11-01

    Full Text Available We used the mitochondria DNA COI (cytochrome c oxidase subunit I sequence as a genetic marker to analyze the population genetic structure of two species of freshwater copepods, Neodiaptomus schmackeri (Poppe and Richard, 1892 and Mongolodiaptomus birulai (Rylov, 1922 from Taiwan. Four populations with 51 individuals of N. schmackeri and five populations with 65 individuals of M. birulai were included. We compared the nucleotide sequences of a 635-bp fragment of the COI gene of N. schmackeri and a 655-bp fragment of the COI gene of M. birulai, and eight and 14 unique haplotypes were recorded, respectively. Tseng-Wen reservoir and Wu-San-Tao reservoir are linked by a channel, and the gene flow between them was unrestricted (Fst = 0.058; Nm = 4.04; Fst, population differentiation parameter; Nm, the number of succesfull migrants per generation; the gene flow between all other populations of both species was restricted (Fst = 0.4–0.99; Nm = 0–0.37. Based on the COI gene diversification pattern, we suggest that most populations of N. schmackeri and M. birulai are isolated from each other. According to the neighbor-joining tree and the minimum spanning network (MSN, the species have similar metapopulation genetic structures. Genetic distance was not found to be correlated with geographical distance. The genetic diversification pattern was not shown to be comparable with geographical isolation owing to long-distance separation. The genetic structure of the present populations may result from serial extinction and redistribution of the populations formed in each reservoir relative to time. Human activity in the reservoirs with regards to water resource management and the fishery industry also exerts an effect on population redistribution.

  2. Using Ovsynch protocol versus Cosynch protocol in dairy cows

    Directory of Open Access Journals (Sweden)

    Ion Valeriu Caraba

    2013-10-01

    Full Text Available As a research on the reproductive physiology and endocrinology surrounding the estrous cycle in dairy cattle has been compiled, several estrous synchronization programs have been developed for use with dairy cows. These include several programs that facilitate the mass breeding of all animals at a predetermined time (timed-AI rather than the detection of estrus. We studied on 15 dary cows which were synchronized by Ovsynch and Cosynch programs. The estrus response for cows in Ovsynch protocol was of 63%. Pregnancy per insemination at 60 days was of 25%. Estrus response for cow in Cosynch protocol was of 57%. Pregnancy per insemination at 60 days was of 57%. Synchronization of ovulation using Ovsynch protocols can provide an effective way to manage reproduction in lactating dairy cows by eliminating the need for estrus detection. These are really efficient management programs for TAI of dairy cows that are able to reduce both the labour costs and the extra handling to daily estrus detection and AI.

  3. Phase Transition in Protocols Minimizing Work Fluctuations

    Science.gov (United States)

    Solon, Alexandre P.; Horowitz, Jordan M.

    2018-05-01

    For two canonical examples of driven mesoscopic systems—a harmonically trapped Brownian particle and a quantum dot—we numerically determine the finite-time protocols that optimize the compromise between the standard deviation and the mean of the dissipated work. In the case of the oscillator, we observe a collection of protocols that smoothly trade off between average work and its fluctuations. However, for the quantum dot, we find that as we shift the weight of our optimization objective from average work to work standard deviation, there is an analog of a first-order phase transition in protocol space: two distinct protocols exchange global optimality with mixed protocols akin to phase coexistence. As a result, the two types of protocols possess qualitatively different properties and remain distinct even in the infinite duration limit: optimal-work-fluctuation protocols never coalesce with the minimal-work protocols, which therefore never become quasistatic.

  4. Database communication protocol analyses and security detection

    International Nuclear Information System (INIS)

    Luo Qun; Liu Qiushi

    2003-01-01

    In this paper we introduced the analysis of TDS protocol in the communication application between Client and Server about SYBASE and MICROSOFT SQL SERVER and do some test for some bugs existed in the protocol. (authors)

  5. Developing security protocols in χ-Spaces

    DEFF Research Database (Denmark)

    Crazzolara, Federico; Milicia, Giuseppe

    2002-01-01

    It is of paramount importance that a security protocol effectively enforces the desired security requirements. The apparent simplicity of informal protocol descriptions hides the inherent complexity of their interactions which, often, invalidate informal correctness arguments and justify the effort...

  6. Kadunud linna otsinguil / Richard Woods

    Index Scriptorium Estoniae

    Woods, Richard

    2000-01-01

    University of East Londoni arheoloogiatudeng Alan Robinson leidis 1998. a. Mehhiko dzhunglist umbes aastatest 600-900 pKr pärineva linna, mis katab 12 ruutmiili suuruse ala. Seni on leitud 11 väljakut, 10 püramiidikujulist ehitist, 6 ümmargust ehitist, 11 sammast.

  7. Richard T. (Rick) Elander | NREL

    Science.gov (United States)

    saccharification Process integration and scale-up Process separations and product recovery Industrial various enzymatic and thermochemical hydrolysis routes. He has direct experience in designing , implementing, and utilizing biomass pretreatment, biomass slurry solid-liquid separation, and enzymatic

  8. Richard R. John, Network Nation

    DEFF Research Database (Denmark)

    Nye, David

    2011-01-01

    Favorable review of this 520 page work, which shows that mass communications are not anonymous agents of change, but culturally constructed through a continual process of technical choice and political negotiation....

  9. Beckett elab edasi / Richard Brooks

    Index Scriptorium Estoniae

    Brooks, Richard

    2001-01-01

    Dublini Gate Theatre, Blue Angel Films, RTE ja Channel 4 on jäädvustanud üheks telesarjaks kõik 19 Samuel Becketi näidendit. Mõnest filmist pikemalt, näiteks John Gielgudi kuu aega enne surma tehtud rollist David Mameti lavastatud "Katastroofis"

  10. Richard DeBlasio | NREL

    Science.gov (United States)

    DeBlasio's leadership, electricity research at NREL helped develop interconnection technology and validate Smart Grid modernization. Professional Experience Trained in electrical and electronics engineering , DeBlasio has worked in various leadership positions at NREL (and SERI) since 1978. These included research

  11. Home Page of Richard Talaga

    Science.gov (United States)

    bottom of the page is a (planned) link to one of my favorite hobbies. Current Experiments MINOS Neutrino Argonne efforts to join this (existing) experiment * Talaga's Presentations Hobbies and Photos Dive Photos

  12. From protocol to published report

    DEFF Research Database (Denmark)

    Berendt, Louise; Callréus, Torbjörn; Petersen, Lene Grejs

    2016-01-01

    and published reports of academic clinical drug trials. METHODS: A comparison was made between study protocols and their corresponding published reports. We assessed the overall consistency, which was defined as the absence of discrepancy regarding study type (categorized as either exploratory or confirmatory...... in 1999, 2001, and 2003, 95 of which fulfilled the eligibility criteria and had at least one corresponding published report reporting data on trial subjects. Overall consistency was observed in 39% of the trials (95% CI: 29 to 49%). Randomized controlled trials (RCTs) constituted 72% (95% CI: 63 to 81......%) of the sample, and 87% (95% CI: 80 to 94%) of the trials were hospital based. CONCLUSIONS: Overall consistency between protocols and their corresponding published reports was low. Motivators for the inconsistencies are unknown but do not seem restricted to economic incentives....

  13. Superposition Attacks on Cryptographic Protocols

    DEFF Research Database (Denmark)

    Damgård, Ivan Bjerre; Funder, Jakob Løvstad; Nielsen, Jesper Buus

    2011-01-01

    of information. In this paper, we introduce a fundamentally new model of quantum attacks on classical cryptographic protocols, where the adversary is allowed to ask several classical queries in quantum superposition. This is a strictly stronger attack than the standard one, and we consider the security......Attacks on classical cryptographic protocols are usually modeled by allowing an adversary to ask queries from an oracle. Security is then defined by requiring that as long as the queries satisfy some constraint, there is some problem the adversary cannot solve, such as compute a certain piece...... of several primitives in this model. We show that a secret-sharing scheme that is secure with threshold $t$ in the standard model is secure against superposition attacks if and only if the threshold is lowered to $t/2$. We use this result to give zero-knowledge proofs for all of NP in the common reference...

  14. Feasible quantum communication complexity protocol

    International Nuclear Information System (INIS)

    Galvao, Ernesto F.

    2002-01-01

    I show that a simple multiparty communication task can be performed more efficiently with quantum communication than with classical communication, even with low detection efficiency η. The task is a communication complexity problem in which distant parties need to compute a function of the distributed inputs, while minimizing the amount of communication between them. A realistic quantum optical setup is suggested that can demonstrate a five-party quantum protocol with higher-than-classical performance, provided η>0.33

  15. Cost estimation of Kyoto Protocol

    International Nuclear Information System (INIS)

    Di Giulio, Enzo

    2005-01-01

    This article proposes a reflection on important aspects in the costs determination performance of Kyoto Protocol. The evaluation of the main models evidence possible impacts on the economies. A key role in the determination of the cost is represented by the relative hypothesis to emission trading and the projects CDM-JI and from the political capacity at the cost negative or equal to zero [it

  16. Building America House Simulation Protocols

    Energy Technology Data Exchange (ETDEWEB)

    Hendron, Robert [National Renewable Energy Lab. (NREL), Golden, CO (United States); Engebrecht, Cheryn [National Renewable Energy Lab. (NREL), Golden, CO (United States)

    2010-09-01

    The House Simulation Protocol document was developed to track and manage progress toward Building America's multi-year, average whole-building energy reduction research goals for new construction and existing homes, using a consistent analytical reference point. This report summarizes the guidelines for developing and reporting these analytical results in a consistent and meaningful manner for all home energy uses using standard operating conditions.

  17. Behavior Protocols for Software Components

    Czech Academy of Sciences Publication Activity Database

    Plášil, František; Višňovský, Stanislav

    2002-01-01

    Roč. 28, č. 11 (2002), s. 1056-1076 ISSN 0098-5589 R&D Projects: GA AV ČR IAA2030902; GA ČR GA201/99/0244 Grant - others:Eureka(XE) Pepita project no.2033 Institutional research plan: AV0Z1030915 Keywords : behavior protocols * component-based programming * software architecture Subject RIV: JC - Computer Hardware ; Software Impact factor: 1.170, year: 2002

  18. Desensitization protocols and their outcome.

    Science.gov (United States)

    Marfo, Kwaku; Lu, Amy; Ling, Min; Akalin, Enver

    2011-04-01

    In the last decade, transplantation across previously incompatible barriers has increasingly become popular because of organ donor shortage, availability of better methods of detecting and characterizing anti-HLA antibodies, ease of diagnosis, better understanding of antibody-mediated rejection, and the availability of effective regimens. This review summarizes all manuscripts published since the first publication in 2000 on desensitized patients and discusses clinical outcomes including acute and chronic antibody-mediated rejection rate, the new agents available, kidney paired exchange programs, and the future directions in sensitized patients. There were 21 studies published between 2000 and 2010, involving 725 patients with donor-specific anti-HLA antibodies (DSAs) who underwent kidney transplantation with different desensitization protocols. All studies were single center and retrospective. The patient and graft survival were 95% and 86%, respectively, at a 2-year median follow-up. Despite acceptable short-term patient and graft survivals, acute rejection rate was 36% and acute antibody-mediated rejection rate was 28%, which is significantly higher than in nonsensitized patients. Recent studies with longer follow-up of those patients raised concerns about long-term success of desensitization protocols. The studies utilizing protocol biopsies in desensitized patients also reported higher subclinical and chronic antibody-mediated rejection. An association between the strength of DSAs determined by median fluorescence intensity values of Luminex single-antigen beads and risk of rejection was observed. Two new agents, bortezomib, a proteasome inhibitor, and eculizumab, an anti-complement C5 antibody, were recently introduced to desensitization protocols. An alternative intervention is kidney paired exchange, which should be considered first for sensitized patients. © 2011 by the American Society of Nephrology

  19. Bioinspired Security Analysis of Wireless Protocols

    DEFF Research Database (Denmark)

    Petrocchi, Marinella; Spognardi, Angelo; Santi, Paolo

    2016-01-01

    work, this paper investigates feasibility of adopting fraglets as model for specifying security protocols and analysing their properties. In particular, we give concrete sample analyses over a secure RFID protocol, showing evolution of the protocol run as chemical dynamics and simulating an adversary...

  20. Formal analysis of a fair payment protocol

    NARCIS (Netherlands)

    J.G. Cederquist; M.T. Dashti (Mohammad)

    2004-01-01

    textabstractWe formally specify a payment protocol. This protocol is intended for fair exchange of time-sensitive data. Here the ?-CRL language is used to formalize the protocol. Fair exchange properties are expressed in the regular alternation-free ?-calculus. These properties are then verified

  1. Formal Analysis of a Fair Payment Protocol

    NARCIS (Netherlands)

    Cederquist, J.G.; Dashti, M.T.

    2004-01-01

    We formally specify a payment protocol. This protocol is intended for fair exchange of timesensitive data. Here the μCRL language is used to formalize the protocol. Fair exchange properties are expressed in the regular alternation-free μ-calculus. These properties are then verified using the finite

  2. Formal Analysis of a Fair Payment Protocol

    NARCIS (Netherlands)

    Cederquist, J.G.; Dashti, Muhammad Torabi; Dimitrakos, Theo; Martinelli, Fabio

    We formally specify a payment protocol described by Vogt et al. This protocol is intended for fair exchange of time-sensitive data. Here the mCRL language is used to formalize the protocol. Fair exchange properties are expressed in the regular alternation-free mu-calculus. These properties are then

  3. Advanced dementia pain management protocols.

    Science.gov (United States)

    Montoro-Lorite, Mercedes; Canalias-Reverter, Montserrat

    Pain management in advanced dementia is complex because of neurological deficits present in these patients, and nurses are directly responsible for providing interventions for the evaluation, management and relief of pain for people suffering from this health problem. In order to facilitate and help decision-makers, pain experts recommend the use of standardized protocols to guide pain management, but in Spain, comprehensive pain management protocols have not yet been developed for advanced dementia. This article reflects the need for an integrated management of pain in advanced dementia. From the review and analysis of the most current and relevant studies in the literature, we performed an approximation of the scales for the determination of pain in these patients, with the observational scale PAINAD being the most recommended for the hospital setting. In addition, we provide an overview for comprehensive management of pain in advanced dementia through the conceptual framework «a hierarchy of pain assessment techniques by McCaffery and Pasero» for the development and implementation of standardized protocols, including a four-phase cyclical process (evaluation, planning/performance, revaluation and recording), which can facilitate the correct management of pain in these patients. Copyright © 2017 Elsevier España, S.L.U. All rights reserved.

  4. Nonblocking and orphan free message logging protocols

    Science.gov (United States)

    Alvisi, Lorenzo; Hoppe, Bruce; Marzullo, Keith

    1992-12-01

    Currently existing message logging protocols demonstrate a classic pessimistic vs. optimistic tradeoff. We show that the optimistic-pessimistic tradeoff is not inherent to the problem of message logging. We construct a message-logging protocol that has the positive features of both optimistic and pessimistic protocol: our protocol prevents orphans and allows simple failure recovery; however, it requires no blocking in failure-free runs. Furthermore, this protocol does not introduce any additional message overhead as compared to one implemented for a system in which messages may be lost but processes do not crash.

  5. Ancestors protocol for scalable key management

    Directory of Open Access Journals (Sweden)

    Dieter Gollmann

    2010-06-01

    Full Text Available Group key management is an important functional building block for secure multicast architecture. Thereby, it has been extensively studied in the literature. The main proposed protocol is Adaptive Clustering for Scalable Group Key Management (ASGK. According to ASGK protocol, the multicast group is divided into clusters, where each cluster consists of areas of members. Each cluster uses its own Traffic Encryption Key (TEK. These clusters are updated periodically depending on the dynamism of the members during the secure session. The modified protocol has been proposed based on ASGK with some modifications to balance the number of affected members and the encryption/decryption overhead with any number of the areas when a member joins or leaves the group. This modified protocol is called Ancestors protocol. According to Ancestors protocol, every area receives the dynamism of the members from its parents. The main objective of the modified protocol is to reduce the number of affected members during the leaving and joining members, then 1 affects n overhead would be reduced. A comparative study has been done between ASGK protocol and the modified protocol. According to the comparative results, it found that the modified protocol is always outperforming the ASGK protocol.

  6. Generalized routing protocols for multihop relay networks

    KAUST Repository

    Khan, Fahd Ahmed

    2011-07-01

    Performance of multihop cooperative networks depends on the routing protocols employed. In this paper we propose the last-n-hop selection protocol, the dual path protocol, the forward-backward last-n-hop selection protocol and the forward-backward dual path protocol for the routing of data through multihop relay networks. The average symbol error probability performance of the schemes is analysed by simulations. It is shown that close to optimal performance can be achieved by using the last-n-hop selection protocol and its forward-backward variant. Furthermore we also compute the complexity of the protocols in terms of number of channel state information required and the number of comparisons required for routing the signal through the network. © 2011 IEEE.

  7. Asymptotic adaptive bipartite entanglement-distillation protocol

    International Nuclear Information System (INIS)

    Hostens, Erik; Dehaene, Jeroen; De Moor, Bart

    2006-01-01

    We present an asymptotic bipartite entanglement-distillation protocol that outperforms all existing asymptotic schemes. This protocol is based on the breeding protocol with the incorporation of two-way classical communication. Like breeding, the protocol starts with an infinite number of copies of a Bell-diagonal mixed state. Breeding can be carried out as successive stages of partial information extraction, yielding the same result: one bit of information is gained at the cost (measurement) of one pure Bell state pair (ebit). The basic principle of our protocol is at every stage to replace measurements on ebits by measurements on a finite number of copies, whenever there are two equiprobable outcomes. In that case, the entropy of the global state is reduced by more than one bit. Therefore, every such replacement results in an improvement of the protocol. We explain how our protocol is organized as to have as many replacements as possible. The yield is then calculated for Werner states

  8. Short Review on Quantum Key Distribution Protocols.

    Science.gov (United States)

    Giampouris, Dimitris

    2017-01-01

    Cryptographic protocols and mechanisms are widely investigated under the notion of quantum computing. Quantum cryptography offers particular advantages over classical ones, whereas in some cases established protocols have to be revisited in order to maintain their functionality. The purpose of this paper is to provide the basic definitions and review the most important theoretical advancements concerning the BB84 and E91 protocols. It also aims to offer a summary on some key developments on the field of quantum key distribution, closely related with the two aforementioned protocols. The main goal of this study is to provide the necessary background information along with a thorough review on the theoretical aspects of QKD, concentrating on specific protocols. The BB84 and E91 protocols have been chosen because most other protocols are similar to these, a fact that makes them important for the general understanding of how the QKD mechanism functions.

  9. Entre a tradição humanista e o neopragmatismo: Richard Rorty e a virada literária da filosofia

    Directory of Open Access Journals (Sweden)

    Eduardo Cesar Maia Ferreira Filho

    2017-09-01

    Full Text Available Este ensaio defende que o pensamento pós-analítico e pós-filosófico de Richard Rorty pode assumir uma função – de caráter profilático – muito interessante no âmbito dos estudos literários acadêmicos e na crítica literária em geral: suas reflexões críticas funcionam como uma advertência contra certas pretensões cientificistas da filosofia e, por consequência, das teorias literárias em geral. Os variados usos e objetivos da linguagemhumana em atos interpretativos – como na crítica literária – extrapolam a noção moderna de verdade como correspondência; o objetivo da crítica não é, pois, "a verdade", mas simplesmente continuar e enriquecer a grande e interminável conversação que é a cultura humana. A crítica só pode dizer “verdades” se entendermos essa palavra numa acepção humanístico-pragmática e não, como faz a filosofia racionalista tradicional, entendendo a verdade como certeza e como correspondência. Para o neopragmatista, devemos abandonar de uma vez por todas a busca por uma teoria geral da representação ou por uma teoria geral da linguagem; da mesma forma, transladando essa concepção ao âmbito literário, também deveríamos desobrigar-nos das sucessivas tentativas de criar uma teoria geral exclusivista da interpretação e da crítica literárias, ou da busca de uma metodologia monista e definitiva: a crítica é uma atividade plural e que atende a diversas demandas e objetivos

  10. The "dirty weather" diaries of Reverend Richard Davis: insights about early colonial-era meteorology and climate variability for northern New Zealand, 1839-1851

    Science.gov (United States)

    Lorrey, Andrew M.; Chappell, Petra R.

    2016-03-01

    Reverend Richard Davis (1790-1863) was a colonial-era missionary stationed in the Far North of New Zealand who was a key figure in the early efforts of the Church Mission Society. He kept meticulous meteorological records for the early settlements of Waimate North and Kaikohe, and his observations are preserved in a two-volume set in the Sir George Grey Special Collections in the Auckland Central Library. The Davis diary volumes are significant because they constitute some of the earliest land-based meteorological measurements that were continually chronicled for New Zealand. The diary measurements cover nine years within the 1839-1851 time span that are broken into two parts: 1839-1844 and 1848-1851. Davis' meteorological recordings include daily 9 a.m. and noon temperatures and midday pressure measurements. Qualitative comments in the diary note prevailing wind flow, wind strength, cloud cover, climate variability impacts, bio-indicators suggestive of drought, and notes on extreme weather events. "Dirty weather" comments scattered throughout the diary describe disturbed conditions with strong winds and driving rainfall. The Davis diary entries coincide with the end of the Little Ice Age (LIA) and they indicate southerly and westerly circulation influences and cooler winter temperatures were more frequent than today. A comparison of climate field reconstructions derived from the Davis diary data and tree-ring-based winter temperature reconstructions are supported by tropical coral palaeotemperature evidence. Davis' pressure measurements were corroborated using ship log data from vessels associated with iconic Antarctic exploration voyages that were anchored in the Bay of Islands, and suggest the pressure series he recorded are robust and can be used as "station data". The Reverend Davis meteorological data are expected to make a significant contribution to the Atmospheric Circulation Reconstructions across the Earth (ACRE) project, which feeds the major data

  11. Analyzing the effect of routing protocols on media access control protocols in radio networks

    Energy Technology Data Exchange (ETDEWEB)

    Barrett, C. L. (Christopher L.); Drozda, M. (Martin); Marathe, A. (Achla); Marathe, M. V. (Madhav V.)

    2002-01-01

    We study the effect of routing protocols on the performance of media access control (MAC) protocols in wireless radio networks. Three well known MAC protocols: 802.11, CSMA, and MACA are considered. Similarly three recently proposed routing protocols: AODV, DSR and LAR scheme 1 are considered. The experimental analysis was carried out using GloMoSim: a tool for simulating wireless networks. The main focus of our experiments was to study how the routing protocols affect the performance of the MAC protocols when the underlying network and traffic parameters are varied. The performance of the protocols was measured w.r.t. five important parameters: (i) number of received packets, (ii) average latency of each packet, (iii) throughput (iv) long term fairness and (v) number of control packets at the MAC layer level. Our results show that combinations of routing and MAC protocols yield varying performance under varying network topology and traffic situations. The result has an important implication; no combination of routing protocol and MAC protocol is the best over all situations. Also, the performance analysis of protocols at a given level in the protocol stack needs to be studied not locally in isolation but as a part of the complete protocol stack. A novel aspect of our work is the use of statistical technique, ANOVA (Analysis of Variance) to characterize the effect of routing protocols on MAC protocols. This technique is of independent interest and can be utilized in several other simulation and empirical studies.

  12. Publication trends of study protocols in rehabilitation.

    Science.gov (United States)

    Jesus, Tiago S; Colquhoun, Heather L

    2017-09-04

    Growing evidence points for the need to publish study protocols in the health field. To observe whether the growing interest in publishing study protocols in the broader health field has been translated into increased publications of rehabilitation study protocols. Observational study using publication data and its indexation in PubMed. Not applicable. Not applicable. PubMed was searched with appropriate combinations of Medical Subject Headings up to December 2014. The effective presence of study protocols was manually screened. Regression models analyzed the yearly growth of publications. Two-sample Z-tests analyzed whether the proportion of Systematic Reviews (SRs) and Randomized Controlled Trials (RCTs) among study protocols differed from that of the same designs for the broader rehabilitation research. Up to December 2014, 746 publications of rehabilitation study protocols were identified, with an exponential growth since 2005 (r2=0.981; p<0.001). RCT protocols were the most common among rehabilitation study protocols (83%), while RCTs were significantly more prevalent among study protocols than among the broader rehabilitation research (83% vs. 35.8%; p<0.001). For SRs, the picture was reversed: significantly less common among study protocols (2.8% vs. 9.3%; p<0.001). Funding was more often reported by rehabilitation study protocols than the broader rehabilitation research (90% vs. 53.1%; p<0.001). Rehabilitation journals published a significantly lower share of rehabilitation study protocols than they did for the broader rehabilitation research (1.8% vs.16.7%; p<0.001). Identifying the reasons for these discrepancies and reverting unwarranted disparities (e.g. low rate of publication for rehabilitation SR protocols) are likely new avenues for rehabilitation research and its publication. SRs, particularly those aggregating RCT results, are considered the best standard of evidence to guide rehabilitation clinical practice; however, that standard can be improved

  13. Protein blotting protocol for beginners.

    Science.gov (United States)

    Petrasovits, Lars A

    2014-01-01

    The transfer and immobilization of biological macromolecules onto solid nitrocellulose or nylon (polyvinylidene difluoride (PVDF)) membranes subsequently followed by specific detection is referred to as blotting. DNA blots are called Southerns after the inventor of the technique, Edwin Southern. By analogy, RNA blots are referred to as northerns and protein blots as westerns (Burnette, Anal Biochem 112:195-203, 1981). With few exceptions, western blotting involves five steps, namely, sample collection, preparation, separation, immobilization, and detection. In this chapter, protocols for the entire process from sample collection to detection are described.

  14. Optical protocols for terabit networks

    Science.gov (United States)

    Chua, P. L.; Lambert, J. L.; Morookian, J. M.; Bergman, L. A.

    1991-01-01

    This paper describes a new fiber-optic local area network technology providing 100X improvement over current technology, has full crossbar funtionality, and inherent data security. Based on optical code-division multiple access (CDMA), using spectral phase encoding/decoding of optical pulses, networking protocols are implemented entirely in the optical domain and thus conventional networking bottlenecks are avoided. Component and system issues for a proof-of-concept demonstration are discussed, as well as issues for a more practical and commercially exploitable system. Possible terrestrial and aerospace applications of this technology, and its impact on other technologies are explored. Some initial results toward realization of this concept are also included.

  15. Je me souviens de tout, Richard (Rolands Kalniņš, Studio de Riga, 1967 : une manifestation précoce d'une mémoire concurrente de la Grande Guerre patriotique I Remember Everything, Richard (Rolands Kalniņš, Riga Film Studio, 1967: A Precocious Manifestation of a Competing Memory with the Great Patriotic War

    Directory of Open Access Journals (Sweden)

    Juliette Denis

    2012-01-01

    Full Text Available It is usually said that the memory of the war period had been completely reversed in the former Soviet borderlands since the collapse of the USSR, turning former “traitors” into heroes or victims. However, attempts to set up a new approach of the Nazi occupation and collaboration are rooted in the “Thaw” period. I remember everything, Richard – dealing with the Latvian legion, started to be considered in 1957. That coincided both with the massive return of the Latvian deportees from Siberia, and with a renewal of trials against war criminals. Produced only in 1966, the film reflected the social tensions going along with the sensitive topic, and presented a point of view far more nuanced than the official figure of the “Latvian traitor” imposed during the Stalinist period. Based on interviews, archival material and film analysis, this article aims at understanding through the film-making process the connection between the deep changes of the political meaning of the war period, and the social composition of film production.

  16. Using semantics for representing experimental protocols.

    Science.gov (United States)

    Giraldo, Olga; García, Alexander; López, Federico; Corcho, Oscar

    2017-11-13

    An experimental protocol is a sequence of tasks and operations executed to perform experimental research in biological and biomedical areas, e.g. biology, genetics, immunology, neurosciences, virology. Protocols often include references to equipment, reagents, descriptions of critical steps, troubleshooting and tips, as well as any other information that researchers deem important for facilitating the reusability of the protocol. Although experimental protocols are central to reproducibility, the descriptions are often cursory. There is the need for a unified framework with respect to the syntactic structure and the semantics for representing experimental protocols. In this paper we present "SMART Protocols ontology", an ontology for representing experimental protocols. Our ontology represents the protocol as a workflow with domain specific knowledge embedded within a document. We also present the S ample I nstrument R eagent O bjective (SIRO) model, which represents the minimal common information shared across experimental protocols. SIRO was conceived in the same realm as the Patient Intervention Comparison Outcome (PICO) model that supports search, retrieval and classification purposes in evidence based medicine. We evaluate our approach against a set of competency questions modeled as SPARQL queries and processed against a set of published and unpublished protocols modeled with the SP Ontology and the SIRO model. Our approach makes it possible to answer queries such as Which protocols use tumor tissue as a sample. Improving reporting structures for experimental protocols requires collective efforts from authors, peer reviewers, editors and funding bodies. The SP Ontology is a contribution towards this goal. We build upon previous experiences and bringing together the view of researchers managing protocols in their laboratory work. Website: https://smartprotocols.github.io/ .

  17. Physical Therapy Protocols for Arthroscopic Bankart Repair.

    Science.gov (United States)

    DeFroda, Steven F; Mehta, Nabil; Owens, Brett D

    Outcomes after arthroscopic Bankart repair can be highly dependent on compliance and participation in physical therapy. Additionally, there are many variations in physician-recommended physical therapy protocols. The rehabilitation protocols of academic orthopaedic surgery departments vary widely despite the presence of consensus protocols. Descriptive epidemiology study. Level 3. Web-based arthroscopic Bankart rehabilitation protocols available online from Accreditation Council for Graduate Medical Education (ACGME)-accredited orthopaedic surgery programs were included for review. Individual protocols were reviewed to evaluate for the presence or absence of recommended therapies, goals for completion of ranges of motion, functional milestones, exercise start times, and recommended time to return to sport. Thirty protocols from 27 (16.4%) total institutions were identified out of 164 eligible for review. Overall, 9 (30%) protocols recommended an initial period of strict immobilization. Variability existed between the recommended time periods for sling immobilization (mean, 4.8 ± 1.8 weeks). The types of exercises and their start dates were also inconsistent. Goals to full passive range of motion (mean, 9.2 ± 2.8 weeks) and full active range of motion (mean, 12.2 ± 2.8 weeks) were consistent with other published protocols; however, wide ranges existed within the reviewed protocols as a whole. Only 10 protocols (33.3%) included a timeline for return to sport, and only 3 (10%) gave an estimate for return to game competition. Variation also existed when compared with the American Society of Shoulder and Elbow Therapists' (ASSET) consensus protocol. Rehabilitation protocols after arthroscopic Bankart repair were found to be highly variable. They also varied with regard to published consensus protocols. This discrepancy may lead to confusion among therapists and patients. This study highlights the importance of attending surgeons being very clear and specific with

  18. Implementation of the Kyoto protocol

    International Nuclear Information System (INIS)

    2006-07-01

    The Rio Earth summit in 1992 has been the starting point of an international awareness about the global risk of climatic change. At this occasion, the richest countries committed themselves to stabilize their greenhouse gas emissions and to reach by the year 2000 an emissions level equivalent to the one of 1990. The Kyoto protocol in 1997 has permitted to convert this will into juridically constraining quantitative commitments. In 2005, Russia ratified the protocol while in 2001 the USA refused to do so. Because the commitments signed are ambitious, flexibility mechanisms have been implemented: 'emission permits' (emissions trading), 'joint implementation' allowing the investments abroad for greenhouse gases abatement in another developed country, and 'clean development mechanisms' when investments are made in a developing country. The Marrakech conference of December 2001 has permitted to fix up the eligibility criteria of projects belonging to the joint implementation and clean development mechanisms. The effective implementation of these mechanisms still raises technical difficulties to evaluate and measure the effective abatement of greenhouse gas emissions. (J.S.)

  19. Latest approaches of Kyoto protocol

    International Nuclear Information System (INIS)

    Matei, M.; Matei, L.

    2005-01-01

    Recently EURELECTRIC welcome the proposal of new EC Directive concerning the inclusion in the EU Emissions Trading Scheme (ETS) of credits from the project mechanisms - Joint Implementation (JI) and Clean Development Mechanism (CDM). The proposed Directive is an amendment to the EU Emissions Trading Directive adopted in June 2003. EURELECTRIC calls for unlimited use of credits in ETS. The draft Directive provides for the application of these mechanisms to begin as of 2008, on condition that the Kyoto Protocol does actually enter into force, an event which is still dependent on Russia's ratification. Such ratification has been subject to contradictory statements from the Russian Government, and the question of whether their signature to the Protocol is forthcoming is still fraught with uncertainty. Although it is not anticipated that significant quantities of JI or CDM certified credits will be available in the period 2005-2007, those that do become available would provide some additional liquidity in the emissions trading market. There is a direct relation between the coming ETS and electricity pricing: environmental policy is the driver, based on the need to switch to a low-carbon future and manage the necessary investments in a rational manner - and emissions trading is the best solution available. Romania has good opportunities to be involved in the greenhouse gases market, both in ETS and JI mechanisms. Some JI projects between Romanian and The Netherlands are already done or underway. (author)

  20. En torno al arte europeo de la segunda mitad del siglo XIX. Aspectos de las relaciones forma–contenido o forma–función en la obra de Lawrence Alma–Tadema, Gottfried Semper y Richard Wagner

    OpenAIRE

    Moreno Dopazo, Ángel

    2011-01-01

    El trabajo se plantea como una reflexión sobre la dificultad actual para apreciar los valores, a menudo denostados, de los ya supuestamente lejanos arte y cultura del siglo XIX. De aquel rico mundo de referentes y asociaciones se destacan aquí las figuras del pintor realista Alma-Tadema, los arquitectos del Ring de Viena, con Semper como singular protagonista, y el músico Richard Wagner. Junto al análisis del complejo universo pictórico del artista holandés afincado en Inglaterra se presenta ...

  1. Summary Report on Unconditionally Secure Protocols

    DEFF Research Database (Denmark)

    Damgård, Ivan Bjerre; Salvail, Louis; Cachin, Christian

    This document describes the state of the art snd some of the main open problems in the area of unconditionally secure cryptographic protocols. The most essential part of a cryptographic protocol is not its being secure. Imagine a cryptographic protocol which is secure, but where we do not know...... that it is secure. Such a protocol would do little in providing security. When all comes to all, cryptographic security is done for the sake of people, and the essential part of security is for people what it has always been, namely to feel secure. To feel secure employing a given cryptographic protocol we need...... to know that is is secure. I.e. we need a proof that it is secure. Today the proof of security of essentially all practically employed cryptographic protocols relies on computational assumptions. To prove that currently employed ways to communicate securely over the Internet are secure we e.g. need...

  2. In-memory interconnect protocol configuration registers

    Energy Technology Data Exchange (ETDEWEB)

    Cheng, Kevin Y.; Roberts, David A.

    2017-09-19

    Systems, apparatuses, and methods for moving the interconnect protocol configuration registers into the main memory space of a node. The region of memory used for storing the interconnect protocol configuration registers may also be made cacheable to reduce the latency of accesses to the interconnect protocol configuration registers. Interconnect protocol configuration registers which are used during a startup routine may be prefetched into the host's cache to make the startup routine more efficient. The interconnect protocol configuration registers for various interconnect protocols may include one or more of device capability tables, memory-side statistics (e.g., to support two-level memory data mapping decisions), advanced memory and interconnect features such as repair resources and routing tables, prefetching hints, error correcting code (ECC) bits, lists of device capabilities, set and store base address, capability, device ID, status, configuration, capabilities, and other settings.

  3. The Simplest Protocol for Oblivious Transfer

    DEFF Research Database (Denmark)

    Chou, Tung; Orlandi, Claudio

    2015-01-01

    Oblivious Transfer (OT) is the fundamental building block of cryptographic protocols. In this paper we describe the simplest and most efficient protocol for 1-out-of-n OT to date, which is obtained by tweaking the Diffie-Hellman key-exchange protocol. The protocol achieves UC-security against...... active and adaptive corruptions in the random oracle model. Due to its simplicity, the protocol is extremely efficient and it allows to perform m 1-out-of-n OTs using only: - Computation: (n+1)m+2 exponentiations (mn for the receiver, mn+2 for the sender) and - Communication: 32(m+1) bytes (for the group...... optimizations) is at least one order of magnitude faster than previous work. Category / Keywords: cryptographic protocols / Oblivious Transfer, UC Security, Elliptic Curves, Efficient Implementation...

  4. In-memory interconnect protocol configuration registers

    Science.gov (United States)

    Cheng, Kevin Y.; Roberts, David A.

    2017-09-19

    Systems, apparatuses, and methods for moving the interconnect protocol configuration registers into the main memory space of a node. The region of memory used for storing the interconnect protocol configuration registers may also be made cacheable to reduce the latency of accesses to the interconnect protocol configuration registers. Interconnect protocol configuration registers which are used during a startup routine may be prefetched into the host's cache to make the startup routine more efficient. The interconnect protocol configuration registers for various interconnect protocols may include one or more of device capability tables, memory-side statistics (e.g., to support two-level memory data mapping decisions), advanced memory and interconnect features such as repair resources and routing tables, prefetching hints, error correcting code (ECC) bits, lists of device capabilities, set and store base address, capability, device ID, status, configuration, capabilities, and other settings.

  5. Blockchain Consensus Protocols in the Wild

    OpenAIRE

    Cachin, Christian; Vukolić, Marko

    2017-01-01

    A blockchain is a distributed ledger for recording transactions, maintained by many nodes without central authority through a distributed cryptographic protocol. All nodes validate the information to be appended to the blockchain, and a consensus protocol ensures that the nodes agree on a unique order in which entries are appended. Consensus protocols for tolerating Byzantine faults have received renewed attention because they also address blockchain systems. This work discusses the process o...

  6. VANET Routing Protocols: Pros and Cons

    OpenAIRE

    Paul, Bijan; Ibrahim, Md.; Bikas, Md. Abu Naser

    2012-01-01

    VANET (Vehicular Ad-hoc Network) is a new technology which has taken enormous attention in the recent years. Due to rapid topology changing and frequent disconnection makes it difficult to design an efficient routing protocol for routing data among vehicles, called V2V or vehicle to vehicle communication and vehicle to road side infrastructure, called V2I. The existing routing protocols for VANET are not efficient to meet every traffic scenarios. Thus design of an efficient routing protocol h...

  7. Security analysis of session initiation protocol

    OpenAIRE

    Dobson, Lucas E.

    2010-01-01

    Approved for public release; distribution is unlimited The goal of this thesis is to investigate the security of the Session Initiation Protocol (SIP). This was accomplished by researching previously discovered protocol and implementation vulnerabilities, evaluating the current state of security tools and using those tools to discover new vulnerabilities in SIP software. The CVSS v2 system was used to score protocol and implementation vulnerabilities to give them a meaning that was us...

  8. Bitcoin-NG: A Scalable Blockchain Protocol

    OpenAIRE

    Eyal, Ittay; Gencer, Adem Efe; Sirer, Emin Gun; van Renesse, Robbert

    2015-01-01

    Cryptocurrencies, based on and led by Bitcoin, have shown promise as infrastructure for pseudonymous online payments, cheap remittance, trustless digital asset exchange, and smart contracts. However, Bitcoin-derived blockchain protocols have inherent scalability limits that trade-off between throughput and latency and withhold the realization of this potential. This paper presents Bitcoin-NG, a new blockchain protocol designed to scale. Based on Bitcoin's blockchain protocol, Bitcoin-NG is By...

  9. Telomerase Repeated Amplification Protocol (TRAP).

    Science.gov (United States)

    Mender, Ilgen; Shay, Jerry W

    2015-11-20

    Telomeres are found at the end of eukaryotic linear chromosomes, and proteins that bind to telomeres protect DNA from being recognized as double-strand breaks thus preventing end-to-end fusions (Griffith et al. , 1999). However, due to the end replication problem and other factors such as oxidative damage, the limited life span of cultured cells (Hayflick limit) results in progressive shortening of these protective structures (Hayflick and Moorhead, 1961; Olovnikov, 1973). The ribonucleoprotein enzyme complex telomerase-consisting of a protein catalytic component hTERT and a functional RNA component hTR or hTERC - counteracts telomere shortening by adding telomeric repeats to the end of chromosomes in ~90% of primary human tumors and in some transiently proliferating stem-like cells (Shay and Wright, 1996; Shay and Wright, 2001). This results in continuous proliferation of cells which is a hallmark of cancer. Therefore, telomere biology has a central role in aging, cancer progression/metastasis as well as targeted cancer therapies. There are commonly used methods in telomere biology such as Telomere Restriction Fragment (TRF) (Mender and Shay, 2015b), Telomere Repeat Amplification Protocol (TRAP) and Telomere dysfunction Induced Foci (TIF) analysis (Mender and Shay, 2015a). In this detailed protocol we describe Telomere Repeat Amplification Protocol (TRAP). The TRAP assay is a popular method to determine telomerase activity in mammalian cells and tissue samples (Kim et al. , 1994). The TRAP assay includes three steps: extension, amplification, and detection of telomerase products. In the extension step, telomeric repeats are added to the telomerase substrate (which is actually a non telomeric oligonucleotide, TS) by telomerase. In the amplification step, the extension products are amplified by the polymerase chain reaction (PCR) using specific primers (TS upstream primer and ACX downstream primer) and in the detection step, the presence or absence of telomerase is

  10. Search and nonsearch protocols for radiographic consultation

    International Nuclear Information System (INIS)

    Swensson, R.G.; Theodore, G.H.

    1989-01-01

    Six radiologists, acting as film reviewers, used two different consultation protocols to differentiate among 292 ambiguous findings on chest films: 120 simulated nodules and 172 normal findings (previous readers' false-positive reports of nodules). The non-search protocol identified each finding (by location), and reviewers rated its likelihood as a nodule. The search protocol, which asked reviewers to report and rate all locations regarded as possible nodules on each film, assigned a default negative rating to any unreported finding (nodule or normal). Receiver operator characteristic analyses demonstrated a significantly higher accuracy for each reviewer's search- protocol discriminations between these nodules and confusing normal findings

  11. Adaptive Protocols for Mobile Wireless Networks

    National Research Council Canada - National Science Library

    Pursley, Michael B

    2005-01-01

    .... Research results are presented on adaptive, energy-efficient, distributed protocols for mobile wireless networks that must operate effectively over unreliable communication links in highly dynamic...

  12. Mac protocols for cyber-physical systems

    CERN Document Server

    Xia, Feng

    2015-01-01

    This book provides a literature review of various wireless MAC protocols and techniques for achieving real-time and reliable communications in the context of cyber-physical systems (CPS). The evaluation analysis of IEEE 802.15.4 for CPS therein will give insights into configuration and optimization of critical design parameters of MAC protocols. In addition, this book also presents the design and evaluation of an adaptive MAC protocol for medical CPS, which exemplifies how to facilitate real-time and reliable communications in CPS by exploiting IEEE 802.15.4 based MAC protocols. This book wil

  13. Efficient secure two-party protocols

    CERN Document Server

    Hazay, Carmit

    2010-01-01

    The authors present a comprehensive study of efficient protocols and techniques for secure two-party computation -- both general constructions that can be used to securely compute any functionality, and protocols for specific problems of interest. The book focuses on techniques for constructing efficient protocols and proving them secure. In addition, the authors study different definitional paradigms and compare the efficiency of protocols achieved under these different definitions.The book opens with a general introduction to secure computation and then presents definitions of security for a

  14. Multimode Communication Protocols Enabling Reconfigurable Radios

    Directory of Open Access Journals (Sweden)

    Berlemann Lars

    2005-01-01

    Full Text Available This paper focuses on the realization and application of a generic protocol stack for reconfigurable wireless communication systems. This focus extends the field of software-defined radios which usually concentrates on the physical layer. The generic protocol stack comprises common protocol functionality and behavior which are extended through specific parts of the targeted radio access technology. This paper considers parameterizable modules of basic protocol functions residing in the data link layer of the ISO/OSI model. System-specific functionality of the protocol software is realized through adequate parameterization and composition of the generic modules. The generic protocol stack allows an efficient realization of reconfigurable protocol software and enables a completely reconfigurable wireless communication system. It is a first step from side-by-side realized, preinstalled modes in a terminal towards a dynamic reconfigurable anymode terminal. The presented modules of the generic protocol stack can also be regarded as a toolbox for the accelerated and cost-efficient development of future communication protocols.

  15. Tool Supported Analysis of Web Services Protocols

    DEFF Research Database (Denmark)

    Marques, Abinoam P.; Ravn, Anders Peter; Srba, Jiri

    2011-01-01

    We describe an abstract protocol model suitable for modelling of web services and other protocols communicating via unreliable, asynchronous communication channels. The model is supported by a tool chain where the first step translates tables with state/transition protocol descriptions, often used...... e.g. in the design of web services protocols, into an intermediate XML format. We further translate this format into a network of communicating state machines directly suitable for verification in the model checking tool UPPAAL. We introduce two types of communication media abstractions in order...

  16. Attack strategies on quantum cryptographic protocols

    International Nuclear Information System (INIS)

    Schauer, S.; Suda, M.

    2006-01-01

    Full text: Quantum key distribution (QKD) and quantum authentication (QA) have been a topic of extensive research in the last 20 years. In course of that many attacks on QKD and QA protocols have been studied. Among these, Zhang, Lee and Guo presented an attack on a QKD protocol using entanglement swapping. Based on that strategy we take a look at other protocols to inspect how much information an adversary may get if he shares entanglement with either one or both parties. We will present some protocols where an adversary can even get full information about the key using entanglement. (author)

  17. Field Triage Decision Scheme: The National Trauma Triage Protocol

    Centers for Disease Control (CDC) Podcasts

    In this podcast, Dr. Richard C. Hunt, Director of CDC's Division of Injury Response, provides an overview on the development process and scientific basis for the revised field triage guidelines published in the MMWR Recommendations and Report: Guidelines for Field Triage of Injured Patients, Recommendations of the National Expert Panel on Field Triage.

  18. Secure Multi-Player Protocols

    DEFF Research Database (Denmark)

    Fehr, Serge

    While classically cryptography is concerned with the problem of private communication among two entities, say players, in modern cryptography multi-player protocols play an important role. And among these, it is probably fair to say that secret sharing, and its stronger version verifiable secret...... sharing (VSS), as well as multi-party computation (MPC) belong to the most appealing and/or useful ones. The former two are basic tools to achieve better robustness of cryptographic schemes against malfunction or misuse by “decentralizing” the security from one single to a whole group of individuals...... (captured by the term threshold cryptography). The latter allows—at least in principle—to execute any collaboration among a group of players in a secure way that guarantees the correctness of the outcome but simultaneously respects the privacy of the participants. In this work, we study three aspects...

  19. Software for simulating IMRT protocol

    Energy Technology Data Exchange (ETDEWEB)

    Fonseca, Thelma C.F.; Campos, Tarcisio P.R. de, E-mail: tcff@ufmg.b, E-mail: campos@nuclear.ufmg.b [Universidade Federal de Minas Gerais (UFMG), Belo Horizonte, MG (Brazil). Dept. de Engenharia Nuclear

    2009-07-01

    The Intensity Modulated Radiation Therapy - IMRT is an advanced technique to cancer treatment widely used on oncology around the world. The present paper describes the SOFT-RT software which is a tool for simulating IMRT protocol. Also, it will be present a cerebral tumor case of studied in which three irradiation windows with distinct orientation were applied. The SOFT-RT collect and export data to MCNP code. This code simulates the photon transport on the voxel model. Later, a out-module from SOFT-RT import the results and express the dose-response superimposing dose and voxel model in a tree-dimensional graphic representation. The present paper address the IMRT software and its function as well a cerebral tumor case of studied is showed. The graphic interface of the SOFT-RT illustrates the example case. (author)

  20. Software for simulating IMRT protocol

    International Nuclear Information System (INIS)

    Fonseca, Thelma C.F.; Campos, Tarcisio P.R. de

    2009-01-01

    The Intensity Modulated Radiation Therapy - IMRT is an advanced technique to cancer treatment widely used on oncology around the world. The present paper describes the SOFT-RT software which is a tool for simulating IMRT protocol. Also, it will be present a cerebral tumor case of studied in which three irradiation windows with distinct orientation were applied. The SOFT-RT collect and export data to MCNP code. This code simulates the photon transport on the voxel model. Later, a out-module from SOFT-RT import the results and express the dose-response superimposing dose and voxel model in a tree-dimensional graphic representation. The present paper address the IMRT software and its function as well a cerebral tumor case of studied is showed. The graphic interface of the SOFT-RT illustrates the example case. (author)

  1. Fetal MRI: techniques and protocols

    International Nuclear Information System (INIS)

    Prayer, Daniela; Brugger, Peter Christian; Prayer, Lucas

    2004-01-01

    The development of ultrafast sequences has led to a significant improvement in fetal MRI. Imaging protocols have to be adjusted to the rapidly developing fetal central nervous system (CNS) and to the clinical question. Sequence parameters must be changed to cope with the respective developmental stage, to produce images free from motion artefacts and to provide optimum visualization of the region and focus of interest. In contrast to postnatal studies, every suspect fetal CNS abnormality requires examination of the whole fetus and the extrafetal intrauterine structures including the uterus. This approach covers both aspects of fetal CNS disorders: isolated and complex malformations and cerebral lesions arising from the impaired integrity of the feto-placental unit. (orig.)

  2. Analysing Protocol Stacks for Services

    DEFF Research Database (Denmark)

    Gao, Han; Nielson, Flemming; Nielson, Hanne Riis

    2011-01-01

    We show an approach, CaPiTo, to model service-oriented applications using process algebras such that, on the one hand, we can achieve a certain level of abstraction without being overwhelmed by the underlying implementation details and, on the other hand, we respect the concrete industrial...... standards used for implementing the service-oriented applications. By doing so, we will be able to not only reason about applications at different levels of abstractions, but also to build a bridge between the views of researchers on formal methods and developers in industry. We apply our approach...... to the financial case study taken from Chapter 0-3. Finally, we develop a static analysis to analyse the security properties as they emerge at the level of concrete industrial protocols....

  3. Protocol Monitoring Passive Solar Energy

    International Nuclear Information System (INIS)

    Van den Ham, E.R.; Bosselaar, L.

    1998-01-01

    A method has been developed by means of which the contribution of passive solar energy to the Dutch energy balance can be quantified univocally. The contribution was 57 PJ in 1990 and also 57 PJ in 1995. The efficiency of passive solar energy systems increased from -31.5% to -28.1% in the period 1990-1995, mainly as a result of the use of extra insulating glazing. As a result of the reduction of energy consumption for heating in houses it is expected that the extra contribution of 2 PJ will not be realized in the year 2010. It is suggested that the method to determine the absolute contribution of passive solar energy to the energy demand of dwellings is to be included in the protocol monitoring renewable energy. For the method to be included in the energy statistics of Statistics Netherlands (CBS) it can be considered only to take into account the difference compared to 1990. 11 refs

  4. Fetal MRI: techniques and protocols

    Energy Technology Data Exchange (ETDEWEB)

    Prayer, Daniela [Department of Neuroradiology, University Clinics of Radiodiagnostics, Medical University Vienna, Waehringerguertel 18-10, 1090, Vienna (Austria); Brugger, Peter Christian [Department of Anatomy, Integrative Morphology Group, Medical University Vienna (Austria); Prayer, Lucas [Diagnosezentrum Urania, Vienna (Austria)

    2004-09-01

    The development of ultrafast sequences has led to a significant improvement in fetal MRI. Imaging protocols have to be adjusted to the rapidly developing fetal central nervous system (CNS) and to the clinical question. Sequence parameters must be changed to cope with the respective developmental stage, to produce images free from motion artefacts and to provide optimum visualization of the region and focus of interest. In contrast to postnatal studies, every suspect fetal CNS abnormality requires examination of the whole fetus and the extrafetal intrauterine structures including the uterus. This approach covers both aspects of fetal CNS disorders: isolated and complex malformations and cerebral lesions arising from the impaired integrity of the feto-placental unit. (orig.)

  5. Modelos de crescimento resultantes da combinação e variações dos modelos de Chapman-Richards e Silva-Bailey aplicados em Leucaena leucocephala (Lam. de Wit.

    Directory of Open Access Journals (Sweden)

    Cícero Carlos Ramos de Brito

    2010-08-01

    Full Text Available O objetivo deste trabalho foi desenvolver novos modelos de crescimento para recursos florestais aplicados à leucena [Leucaena leucocephala (Lam. de Wit], tendo como base as hipóteses biológicas propostas por Chapman-Richards e Silva-Bailey. O experimento de leucena foi conduzido na Estação Experimental da Empresa Pernambucana de Pesquisa Agropecuária - IPA, Caruaru, PE. Foram utilizadas 544 árvores de leucena de um experimento com vinte remedições realizadas ao longo de 12 anos. Compararam-se novos modelos de crescimento resultantes da combinação e variações dos modelos de Chapman-Richards e Silva-Bailey, bem como outros comumente usados em recursos florestais. Para a seleção das equações, utilizaram-se o Índice de Ajuste (IA, o erro-padrão da estimativa e a distribuição gráfica dos resíduos. Os resultados indicaram que todos os modelos testados se ajustaram de maneira satisfatória aos dados, podendo ser utilizados para se estimar o crescimento em altura da leucena.

  6. Wind power agreement protocol; Protocole d'accord eolien

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    2002-10-01

    The aim of this protocol of agreement is to propose to wind turbine fitters some models of contracts allowing the setting up of wind turbines on agricultural lots. These documents, which make an indissociable ensemble, apply to both phases of development of a wind power project: the feasibility study phase, for a duration comprised between 2 and 5 years (studies, administrative procedures, precise definition of the project), and the construction, exploitation and dismantling phase. These documents will serve as common guidelines for both the farmers and the wind turbine designers. Both parties agree to meet together in the future to propose some modifications of these texts if necessary. The four models of contracts are attached to the document: contract for the feasibility study phase, first contract between the landlord and the farmer for the cancellation of the rural lease, second contract between the landlord and the wind power exploitation company for the common right lease, and the third contract between the farmer and the wind power company for the indemnification convention. (J.S.)

  7. Analysis of a security protocol in ?CRL

    NARCIS (Netherlands)

    J. Pang

    2002-01-01

    textabstractNeedham-Schroeder public-key protocol; With the growth and commercialization of the Internet, the security of communication between computers becomes a crucial point. A variety of security protocols based on cryptographic primitives are used to establish secure communication over

  8. An Argument Approach to Observation Protocol Validity

    Science.gov (United States)

    Bell, Courtney A.; Gitomer, Drew H.; McCaffrey, Daniel F.; Hamre, Bridget K.; Pianta, Robert C.; Qi, Yi

    2012-01-01

    This article develops a validity argument approach for use on observation protocols currently used to assess teacher quality for high-stakes personnel and professional development decisions. After defining the teaching quality domain, we articulate an interpretive argument for observation protocols. To illustrate the types of evidence that might…

  9. Model checking the HAVi leader election protocol

    NARCIS (Netherlands)

    J.M.T. Romijn (Judi)

    1999-01-01

    textabstractThe HAVi specification proposes an architecture for audio/video interoperability in home networks. Part of the HAVi specification is a distributed leader election protocol. We have modelled this leader election protocol in Promela and Lotos and have checked several properties with the

  10. Climate Change And The Kyoto Protocol

    International Nuclear Information System (INIS)

    Comsan, M.N.H.

    2007-01-01

    The problem of global warming is addressed. Changes in earth surface temperature, emission of CO 2 and other four major green house gases are presented. Effect of global warming on weather, ocean, and ecosystem is discussed. A brief history of the Kyoto protocol starting from the 151 Earth Summit in 1972 is outlined. An overview of the protocol and a brief summary are given

  11. Kyoto Protocol: trade versus the environment

    International Nuclear Information System (INIS)

    Loose, H.

    2001-01-01

    Could the signatories to the Kyoto Protocol find themselves up against the WTO? This paper examines how the climate change agreement could conflict with trade rules, and shows that there are potentially serious conflicts in the interface between the WTO and the Kyoto Protocol. It argues for dialogue and debate before it is too late. (author)

  12. Network Coding Protocols for Smart Grid Communications

    DEFF Research Database (Denmark)

    Prior, Rui; Roetter, Daniel Enrique Lucani; Phulpin, Yannick

    2014-01-01

    We propose a robust network coding protocol for enhancing the reliability and speed of data gathering in smart grids. At the heart of our protocol lies the idea of tunable sparse network coding, which adopts the transmission of sparsely coded packets at the beginning of the transmission process b...

  13. Quantum Communication Attacks on Classical Cryptographic Protocols

    DEFF Research Database (Denmark)

    Damgård, Ivan Bjerre

    , one can show that the protocol remains secure even under such an attack. However, there are also cases where the honest players are quantum as well, even if the protocol uses classical communication. For instance, this is the case when classical multiparty computation is used as a “subroutine......In the literature on cryptographic protocols, it has been studied several times what happens if a classical protocol is attacked by a quantum adversary. Usually, this is taken to mean that the adversary runs a quantum algorithm, but communicates classically with the honest players. In several cases......” in quantum multiparty computation. Furthermore, in the future, players in a protocol may employ quantum computing simply to improve efficiency of their local computation, even if the communication is supposed to be classical. In such cases, it no longer seems clear that a quantum adversary must be limited...

  14. Cryptanalysis of the arbitrated quantum signature protocols

    International Nuclear Information System (INIS)

    Gao Fei; Qin Sujuan; Guo Fenzhuo; Wen Qiaoyan

    2011-01-01

    As a new model for signing quantum messages, arbitrated quantum signature (AQS) has recently received a lot of attention. In this paper we study the cryptanalysis of previous AQS protocols from the aspects of forgery and disavowal. We show that in these protocols the receiver, Bob, can realize existential forgery of the sender's signature under known message attack. Bob can even achieve universal forgery when the protocols are used to sign a classical message. Furthermore, the sender, Alice, can successfully disavow any of her signatures by simple attack. The attack strategies are described in detail and some discussions about the potential improvements of the protocols are given. Finally we also present several interesting topics on AQS protocols that can be studied in future.

  15. Nucleic acid protocols: Extraction and optimization

    Directory of Open Access Journals (Sweden)

    Saeed El-Ashram

    2016-12-01

    Full Text Available Yield and quality are fundamental features for any researchers during nucleic acid extraction. Here, we describe a simplified, semi-unified, effective, and toxic material free protocol for extracting DNA and RNA from different prokaryotic and eukaryotic sources exploiting the physical and chemical properties of nucleic acids. Furthermore, this protocol showed that DNA and RNA are under triple protection (i.e. EDTA, SDS and NaCl during lysis step, and this environment is improper for RNase to have DNA liberated of RNA and even for DNase to degrade the DNA. Therefore, the complete removal of RNA under RNase influence is achieved when RNase is added after DNA extraction, which gives optimal quality with any protocols. Similarly, DNA contamination in an isolated RNA is degraded by DNase to obtain high-quality RNA. Our protocol is the protocol of choice in terms of simplicity, recovery time, environmental safety, amount, purity, PCR and RT-PCR applicability.

  16. Quantum Communication Attacks on Classical Cryptographic Protocols

    DEFF Research Database (Denmark)

    Damgård, Ivan Bjerre

    , one can show that the protocol remains secure even under such an attack. However, there are also cases where the honest players are quantum as well, even if the protocol uses classical communication. For instance, this is the case when classical multiparty computation is used as a “subroutine......” in quantum multiparty computation. Furthermore, in the future, players in a protocol may employ quantum computing simply to improve efficiency of their local computation, even if the communication is supposed to be classical. In such cases, it no longer seems clear that a quantum adversary must be limited......In the literature on cryptographic protocols, it has been studied several times what happens if a classical protocol is attacked by a quantum adversary. Usually, this is taken to mean that the adversary runs a quantum algorithm, but communicates classically with the honest players. In several cases...

  17. A Comparison Between Inter-Asterisk eXchange Protocol and Jingle Protocol: Session Time

    Directory of Open Access Journals (Sweden)

    H. S. Haj Aliwi

    2016-08-01

    Full Text Available Over the last few years, many multimedia conferencing and Voice over Internet Protocol (VoIP applications have been developed due to the use of signaling protocols in providing video, audio and text chatting services between at least two participants. This paper compares between two widely common signaling protocols: InterAsterisk eXchange Protocol (IAX and the extension of the eXtensible Messaging and Presence Protocol (Jingle in terms of delay time during call setup, call teardown, and media sessions.

  18. A family of multi-party authentication protocols

    NARCIS (Netherlands)

    Cremers, C.J.F.; Mauw, S.

    2006-01-01

    We introduce a family of multi-party authentication protocols and discuss six novel protocols, which are members of this family. The first three generalize the well-known Needham-Schroeder-Lowe public-key protocol, the Needham-Schroeder private-key protocol, and the Bilateral Key Exchange protocol.

  19. Universally composable protocols with relaxed set-up assumptions

    DEFF Research Database (Denmark)

    Barak, Boaz; Canetti, Ran; Nielsen, Jesper Buus

    2004-01-01

    A desirable goal for cryptographic protocols is to guarantee security when the protocol is composed with other protocol instances. Universally composable (UC) protocols provide this guarantee in a strong sense: A protocol remains secure even when composed concurrently with an unbounded number of ...

  20. Live chat alternative security protocol

    Science.gov (United States)

    Rahman, J. P. R.; Nugraha, E.; Febriany, A.

    2018-05-01

    Indonesia is one of the largest e-commerce markets in Southeast Asia, as many as 5 million people do transactions in e-commerce, therefore more and more people use live chat service to communicate with customer service. In live chat, the customer service often asks customers’ data such as, full name, address, e-mail, transaction id, which aims to verify the purchase of the product. One of the risks that will happen is sniffing which will lead to the theft of confidential information that will cause huge losses to the customer. The anticipation that will be done is build an alternative security protocol for user interaction in live chat by using a cryptographic algorithm that is useful for protecting confidential messages. Live chat requires confidentiality and data integration with encryption and hash functions. The used algorithm are Rijndael 256 bits, RSA, and SHA256. To increase the complexity, the Rijndael algorithm will be modified in the S-box and ShiftRow sections based on the shannon principle rule, the results show that all pass the Randomness test, but the modification in Shiftrow indicates a better avalanche effect. Therefore the message will be difficult to be stolen or changed.

  1. A Simple XML Producer-Consumer Protocol

    Science.gov (United States)

    Smith, Warren; Gunter, Dan; Quesnel, Darcy; Biegel, Bryan (Technical Monitor)

    2001-01-01

    There are many different projects from government, academia, and industry that provide services for delivering events in distributed environments. The problem with these event services is that they are not general enough to support all uses and they speak different protocols so that they cannot interoperate. We require such interoperability when we, for example, wish to analyze the performance of an application in a distributed environment. Such an analysis might require performance information from the application, computer systems, networks, and scientific instruments. In this work we propose and evaluate a standard XML-based protocol for the transmission of events in distributed systems. One recent trend in government and academic research is the development and deployment of computational grids. Computational grids are large-scale distributed systems that typically consist of high-performance compute, storage, and networking resources. Examples of such computational grids are the DOE Science Grid, the NASA Information Power Grid (IPG), and the NSF Partnerships for Advanced Computing Infrastructure (PACIs). The major effort to deploy these grids is in the area of developing the software services to allow users to execute applications on these large and diverse sets of resources. These services include security, execution of remote applications, managing remote data, access to information about resources and services, and so on. There are several toolkits for providing these services such as Globus, Legion, and Condor. As part of these efforts to develop computational grids, the Global Grid Forum is working to standardize the protocols and APIs used by various grid services. This standardization will allow interoperability between the client and server software of the toolkits that are providing the grid services. The goal of the Performance Working Group of the Grid Forum is to standardize protocols and representations related to the storage and distribution of

  2. The Development of Korea Additional Protocol System

    International Nuclear Information System (INIS)

    Shim, Hye Won; Yeo, Jin Kyun

    2008-01-01

    The Agreement between the Republic of Korea (ROK) and the IAEA for the Application of Safeguards in Connection with the Treaty on the Non-Proliferation of Nuclear Weapons (the Safeguards Agreement) entered into force on 14 November 1975. The Additional Protocol to the Safeguards Agreement (the Additional Protocol) was signed on 21 June 1999 and entered into force on 19 February 2004. ROK has been submitting annual updated reports of initial declaration on every May 15th since August 2004. Additional protocol reports were submitted through Protocol Reporter provided by IAEA. Annual declarations were simply uploaded and stored in the Accounting Information Treatment System of KINAC, which did not provide data analysis and management function. There have been demands for improvement to handle ever-increasing information. KAPS (Korea Additional Protocol System) has been developed to assist and administrate the additional protocol related works effectively. The new system enables integrated management including composition of additional protocol report and version control, periodical update of related information, results of IAEA complementary access to each facility

  3. New logistics protocols for distributed interactive simulation

    Science.gov (United States)

    Taylor, Darrin; Morrison, John; Katz, Warren; Felton, Erik; Herman, Deborah A.

    1995-06-01

    In today's environment, the transportation and maintenance of military forces is nearly as important as combat operations. Rapid deployment to regions of low-intensity conflict will become a very common training scenario for the U.S. military. Thus it is desirable to apply distributed simulation technology to train logistics personnel in their combat support roles. Currently, distributed interactive simulation (DIS) only contains rudimentary logistics protocols. This paper introduces new protocols designed to handle the logistics problem. The Newtonian protocol takes a physics-based approach to modeling interactions on the simulation network. This protocol consists of a family of protocol data units (PDUs) which are used to communicate forces in different circumstances. The protocol implements a small set of physical relations. This represents a flexible and general mechanism to describe battlefield interactions between network entities. The migratory object protocol (MOP) family addresses the transfer of control. General mechanisms provide the means to simulate resupply, repair, and maintenance of entities at any level of abstraction (individual soldier to division). It can also increase the fidelity of mine laying, enable handover of weapons for terminal guidance, allow for the distribution of aggregate-level simulation entities, provide capabilities for the simulation of personnel, etc.

  4. The Kyoto Protocol. An economic appraisal

    International Nuclear Information System (INIS)

    Grubb, M.

    2000-05-01

    This paper examines the overall economics of the Kyoto Protocol on climate change, in three main parts. The first part explores the structure of the Protocol and how this matches against classical economic criteria of an 'optimal' climate change agreement. This discussion also considers the nature of and reasons for shortcomings, and the prospects for its evolution. Given the various flexibilities in the agreement, the Kyoto Protocol is far more economically efficient in its structure than any previous global environmental agreement. The central conclusion is that, from an economic perspective, the Protocol's structure for industrialised country commitments is as good as could reasonably be expected. The second part of the paper explores more closely the economics of the commitments themselves and how they combine with the various flexibilities, briefly reviewing the available literature and using a simple spreadsheet model of how the commitments might combine with trading mechanisms under a range of assumptions. Flexibility is intrinsic and necessary, but it is argued that the allocations to Russia and Ukraine in particular mean that unlimited flexibility could render the Protocol's commitments weaker in their impacts than is economically desirable to address climate change. It is argued that, should this prove to be the case, access to the large surplus in the transition economies could be used as a control valve to limit the costs of the Protocol to within acceptable limits. Finally, the paper considers the issues of developing country involvement in the Kyoto Protocol, and the Protocol's longer-term impact and evolution, including its impact on technological evolution and dissemination and the evolution of future commitments. It is argued that taking account of such issues critically affects views of the Protocol

  5. An Authentication Protocol for Future Sensor Networks.

    Science.gov (United States)

    Bilal, Muhammad; Kang, Shin-Gak

    2017-04-28

    Authentication is one of the essential security services in Wireless Sensor Networks (WSNs) for ensuring secure data sessions. Sensor node authentication ensures the confidentiality and validity of data collected by the sensor node, whereas user authentication guarantees that only legitimate users can access the sensor data. In a mobile WSN, sensor and user nodes move across the network and exchange data with multiple nodes, thus experiencing the authentication process multiple times. The integration of WSNs with Internet of Things (IoT) brings forth a new kind of WSN architecture along with stricter security requirements; for instance, a sensor node or a user node may need to establish multiple concurrent secure data sessions. With concurrent data sessions, the frequency of the re-authentication process increases in proportion to the number of concurrent connections. Moreover, to establish multiple data sessions, it is essential that a protocol participant have the capability of running multiple instances of the protocol run, which makes the security issue even more challenging. The currently available authentication protocols were designed for the autonomous WSN and do not account for the above requirements. Hence, ensuring a lightweight and efficient authentication protocol has become more crucial. In this paper, we present a novel, lightweight and efficient key exchange and authentication protocol suite called the Secure Mobile Sensor Network (SMSN) Authentication Protocol. In the SMSN a mobile node goes through an initial authentication procedure and receives a re-authentication ticket from the base station. Later a mobile node can use this re-authentication ticket when establishing multiple data exchange sessions and/or when moving across the network. This scheme reduces the communication and computational complexity of the authentication process. We proved the strength of our protocol with rigorous security analysis (including formal analysis using the BAN

  6. Energy Efficient Network Protocols for Wireless and Mobile Networks

    National Research Council Canada - National Science Library

    Sivalingam, Krishna

    2001-01-01

    ... (also called power aware) network protocols for wireless and mobile networks. Battery power limitations are a very serious concern, and it is essential to study energy efficient protocol design at different layers of the network protocol stack...

  7. Event-by-event simulation of quantum cryptography protocols

    NARCIS (Netherlands)

    Zhao, S.; Raedt, H. De

    We present a new approach to simulate quantum cryptography protocols using event-based processes. The method is validated by simulating the BB84 protocol and the Ekert protocol, both without and with the presence of an eavesdropper.

  8. Protocolized hyperventilation enhances electroconvulsive therapy.

    Science.gov (United States)

    de Arriba-Arnau, Aida; Dalmau, Antonia; Soria, Virginia; Salvat-Pujol, Neus; Ribes, Carmina; Sánchez-Allueva, Ana; Menchón, José Manuel; Urretavizcaya, Mikel

    2017-08-01

    Hyperventilation is recommended in electroconvulsive therapy (ECT) to enhance seizures and to increase patients' safety. However, more evidence is needed regarding its effects and the optimum method of application. This prospective study involving 21 subjects compared two procedures, protocolized hyperventilation (PHV) and hyperventilation as usual (HVau), applied to the same patient in two consecutive sessions. Transcutaneous partial pressure of carbon dioxide (TcPCO 2 ) was measured throughout all sessions. Ventilation parameters, hemodynamic measures, seizure characteristics, and side effects were also explored. PHV resulted in lower TcPCO 2 after hyperventilation (p=.008) and over the whole session (p=.035). The lowest TcPCO 2 was achieved after voluntary hyperventilation. Changes in TcPCO 2 from baseline showed differences between HVau and PHV at each session time-point (all p<.05). Between- and within-subjects factors were statistically significant in a general linear model. Seizure duration was greater in PHV sessions (p=.028), without differences in other seizure quality parameters or adverse effects. Correlations were found between hypocapnia induction and seizure quality indexes. Secondary outcomes could be underpowered. PHV produces hypocapnia before the stimulus, modifies patients' TcPCO 2 values throughout the ECT session and lengthens seizure duration. Voluntary hyperventilation is the most important part of the PHV procedure with respect to achieving hypocapnia. A specific ventilation approach, CO 2 quantification and monitoring may be advisable in ECT. PHV is easy to apply in daily clinical practice and does not imply added costs. Ventilation management has promising effects in terms of optimizing ECT technique. Copyright © 2017 Elsevier B.V. All rights reserved.

  9. The protocol amending the 1963 Vienna Convention

    International Nuclear Information System (INIS)

    Lamm, V.

    2006-01-01

    Technically the Vienna Convention was revised by the adoption of the protocol to amend the instrument. and according to Article 19 of the protocol 'A State which is Party to this Protocol but not to the 1963 Vienna Convention shall be bound by the provisions of that Convention as amended by this Protocol in relation to other States Parties hereto, and failing an expression of a different intention by that State at the time of deposit of an instrument referred to in Article 20 shall be bound by the provisions of the 1963 Vienna Convention in relation to States which are only Parties thereto'. This solution has created a special situation, because after the entry into force of the protocol there will be living together or operating in practice 'two' Vienna Conventions, notably the convention's original text of 1963 and its new version as amended by the protocol. After the protocol has come into force, a state may only accede to the amended version, but in the inter se relations of the States Party to the 'old' Vienna Convention the provisions of that convention will remain in force until such time as they have acceded to the new protocol. This rather complicated situation is nevertheless understandable and is fully in accord with Article 40 of the 1969 Vienna Convention on the Law of Treaties, which provides for the amendment of multilateral treaties. In 1989 the negotiations on the revision of the Vienna Convention had begun with the aim of strengthening the existing nuclear liability regime and of improving the situation of potential victims of nuclear accidents. The Protocol to Amend the Vienna Convention serves those purposes; it also reflects a good compromise, since it is the outcome of a negotiation process in which experts from both nuclear and non-nuclear states, from Contacting Parties and non-Contracting Parties were very active. That affords some assurance that the compromise solution reached is acceptable to all States participating in the adoption of

  10. Advanced Internet Protocols, Services, and Applications

    CERN Document Server

    Oki, Eiji; Tatipamula, Mallikarjun; Vogt, Christian

    2012-01-01

    Today, the internet and computer networking are essential parts of business, learning, and personal communications and entertainment. Virtually all messages or transactions sent over the internet are carried using internet infrastructure- based on advanced internet protocols. Advanced internet protocols ensure that both public and private networks operate with maximum performance, security, and flexibility. This book is intended to provide a comprehensive technical overview and survey of advanced internet protocols, first providing a solid introduction and going on to discu

  11. Security Protocol Review Method Analyzer(SPRMAN)

    OpenAIRE

    Navaz, A. S. Syed; Narayanan, H. Iyyappa; Vinoth, R.

    2013-01-01

    This Paper is designed using J2EE (JSP, SERVLET), HTML as front end and a Oracle 9i is back end. SPRMAN is been developed for the client British Telecom (BT) UK., Telecom company. Actually the requirement of BT is, they are providing Network Security Related Products to their IT customers like Virtusa,Wipro,HCL etc., This product is framed out by set of protocols and these protocols are been associated with set of components. By grouping all these protocols and components together, product is...

  12. Analyzing security protocols in hierarchical networks

    DEFF Research Database (Denmark)

    Zhang, Ye; Nielson, Hanne Riis

    2006-01-01

    Validating security protocols is a well-known hard problem even in a simple setting of a single global network. But a real network often consists of, besides the public-accessed part, several sub-networks and thereby forms a hierarchical structure. In this paper we first present a process calculus...... capturing the characteristics of hierarchical networks and describe the behavior of protocols on such networks. We then develop a static analysis to automate the validation. Finally we demonstrate how the technique can benefit the protocol development and the design of network systems by presenting a series...

  13. Establishing treatment protocols for clinical mastitis.

    Science.gov (United States)

    Roberson, Jerry R

    2003-03-01

    Each farm has a unique mix of mastitis pathogens and management procedures that have evolved over time. The herd veterinarian should work with the manager/owner to systematically develop treatment protocols that meet the needs and management of the farm. To establish a mastitis treatment protocol, it is necessary to develop a system to routinely identify clinical mastitis cases, develop a herd-specific severity level assessment system, manage the clinical mastitis cases based on severity level and culture result (when available), avoid antibiotic residues, and monitor the success of the system and alter the protocol as necessary.

  14. Overview of the InterGroup protocols

    Energy Technology Data Exchange (ETDEWEB)

    Berket, Karlo [Lawrence Berkeley National Lab. (LBNL), Berkeley, CA (United States); Agarwal, Deborah A. [Lawrence Berkeley National Lab. (LBNL), Berkeley, CA (United States); Melliar-Smith, P. Michael [Univ. of California, Santa Barbara, CA (United States); Moser, Louise E. [Univ. of California, Santa Barbara, CA (United States)

    2001-03-01

    Existing reliable ordered group communication protocols have been developed for local-area networks and do not, in general, scale well to large numbers of nodes and wide-area networks. The InterGroup suite of protocols is a scalable group communication system that introduces a novel approach to handling group membership, and supports a receiver-oriented selection of service. The protocols are intended for a wide-area network, with a large number of nodes, that has highly variable delays and a high message loss rate, such as the Internet. The levels of the message delivery service range from unreliable unordered to reliable group timestamp ordered.

  15. The Singapore protocol [for quantum cryptography

    International Nuclear Information System (INIS)

    Englert, B.

    2005-01-01

    The qubit protocol for quantum key distribution presented in this talk is fully tomographic and more efficient than other tomographic protocols. Under ideal circumstances the efficiency is log 2 (4/3) = 0.415 key bits per qubit sent, which is 25% more than the efficiency of 1/3 = 0.333 for the standard 6-state protocol. One can extract 0.4 key bits per qubit by a simple two-way communication scheme, and can so get close to the information-theoretical limit. The noise thresholds for secure key bit generation in the presence of unbiased noise will be reported and discussed. (author)

  16. A Logical Analysis of Quantum Voting Protocols

    Science.gov (United States)

    Rad, Soroush Rafiee; Shirinkalam, Elahe; Smets, Sonja

    2017-12-01

    In this paper we provide a logical analysis of the Quantum Voting Protocol for Anonymous Surveying as developed by Horoshko and Kilin in (Phys. Lett. A 375, 1172-1175 2011). In particular we make use of the probabilistic logic of quantum programs as developed in (Int. J. Theor. Phys. 53, 3628-3647 2014) to provide a formal specification of the protocol and to derive its correctness. Our analysis is part of a wider program on the application of quantum logics to the formal verification of protocols in quantum communication and quantum computation.

  17. Zanaatkârlığın Tarihsel Dönüşümü Ve Richard Sennett’in Zanaatkârlık Kavramı / Historical Transformation of Craftsmanship and Richard Sennett’s Concept of Craftsmanhip

    Directory of Open Access Journals (Sweden)

    Umut Osmanlı

    2017-06-01

    Full Text Available Abstract This study examines the concept of crafting which means becoming an expert in an activity. Specializing in a field, in order to facilitate the life, backs as early as the first human settlements in human history. Crafting is a phenomenon in which the person makes the craft in the best possible way for its own goodness. However, it has been gone through some transformations since its formation. The history of crafting includes some milestones such as institution of crafting, its unification and its transformation after the Industrial Revolution. The most essential one of those transformations has been experienced after the Industrial Revolution and it has become difficult to define the crafting followingly. At the present time, crafting has been diminished to the status of a simple worker. In this work, which the historical transformation of crafting is held, It will be examined respectively: the historical roots of crafting, the social status of crafting, professional organizations that hold crafting altogether, the effects on crafting brought by new economic order of industrial revolution and the ideas of Richard Sennett on crafting in order to evaluate crafting in our present society. Hereby, I will try to reach the definitions of crafting that are able to address our today’s society by taking references from the roots of archaic crafting phenomenon. Öz Bu çalışmada, bilinçli olarak yapılan bir eylemde ustalaşma/uzmanlaşma anlamına gelen zanaatkârlık kavramı incelenmiştir. Hayatı kolaylaştırmak adına herhangi bir alanda çalışma ve bu alanda beceri kazanarak ustalaşmak, insanların bir arada yaşamaya başlaması kadar eskidir. Zanaatkârlık, kişinin kendi iyiliği için uğraş verdiği şeyi mümkün olan en iyi şekilde yapmasıdır. Fakat bu durum ortaya çıktığı günden günümüze gelene kadar çeşitli dönüşümlere uğramıştır. Zanaatkârlığın tarihsel serüveni, zanaatk

  18. Taking an idea to a research protocol

    African Journals Online (AJOL)

    2013-11-13

    Nov 13, 2013 ... Review Article: Taking an idea to a research protocol ... step is to identify the knowledge gap within the intended field of research by examining the background ... be found by writing a critical narrative review of the literature.

  19. Security Protocols: Specification, Verification, Implementation, and Composition

    DEFF Research Database (Denmark)

    Almousa, Omar

    An important aspect of Internet security is the security of cryptographic protocols that it deploys. We need to make sure that such protocols achieve their goals, whether in isolation or in composition, i.e., security protocols must not suffer from any aw that enables hostile intruders to break...... results. The most important generalization is the support for all security properties of the geometric fragment proposed by [Gut14]....... their security. Among others, tools like OFMC [MV09b] and Proverif [Bla01] are quite efficient for the automatic formal verification of a large class of protocols. These tools use different approaches such as symbolic model checking or static analysis. Either approach has its own pros and cons, and therefore, we...

  20. Oxygen tolerance test : A standardised protocol

    Directory of Open Access Journals (Sweden)

    D K Ghosh

    2015-01-01

    Conclusion: By following a standardised protocol for Oxygen Tolerance Test, an objective assessment and recordkeeping is possible. This shall entail a more effective screening during the initial diving medical examination.

  1. Protocol to Exploit Waiting Resources for UASNs

    Directory of Open Access Journals (Sweden)

    Li-Ling Hung

    2016-03-01

    Full Text Available The transmission speed of acoustic waves in water is much slower than that of radio waves in terrestrial wireless sensor networks. Thus, the propagation delay in underwater acoustic sensor networks (UASN is much greater. Longer propagation delay leads to complicated communication and collision problems. To solve collision problems, some studies have proposed waiting mechanisms; however, long waiting mechanisms result in low bandwidth utilization. To improve throughput, this study proposes a slotted medium access control protocol to enhance bandwidth utilization in UASNs. The proposed mechanism increases communication by exploiting temporal and spatial resources that are typically idle in order to protect communication against interference. By reducing wait time, network performance and energy consumption can be improved. A performance evaluation demonstrates that when the data packets are large or sensor deployment is dense, the energy consumption of proposed protocol is less than that of existing protocols as well as the throughput is higher than that of existing protocols.

  2. Authentication Protocol using Quantum Superposition States

    Energy Technology Data Exchange (ETDEWEB)

    Kanamori, Yoshito [University of Alaska; Yoo, Seong-Moo [University of Alabama, Huntsville; Gregory, Don A. [University of Alabama, Huntsville; Sheldon, Frederick T [ORNL

    2009-01-01

    When it became known that quantum computers could break the RSA (named for its creators - Rivest, Shamir, and Adleman) encryption algorithm within a polynomial-time, quantum cryptography began to be actively studied. Other classical cryptographic algorithms are only secure when malicious users do not have sufficient computational power to break security within a practical amount of time. Recently, many quantum authentication protocols sharing quantum entangled particles between communicators have been proposed, providing unconditional security. An issue caused by sharing quantum entangled particles is that it may not be simple to apply these protocols to authenticate a specific user in a group of many users. An authentication protocol using quantum superposition states instead of quantum entangled particles is proposed. The random number shared between a sender and a receiver can be used for classical encryption after the authentication has succeeded. The proposed protocol can be implemented with the current technologies we introduce in this paper.

  3. Technical Analysis of SSP-21 Protocol

    Energy Technology Data Exchange (ETDEWEB)

    Bromberger, S. [Lawrence Livermore National Lab. (LLNL), Livermore, CA (United States)

    2017-06-09

    As part of the California Energy Systems for the Twenty-First Century (CES-21) program, in December 2016 San Diego Gas and Electric (SDG&E) contracted with Lawrence Livermore National Laboratory (LLNL) to perform an independent verification and validation (IV&V) of a white paper describing their Secure SCADA Protocol for the Twenty-First Century (SSP-21) in order to analyze the effectiveness and propriety of cryptographic protocol use within the SSP-21 specification. SSP-21 is designed to use cryptographic protocols to provide (optional) encryption, authentication, and nonrepudiation, among other capabilities. The cryptographic protocols to be used reflect current industry standards; future versions of SSP-21 will use other advanced technologies to provide a subset of security services.

  4. Adaptive security protocol selection for mobile computing

    NARCIS (Netherlands)

    Pontes Soares Rocha, B.; Costa, D.N.O.; Moreira, R.A.; Rezende, C.G.; Loureiro, A.A.F.; Boukerche, A.

    2010-01-01

    The mobile computing paradigm has introduced new problems for application developers. Challenges include heterogeneity of hardware, software, and communication protocols, variability of resource limitations and varying wireless channel quality. In this scenario, security becomes a major concern for

  5. Entanglement distillation protocols and number theory

    International Nuclear Information System (INIS)

    Bombin, H.; Martin-Delgado, M.A.

    2005-01-01

    We show that the analysis of entanglement distillation protocols for qudits of arbitrary dimension D benefits from applying basic concepts from number theory, since the set Z D n associated with Bell diagonal states is a module rather than a vector space. We find that a partition of Z D n into divisor classes characterizes the invariant properties of mixed Bell diagonal states under local permutations. We construct a very general class of recursion protocols by means of unitary operations implementing these local permutations. We study these distillation protocols depending on whether we use twirling operations in the intermediate steps or not, and we study them both analytically and numerically with Monte Carlo methods. In the absence of twirling operations, we construct extensions of the quantum privacy algorithms valid for secure communications with qudits of any dimension D. When D is a prime number, we show that distillation protocols are optimal both qualitatively and quantitatively

  6. Saudi Arabia and CERN sign protocol

    CERN Multimedia

    2008-01-01

    On 9 May 2008, Mohammed I. Al Suwaiyel, President of the King Abdulaziz City of Science and Technology, representing the Government of Saudi Arabia, and CERN Director-General, Robert Aymar, signed a protocol to the 2006 cooperation agreement between CERN and Saudi Arabia. Members of the Saudi Arabian Government visit ATLAS.The purpose of the protocol is to define the operational framework needed to carry out various specific tasks provided for in the cooperation agreement in order to promote the development of a high energy particle physics community in Saudi Arabia and its ultimate visible participation as a member of the global CERN community. Signing the protocol, Mohammed I. Al-Suwaiyel said: "The Saudi Arabian Government has taken a number of initiatives to promote R&D in the interests of our country’s development and the advancement of science. Thanks to this protocol, Saudi scientists will be able to work towards this go...

  7. Verbal protocols as methodological resources: research evidence

    Directory of Open Access Journals (Sweden)

    Alessandra Baldo

    2012-01-01

    Full Text Available This article aims at reflecting on the use of verbal protocols as a methodological resource in qualitative research, more specifically on the aspect regarded as the main limitation of a study about lexical inferencing in L2 (BALDO; VELASQUES, 2010: its subjective trait. The article begins with a brief literature review on protocols, followed by a description of the study in which they were employed as methodological resources. Based on that, protocol subjectivity is illustrated through samples of unparalleled data classification, carried out independently by two researchers. In the final section, the path followed to minimize the problem is presented, intending to contribute to improve efficiency in the use of verbal protocols in future research.

  8. Real-Time Fault Tolerant Networking Protocols

    National Research Council Canada - National Science Library

    Henzinger, Thomas A

    2004-01-01

    We made significant progress in the areas of video streaming, wireless protocols, mobile ad-hoc and sensor networks, peer-to-peer systems, fault tolerant algorithms, dependability and timing analysis...

  9. Development of measurement protocols for quantum magnetometry

    DEFF Research Database (Denmark)

    Stark, Alexander

    and protocols to enhance the lifetime and the coherences of the NV center with the overall goal of enhancing the capabilities of this sensor in the field of magnetometry. In order to realize complex protocols, a sophisticated software control of the measurement setup is required. A general software framework......, is serving as rigorous framework to reduce the complexity of the setup configuration by a fundamental separation of tasks. As a consequence, the general idea of this framework is not limited to experiments with color centers in diamond, but can find application in any laboratory environment. The measurement...... of magnetic fields in the high-frequency GHz regimes is challenging. In this thesis, a continuous dynamical decoupling protocol is developed and implemented, which extends the capabilities of the NV sensor to probe GHz signals with a narrow bandwidth. Moreover, the protocol protects the system from noise...

  10. How to write a research protocol

    African Journals Online (AJOL)

    A research protocol is best viewed as a key to open the gates between the researcher and ... studies will be quantitative designs and these form the focus of this paper. ..... applied to the underlying clinical problem addressed by the study.

  11. Compiling symbolic attacks to protocol implementation tests

    Directory of Open Access Journals (Sweden)

    Michael Rusinowitch

    2013-07-01

    Full Text Available Recently efficient model-checking tools have been developed to find flaws in security protocols specifications. These flaws can be interpreted as potential attacks scenarios but the feasability of these scenarios need to be confirmed at the implementation level. However, bridging the gap between an abstract attack scenario derived from a specification and a penetration test on real implementations of a protocol is still an open issue. This work investigates an architecture for automatically generating abstract attacks and converting them to concrete tests on protocol implementations. In particular we aim to improve previously proposed blackbox testing methods in order to discover automatically new attacks and vulnerabilities. As a proof of concept we have experimented our proposed architecture to detect a renegotiation vulnerability on some implementations of SSL/TLS, a protocol widely used for securing electronic transactions.

  12. Language, Semantics, and Methods for Security Protocols

    DEFF Research Database (Denmark)

    Crazzolara, Federico

    events. Methods like strand spaces and the inductive method of Paulson have been designed to support an intensional, event-based, style of reasoning. These methods have successfully tackled a number of protocols though in an ad hoc fashion. They make an informal spring from a protocol to its......-nets. They have persistent conditions and as we show in this thesis, unfold under reasonable assumptions to a more basic kind of nets. We relate SPL-nets to strand spaces and inductive rules, as well as trace languages and event structures so unifying a range of approaches, as well as providing conditions under...... reveal. The last few years have seen the emergence of successful intensional, event-based, formal approaches to reasoning about security protocols. The methods are concerned with reasoning about the events that a security protocol can perform, and make use of a causal dependency that exists between...

  13. Implementation of the Additional Protocol in Japan

    International Nuclear Information System (INIS)

    Ogawa, T.

    2001-01-01

    The Additional Protocol between Japan and the IAEA entered into force in December 1999. To come into force a series of implementation trials of Additional Protocol was carried out at two Japanese representative nuclear research centers, i.e. Tokai Research Establishment of Japan Atomic Energy Research Institute (JAERI) and Oarai Engineering Center of Japan Nuclear Fuel Cycle Development Institute (JNC). These trials were proposed by Japan and were conducted in cooperation with the IAEA Secretariat. In addition, Japan amended 'the Law for the Regulation of Reactors etc.', to collect adequate information to submit to the IAEA, to arrange the surrounding for the complementary access, etc. In addition, Japan Submitted the Initial Declaration of the Additional Protocol within 180 days of the entry into force of the Protocol, in the middle of June, 2000

  14. O diálogo da tradição e da renovação sobre a montagem de Tristão e Isolda de Richard Wagner por Peter Konwitschny

    Directory of Open Access Journals (Sweden)

    Alexandre Sobreira Martins

    2006-12-01

    Full Text Available A presente comunicação busca fazer uma leitura da montagem de Peter Konwitschny do drama musical Tristan und Isolde, do compositor alemão Richard Wagner encenada no Teatro Nacional de Munique durante o Festival de Ópera de Munique de 1998, considerando-o como uma revisão pós-moderna que busca romper com a tradição de encenações wagnerianas, trazendo o conteúdo do drama de Wagner para nosso contexto atual; essa leitura será feita à luz das propostas de Christopher Innes e Artaud sobre a representação teatral e as leituras de Homi Bhabha e Michel Foucault sobre a pós-modernidade.

  15. [Richard Freiherr v. Krafft-Ebing and Sigmund Freud--discourse on the "normality" and "perversion" of human sexuality at the close of the 19th century and the beginning of the 20th century].

    Science.gov (United States)

    Kapfhammer, Hans-Peter

    2015-01-01

    Sexuality has been defined a central feature of personal identity since the epoch of enlightenment and has gradually become a decisive issue also in societal and political terms. A major transfer from religion and religious institutions to medicine and medical experts and later on to neuropsychiatrists has to be underlined in the primary position to assess "normal" and "deviant" manifestations of sexuality. Richard Freiherr von Krafft-Ebing and Sigmund Freund play an eminent role in this "discourse on sexuality" (M. Foucault) during the nineteenth and beginning twentieth century on the way to modern sexology. Within this overarching context Krafft-Ebing's and Freud's theoretical conceptualizations of sexuality and perversion will be sketched and basic clinical and societal implications there out will be discussed.

  16. En torno al arte europeo de la segunda mitad del siglo XIX. Aspectos de las relaciones forma–contenido o forma–función en la obra de Lawrence Alma–Tadema, Gottfried Semper y Richard Wagner

    Directory of Open Access Journals (Sweden)

    Ángel Moreno Dopazo

    2010-01-01

    Full Text Available El trabajo se plantea como una reflexión sobre la dificultad actual para apreciar los valores, a menudo denostados, de los ya supuestamente lejanos arte y cultura del siglo XIX. De aquel rico mundo de referentes y asociaciones se destacan aquí las figuras del pintor realista Alma-Tadema, los arquitectos del Ring de Viena, con Semper como singular protagonista, y el músico Richard Wagner. Junto al análisis del complejo universo pictórico del artista holandés afincado en Inglaterra se presenta una reducida selección de obras arquitectónicas que culminan con los nuevos espacios para el arte más decisivamente alemán del XIX, la música.

  17. Field Monitoring Protocol. Heat Pump Water Heaters

    Energy Technology Data Exchange (ETDEWEB)

    Sparn, B. [National Renewable Energy Lab. (NREL), Golden, CO (United States); Earle, L. [National Renewable Energy Lab. (NREL), Golden, CO (United States); Christensen, D. [National Renewable Energy Lab. (NREL), Golden, CO (United States); Maguire, J. [National Renewable Energy Lab. (NREL), Golden, CO (United States); Wilson, E. [National Renewable Energy Lab. (NREL), Golden, CO (United States); Hancock, C. E. [Mountain Energy Partnership, Longmont, CO (United States)

    2013-02-01

    This document provides a standard field monitoring protocol for evaluating the installed performance of Heat Pump Water Heaters in residential buildings. The report is organized to be consistent with the chronology of field test planning and execution. Research questions are identified first, followed by a discussion of analysis methods, and then the details of measuring the required information are laid out. A field validation of the protocol at a house near the NREL campus is included for reference.

  18. Field Monitoring Protocol: Heat Pump Water Heaters

    Energy Technology Data Exchange (ETDEWEB)

    Sparn, B.; Earle, L.; Christensen, D.; Maguire, J.; Wilson, E.; Hancock, E.

    2013-02-01

    This document provides a standard field monitoring protocol for evaluating the installed performance of Heat Pump Water Heaters in residential buildings. The report is organized to be consistent with the chronology of field test planning and execution. Research questions are identified first, followed by a discussion of analysis methods, and then the details of measuring the required information are laid out. A field validation of the protocol at a house near the NREL campus is included for reference.

  19. An Evaluation Methodology for Protocol Analysis Systems

    Science.gov (United States)

    2007-03-01

    Main Memory Requirement NS: Needham-Schroeder NSL: Needham-Schroeder-Lowe OCaml : Objective Caml POSIX: Portable Operating System...methodology is needed. A. PROTOCOL ANALYSIS FIELD As with any field, there is a specialized language used within the protocol analysis community. Figure...ProVerif requires that Objective Caml ( OCaml ) be installed on the system, OCaml version 3.09.3 was installed. C. WINDOWS CONFIGURATION OS

  20. Topology Discovery Using Cisco Discovery Protocol

    OpenAIRE

    Rodriguez, Sergio R.

    2009-01-01

    In this paper we address the problem of discovering network topology in proprietary networks. Namely, we investigate topology discovery in Cisco-based networks. Cisco devices run Cisco Discovery Protocol (CDP) which holds information about these devices. We first compare properties of topologies that can be obtained from networks deploying CDP versus Spanning Tree Protocol (STP) and Management Information Base (MIB) Forwarding Database (FDB). Then we describe a method of discovering topology ...

  1. Emulation of Industrial Control Field Device Protocols

    Science.gov (United States)

    2013-03-01

    today. The protocol operates at the application layer of the open systems interconnection ( OSI ) model, meaning it operates independently of the...the OSI model. Their job is to receive serial data from an MTU in the Modbus RTU or ASCII protocol, encapsulate and transmit the data to another modem...facing connection and out-of-band logging capabilities over the other LAN -facing connection. Despite the fact that the hardware configuration of the

  2. A Review of Fair Exchange Protocols

    OpenAIRE

    Abdullah AlOtaibi; Hamza Aldabbas

    2012-01-01

    Recently, the Internet has become an essential business platform, aiding trading, distribution and sales between organisations, consumers and even between consumers themselves. This technology revolution has brought e-commerce to an entirely new level, which therefore has raised some new security issues. Security protocols in e-commerce are required to manage the transactions between buyers and sellers. In order to engage customers in e-commerce, these protocols should be well formulated and ...

  3. Recursion vs. Replication in Simple Cryptographic Protocols

    DEFF Research Database (Denmark)

    Huttel, Hans; Srba, Jiri

    2005-01-01

    We use some recent techniques from process algebra to draw several conclusions about the well studied class of ping-pong protocols introduced by Dolev and Yao. In particular we show that all nontrivial properties, including reachability and equivalence checking wrt. the whole van Glabbeek's spect...... of messages in the sense of Amadio, Lugiez and Vanackere. We conclude by showing that reachability analysis for a replicative variant of the protocol becomes decidable....

  4. Broadening and Simplifying the First SETI Protocol

    Science.gov (United States)

    Michaud, M. A. G.

    The Declaration of Principles Concerning Activities Following the Detection of Extraterrestrial Intelligence, known informally as the First SETI Protocol, is the primary existing international guidance on this subject. During the fifteen years since the document was issued, several people have suggested revisions or additional protocols. This article proposes a broadened and simplified text that would apply to the detection of alien technology in our solar system as well as to electromagnetic signals from more remote sources.

  5. Hybrid Long-Distance Entanglement Distribution Protocol

    DEFF Research Database (Denmark)

    Brask, J.B.; Rigas, I.; Polzik, E.S.

    2010-01-01

    We propose a hybrid (continuous-discrete variable) quantum repeater protocol for long-distance entanglement distribution. Starting from states created by single-photon detection, we show how entangled coherent state superpositions can be generated by means of homodyne detection. We show that near......-deterministic entanglement swapping with such states is possible using only linear optics and homodyne detectors, and we evaluate the performance of our protocol combining these elements....

  6. Dynamic Aggregation Protocol for Wireless Sensor Networks

    OpenAIRE

    Mounir Said , Adel; William Ibrahim , Ashraf; Soua , Ahmed; Afifi , Hossam

    2013-01-01

    International audience; Sensor networks suffer from limited capabilities such as bandwidth, low processing power, and memory size. There is therefore a need for protocols that deliver sensor data in an energy-efficient way to the sink. One of those techniques, it gathers sensors' data in a small size packet suitable for transmission. In this paper, we propose a new Effective Data Aggregation Protocol (DAP) to reduce the energy consumption in Wireless Sensor Networks (WSNs), which prolongs the...

  7. UNA NUEVA ALTERNATIVA NUMÉRICA PARA LA SOLUCIÓN DE LA ECUACIÓN UNIDIMENSIONAL DE RICHARDS: ESTUDIO DE DRENAJE E INFILTRACIÓN DE FLUIDOS EN LA ZONA NO SATURADA

    Directory of Open Access Journals (Sweden)

    Evelyn Álvarez Sierra

    2016-10-01

    Full Text Available En el trabajo se comparan dos métodos numéricos para resolver el modelo unidimensional de infiltración y drenaje de agua en la zona no saturada en medios porosos, el cual es modelado respecto al contenido de humedad utilizando la ecuación no-lineal de Richards. El primer método está basado en el método clásico de Diferencias Finitas y el segundo en el método de Líneas combinado con el código DASSL para la solución de las ecuaciones diferenciales-algebraicas resultantes. Se muestra que el último método proporciona una vía numérica eficiente para la solución de problemas de EDPs que tienen un comportamiento singular de shock u ondas viajeras, como es el caso de la ecuación de Richard, los cuales se pueden resolver numéricamente con éxito sólo utilizando esquemas muy estables. Los métodos numéricos discutidos en el trabajo se aplican a dos tipos de suelos reales: Yolo Light Clay y Brindabella Silty Clay Loam, usando las propiedades hidráulicas referidas en Broadbridge y White [16]. Para validar el modelo, se comparan los perfiles de humedad con los resultados reportados por Warrick, Lomen e Islas [18].Igualmente, se demuestra con datos reales la ventaja de resolver numéricamente el comportamiento del flujo unidimensional en la zona no saturada de un medio poroso. Finalmente, el modelo propuesto y los resultados numéricos obtenidos posibilitan brindar un pronóstico sobre la utilización de recursos hídricos para el caso de riego en agricultura y también para el transporte de contaminantes.

  8. Optimistic protocol for partitioned distributed database systems

    International Nuclear Information System (INIS)

    Davidson, S.B.

    1982-01-01

    A protocol for transaction processing during partition failures is presented which guarantees mutual consistency between copies of data-items after repair is completed. The protocol is optimistic in that transactions are processed without restrictions during the failure; conflicts are detected at repair time using a precedence graph and are resolved by backing out transactions according to some backout strategy. The protocol is then evaluated using simulation and probabilistic modeling. In the simulation, several parameters are varied such as the number of transactions processed in a group, the type of transactions processed, the number of data-items present in the database, and the distribution of references to data-items. The simulation also uses different backout strategies. From these results we note conditions under which the protocol performs well, i.e., conditions under which the protocol backs out a small percentage of the transaction run. A probabilistic model is developed to estimate the expected number of transactions backed out using most of the above database and transaction parameters, and is shown to agree with simulation results. Suggestions are then made on how to improve the performance of the protocol. Insights gained from the simulation and probabilistic modeling are used to develop a backout strategy which takes into account individual transaction costs and attempts to minimize total backout cost. Although the problem of choosing transactions to minimize total backout cost is, in general, NP-complete, the backout strategy is efficient and produces very good results

  9. Network-topology-adaptive quantum conference protocols

    International Nuclear Information System (INIS)

    Zhang Sheng; Wang Jian; Tang Chao-Jing; Zhang Quan

    2011-01-01

    As an important application of the quantum network communication, quantum multiparty conference has made multiparty secret communication possible. Previous quantum multiparty conference schemes based on quantum data encryption are insensitive to network topology. However, the topology of the quantum network significantly affects the communication efficiency, e.g., parallel transmission in a channel with limited bandwidth. We have proposed two distinctive protocols, which work in two basic network topologies with efficiency higher than the existing ones. We first present a protocol which works in the reticulate network using Greeberger—Horne—Zeilinger states and entanglement swapping. Another protocol, based on quantum multicasting with quantum data compression, which can improve the efficiency of the network, works in the star-like network. The security of our protocols is guaranteed by quantum key distribution and one-time-pad encryption. In general, the two protocols can be applied to any quantum network where the topology can be equivalently transformed to one of the two structures we propose in our protocols. (general)

  10. Simulation and Evaluation of CTP and Secure-CTP Protocols

    Directory of Open Access Journals (Sweden)

    P. Pecho

    2010-04-01

    Full Text Available The paper discusses characteristics and qualities of two routing protocols – Collection Tree Protocol and its secure modification. The original protocol, as well as other protocols for wireless sensors, solves only problems of ra- dio communication and limited resources. Our design of the secure protocol tries to solve also the essential security ob- jectives. For the evaluation of properties of our protocol in large networks, a TOSSIM simulator was used. Our effort was to show the influence of the modification of the routing protocol to its behavior and quality of routing trees. We have proved that adding security into protocol design does not necessarily mean higher demands for data transfer, power consumption or worse protocol efficiency. In the paper, we manifest that security in the protocol may be achieved with low cost and may offer similar performance as the original protocol.

  11. MDEP Protocol VICWG-01. MDEP Protocol: Witnessed, Joint, and Multinational Vendor Inspection Protocol

    International Nuclear Information System (INIS)

    2014-01-01

    The Multinational Design Evaluation Programme (MDEP) was launched in 2006 by the US Nuclear Regulatory Commission (NRC) and the French Nuclear Safety Authority (ASN) with the aim of developing innovative approaches to leverage the resources and knowledge of national regulatory authorities reviewing new reactor designs. MDEP full members are regulators from Canada, People's Republic of China, Finland, France, India, Japan, Republic of Korea, Russian Federation, South Africa, Sweden, the United Kingdom and the United States of America. The United Arab Emirates and Turkey are associate members. The OECD Nuclear Energy Agency (NEA) acts as the Technical Secretariat for the MDEP. The International Atomic Energy Agency (IAEA) participates in many of the MDEP activities, including harmonisation efforts. The Vendor Inspection Cooperation Working Group (VICWG) is one of the issue-specific working groups that the MDEP members are undertaking with one long term goal of the VICWG being to maximize the use of the results obtained from other regulator's efforts in inspecting vendors. To accomplish this goal, it is vital that the regulators learn about each other's procedures, processes, and regulations. To facilitate the learning process the VICWG is coordinating vendor inspections among the involved regulatory authorities with the purpose of enhancing the understanding of each other's vendor inspection procedures. This programme is administered by the NEA. Involvement in specific inspections provides a number of opportunities for member state regulators to witness other regulators' inspection methods, gain useful information on the quality systems and manufacturing arrangements of specific vendors and where appropriate, actively participate in the inspection. The purpose of this protocol is to provide guidance to regulators that wish to carry out vendor inspections or participate in or witness other regulators' vendor inspections. It also provides

  12. Protocol for Communication Networking for Formation Flying

    Science.gov (United States)

    Jennings, Esther; Okino, Clayton; Gao, Jay; Clare, Loren

    2009-01-01

    An application-layer protocol and a network architecture have been proposed for data communications among multiple autonomous spacecraft that are required to fly in a precise formation in order to perform scientific observations. The protocol could also be applied to other autonomous vehicles operating in formation, including robotic aircraft, robotic land vehicles, and robotic underwater vehicles. A group of spacecraft or other vehicles to which the protocol applies could be characterized as a precision-formation- flying (PFF) network, and each vehicle could be characterized as a node in the PFF network. In order to support precise formation flying, it would be necessary to establish a corresponding communication network, through which the vehicles could exchange position and orientation data and formation-control commands. The communication network must enable communication during early phases of a mission, when little positional knowledge is available. Particularly during early mission phases, the distances among vehicles may be so large that communication could be achieved only by relaying across multiple links. The large distances and need for omnidirectional coverage would limit communication links to operation at low bandwidth during these mission phases. Once the vehicles were in formation and distances were shorter, the communication network would be required to provide high-bandwidth, low-jitter service to support tight formation-control loops. The proposed protocol and architecture, intended to satisfy the aforementioned and other requirements, are based on a standard layered-reference-model concept. The proposed application protocol would be used in conjunction with conventional network, data-link, and physical-layer protocols. The proposed protocol includes the ubiquitous Institute of Electrical and Electronics Engineers (IEEE) 802.11 medium access control (MAC) protocol to be used in the datalink layer. In addition to its widespread and proven use in

  13. Review of Richard Parra, «La tiranía del Inca. El Inca Garcilaso y la escritura política en el Perú colonial (1568-1617», Lima, Ediciones Copé, 2015, 508 pp., ISBN 978-6124-20-221-6

    Directory of Open Access Journals (Sweden)

    Germán Adolfo Morong Reyes

    2016-05-01

    Full Text Available Review of Richard Parra, «La tiranía del Inca. El Inca Garcilaso y la escritura política en el Perú colonial (1568-1617», Lima, Ediciones Copé, 2015, 508 pp., ISBN 978-6124-20-221-6

  14. MODELLING AND VERIFICATION OF KITSAT PACKET COMMUNICATION PROTOCOLS

    Directory of Open Access Journals (Sweden)

    Young-Ro Lee

    1996-06-01

    Full Text Available In this paper, in order to verify KITSAT 1/2 packet communication protocols, we model the AX.25 protocol and PACSAT protocol by using an extended Petri net and then verify the correctness, boundedness, liveness and deadlock freeness of packet protocols by utilizing reachability trees.

  15. Differential phase-time shifting protocol for QKD (DPTS)

    DEFF Research Database (Denmark)

    Usuga Castaneda, Mario A.; Bacco, Davide; Christensen, Jesper Bjerge

    2016-01-01

    We explore the implementation of a novel protocol for fiber-based high-dimensional quantum key distribution (QKD) which improves over the traditional DPS-QKD and COW protocols.......We explore the implementation of a novel protocol for fiber-based high-dimensional quantum key distribution (QKD) which improves over the traditional DPS-QKD and COW protocols....

  16. A Cryptographic Moving-Knife Cake-Cutting Protocol

    Directory of Open Access Journals (Sweden)

    Yoshifumi Manabe

    2012-02-01

    Full Text Available This paper proposes a cake-cutting protocol using cryptography when the cake is a heterogeneous good that is represented by an interval on a real line. Although the Dubins-Spanier moving-knife protocol with one knife achieves simple fairness, all players must execute the protocol synchronously. Thus, the protocol cannot be executed on asynchronous networks such as the Internet. We show that the moving-knife protocol can be executed asynchronously by a discrete protocol using a secure auction protocol. The number of cuts is n-1 where n is the number of players, which is the minimum.

  17. Welfare Quality assessment protocol for laying hens = Welfare Quality assessment protocol voor leghennen

    NARCIS (Netherlands)

    Niekerk, van T.G.C.M.; Gunnink, H.; Reenen, van C.G.

    2012-01-01

    Results of a study on the Welfare Quality® assessment protocol for laying hens. It reports the development of the integration of welfare assessment as scores per criteria as well as simplification of the Welfare Quality® assessment protocol. Results are given from assessment of 122 farms.

  18. Nursing Music Protocol and Postoperative Pain.

    Science.gov (United States)

    Poulsen, Michael J; Coto, Jeffrey

    2018-04-01

    Pain has always been a major concern for patients and nurses during the postoperative period. Therapies, medicines, and protocols have been developed to improve pain and anxiety but have undesirable risks to the patient. Complementary and alternative medicine therapies have been studied but have not been applied as regular protocols in the hospital setting. Music is one type of complementary and alternative medicine therapy that has been reported to have favorable results on reducing postoperative pain, anxiety, and opioid usage. However, music lacks a protocol that nurses can implement during the perioperative process. This paper is an in-depth literature review assessing a best practice recommendation and protocol that establishes a consensus in the use of music therapy. The results suggest that music therapy may consist of calming, soft tones of 60-80 beats per minute for at least 15-30 minutes at least twice daily during the pre- and postoperative periods. It is suggested that music only be used in conjunction with standards of care and not as the primary intervention of pain or anxiety. This evidence suggests that proper use of music therapy can significantly reduce surgical pain. Implementing these protocols and allowing the freedom of nursing staff to use them may lead to greater reductions in surgical pain and anxiety and a reduction in opioid use. Copyright © 2017 American Society for Pain Management Nursing. Published by Elsevier Inc. All rights reserved.

  19. WDM Network and Multicasting Protocol Strategies

    Directory of Open Access Journals (Sweden)

    Pinar Kirci

    2014-01-01

    Full Text Available Optical technology gains extensive attention and ever increasing improvement because of the huge amount of network traffic caused by the growing number of internet users and their rising demands. However, with wavelength division multiplexing (WDM, it is easier to take the advantage of optical networks and optical burst switching (OBS and to construct WDM networks with low delay rates and better data transparency these technologies are the best choices. Furthermore, multicasting in WDM is an urgent solution for bandwidth-intensive applications. In the paper, a new multicasting protocol with OBS is proposed. The protocol depends on a leaf initiated structure. The network is composed of source, ingress switches, intermediate switches, edge switches, and client nodes. The performance of the protocol is examined with Just Enough Time (JET and Just In Time (JIT reservation protocols. Also, the paper involves most of the recent advances about WDM multicasting in optical networks. WDM multicasting in optical networks is given as three common subtitles: Broadcast and-select networks, wavelength-routed networks, and OBS networks. Also, in the paper, multicast routing protocols are briefly summarized and optical burst switched WDM networks are investigated with the proposed multicast schemes.

  20. A Lightweight Protocol for Secure Video Streaming.

    Science.gov (United States)

    Venčkauskas, Algimantas; Morkevicius, Nerijus; Bagdonas, Kazimieras; Damaševičius, Robertas; Maskeliūnas, Rytis

    2018-05-14

    The Internet of Things (IoT) introduces many new challenges which cannot be solved using traditional cloud and host computing models. A new architecture known as fog computing is emerging to address these technological and security gaps. Traditional security paradigms focused on providing perimeter-based protections and client/server point to point protocols (e.g., Transport Layer Security (TLS)) are no longer the best choices for addressing new security challenges in fog computing end devices, where energy and computational resources are limited. In this paper, we present a lightweight secure streaming protocol for the fog computing "Fog Node-End Device" layer. This protocol is lightweight, connectionless, supports broadcast and multicast operations, and is able to provide data source authentication, data integrity, and confidentiality. The protocol is based on simple and energy efficient cryptographic methods, such as Hash Message Authentication Codes (HMAC) and symmetrical ciphers, and uses modified User Datagram Protocol (UDP) packets to embed authentication data into streaming data. Data redundancy could be added to improve reliability in lossy networks. The experimental results summarized in this paper confirm that the proposed method efficiently uses energy and computational resources and at the same time provides security properties on par with the Datagram TLS (DTLS) standard.

  1. Two Cheers for the Trafficking Protocol

    Directory of Open Access Journals (Sweden)

    Anne T Gallagher

    2015-04-01

    Full Text Available The Trafficking Protocol makes an easy target for attack. Its origins lie in an attempt to control a particularly exploitative form of migration that was challenging the ability of States to control their own borders. Its parent instrument is a framework agreement to address transnational organised crime. While paying fleeting attention to the rights of victims, the Protocol, with its emphasis on criminalisation and border protection is nowhere near being a human rights treaty. On top of all that it does not even have a credible enforcement mechanism, allowing states parties wide latitude in interpreting and applying their obligations. Strangely, these seemingly insurmountable flaws have not stopped the Protocol’s emergence as perhaps the single most important development in the fight against human trafficking. Without the Protocol, arguments around definitions would have continued to block the evolution of principles and rules. Without the Protocol it is likely that the human rights system would have continued its shameful tradition of sidelining issues such as forced labour, forced sex, forced marriage and the ritual exploitation of migrant workers through debt. Most critically, the Protocol provided the impetus and template for a series of legal and political developments that, over time, have served to ameliorate some of its greatest weaknesses, including the lack of human rights protections and of a credible oversight mechanism.

  2. Supporting Adaptation of Wireless Communication Protocols

    International Nuclear Information System (INIS)

    Dhomeja, L.D.; Soomro, I.A.; Malkani, Y.A.

    2016-01-01

    Pervasive devices such as mobile phones and PDAs (Personal Digital Assistants) come with different wireless communication capabilities, for example, WiFi (Wireless Fidelity), Bluetooth, IrDA (Infrared), etc. In order for pervasive devices to interact with each other, they need to have matching (alike) communication capabilities, otherwise such heterogeneous devices would not be able to interact with each other. In this paper we address this issue and propose a system that makes devices with heterogeneous wireless communication capabilities communicate with each other. The proposed system supports adaptation of wireless communication protocols through a proxy, which sits between a client and a server, and supports adaptation of wireless communication protocols. Its functionality involves intercepting a request made by a client with a different wireless communication capability (e.g. Bluetooth) from what the server has (e.g. WiFi), connecting to the server and then sending results back to the client. We have tested the system by implementing a messaging service application and running it on the system. The proxy supports all Bluetooth protocols, i.e. OBEX (Object Exchange), L2CAP (Logical Link Control and Adaptation Protocol), RFCOM (Radio Frequency Communication) and WiFi protocol and can run on (J2MW (Java 2 Micro Edition) enabled mobile phones which support both Bluetooth and WiFi capabilities. (author)

  3. Controlled Delegation Protocol in Mobile RFID Networks

    Directory of Open Access Journals (Sweden)

    Yang MingHour

    2010-01-01

    Full Text Available To achieve off-line delegation for mobile readers, we propose a delegation protocol for mobile RFID allowing its readers access to specific tags through back-end server. That is to say, reader-tag mutual authentication can be performed without readers being connected to back-end server. Readers are also allowed off-line access to tags' data. Compared with other delegation protocols, our scheme uniquely enables back-end server to limit each reader's reading times during delegation. Even in a multireader situation, our protocol can limit reading times and reading time periods for each of them and therefore makes back-end server's delegation more flexible. Besides, our protocol can prevent authorized readers from transferring their authority to the unauthorized, declining invalid access to tags. Our scheme is proved viable and secure with GNY logic; it is against certain security threats, such as replay attacks, denial of service (DoS attacks, Man-in-the-Middle attacks, counterfeit tags, and breaches of location and data privacy. Also, the performance analysis of our protocol proves that current tags can afford the computation load required in this scheme.

  4. Decellularization of placentas: establishing a protocol

    Directory of Open Access Journals (Sweden)

    L.C.P.C. Leonel

    2017-11-01

    Full Text Available Biological biomaterials for tissue engineering purposes can be produced through tissue and/or organ decellularization. The remaining extracellular matrix (ECM must be acellular and preserve its proteins and physical features. Placentas are organs of great interest because they are discarded after birth and present large amounts of ECM. Protocols for decellularization are tissue-specific and have not been established for canine placentas yet. This study aimed at analyzing a favorable method for decellularization of maternal and fetal portions of canine placentas. Canine placentas were subjected to ten preliminary tests to analyze the efficacy of parameters such as the type of detergents, freezing temperatures and perfusion. Two protocols were chosen for further analyses using histology, scanning electron microscopy, immunofluorescence and DNA quantification. Sodium dodecyl sulfate (SDS was the most effective detergent for cell removal. Freezing placentas before decellularization required longer periods of incubation in different detergents. Both perfusion and immersion methods were capable of removing cells. Placentas decellularized using Protocol I (1% SDS, 5 mM EDTA, 50 mM TRIS, and 0.5% antibiotic preserved the ECM structure better, but Protocol I was less efficient to remove cells and DNA content from the ECM than Protocol II (1% SDS, 5 mM EDTA, 0.05% trypsin, and 0.5% antibiotic.

  5. A More Efficient Contextuality Distillation Protocol

    Science.gov (United States)

    Meng, Hui-xian; Cao, Huai-xin; Wang, Wen-hua; Fan, Ya-jing; Chen, Liang

    2018-03-01

    Based on the fact that both nonlocality and contextuality are resource theories, it is natural to ask how to amplify them more efficiently. In this paper, we present a contextuality distillation protocol which produces an n-cycle box B ∗ B ' from two given n-cycle boxes B and B '. It works efficiently for a class of contextual n-cycle ( n ≥ 4) boxes which we termed as "the generalized correlated contextual n-cycle boxes". For any two generalized correlated contextual n-cycle boxes B and B ', B ∗ B ' is more contextual than both B and B '. Moreover, they can be distilled toward to the maximally contextual box C H n as the times of iteration goes to infinity. Among the known protocols, our protocol has the strongest approximate ability and is optimal in terms of its distillation rate. What is worth noting is that our protocol can witness a larger set of nonlocal boxes that make communication complexity trivial than the protocol in Brunner and Skrzypczyk (Phys. Rev. Lett. 102, 160403 2009), this might be helpful for exploring the problem that why quantum nonlocality is limited.

  6. Efficient Communication Protocols for Deciding Edit Distance

    DEFF Research Database (Denmark)

    Jowhari, Hossein

    2012-01-01

    In this paper we present two communication protocols on computing edit distance. In our first result, we give a one-way protocol for the following Document Exchange problem. Namely given x ∈ Σn to Alice and y ∈ Σn to Bob and integer k to both, Alice sends a message to Bob so that he learns x...... or truthfully reports that the edit distance between x and y is greater than k. For this problem, we give a randomized protocol in which Alice transmits at most O ˜ (klog 2 n) bits and each party’s time complexity is O ˜ (nlogn+k 2 log 2 n) . Our second result is a simultaneous protocol for edit distance over...... permutations. Here Alice and Bob both send a message to a third party (the referee) who does not have access to the input strings. Given the messages, the referee decides if the edit distance between x and y is at most k or not. For this problem we give a protocol in which Alice and Bob run a O...

  7. A Lightweight Buyer-Seller Watermarking Protocol

    Directory of Open Access Journals (Sweden)

    Yongdong Wu

    2008-01-01

    Full Text Available The buyer-seller watermarking protocol enables a seller to successfully identify a traitor from a pirated copy, while preventing the seller from framing an innocent buyer. Based on finite field theory and the homomorphic property of public key cryptosystems such as RSA, several buyer-seller watermarking protocols (N. Memon and P. W. Wong (2001 and C.-L. Lei et al. (2004 have been proposed previously. However, those protocols require not only large computational power but also substantial network bandwidth. In this paper, we introduce a new buyer-seller protocol that overcomes those weaknesses by managing the watermarks. Compared with the earlier protocols, ours is n times faster in terms of computation, where n is the number of watermark elements, while incurring only O(1/lN times communication overhead given the finite field parameter lN. In addition, the quality of the watermarked image generated with our method is better, using the same watermark strength.

  8. A class-chest for deriving transport protocols

    Energy Technology Data Exchange (ETDEWEB)

    Strayer, W.T.

    1996-10-01

    Development of new transport protocols or protocol algorithms suffers from the complexity of the environment in which they are intended to run. Modeling techniques attempt to avoid this by simulating the environment. Another approach to promoting rapid prototyping of protocols and protocol algorithms is to provide a pre-built infrastructure that is common to transport protocols, so that the focus is placed on the protocol-specific aspects. The Meta-Transport Library is a library of C++ base classes that implement or abstract out the mundane functions of a protocol, new protocol implementations are derived from base classes. The result is a fully viable user- level transport protocol implementation, with emphasis on modularity. The collection of base classes form a ``class-chest`` of tools .from which protocols can be developed and studied with as little change to a normal UNIX environment as possible.

  9. An one-time-pad key communication protocol with entanglement

    OpenAIRE

    Cai, Qing-yu

    2003-01-01

    We present an one-time-pad key communication protocol that allows secure direct communication with entanglement. Alice can send message to Bob in a deterministic manner by using local measurements and public communication. The theoretical efficiency of this protocol is double compared with BB84 protocol. We show this protocol is unconditional secure under arbitrary quantum attack. And we discuss that this protocol can be perfectly implemented with current technologies.

  10. Objective and automated protocols for the evaluation of biomedical search engines using No Title Evaluation protocols.

    Science.gov (United States)

    Campagne, Fabien

    2008-02-29

    The evaluation of information retrieval techniques has traditionally relied on human judges to determine which documents are relevant to a query and which are not. This protocol is used in the Text Retrieval Evaluation Conference (TREC), organized annually for the past 15 years, to support the unbiased evaluation of novel information retrieval approaches. The TREC Genomics Track has recently been introduced to measure the performance of information retrieval for biomedical applications. We describe two protocols for evaluating biomedical information retrieval techniques without human relevance judgments. We call these protocols No Title Evaluation (NT Evaluation). The first protocol measures performance for focused searches, where only one relevant document exists for each query. The second protocol measures performance for queries expected to have potentially many relevant documents per query (high-recall searches). Both protocols take advantage of the clear separation of titles and abstracts found in Medline. We compare the performance obtained with these evaluation protocols to results obtained by reusing the relevance judgments produced in the 2004 and 2005 TREC Genomics Track and observe significant correlations between performance rankings generated by our approach and TREC. Spearman's correlation coefficients in the range of 0.79-0.92 are observed comparing bpref measured with NT Evaluation or with TREC evaluations. For comparison, coefficients in the range 0.86-0.94 can be observed when evaluating the same set of methods with data from two independent TREC Genomics Track evaluations. We discuss the advantages of NT Evaluation over the TRels and the data fusion evaluation protocols introduced recently. Our results suggest that the NT Evaluation protocols described here could be used to optimize some search engine parameters before human evaluation. Further research is needed to determine if NT Evaluation or variants of these protocols can fully substitute

  11. Analysis of Security Protocols by Annotations

    DEFF Research Database (Denmark)

    Gao, Han

    . The development of formal techniques, e.g. control flow analyses, that can check various security properties, is an important tool to meet this challenge. This dissertation contributes to the development of such techniques. In this dissertation, security protocols are modelled in the process calculus LYSA......The trend in Information Technology is that distributed systems and networks are becoming increasingly important, as most of the services and opportunities that characterise the modern society are based on these technologies. Communication among agents over networks has therefore acquired a great...... deal of research interest. In order to provide effective and reliable means of communication, more and more communication protocols are invented, and for most of them, security is a significant goal. It has long been a challenge to determine conclusively whether a given protocol is secure or not...

  12. Breaking Megrelishvili protocol using matrix diagonalization

    Science.gov (United States)

    Arzaki, Muhammad; Triantoro Murdiansyah, Danang; Adi Prabowo, Satrio

    2018-03-01

    In this article we conduct a theoretical security analysis of Megrelishvili protocol—a linear algebra-based key agreement between two participants. We study the computational complexity of Megrelishvili vector-matrix problem (MVMP) as a mathematical problem that strongly relates to the security of Megrelishvili protocol. In particular, we investigate the asymptotic upper bounds for the running time and memory requirement of the MVMP that involves diagonalizable public matrix. Specifically, we devise a diagonalization method for solving the MVMP that is asymptotically faster than all of the previously existing algorithms. We also found an important counterintuitive result: the utilization of primitive matrix in Megrelishvili protocol makes the protocol more vulnerable to attacks.

  13. Automatic Generation of Network Protocol Gateways

    DEFF Research Database (Denmark)

    Bromberg, Yérom-David; Réveillère, Laurent; Lawall, Julia

    2009-01-01

    for describing protocol behaviors, message structures, and the gateway logic.  Z2z includes a compiler that checks essential correctness properties and produces efficient code. We have used z2z to develop a number of gateways, including SIP to RTSP, SLP to UPnP, and SMTP to SMTP via HTTP, involving a range......The emergence of networked devices in the home has made it possible to develop applications that control a variety of household functions. However, current devices communicate via a multitude of incompatible protocols, and thus gateways are needed to translate between them.  Gateway construction......, however, requires an intimate knowledge of the relevant protocols and a substantial understanding of low-level network programming, which can be a challenge for many application programmers. This paper presents a generative approach to gateway construction, z2z, based on a domain-specific language...

  14. Magnetic resonance imaging protocols for paediatric neuroradiology

    International Nuclear Information System (INIS)

    Saunders, Dawn E.; Thompson, Clare; Gunny, Roxanne; Jones, Rod; Cox, Tim; Chong, Wui Khean

    2007-01-01

    Increasingly, radiologists are encouraged to have protocols for all imaging studies and to include imaging guidelines in care pathways set up by the referring clinicians. This is particularly advantageous in MRI where magnet time is limited and a radiologist's review of each patient's images often results in additional sequences and longer scanning times without the advantage of improvement in diagnostic ability. The difficulties of imaging small children and the challenges presented to the radiologist as the brain develops are discussed. We present our protocols for imaging the brain and spine of children based on 20 years experience of paediatric neurological MRI. The protocols are adapted to suit children under the age of 2 years, small body parts and paediatric clinical scenarios. (orig.)

  15. Demarcation of Security in Authentication Protocols

    DEFF Research Database (Denmark)

    Ahmed, Naveed; Jensen, Christian D.

    2011-01-01

    Security analysis of communication protocols is a slippery business; many “secure” protocols later turn out to be insecure. Among many, two complains are more frequent: inadequate definition of security and unstated assumptions in the security model. In our experience, one principal cause...... for such state of affairs is an apparent overlap of security and correctness, which may lead to many sloppy security definitions and security models. Although there is no inherent need to separate security and correctness requirements, practically, such separation is significant. It makes security analysis...... easier, and enables us to define security goals with a fine granularity. We present one such separation, by introducing the notion of binding sequence as a security primitive. A binding sequence, roughly speaking, is the only required security property of an authentication protocol. All other...

  16. Will OPEC lose from the Kyoto Protocol?

    International Nuclear Information System (INIS)

    Barnett, Jon; Dessai, Suraje; Webber, Michael

    2004-01-01

    A range of energy-economy models forecast losses to members of the Organisation of Petroleum Exporting Countries (OPEC) should the Kyoto Protocol come into force. These forecasts are a powerful influence in the United Nations Framework Convention on Climate Change negotiations. They are used by OPEC to advance the agenda on the impacts of response measures, covertly arguing for compensation for lost oil revenues arising from implementation of the Protocol. This paper discusses this issue, and explores the key assumptions of these models and their uncertainties. Assumptions about carbon leakage, future availability of oil reserves, substitution, innovation, and capital turnover are considered. The paper suggests that losses will not affect OPEC countries equally, and that these losses are not likely to be as substantial as the models forecast. A range of policy measures are proposed to lessen any impact the Protocol may have on OPEC

  17. Structured Transition Protocol for Children with Cystinosis

    Directory of Open Access Journals (Sweden)

    Rupesh Raina

    2017-08-01

    Full Text Available The transition from pediatric to adult medical services has a greater impact on the care of adolescents or young adults with chronic diseases such as cystinosis. This transition period is a time of psychosocial development and new responsibilities placing these patients at increased risk of non-adherence. This can lead to serious adverse effects such as graft loss and progression of the disease. Our transition protocol will provide patients, families, physicians, and all those involved a structured guide to transitioning cystinosis patients. This structured protocol depends on four areas of competency: Recognition, Insight, Self-reliance, and Establishment of healthy habits (RISE. This protocol has not been tested and therefore challenges not realized. With a focus on medical, social, and educational/vocational aspects, we aim to improve transition for cystinosis patients in all aspects of their lives.

  18. Newborn hearing screening protocol in tuscany region.

    Science.gov (United States)

    Berrettini, Stefano; Ghirri, Paolo; Lazzerini, Francesco; Lenzi, Giovanni; Forli, Francesca

    2017-09-20

    Newborn hearing screening has to be considered the first step of a program for the identification, diagnosis, treatment and habilitation/rehabilitation of children with hearing impairment. In Tuscany Region of Italy, the universal newborn hearing screening is mandatory since november 2007. The first guidelines for the execution of the screening have been released in June 2008; then many other Italian regions partially or totally adopted these guidelines. On the basis of the experience from 2008 and according to the recent evidences in the scientific literature, a new screening protocol was released in Tuscany region. The new protocol is an evolution of the previous one. Some issues reported in the previous protocol and in the Joint Committee on Infant Hearing statement published in 2007 were revised, such as the risk factors for auditory neuropathy and for late onset, progressive or acquired hearing loss. The new updated guidelines were submitted to the Sanitary Regional Council and then they have been approved in August 2016. The updated screening protocol is mainly aimed to identify newborns with a congenital moderate-to-profound hearing loss, but it also provides indications for the audiological follow-up of children with risk's factor for progressive or late onset hearing loss; further it provides indications for the audiological surveillance of children at risk for acquired hearing impairment. Then, in the new guidelines the role of the family paediatrician in the newborn hearing screening and audiological follow-up and surveillance is underscored. Finally the new guidelines provide indications for the treatment with hearing aids and cochlear implant, in accordance with the recent Italian Health Technology Assessment (HTA) guidelines. In the paper we report the modality of execution of the universal newborn hearing screening in the Tuscany Region, according to the recently updated protocol. The main features of the protocol and the critical issues are

  19. Turf Conversion Measurement and Verification Protocol

    Energy Technology Data Exchange (ETDEWEB)

    Kurnik, Charles W. [National Renewable Energy Lab. (NREL), Golden, CO (United States); Stoughton, Kate M. [Pacific Northwest National Lab. (PNNL), Richland, WA (United States); Figueroa, Jorge [Western Resource Advocates, Boulder, CO (United States)

    2017-12-05

    This measurement and verification (M and V) protocol provides procedures for energy service companies (ESCOs) and water efficiency service companies (WESCOs) to determine water savings as a result of water conservation measures (WCMs) in energy performance contracts associated with converting turfgrass or other water-intensive plantings to water-wise and sustainable landscapes. The water savings are determined by comparing the baseline water use to the water use after the WCM has been implemented. This protocol outlines the basic structure of the M and V plan, and details the procedures to use to determine water savings.

  20. Outdoor Irrigation Measurement and Verification Protocol

    Energy Technology Data Exchange (ETDEWEB)

    Kurnik, Charles W. [National Renewable Energy Lab. (NREL), Golden, CO (United States); Stoughton, Kate M. [Pacific Northwest National Lab. (PNNL), Richland, WA (United States); Figueroa, Jorge [Western Resource Advocates, Boulder, CO (United States)

    2017-12-05

    This measurement and verification (M&V) protocol provides procedures for energy service companies (ESCOs) and water efficiency service companies (WESCOs) to determine water savings resulting from water conservation measures (WCMs) in energy performance contracts associated with outdoor irrigation efficiency projects. The water savings are determined by comparing the baseline water use to the water use after the WCM has been implemented. This protocol outlines the basic structure of the M&V plan, and details the procedures to use to determine water savings.

  1. Study Application of RADIUS Protocol on Ethernet

    Institute of Scientific and Technical Information of China (English)

    GUO Fang; YANG Huan-yu; LI Hong

    2004-01-01

    This paper presents how to apply the RADIUS (Remote Authentication Dial In User Service)protocol ,which is generally applied to dial-up network, to the authentication & charge of Broad Band accessing control system on Ethernet. It is provided that the Broad Band accessing control system included a self-designed communication protocol is used in communicating between an terminal user and Network Access Server .The interface module on the servers side and the Radius system is also given in this article.

  2. Vicissitudes of Nagoya Protocol in Colombia

    International Nuclear Information System (INIS)

    Rojas Blanco, Diana Lorena

    2013-01-01

    The fair and equitable sharing of benefits arising from the utilization of genetic resources is not only one of the central objectives of the Nagoya Protocol, but also a challenge for communities of scientists, researchers, and indigenous ancestral generally for the educational community. It is therefore essential to know what the real and material implications for the population, the ratification of the Nagoya Protocol, which despite having sufficient justification and argued, highlights the need to develop legal tools, economic, technological and education for proper and fair implementation.

  3. Evolution of a C2 protocol gateway

    CSIR Research Space (South Africa)

    Duvenhage, A

    2008-06-01

    Full Text Available real-time or slower than real-time, depending on the type of link and the data source: The gateway normally reads logged raw protocol data much faster than real-time; a simulation could also start running slower than real-time if it requires too... inherent support for logging and playback of the raw protocol data. From a software architecture perspective, each link has a corresponding link component that is responsible for opening and closing the connection, as well as reading and writing...

  4. Sessions and Separability in Security Protocols

    DEFF Research Database (Denmark)

    Carbone, Marco; Guttman, Joshua

    2013-01-01

    Despite much work on sessions and session types in non- adversarial contexts, session-like behavior given an active adversary has not received an adequate definition and proof methods. We provide a syntactic property that guarantees that a protocol has session-respecting executions. Any uncomprom......Despite much work on sessions and session types in non- adversarial contexts, session-like behavior given an active adversary has not received an adequate definition and proof methods. We provide a syntactic property that guarantees that a protocol has session-respecting executions. Any...

  5. A robust ECC based mutual authentication protocol with anonymity for session initiation protocol.

    Science.gov (United States)

    Mehmood, Zahid; Chen, Gongliang; Li, Jianhua; Li, Linsen; Alzahrani, Bander

    2017-01-01

    Over the past few years, Session Initiation Protocol (SIP) is found as a substantial application-layer protocol for the multimedia services. It is extensively used for managing, altering, terminating and distributing the multimedia sessions. Authentication plays a pivotal role in SIP environment. Currently, Lu et al. presented an authentication protocol for SIP and profess that newly proposed protocol is protected against all the familiar attacks. However, the detailed analysis describes that the Lu et al.'s protocol is exposed against server masquerading attack and user's masquerading attack. Moreover, it also fails to protect the user's identity as well as it possesses incorrect login and authentication phase. In order to establish a suitable and efficient protocol, having ability to overcome all these discrepancies, a robust ECC-based novel mutual authentication mechanism with anonymity for SIP is presented in this manuscript. The improved protocol contains an explicit parameter for user to cope the issues of security and correctness and is found to be more secure and relatively effective to protect the user's privacy, user's masquerading and server masquerading as it is verified through the comprehensive formal and informal security analysis.

  6. A robust ECC based mutual authentication protocol with anonymity for session initiation protocol.

    Directory of Open Access Journals (Sweden)

    Zahid Mehmood

    Full Text Available Over the past few years, Session Initiation Protocol (SIP is found as a substantial application-layer protocol for the multimedia services. It is extensively used for managing, altering, terminating and distributing the multimedia sessions. Authentication plays a pivotal role in SIP environment. Currently, Lu et al. presented an authentication protocol for SIP and profess that newly proposed protocol is protected against all the familiar attacks. However, the detailed analysis describes that the Lu et al.'s protocol is exposed against server masquerading attack and user's masquerading attack. Moreover, it also fails to protect the user's identity as well as it possesses incorrect login and authentication phase. In order to establish a suitable and efficient protocol, having ability to overcome all these discrepancies, a robust ECC-based novel mutual authentication mechanism with anonymity for SIP is presented in this manuscript. The improved protocol contains an explicit parameter for user to cope the issues of security and correctness and is found to be more secure and relatively effective to protect the user's privacy, user's masquerading and server masquerading as it is verified through the comprehensive formal and informal security analysis.

  7. A Clustering Routing Protocol for Mobile Ad Hoc Networks

    Directory of Open Access Journals (Sweden)

    Jinke Huang

    2016-01-01

    Full Text Available The dynamic topology of a mobile ad hoc network poses a real challenge in the design of hierarchical routing protocol, which combines proactive with reactive routing protocols and takes advantages of both. And as an essential technique of hierarchical routing protocol, clustering of nodes provides an efficient method of establishing a hierarchical structure in mobile ad hoc networks. In this paper, we designed a novel clustering algorithm and a corresponding hierarchical routing protocol for large-scale mobile ad hoc networks. Each cluster is composed of a cluster head, several cluster gateway nodes, several cluster guest nodes, and other cluster members. The proposed routing protocol uses proactive protocol between nodes within individual clusters and reactive protocol between clusters. Simulation results show that the proposed clustering algorithm and hierarchical routing protocol provide superior performance with several advantages over existing clustering algorithm and routing protocol, respectively.

  8. Static Validation of a Voting Protocol

    DEFF Research Database (Denmark)

    Nielsen, Christoffer Rosenkilde; Andersen, Esben Heltoft; Nielson, Hanne Riis

    2005-01-01

    is formalised in an extension of the LySa process calculus with blinding signatures. The analysis, which is fully automatic, pinpoints previously undiscovered flaws related to verifiability and accuracy and we suggest modifications of the protocol needed for validating these properties....

  9. Development of bull trout sampling protocols

    Science.gov (United States)

    R. F. Thurow; J. T. Peterson; J. W. Guzevich

    2001-01-01

    This report describes results of research conducted in Washington in 2000 through Interagency Agreement #134100H002 between the U.S. Fish and Wildlife Service (USFWS) and the U.S. Forest Service Rocky Mountain Research Station (RMRS). The purpose of this agreement is to develop a bull trout (Salvelinus confluentus) sampling protocol by integrating...

  10. A Verifiable Language for Cryptographic Protocols

    DEFF Research Database (Denmark)

    Nielsen, Christoffer Rosenkilde

    We develop a formal language for specifying cryptographic protocols in a structured and clear manner, which allows verification of many interesting properties; in particular confidentiality and integrity. The study sheds new light on the problem of creating intuitive and human readable languages...

  11. The Nagoya Protocol: Fragmentation or Consolidation?

    Directory of Open Access Journals (Sweden)

    Carmen Richerzhagen

    2014-02-01

    Full Text Available In October, 2010, a protocol on access and benefit-sharing (ABS of genetic resources was adopted, the so-called Nagoya Protocol on Access to Genetic Resources and the Fair and Equitable Sharing of Benefits Arising from their Utilization to the Convention on Biological Diversity. Before the adoption of the Nagoya Protocol, the governance architecture of ABS was already characterized by a multifaceted institutional environment. The use of genetic resources is confronted with many issues (conservation, research and development, intellectual property rights, food security, health issues, climate change that are governed by different institutions and agreements. The Nagoya Protocol contributes to increased fragmentation. However, the question arises whether this new regulatory framework can help to advance the implementation of the ABS provisions of the Convention on Biological Diversity (CBD. This paper attempts to find an answer to that question by following three analytical steps. First, it analyzes the causes of change against the background of theories of institutional change. Second, it aims to assess the typology of the architecture in order to find out if this new set of rules will contribute to a more synergistic, cooperative or conflictive architecture of ABS governance. Third, the paper looks at the problem of “fit” and identifies criteria that can be used to assess the new ABS governance architecture with regard to its effectiveness.

  12. Real-time communication protocols: an overview

    NARCIS (Netherlands)

    Hanssen, F.T.Y.; Jansen, P.G.

    2003-01-01

    This paper describes several existing data link layer protocols that provide real-time capabilities on wired networks, focusing on token-ring and Carrier Sense Multiple Access based networks. Existing modifications to provide better real-time capabilities and performance are also described. Finally

  13. Protocol design and implementation using formal methods

    NARCIS (Netherlands)

    van Sinderen, Marten J.; Ferreira Pires, Luis; Pires, L.F.; Vissers, C.A.

    1992-01-01

    This paper reports on a number of formal methods that support correct protocol design and implementation. These methods are placed in the framework of a design methodology for distributed systems that was studied and developed within the ESPRIT II Lotosphere project (2304). The paper focuses on

  14. On BAN logics for industrial security protocols

    NARCIS (Netherlands)

    Agray, N.; Hoek, van der W.; Vink, de E.P.; Dunin-Keplicz, B.; Nawarecki, E.

    2002-01-01

    This paper reports on two case-studies of applying BAN logic to industrial strength security protocols. These studies demonstrate the flexibility of the BAN language, as it caters for the addition of appropriate constructs and rules. We argue that, although a semantical foundation of the formalism

  15. Radiotherapy QA of the DAHANCA 19 protocol

    DEFF Research Database (Denmark)

    Samsøe, E.; Andersen, E.; Hansen, C. R.

    2015-01-01

    Purpose/Objective: It has been demonstrated that nonadherence to protocol-specified radiotherapy (RT) requirements is associated with reduced survival, local control and potentially increased toxicity [1]. Thus, quality assurance (QA) of RT is important when evaluating the results of clinical...

  16. Recursion Versus Replication in Simple Cryptographic Protocols

    DEFF Research Database (Denmark)

    Hüttel, Hans; Srba, Jiri

    2005-01-01

    We use some very recent techniques from process algebra to draw interesting conclusions about the well studied class of ping-pong protocols introduced by Dolev and Yao. In particular we show that all nontrivial properties, including reachability and equivalence checking wrt. the whole van Glabbee...

  17. Semantics and logic for security protocols

    NARCIS (Netherlands)

    Jacobs, B.P.F.; Hasuo, I.

    2009-01-01

    This paper presents a sound BAN-like logic for reasoning about security protocols with theorem prover support. The logic has formulas for sending and receiving messages (with nonces, public and private encryptions, etc.), and has both temporal and epistemic operators (describing the knowledge of

  18. Monitoring System with Two Central Facilities Protocol

    Directory of Open Access Journals (Sweden)

    Caesar Firdaus

    2017-03-01

    Full Text Available The security of data and information on government’s information system required proper way of defending against threat. Security aspect can be achieved by using cryptography algorithm, applying information hiding concept, and implementing security protocol. In this research, two central facilities protocol was implemented on Research and Development Center of Mineral and Coal Technology’s Cooperation Contract Monitoring System by utilizing AES and whitespace manipulation algorithm. Adjustment on the protocol by creating several rule of validation ID’s generation and checking processes could fulfill two of four cryptography objectives, consist of authentication and non-repudiation. The solid collaboration between central legitimization agency (CLA, central tabulating facility (CTF, and client is the main idea in two central facilities protocol. The utilization of AES algorithm could defend the data on transmission from man in the middle attack scenario. On the other hand, whitespace manipulation algorithm provided data integrity aspect of the document that is uploaded to the system itself. Both of the algorithm fulfill confidentiality, data integrity, and authentication.

  19. Formalization of Quantum Protocols using Coq

    Directory of Open Access Journals (Sweden)

    Jaap Boender

    2015-11-01

    Full Text Available Quantum Information Processing, which is an exciting area of research at the intersection of physics and computer science, has great potential for influencing the future development of information processing systems. The building of practical, general purpose Quantum Computers may be some years into the future. However, Quantum Communication and Quantum Cryptography are well developed. Commercial Quantum Key Distribution systems are easily available and several QKD networks have been built in various parts of the world. The security of the protocols used in these implementations rely on information-theoretic proofs, which may or may not reflect actual system behaviour. Moreover, testing of implementations cannot guarantee the absence of bugs and errors. This paper presents a novel framework for modelling and verifying quantum protocols and their implementations using the proof assistant Coq. We provide a Coq library for quantum bits (qubits, quantum gates, and quantum measurement. As a step towards verifying practical quantum communication and security protocols such as Quantum Key Distribution, we support multiple qubits, communication and entanglement. We illustrate these concepts by modelling the Quantum Teleportation Protocol, which communicates the state of an unknown quantum bit using only a classical channel.

  20. Equilibria of Generalized Cut and Choose Protocols

    DEFF Research Database (Denmark)

    Branzei, Simina; Caragiannis, Ioannis; Kurokawa, David

    Classic cake cutting protocols — which fairly allocate a divisible good among agents with heterogeneous preferences — are susceptible to manipulation. Do their strategic outcomes still guarantee fairness? To answer this question we adopt a novel algo rithmic approach, proposing a concrete computa...