WorldWideScience

Sample records for hardware storage vault

  1. Cleanup Verification Package for the 118-F-7, 100-F Miscellaneous Hardware Storage Vault

    Energy Technology Data Exchange (ETDEWEB)

    M. J. Appel

    2006-11-02

    This cleanup verification package documents completion of remedial action for the 118-F-7, 100-F Miscellaneous Hardware Storage Vault. The site consisted of an inactive solid waste storage vault used for temporary storage of slightly contaminated reactor parts that could be recovered and reused for the 100-F Area reactor operations.

  2. Radiological dose assessment for vault storage concepts

    Energy Technology Data Exchange (ETDEWEB)

    Richard, R.F.

    1997-02-25

    This radiological dose assessment presents neutron and photon dose rates in support of project W-460. Dose rates are provided for a single 3013 container, the ``infloor`` storage vault concept, and the ``cubicle`` storage vault concept.

  3. Searchable Data Vault: Encrypted Queries in Secure Distributed Cloud Storage

    Directory of Open Access Journals (Sweden)

    Geong Sen Poh

    2017-05-01

    Full Text Available Cloud storage services allow users to efficiently outsource their documents anytime and anywhere. Such convenience, however, leads to privacy concerns. While storage providers may not read users’ documents, attackers may possibly gain access by exploiting vulnerabilities in the storage system. Documents may also be leaked by curious administrators. A simple solution is for the user to encrypt all documents before submitting them. This method, however, makes it impossible to efficiently search for documents as they are all encrypted. To resolve this problem, we propose a multi-server searchable symmetric encryption (SSE scheme and construct a system called the searchable data vault (SDV. A unique feature of the scheme is that it allows an encrypted document to be divided into blocks and distributed to different storage servers so that no single storage provider has a complete document. By incorporating the scheme, the SDV protects the privacy of documents while allowing for efficient private queries. It utilizes a web interface and a controller that manages user credentials, query indexes and submission of encrypted documents to cloud storage services. It is also the first system that enables a user to simultaneously outsource and privately query documents from a few cloud storage services. Our preliminary performance evaluation shows that this feature introduces acceptable computation overheads when compared to submitting documents directly to a cloud storage service.

  4. A visual assessment of the concrete vaults which surround underground waste storage tanks

    Energy Technology Data Exchange (ETDEWEB)

    Wiersma, B.J.; Shurrab, M.S.

    1993-12-01

    Radioactive waste produced at the Savannah River Site (SRS) is stored in underground tanks. There are four different waste tank designs. For each waste tank design the outermost containment shield between the waste and the soil is a concrete vault surrounding the carbon steel liner(s). Should the primary and/or secondary liner be breached, the concrete vault would slow transport of the waste so that contamination of the soil is minimized. The type 3 waste tanks have a stated design life of 40--60 years. With the uncertainty of the schedule for transfer of the waste to the Defense Waste Processing Facility, it is conceivable that the tanks will be required to function past their design life. The Department of Energy formed a Waste Tank Structural Integrity Panel to investigate the potential for aging and degradation of underground radioactive waste storage tanks employed in the weapons complex. The panel is focusing on how each site in the complex: (1) inspects the waste tanks for degradation, (2) understands the potential degradation mechanisms which may occur at their sites, and (3) mitigates the known potential degradation mechanisms. In addition to the carbon steel liners, the degradation of the concrete vault has also been addressed by the panel. High Level Waste Engineering (HLWE) at SRS has formed a task team to identify key issues that determine and/or effect the condition of the concrete. In June 1993, slides were reviewed which showed the inside of the concrete vault in Type 1, 2, and 4 tanks. The authors subsequently visited the tank farm and assessed the visible portions of the outer concrete vault. Later a team of engineers knowledgeable in concrete degradation performed a walk-down. Photographs showing the concrete condition were taken at this time. This report summarizes the findings of these walk-downs and reinforces previous recommendations.

  5. Data storage technology: Hardware and software, Appendix B

    Science.gov (United States)

    Sable, J. D.

    1972-01-01

    This project involves the development of more economical ways of integrating and interfacing new storage devices and data processing programs into a computer system. It involves developing interface standards and a software/hardware architecture which will make it possible to develop machine independent devices and programs. These will interface with the machine dependent operating systems of particular computers. The development project will not be to develop the software which would ordinarily be the responsibility of the manufacturer to supply, but to develop the standards with which that software is expected to confirm in providing an interface with the user or storage system.

  6. SnoVault and encodeD: A novel object-based storage system and applications to ENCODE metadata.

    Science.gov (United States)

    Hitz, Benjamin C; Rowe, Laurence D; Podduturi, Nikhil R; Glick, David I; Baymuradov, Ulugbek K; Malladi, Venkat S; Chan, Esther T; Davidson, Jean M; Gabdank, Idan; Narayana, Aditi K; Onate, Kathrina C; Hilton, Jason; Ho, Marcus C; Lee, Brian T; Miyasato, Stuart R; Dreszer, Timothy R; Sloan, Cricket A; Strattan, J Seth; Tanaka, Forrest Y; Hong, Eurie L; Cherry, J Michael

    2017-01-01

    The Encyclopedia of DNA elements (ENCODE) project is an ongoing collaborative effort to create a comprehensive catalog of functional elements initiated shortly after the completion of the Human Genome Project. The current database exceeds 6500 experiments across more than 450 cell lines and tissues using a wide array of experimental techniques to study the chromatin structure, regulatory and transcriptional landscape of the H. sapiens and M. musculus genomes. All ENCODE experimental data, metadata, and associated computational analyses are submitted to the ENCODE Data Coordination Center (DCC) for validation, tracking, storage, unified processing, and distribution to community resources and the scientific community. As the volume of data increases, the identification and organization of experimental details becomes increasingly intricate and demands careful curation. The ENCODE DCC has created a general purpose software system, known as SnoVault, that supports metadata and file submission, a database used for metadata storage, web pages for displaying the metadata and a robust API for querying the metadata. The software is fully open-source, code and installation instructions can be found at: http://github.com/ENCODE-DCC/snovault/ (for the generic database) and http://github.com/ENCODE-DCC/encoded/ to store genomic data in the manner of ENCODE. The core database engine, SnoVault (which is completely independent of ENCODE, genomic data, or bioinformatic data) has been released as a separate Python package.

  7. Filigree Vaults

    DEFF Research Database (Denmark)

    Hansen, Flemming Tvede; Tamke, Martin; Evers, Henrik Leander

    2017-01-01

    Filigree Vaults takes its point of departure in the use of ceramics in architecture.Today ceramic is in buildings mostly used as uniform modular elements for surface application - bricks and tiles. This project discusses and exemplifies new possibilities for ceramics in architecture, which emerge...

  8. Storage Information Management System (SIMS) Spaceflight Hardware Warehousing at Goddard Space Flight Center

    Science.gov (United States)

    Kubicko, Richard M.; Bingham, Lindy

    1995-01-01

    Goddard Space Flight Center (GSFC) on site and leased warehouses contain thousands of items of ground support equipment (GSE) and flight hardware including spacecraft, scaffolding, computer racks, stands, holding fixtures, test equipment, spares, etc. The control of these warehouses, and the management, accountability, and control of the items within them, is accomplished by the Logistics Management Division. To facilitate this management and tracking effort, the Logistics and Transportation Management Branch, is developing a system to provide warehouse personnel, property owners, and managers with storage and inventory information. This paper will describe that PC-based system and address how it will improve GSFC warehouse and storage management.

  9. LIABILITY OF COMPUTER MAINTENANCE PROVIDERS UNDER COPYRIGHT LAW: STORAGE TECH. CORP. V. CUSTOM HARDWARE ENG'G & CONSULTING, INC.

    National Research Council Canada - National Science Library

    Dean L Franklin; Timothy D Krieger

    2006-01-01

    .... Custom Hardware Engineering & Consulting Inc ("Storage Tech. i"), held that 17 U.S.C. S 117 excluded from copyright infringement the copying of computer programs by an ISO while performing ongoing maintenance on a computer system...

  10. Thermal calculations for the study of the heat evacuation in the vaults building of the centralised temporary storage (ATC); Calculos termicos para el estudio de la evacuacion de calor en el Edificio de Bovedas del Almacen Temporal Centralizado (ATC)

    Energy Technology Data Exchange (ETDEWEB)

    Perez Dominguez, J. R.; Garcia Gonzalez, M.; Huelamo, E.

    2015-07-01

    This article presents the thermal analyses of the vaults building at the future Spanish Nuclear Waste Storage facility (ATC) in which spent nuclear fuel and high activity nuclear wastes are to be stored efficiency, safety and securely. the analyses have been carried out by means of computational fluid dynamics (CFD) simulation codes, for the purpose of confirming the adequate design of the storage buildings and in order to obtain the air flow rate required to guarantee that the different thermal criteria are met. The design relies on natural convection in order to remove residual heat from the nuclear waste. The simulation model allows the designer to perform sensitivity analyses to evaluate the impact of different design parameters, to optimize the heat load per fuel canister and to provide an optimal loading plan for the facility. (Author)

  11. Vaginal vault prolapse.

    Science.gov (United States)

    Uzoma, Azubuike; Farag, K A

    2009-01-01

    Introduction. Vaginal vault prolapse is a common complication following vaginal hysterectomy with negative impact on women's quality of life due to associated urinary, anorectal and sexual dysfunction. A clear understanding of the supporting mechanism for the uterus and vagina is important in making the right choice of corrective procedure. Management should be individualised, taking into consideration the surgeon's experience, patients age, comorbidities, previous surgery and sex life. Result. Preexisting pelvic floor defect prior to hysterectomy is the single most important risk factor for vault prolapse. Various surgical techniques have been advanced at hysterectomy to prevent vault prolapse. Studies have shown the McCall's culdoplasty under direct visualisation to be superior. Vault prolapse repair rely on either the use of patient's tissue or synthetic materials and can be carried out abdominally or vaginally. Sacrospinous fixation and abdominal sacrocolpopexy are the commonly performed procedures, with literature in favour of abdominal sacrocolpopexy over sacrospinous fixation due to its reported higher success rate of about 90%. Other less commonly performed procedures include uterosacral ligament suspension and illiococcygeal fixation, both of which are equally effective, with the former having a high risk of ureteric injury. Colpoclesis will play a greater role in the future as the aging population increases. Mesh procedures are gaining in popularity, and preliminary data from vaginal mesh procedures is encouraging. Laparoscopic techniques require a high level of skill and experience. There are many controversies on the mechanism of prolapse and management techniques, which we have tried to address in this article. Conclusion. As the aging population increases, the incidence of prolapse will also rise, older techniques using native tissue will continue, while new techniques using the mesh needs to be studied further. The later may well be the way forward

  12. Optimized Architectural Approaches in Hardware and Software Enabling Very High Performance Shared Storage Systems

    CERN Multimedia

    CERN. Geneva

    2004-01-01

    There are issues encountered in high performance storage systems that normally lead to compromises in architecture. Compute clusters tend to have compute phases followed by an I/O phase that must move data from the entire cluster in one operation. That data may then be shared by a large number of clients creating unpredictable read and write patterns. In some cases the aggregate performance of a server cluster must exceed 100 GB/s to minimize the time required for the I/O cycle thus maximizing compute availability. Accessing the same content from multiple points in a shared file system leads to the classical problems of data "hot spots" on the disk drive side and access collisions on the data connectivity side. The traditional method for increasing apparent bandwidth usually includes data replication which is costly in both storage and management. Scaling a model that includes replicated data presents additional management challenges as capacity and bandwidth expand asymmetrically while the system is scaled. ...

  13. Primary Cranial Vault Lymphoma: A Case Report

    Energy Technology Data Exchange (ETDEWEB)

    Yoon, So Hee; Kim, Myung Soon; Kim, Young Ju [Dept. of Radiology, Yonsei University Wonju College of Medicine, Wonju Christian Hospital, Wonju (Korea, Republic of)

    2012-09-15

    Cranial vault involvement in primary lymphoma is extremely rare in immunocompetent subjects. However, it should be considered as a differential diagnosis in the presence of a lesion involving all three compartments of the cranial vault, including the scalp, skull, and pachymeninges. We report a case of primary cranial vault lymphoma involving all three compartments of the cranial vault in an immunocompetent patient.

  14. Designing and building the cork vault

    DEFF Research Database (Denmark)

    Merritt, Timothy; de Azambuja Varela, Pedro

    2014-01-01

    producing 2 arch experiments, 3 vault prototypes made from plywood, and 2 vaults made from expanded cork agglomerate. The final vault was the result of a competition between student groups and was based on an algorithm prepared by one of the instructors to design a structurally sound, compression-only vault...

  15. CLEARANCE OF ARCHIVE TAPE VAULT (BUILDING 186)

    CERN Multimedia

    EP Division

    1999-01-01

    The archive tape vault is being cleared to make way for the LHC experiments silicon facility.Experiments were contacted in February to arrange for the extended storage or destruction of archived volumes. Any who have not yet done so are asked to contactR. Minchin/IT immediately.This is also an opportunity to clear unused tapes or cartridges from around the site and have them destroyed ecologically. Please contact ep.smi.helpdesk@cern.ch to arrange for collection.A.E. Ball/EP-SMI

  16. Vaginal Vault Prolapse

    Directory of Open Access Journals (Sweden)

    Azubuike Uzoma

    2009-01-01

    Vault prolapse repair rely on either the use of patient's tissue or synthetic materials and can be carried out abdominally or vaginally. Sacrospinous fixation and abdominal sacrocolpopexy are the commonly performed procedures, with literature in favour of abdominal sacrocolpopexy over sacrospinous fixation due to its reported higher success rate of about 90%. Other less commonly performed procedures include uterosacral ligament suspension and illiococcygeal fixation, both of which are equally effective, with the former having a high risk of ureteric injury. Colpoclesis will play a greater role in the future as the aging population increases. Mesh procedures are gaining in popularity, and preliminary data from vaginal mesh procedures is encouraging. Laparoscopic techniques require a high level of skill and experience. There are many controversies on the mechanism of prolapse and management techniques, which we have tried to address in this article. Conclusion. As the aging population increases, the incidence of prolapse will also rise, older techniques using native tissue will continue, while new techniques using the mesh needs to be studied further. The later may well be the way forward in future.

  17. A model for gymnastics vaulting.

    Science.gov (United States)

    Dainis, A

    1981-01-01

    A mathematical model describing the motion of a gymnast represented by a planar three-segment link system is developed for the airborne and horse-support phases of vaulting. Four handspring vaults performed by advanced-level female gymnasts were analyzed and the results were used to verify the model. In order to describe observed performance, it was found necessary to consider the period of support on the vaulting horse as being comprised of two distinct phases: a compression phase and a repulsion phase. Solutions of the model are presented graphically enabling the relationships of important variables to be readily observed, and predictions to be made. Good agreement between observed performance and the model was obtained in all cases. The take-off velocity and initial distance from the horse were found to be the principal variables affecting the outcome of the vault. The model indicated that in the case of a good vault, a decrease of 7% in the take-off horizontal speed would cause a reduction of 13% in after-flight distance, and a similar decrease in the vertical speed would produce a 25% reduction in after-flight distance. Also, the force exerted by the performer during the repulsion phase has only a minimal effect on the after-flight characteristics of the vault. The take-off velocity requirements for an excellent vault were investigated for varying take-off distances from the horse. As the distance was decreased, the necessary velocity was decreased, but the angular velocity of the body required during the pre-flight phase was found to increase very rapidly.

  18. 49 CFR 192.749 - Vault maintenance.

    Science.gov (United States)

    2010-10-01

    ... 49 Transportation 3 2010-10-01 2010-10-01 false Vault maintenance. 192.749 Section 192.749 Transportation Other Regulations Relating to Transportation (Continued) PIPELINE AND HAZARDOUS MATERIALS SAFETY... BY PIPELINE: MINIMUM FEDERAL SAFETY STANDARDS Maintenance § 192.749 Vault maintenance. (a) Each vault...

  19. Movement Regulation of Handsprings on Vault

    Science.gov (United States)

    Heinen, Thomas; Vinken, Pia M.; Jeraj, Damian; Velentzas, Konstantinos

    2013-01-01

    Purpose: Visual information is utilized in gymnastics vaulting. The question remains as to which informational sources are used to regulate handspring performance. The purpose of this study was to examine springboard and vaulting table position as informational sources in gymnastics vaulting. The hypothesis tested was that the approach-run and…

  20. Desalination of painted brick vaults

    DEFF Research Database (Denmark)

    Larsen, Poul Klenz

    The subject of the thesis is salt and moisture movement that causes damage to wall paintings on church vaults. The deterioration was studied in the churches of Fanefjord, Kirkerup and Brarup. A desalination method was tested om location. The salt and moisture transfer was examined in detail...

  1. Material control and surveillance for high frequency access vaults project

    Energy Technology Data Exchange (ETDEWEB)

    Longmire, V. L. (Victoria L.); Stevens, R. S. (Rebecca S.); Martinez, B. J. (Benny J.); Butler, G. W. (Gilbert W.); Huang, J. Y. (John Y.); Pickett, C. (Chris); Younkin, J. (James); Dunnigan, Janelle; Gaby, Jane; Lawson, R. (Roger)

    2004-01-01

    The 'Material Control and Surveillance for High Frequency Access Vaults' project sponsored by United States Department of Energy's Office of Security Policy, Policy Integration and Technical Support Program (SO-20.3) focuses on enhancing nuclear materials control and surveillance in vaults that are frequently accessed. The focus of this effort is to improve materials control and accountability (MC&A) while decreasing the operational impact of these activities. Los Alamos and Y-12 have developed a testbed at the Los Alamos National Laboratory for evaluating and demonstrating integrated technologies for use in enhancing materials control and accountability in active nuclear material storage vaults. An update will be provided on the new systems demonstrated in the test-bed including a 'confirmatory cart' for expediting the performance of inventory and radio-frequency actuated video that demonstrates the concept of automated data entry for materials moving between MBA's. The United States Department of Energy's Office of Security Policy, Policy Integration and Technical Support Program (SO-20.3) has sponsored a project where nuclear material inventory, control and surveillance systems are evaluated, developed, and demonstrated in an effort to provide technologies that reduce risk, increase material assurance, and provide cost-efficient alternatives to manpower-intensive physical inventory and surveillance approaches for working (high-frequency-access) vaults. This Fiscal Year has been largely focused on evaluating and developing components of two sub-systems that could be used either separately in nuclear material vaults or as part of a larger integrated system for nuclear materials accountability, control and surveillance.

  2. Pre-flight characteristics of Hecht vaults.

    Science.gov (United States)

    Yeadon, M R; King, M A; Sprigings, E J

    1998-05-01

    This study reports the techniques used by gymnasts to perform the Hecht vault and compares them with techniques used for the handspring somersault vault (Takei and Kim, 1990). Our main aim was to establish how the pre-flight characteristics of the Hecht vault influence post-flight performance. Data were obtained on 27 elite gymnasts performing the Hecht vault at the 1993 Canadian National Championships using two-dimensional video analysis with the direct linear transformation (DLT) technique. The maximum height reached by the mass centre during post-flight was significantly correlated (P vault, the gymnasts had longer, lower and faster pre-flights with slower rotation at horse contact compared with the handspring somersault vaults.

  3. An automated magnetic tape vault at CERN computer center

    CERN Multimedia

    Claudia Marcelloni

    2008-01-01

    The rapidly changing data processing landscape the underlying long-term storage technology remains the tried and tested magnetic tape. This robust and mature technology is used to store the complete LHC data set, from which a fraction of the data is copied to overlying disk caches for fast and widespread access. The handling of the magnetic tape cartridges is now fully automated, as they are racked in vaults where they are moved between the storage shelves and the tape drives by robotic arms.

  4. Hitting the vault board: implications for vaulting take-off--a preliminary investigation.

    Science.gov (United States)

    Coventry, Evan; Sands, William A; Smith, Sarah L

    2006-01-01

    Gymnastics vaulting relies on a specialized take-off board for propulsion during the take-off phase of the vault. There is little information on the vault board and its behaviour. The aim of this study was to characterize the behaviour of the vault board during handspring drill take-offs of young male gymnasts (n = 36). The side of the top surface of the vault board and the wooden base were marked with three reflective markers, placed at the end of the vault board nearest the vault table and the centres of the two rearmost coil springs. The vault board surface was divided into two areas, rear and middle, based on marker location. The gymnasts' groups were determined from the location of the gymnast's lateral malleolus at vault board contact. Landings with the malleolus directly above or behind the rearmost marker were considered rear landings; landings with the malleolus forward of the rearmost marker were considered middle landings. Marker movements were automatically digitized and the right malleolus was hand digitized at 120 Hz. The maximum vertical displacement, vertical deflection time, and vertical velocity at take-off of the vault board markers did not differ statistically between board contact groups (all p > 0.05). The lateral malleolus velocity components also did not differ between board contact groups. Some low to moderately strong correlations were observed between the various marker displacements, durations and take-off velocities. Modest correlations were obtained between board markers and right malleolus velocities. The results indicate that foot contact on the vault board, as defined here, did not result in differences in board marker behaviour or right lateral malleolus velocities. This information does not support the idea that vault board contacts at the rear of the vault board are worse than contacts near the middle of the vault board. More research is needed to ascertain the role of the vault board's vibration characteristics to whole body

  5. Radiological performance assessment for the E-Area Vaults Disposal Facility

    Energy Technology Data Exchange (ETDEWEB)

    Cook, J.R.; Hunt, P.D. [Westinghouse Savannah River Co., Aiken, SC (United States)

    1994-04-15

    The E-Area Vaults (EAVs) located on a 200 acre site immediately north of the current LLW burial site at Savannah River Site will provide a new disposal and storage site for solid, low-level, non-hazardous radioactive waste. The EAV Disposal Facility will contain several large concrete vaults divided into cells. Three types of structures will house four designated waste types. The Intermediate Level Non-Tritium Vaults will receive waste radiating greater than 200 mR/h at 5 cm from the outer disposal container. The Intermediate Level Tritium Vaults will receive waste with at least 10 Ci of tritium per package. These two vaults share a similar design, are adjacent, share waste handling equipment, and will be closed as one facility. The second type of structure is the Low Activity Waste Vaults which will receive waste radiating less than 200 mR/h at 5 cm from the outer disposal container and containing less than 10 Ci of tritium per package. The third facility, the Long Lived Waste Storage Building, provides covered, long term storage for waste containing long lived isotopes. Two additional types of disposal are proposed: (1) trench disposal of suspect soil, (2) naval reactor component disposal. To evaluate the long-term performance of the EAVs, site-specific conceptual models were developed to consider: (1) exposure pathways and scenarios of potential importance; (2) potential releases from the facility to the environment; (3) effects of degradation of engineered features; (4) transport in the environment; (5) potential doses received from radionuclides of interest in each vault type.

  6. Security analysis for fingerprint fuzzy vaults

    Science.gov (United States)

    Hartloff, Jesse; Bileschi, Maxwell; Tulyakov, Sergey; Dobler, Jimmy; Rudra, Atri; Govindaraju, Venu

    2013-05-01

    In this work we place some of the traditional biometrics work on fingerprint verification via the fuzzy vault scheme within a cryptographic framework. We show that the breaking of a fuzzy vault leads to decoding of Reed-Solomon codes from random errors, which has been proposed as a hard problem in the cryptography community. We provide a security parameter for the fuzzy vault in terms of the decoding problem, which gives context for the breaking of the fuzzy vault, whereas most of the existing literature measures the strength of the fuzzy vault in terms of its resistance to pre-defined attacks or by the entropy of the vault. We keep track of our security parameter, and provide it alongside ROC statistics. We also aim to be more aware of the nature of the fingerprints when placing them in the fuzzy vault, noting that the distribution of minutiae is far from uniformly random. The results we show provide additional support that the fuzzy vault can be a viable scheme for secure fingerprint verification.

  7. Vaults: a ribonucleoprotein particle involved in drug resistance?

    NARCIS (Netherlands)

    Mossink, MH; Zon, van A; Scheper, R.J.; Sonneveld, P.; Wiemer, EA

    2003-01-01

    Vaults are ribonucleoprotein particles found in the cytoplasm of eucaryotic cells. The 13 MDa particles are composed of multiple copies of three proteins: an M(r) 100 000 major vault protein (MVP) and two minor vault proteins of M(r) 193 000 (vault poly-(ADP-ribose) polymerase) and M(r) 240 000

  8. [Computer tomographic image of the cranial vault].

    Science.gov (United States)

    Klumair, J; Fochem, K

    1983-06-01

    Imaging of the vault of the cranium via CT must be considered as an additional examination. It is possible to assess the CT image already stored during examination of the brain, without additionally exposing the patient, merely by changing position and breadth of the window. In our opinion, primary indication for CT of the vault of the cranium exists only if diagnosis based on survey remains doubtful. However, examination will always be combined with a representation of the individual strata of the brain. Our studies have also shown that in many cases CT assessment of the vault of the cranium necessarily also involves comparison with the surveys.

  9. Tile vaulting in the 21st century

    Directory of Open Access Journals (Sweden)

    D. López López

    2016-12-01

    Full Text Available New interactive equilibrium methods for the design and analysis of masonry structures have facilitated the construction of masonry structures with a formal language well beyond what is typically associated with compression-only architecture. These developments have also rekindled interest in tile vaulting, and led to a rediscovery of this traditional building technique. To ensure that tile vaults with new, complex shapes can still be built economically, the construction processes involved in the realisation of these structures have adapted. For example, cheaper and simpler falsework systems have been introduced. In addition, a wide variety of materials have been experimented with to be able to build more sustainable vaulted structures with local resources. This paper presents a review of the latest innovations in tile vaulting, based on the most representative works of the past few years with respect to shape, construction method and the use of materials.

  10. Mechanics of pole vaulting: a review.

    Science.gov (United States)

    Frère, Julien; L'hermette, Maxime; Slawinski, Jean; Tourny-Chollet, Claire

    2010-06-01

    A good understanding of the mechanics of pole vaulting is fundamental to performance because this event is quite complex, with several factors occurring in sequence and/or in parallel. These factors mainly concern the velocities of the vaulter-pole system, the kinetic and potential energy of the vaulter and the strain energy stored in the pole, the force and torque applied by the athlete, and the pole design. Although the pole vault literature is vast, encompassing several fields such as medicine, sports sciences, mechanics, mathematics, and physics, the studies agree that pole vault performance is basically influenced by the energy exchange between the vaulter and pole. Ideally, as the athlete clears the crossbar, the vaulter mechanical energy must be composed of high potential energy and low kinetic energy, guaranteeing the high vertical component of the vault. Moreover, the force and torque applied by the vaulter influences this energy exchange and these factors thus must be taken into consideration in the analysis of performance. This review presents the variables that influence pole vault performance during the run-up, take-off, pole support, and free flight phases.

  11. Kinematic variables of table vault on artistic gymnastics

    OpenAIRE

    FERNANDES, Sarah Maria Boldrini; Carrara, Paulo; Júlio Cerca SERRÃO; Amadio, Alberto Carlos; MOCHIZUKI, Luis

    2016-01-01

    Abstract The table vault is an event of male and female Artistics Gymnastics. Although it can be performed in a variety of rotations and body positions in different phases, it can be separated in three groups: handspring, Yurchenko and Tsukahara. It is believed that kinematic variables of vault may vary according to group of vault or gymnast body position, but few studies compares the real differences among the three groups of vaults, comparing and describing the variables in different phases...

  12. New Regression Models to Evaluate the Relationship between Biomechanics of Gymnastic Vault and Initial Vault Difficulty Values

    National Research Council Canada - National Science Library

    Atiković, Almir

    2012-01-01

    The main objective of this paper was to determine the relationship between biomechanical parameters of vault flights with respect to new models of initial vault difficulty values in men's artistic gymnastic...

  13. Utilities:Water:Water Infrastructure Vaults at Pipe Spring National Monument, Arizona (Utilities.gdb:Water:vaults)

    Data.gov (United States)

    National Park Service, Department of the Interior — This feature class represents vaults associated with the water infrastructure at Pipe Spring National Monument, Arizona. The vaults data were collected using Trimble...

  14. Use of Video Replay in Judging Gymnastics Vaults.

    Science.gov (United States)

    Puhl, Jackie

    1980-01-01

    The effectiveness of using video replays to judge gymnastics vaulting was examined by determining reliability of judges' scores and comparing mean scores for original (live) vaults and replays. Statistical analyses suggest that variability of scores was greater after the live vault, and that judges' reliability may be enhanced by replays.…

  15. Hardly Hardware

    Science.gov (United States)

    Lott, Debra

    2007-01-01

    In a never-ending search for new and inspirational still-life objects, the author discovered that home improvement retailers make great resources for art teachers. Hardware and building materials are inexpensive and have interesting and variable shapes. She especially liked the dryer-vent coils and the electrical conduit. These items can be…

  16. Kinematic variables of table vault on artistic gymnastics

    Directory of Open Access Journals (Sweden)

    Sarah Maria Boldrini FERNANDES

    2016-03-01

    Full Text Available Abstract The table vault is an event of male and female Artistics Gymnastics. Although it can be performed in a variety of rotations and body positions in different phases, it can be separated in three groups: handspring, Yurchenko and Tsukahara. It is believed that kinematic variables of vault may vary according to group of vault or gymnast body position, but few studies compares the real differences among the three groups of vaults, comparing and describing the variables in different phases. Vault kinematic variables could be diversifying according to the approach or position of the vaulting, but little has been studied about the biomechanical differences, comparing and describing behaviours at different stages. The aim of this study was to organize critical, objective and to systematize the most relevant kinematic variables to performance on vaulting. A Meta analysis over the basis Pubmed, Sport Discus and Web of Science were performed about this issue. From the selected references, we described and analyzed the kinematics of the table vault. Vault can be characterized in seven phases of analysis. Most of the studies are descriptive, and some do not descript all phases. Differences among vault variables according to group vaults, technical level and gender were analysed only in recent studies. There still gaps of knowledge about kinematic variables of table vault, in order to provide comprehensive information about all possibilities of vaults in this gymnastic event. It is concluded that kinematic variables of table vault depends upon vault group and may be considered to the improvement of technical performance. More researches are needed to approach the coaching interface with biomechanics applicable knowledge.

  17. Rupture loop annex ion exchange RLAIX vault deactivation

    Energy Technology Data Exchange (ETDEWEB)

    Ham, J.E.; Harris, D.L., Westinghouse Hanford

    1996-08-01

    This engineering report documents the deactivation, stabilization and final conditions of the Rupture Loop Annex Ion Exchange (RLAIX) Vault located northwest of the 309 Building`s Plutonium Recycle Test Reactor (PRTR). Twelve ion exchange columns, piping debris, and column liquid were removed from the vault, packaged and shipped for disposal. The vault walls and floor were decontaminated, and portions of the vault were painted to fix loose contamination. Process piping and drains were plugged, and the cover blocks and rain cover were installed. Upon closure,the vault was empty, stabilized, isolated.

  18. Composite analysis E-area vaults and saltstone disposal facilities

    Energy Technology Data Exchange (ETDEWEB)

    Cook, J.R.

    1997-09-01

    This report documents the Composite Analysis (CA) performed on the two active Savannah River Site (SRS) low-level radioactive waste (LLW) disposal facilities. The facilities are the Z-Area Saltstone Disposal Facility and the E-Area Vaults (EAV) Disposal Facility. The analysis calculated potential releases to the environment from all sources of residual radioactive material expected to remain in the General Separations Area (GSA). The GSA is the central part of SRS and contains all of the waste disposal facilities, chemical separations facilities and associated high-level waste storage facilities as well as numerous other sources of radioactive material. The analysis considered 114 potential sources of radioactive material containing 115 radionuclides. The results of the CA clearly indicate that continued disposal of low-level waste in the saltstone and EAV facilities, consistent with their respective radiological performance assessments, will have no adverse impact on future members of the public.

  19. Geometric principles in additive systems for construction of vaults

    DEFF Research Database (Denmark)

    Jaeger, Thomas Arvid

    2015-01-01

    della Fiore. The Barouque style followed with the domes of Borromini; Bernini and Guarini. The Period of Enlightenment had iconic tunnel- and dome vault projects by Etienne l. Boulée. All these stone vaults were made by additive systems in bricks and mortar. In the 20.th century concrete was introduced......Abstract Vaults and shell constructions are among the most fascinating elements in architecture. Covering large spaces has always been a challenge in architecture and engineering and the vault with curved and double curved form has a special significance. Throughout the history of Christianity....... We wanted to examine vault systems which make use of repetitions of units. The objective was to describe the additive system and isolate the components. The research project started to investigate the vaulting systems of some famous/well known vaults and domes from the history of architecture...

  20. E-Area Vault Concrete Material Property And Vault Durability/Degradation Projection Recommendations

    Energy Technology Data Exchange (ETDEWEB)

    Phifer, M. A. [Savannah River Site (SRS), Aiken, SC (United States). Savannah River National Lab. (SRNL)

    2014-03-11

    Subsequent to the 2008 E-Area Low-Level Waste Facility (ELLWF) Performance Assessment (PA) (WSRC 2008), two additional E-Area vault concrete property testing programs have been conducted (Dixon and Phifer 2010 and SIMCO 2011a) and two additional E-Area vault concrete durability modeling projections have been made (Langton 2009 and SIMCO 2012). All the information/data from these reports has been evaluated and consolidated herein by the Savannah River National Laboratory (SRNL) at the request of Solid Waste Management (SWM) to produce E-Area vault concrete hydraulic and physical property data and vault durability/degradation projection recommendations that are adequately justified for use within associated Special Analyses (SAs) and future PA updates. The Low Activity Waste (LAW) and Intermediate Level (IL) Vaults structural degradation predictions produced by Carey 2006 and Peregoy 2006, respectively, which were used as the basis for the 2008 ELLWF PA, remain valid based upon the results of the E-Area vault concrete durability simulations reported by Langton 2009 and those reported by SIMCO 2012. Therefore revised structural degradation predictions are not required so long as the mean thickness of the closure cap overlying the vaults is no greater than that assumed within Carey 2006 and Peregoy 2006. For the LAW Vault structural degradation prediction (Carey 2006), the mean thickness of the overlying closure cap was taken as nine feet. For the IL Vault structural degradation prediction (Peregoy 2006), the mean thickness of the overlying closure cap was taken as eight feet. The mean closure cap thicknesses as described here for both E-Area Vaults will be included as a key input and assumption (I&A) in the next revision to the closure plan for the ELLWF (Phifer et al. 2009). In addition, it has been identified as new input to the PA model to be assessed in the ongoing update to the new PA Information UDQE (Flach 2013). Once the UDQE is approved, the SWM Key I

  1. Hardware malware

    CERN Document Server

    Krieg, Christian

    2013-01-01

    In our digital world, integrated circuits are present in nearly every moment of our daily life. Even when using the coffee machine in the morning, or driving our car to work, we interact with integrated circuits. The increasing spread of information technology in virtually all areas of life in the industrialized world offers a broad range of attack vectors. So far, mainly software-based attacks have been considered and investigated, while hardware-based attacks have attracted comparatively little interest. The design and production process of integrated circuits is mostly decentralized due to

  2. Exploratory Investigation of Impact Loads During the Forward Handspring Vault.

    Science.gov (United States)

    Penitente, Gabriella; Sands, William A

    2015-06-27

    The purpose of this study was to examine kinematic and kinetic differences in low and high intensity hand support impact loads during a forward handspring vault. A high-speed video camera (500 Hz) and two portable force platforms (500 Hz) were installed on the surface of the vault table. Two-dimensional analyses were conducted on 24 forward handspring vaults performed by 12 senior level, junior Olympic program female gymnasts (16.9 ±1.4 yr; body height 1.60 ±0.1 m; body mass 56.7 ±7.8 kg). Load intensities at impact with the vault table were classified as low (peak force 0.8 × body weight). These vaults were compared via crucial kinetic and kinematic variables using independent t-tests and Pearson correlations. Statistically significant (p vault.

  3. Cranial vault thickness in primates: Homo erectus does not have uniquely thick vault bones.

    Science.gov (United States)

    Copes, Lynn E; Kimbel, William H

    2016-01-01

    Extremely thick cranial vaults have been noted as a diagnostic characteristic of Homo erectus since the first fossil of the species was identified, but relatively little work has been done on elucidating its etiology or variation across fossils, living humans, or extant non-human primates. Cranial vault thickness (CVT) is not a monolithic trait, and the responsiveness of its layers to environmental stimuli is unknown. We obtained measurements of cranial vault thickness in fossil hominins from the literature and supplemented those data with additional measurements taken on African fossil specimens. Total CVT and the thickness of the cortical and diploë layers individually were compared to measures of CVT in extant species measured from more than 500 CT scans of human and non-human primates. Frontal and parietal CVT in fossil primates was compared to a regression of CVT on cranial capacity calculated for extant species. Even after controlling for cranial capacity, African and Asian H. erectus do not have uniquely high frontal or parietal thickness residuals, either among hominins or extant primates. Extant primates with residual CVT thickness similar to or exceeding H. erectus (depending on the sex and bone analyzed) include Nycticebus coucang, Perodicticus potto, Alouatta caraya, Lophocebus albigena, Galago alleni, Mandrillus sphinx, and Propithecus diadema. However, the especially thick vaults of extant non-human primates that overlap with H. erectus values are composed primarily of cortical bone, while H. erectus and other hominins have diploë-dominated vault bones. Thus, the combination of thick vaults comprised of a thickened diploë layer may be a reliable autapomorphy for members of the genus Homo. Copyright © 2015 Elsevier Ltd. All rights reserved.

  4. MVP and vaults: a role in the radiation response

    Directory of Open Access Journals (Sweden)

    Zimmermann Martina

    2011-10-01

    Full Text Available Abstract Vaults are evolutionary highly conserved ribonucleoproteins particles with a hollow barrel-like structure. The main component of vaults represents the 110 kDa major vault protein (MVP, whereas two minor vaults proteins comprise the 193 kDa vault poly(ADP-ribose polymerase (vPARP and the 240 kDa telomerase-associated protein-1 (TEP-1. Additionally, at least one small and untranslated RNA is found as a constitutive component. MVP seems to play an important role in the development of multidrug resistance. This particle has also been implicated in the regulation of several cellular processes including transport mechanisms, signal transmission and immune responses. Vaults are considered a prognostic marker for different cancer types. The level of MVP expression predicts the clinical outcome after chemotherapy in different tumour types. Recently, new roles have been assigned to MVP and vaults including the association with the insulin-like growth factor-1, hypoxia-inducible factor-1alpha, and the two major DNA double-strand break repair machineries: non-homologous endjoining and homologous recombination. Furthermore, MVP has been proposed as a useful prognostic factor associated with radiotherapy resistance. Here, we review these novel actions of vaults and discuss a putative role of MVP and vaults in the response to radiotherapy.

  5. New Regression Models to Evaluate the Relationship between Biomechanics of Gymnastic Vault and Initial Vault Difficulty Values

    OpenAIRE

    Atikovi?, Almir

    2012-01-01

    The main objective of this paper was to determine the relationship between biomechanical parameters of vault flights with respect to new models of initial vault difficulty values in men?s artistic gymnastic. The study sample included vaults (n=64) and models (n=5) from the 2009 Code of Points (CoP) of the Federation International of Gymnastics (FIG). The dependent variable included all difficulty values ranging from 2?7.2 points, while the sample of independent variables included twelve biome...

  6. Sea urchin vault structure, composition, and differential localization during development

    Directory of Open Access Journals (Sweden)

    Dickey-Sims Carrie

    2005-02-01

    Full Text Available Abstract Background Vaults are intriguing ribonucleoprotein assemblies with an unknown function that are conserved among higher eukaryotes. The Pacific coast sea urchin, Strongylocentrotus purpuratus, is an invertebrate model organism that is evolutionarily closer to humans than Drosophila and C. elegans, neither of which possesses vaults. Here we compare the structures of sea urchin and mammalian vaults and analyze the subcellular distribution of vaults during sea urchin embryogenesis. Results The sequence of the sea urchin major vault protein (MVP was assembled from expressed sequence tags and genome traces, and the predicted protein was found to have 64% identity and 81% similarity to rat MVP. Sea urchin MVP includes seven ~50 residue repeats in the N-terminal half of the protein and a predicted coiled coil domain in the C-terminus, as does rat MVP. A cryoelectron microscopy (cryoEM reconstruction of isolated sea urchin vaults reveals the assembly to have a barrel-shaped external structure that is nearly identical to the rat vault structure. Analysis of the molecular composition of the sea urchin vault indicates that it contains components that may be homologs of the mammalian vault RNA component (vRNA and protein components (VPARP and TEP1. The sea urchin vault appears to have additional protein components in the molecular weight range of 14–55 kDa that might correspond to molecular contents. Confocal experiments indicate a dramatic relocalization of MVP from the cytoplasm to the nucleus during sea urchin embryogenesis. Conclusions These results are suggestive of a role for the vault in delivering macromolecules to the nucleus during development.

  7. Increasing the load bearing capacity of barrel vaults

    NARCIS (Netherlands)

    Kamerling, M.W.

    2011-01-01

    Just after World War II many barrel vaults and domes were built with a structural system, known as Fusée Ceramique. This paper analyses the load bearing capacity of these vaults. Schemes, theories, idealizations and assumptions are analysed, validated and discussed. Methods to increase the load

  8. A Hardware Filesystem Implementation with Multidisk Support

    National Research Council Canada - National Science Library

    Mendon, Ashwin A; Schmidt, Andrew G; Sass, Ron

    2009-01-01

    .... This article describes one such innovation: a filesystem implemented in hardware. This has the potential of improving the performance of data-intensive applications by connecting secondary storage directly to FPGA compute accelerators...

  9. Cranial vault metastasis of giant cell tumor.

    Science.gov (United States)

    Notarianni, Christina; Abreo, Fluerette; Nanda, Anil

    2008-08-01

    Giant cell tumors are benign bony tumors involving the epiphysis of long bones. Here, we present a case of giant cell tumor involving the parietal bone that had metastasized from the sacrum. A 36-year-old healthy woman presented to neurosurgery clinic in April 2005 reporting a "bump" over the left parietal area that had been increasing in size over the past 6 months. The lesion was nontender, and the patient had no other associated neurological symptoms. As we have presented here, cranial vault metastases can occur and should be considered in a differential diagnosis of bony lesions found in this location. These distant metastases, although relatively uncommon, must be managed aggressively. Newer radiation treatments seem to be a promising favorable adjunct to wide local resection and should be investigated further for these tumors.

  10. Pilonidal cyst on the vault: case report

    Directory of Open Access Journals (Sweden)

    BORGES GUILHERME

    1999-01-01

    Full Text Available Pilonidal cysts and sinuses are described as dermoid cysts which contain follicles of hairs and sebaceous glands. They clinically present as a classic case of inflammation which comes with pain, local infection and redness. The origin of pilonidal disease remains controverse. There are many hypothesis as lack of hygiene on the affected area and a penetration and growth of a hair in the subcutaneus tissue caused by constant friction or direct trauma on the damaged area. The option for clinical treatment is very frequent. However, taking into consideration the incidence and the possibility of recidive, surgical treatment is presently recommended. Complications include cellulitis and abscess formation. Pilonidal cysts are mostly found on the sacral region. In the literature is found description of pilonidal cysts on the penis, interdigital region on the hands as well as on the cervical region. We present a case of pilonidal cyst located on the vault biparietal region, without malignant degeneration.

  11. Cavern/Vault Disposal Concepts and Thermal Calculations for Direct Disposal of 37-PWR Size DPCs

    Energy Technology Data Exchange (ETDEWEB)

    Hardin, Ernest [Sandia National Laboratories (SNL-NM), Albuquerque, NM (United States); Hadgu, Teklu [Sandia National Laboratories (SNL-NM), Albuquerque, NM (United States); Clayton, Daniel James [Sandia National Laboratories (SNL-NM), Albuquerque, NM (United States)

    2015-03-01

    This report provides two sets of calculations not presented in previous reports on the technical feasibility of spent nuclear fuel (SNF) disposal directly in dual-purpose canisters (DPCs): 1) thermal calculations for reference disposal concepts using larger 37-PWR size DPC-based waste packages, and 2) analysis and thermal calculations for underground vault-type storage and eventual disposal of DPCs. The reader is referred to the earlier reports (Hardin et al. 2011, 2012, 2013; Hardin and Voegele 2013) for contextual information on DPC direct disposal alternatives.

  12. Shielding design of the Mayo Clinic Scottsdale cyclotron vault

    Directory of Open Access Journals (Sweden)

    Riper Kenneth A. Van

    2017-01-01

    Full Text Available Mayo Clinic Scottsdale (Scottsdale, Arizona is building a cyclotron vault containing a cyclotron with adjacent targets and a beam line leading to an external target. The targets are irradiated by high energy (15 to 16.5 MeV protons for the production of radioisotopes. We performed Monte Carlo radiation transport simulations to calculate the radiation dose outside of the vault during irradiation of the cyclotron and external targets. We present the Monte Carlo model including the geometry, sources, and variance reduction methods. Mesh tallies surrounding the vault show the external dose rate is within acceptable limits.

  13. New Regression Models to Evaluate the Relationship between Biomechanics of Gymnastic Vault and Initial Vault Difficulty Values.

    Science.gov (United States)

    Atiković, Almir

    2012-12-01

    The main objective of this paper was to determine the relationship between biomechanical parameters of vault flights with respect to new models of initial vault difficulty values in men's artistic gymnastic. The study sample included vaults (n=64) and models (n=5) from the 2009 Code of Points (CoP) of the Federation International of Gymnastics (FIG). The dependent variable included all difficulty values ranging from 2-7.2 points, while the sample of independent variables included twelve biomechanical parameters. After implementing the regression analysis, it could be established that the best model derived only the second flight phase with 95% of explained variance.

  14. Kinematic variables of table vault on artistic gymnastics

    National Research Council Canada - National Science Library

    FERNANDES, Sarah Maria Boldrini; CARRARA, Paulo; SERRÃO, Júlio Cerca; AMADIO, Alberto Carlos; MOCHIZUKI, Luis

    2016-01-01

    Abstract The table vault is an event of male and female Artistics Gymnastics. Although it can be performed in a variety of rotations and body positions in different phases, it can be separated in three groups...

  15. Experimental Analysis of Dynamic Effects of FRP Reinforced Masonry Vaults

    Directory of Open Access Journals (Sweden)

    Marco Corradi

    2015-11-01

    Full Text Available An increasing interest in the preservation of historic structures has produced a need for new methods for reinforcing curved masonry structures, such as arches and vaults. These structures are generally very ancient, have geometries and materials which are poorly defined and have been exposed to long-term historical movements and actions. Consequently, they are often in need of repair or reinforcement. This article presents the results of an experimental study carried out in the laboratory and during on-site testing to investigate the behaviour of brick masonry vaults under dynamic loading strengthened with FRPs (Fiber Reinforced Polymers. For the laboratory tests, the brick vaults were built with solid sanded clay bricks and weak mortar and were tested under dynamic loading. The experimental tests were designed to facilitate analysis of the dynamic behaviour of undamaged, damaged and reinforced vaulted structures. On-site tests were carried out on an earthquake-damaged thin brick vault of an 18th century aristocratic residence in the city of L’Aquila, Italy. The provision of FRP reinforcement is shown to re-establish elastic behavior previously compromised by time induced damage in the vaults.

  16. Optimal technique for maximal forward rotating vaults in men's gymnastics.

    Science.gov (United States)

    Hiley, Michael J; Jackson, Monique I; Yeadon, Maurice R

    2015-08-01

    In vaulting a gymnast must generate sufficient linear and angular momentum during the approach and table contact to complete the rotational requirements in the post-flight phase. This study investigated the optimization of table touchdown conditions and table contact technique for the maximization of rotation potential for forwards rotating vaults. A planar seven-segment torque-driven computer simulation model of the contact phase in vaulting was evaluated by varying joint torque activation time histories to match three performances of a handspring double somersault vault by an elite gymnast. The closest matching simulation was used as a starting point to maximize post-flight rotation potential (the product of angular momentum and flight time) for a forwards rotating vault. It was found that the maximized rotation potential was sufficient to produce a handspring double piked somersault vault. The corresponding optimal touchdown configuration exhibited hip flexion in contrast to the hyperextended configuration required for maximal height. Increasing touchdown velocity and angular momentum lead to additional post-flight rotation potential. By increasing the horizontal velocity at table touchdown, within limits obtained from recorded performances, the handspring double somersault tucked with one and a half twists, and the handspring triple somersault tucked became theoretically possible. Copyright © 2015 Elsevier B.V. All rights reserved.

  17. Experimental Analysis of Dynamic Effects of FRP Reinforced Masonry Vaults

    Science.gov (United States)

    Corradi, Marco; Borri, Antonio; Castori, Giulio; Coventry, Kathryn

    2015-01-01

    An increasing interest in the preservation of historic structures has produced a need for new methods for reinforcing curved masonry structures, such as arches and vaults. These structures are generally very ancient, have geometries and materials which are poorly defined and have been exposed to long-term historical movements and actions. Consequently, they are often in need of repair or reinforcement. This article presents the results of an experimental study carried out in the laboratory and during on-site testing to investigate the behaviour of brick masonry vaults under dynamic loading strengthened with FRPs (Fiber Reinforced Polymers). For the laboratory tests, the brick vaults were built with solid sanded clay bricks and weak mortar and were tested under dynamic loading. The experimental tests were designed to facilitate analysis of the dynamic behaviour of undamaged, damaged and reinforced vaulted structures. On-site tests were carried out on an earthquake-damaged thin brick vault of an 18th century aristocratic residence in the city of L’Aquila, Italy. The provision of FRP reinforcement is shown to re-establish elastic behavior previously compromised by time induced damage in the vaults. PMID:28793697

  18. Studing cranial vault modifications in ancient Mesoamerica.

    Science.gov (United States)

    Tiesler, Vera

    2012-01-01

    The artificial modification of infant cranial vaults through massages or by means of constriction and compression devices constitutes a readily visible, permanent body modification that has been employed cross-culturally to express identity, ethnicity, beauty, status and gender. For those ancient societies that staged head shaping, these cultural correlates may be ascertained by examining cranial shapes together with other data sets from the archaeological record. Studies of skulls modified for cultural reasons also provide important clues for understanding principles in neural growth and physiopathological variation in cranial expansion. This paper focuses on head shaping techniques in Mesoamerica, where the practice was deeply rooted and widespread before the European conquest. It provides a comprehensive review of the Mesoamericanistic research on shaping techniques, implements and taxonomies. An up-dated, interdisciplinary examination of the physiological implications and the cultural meanings of artificially produced head shapes in different times and culture areas within Mesoamerica leads to a discussion of the scope, caveats, and future directions involved in this kind of research in the region and beyond.

  19. Introduction to Hardware Security

    Directory of Open Access Journals (Sweden)

    Yier Jin

    2015-10-01

    Full Text Available Hardware security has become a hot topic recently with more and more researchers from related research domains joining this area. However, the understanding of hardware security is often mixed with cybersecurity and cryptography, especially cryptographic hardware. For the same reason, the research scope of hardware security has never been clearly defined. To help researchers who have recently joined in this area better understand the challenges and tasks within the hardware security domain and to help both academia and industry investigate countermeasures and solutions to solve hardware security problems, we will introduce the key concepts of hardware security as well as its relations to related research topics in this survey paper. Emerging hardware security topics will also be clearly depicted through which the future trend will be elaborated, making this survey paper a good reference for the continuing research efforts in this area.

  20. Is the tongue position influenced by the palatal vault dimensions?

    Science.gov (United States)

    Bourdiol, P; Mishellany-Dutour, A; Abou-El-Karam, S; Nicolas, E; Woda, A

    2010-02-01

    The influence of the palatal vault dimensions on tongue position is here studied through evaluation of the in-mouth air cavity (IMAC) volume when the mandible is in maximal intercuspal position. A sample of 35 women (mean age 21.2 +/- 1.0) and 15 men (mean age 22.1 +/- 0.9) was selected. The sagittal cross-section area of the IMAC, which is modulated by the tongue position, was measured on lateral cephalograms. Dental casts were used to measure the palatal vault volume, which was defined by the occlusal plane, the hard palate and the posterior face of the second molars. Palatal vault volume allowed deduction of the IMAC volume through a rule of three procedure relating volume to area ratios. No IMAC could be calculated from cephalograms of 10 subjects who had the tongue stuck to the palate. For the 40 other subjects, the IMAC volume was 8.9 +/- 4.8 mL. It was 2 mL larger in men (n = 14) than in women (n = 26) and was the largest in skeletal Class III and the smallest in skeletal Class II (P > 0.05). IMAC volume was strongly correlated with palatal vault height but neither with palatal width nor length. It was thus assumed that the height of the palatal vault could influence the most observed position of the tongue but this does not exclude a possible growth influence of the tongue on its surrounding skeletal structures.

  1. Hardware support for collecting performance counters directly to memory

    Science.gov (United States)

    Gara, Alan; Salapura, Valentina; Wisniewski, Robert W.

    2012-09-25

    Hardware support for collecting performance counters directly to memory, in one aspect, may include a plurality of performance counters operable to collect one or more counts of one or more selected activities. A first storage element may be operable to store an address of a memory location. A second storage element may be operable to store a value indicating whether the hardware should begin copying. A state machine may be operable to detect the value in the second storage element and trigger hardware copying of data in selected one or more of the plurality of performance counters to the memory location whose address is stored in the first storage element.

  2. IDD Archival Hardware Architecture and Workflow

    Energy Technology Data Exchange (ETDEWEB)

    Mendonsa, D; Nekoogar, F; Martz, H

    2008-10-09

    This document describes the functionality of every component in the DHS/IDD archival and storage hardware system shown in Fig. 1. The document describes steps by step process of image data being received at LLNL then being processed and made available to authorized personnel and collaborators. Throughout this document references will be made to one of two figures, Fig. 1 describing the elements of the architecture and the Fig. 2 describing the workflow and how the project utilizes the available hardware.

  3. LHCb: Hardware Data Injector

    CERN Multimedia

    Delord, V; Neufeld, N

    2009-01-01

    The LHCb High Level Trigger and Data Acquisition system selects about 2 kHz of events out of the 1 MHz of events, which have been selected previously by the first-level hardware trigger. The selected events are consolidated into files and then sent to permanent storage for subsequent analysis on the Grid. The goal of the upgrade of the LHCb readout is to lift the limitation to 1 MHz. This means speeding up the DAQ to 40 MHz. Such a DAQ system will certainly employ 10 Gigabit or technologies and might also need new networking protocols: a customized TCP or proprietary solutions. A test module is being presented, which integrates in the existing LHCb infrastructure. It is a 10-Gigabit traffic generator, flexible enough to generate LHCb's raw data packets using dummy data or simulated data. These data are seen as real data coming from sub-detectors by the DAQ. The implementation is based on an FPGA using 10 Gigabit Ethernet interface. This module is integrated in the experiment control system. The architecture, ...

  4. Strategies in preflight for an optimal Yurchenko layout vault.

    Science.gov (United States)

    Koh, Michael; Jennings, Les

    2007-01-01

    An optimal Yurchenko layout vault of an elite female gymnast was identified by Koh et al. [2003. A predicted optimal performance of the Yurchenko layout vault in women's artistic gymnastics. Journal of Applied Biomechanics 19, 187-204] to require a combination of an increased body angle at horse contact and increased angular momentum for postflight than was recorded experimentally. However, the individual effect of each of these variables to producing the optimal vault is not known. The purpose of the study was to determine an appropriate strategy to teaching the optimal Yurchenko layout vault. Separate optimisations were carried out to investigate how each of these variables would change in order to produce the optimal vault identified by Koh et al. (2003). A combined optimal parameter selection and optimal control approach was used. The results suggest that when the body angle of attack at horse impact was kept low, pre-flight angular momentum had to be increased, with further gains during horse impact, to produce an optimal vault. This strategy of increasing solely the level of angular momentum needed for optimum postflight may not be attainable realistically. On the other hand, employing a larger body angle of attack required an increase in angular momentum during impact but which was attainable. Both optimisations show that increasing the vertical CM horse takeoff velocity is essential for postflight height and distance. The strategy to enhance performance should thus focus on maintaining an appropriate CM pre-flight velocity, a high level of angular momentum during pre-flight and to contact the horse with a large body angle of attack.

  5. The Guastavinos and tile vaults in North America

    OpenAIRE

    Ochsendorf, John

    2005-01-01

    Rafael Guastavino Moreno (1842-1908) and his son Rafael Guastavino Expósito (1872-1950) gained fame for having built tile vaults in over 1,000 significant buildings in the United States from the 1880s to the 1940s (Figure 1). Engineering and architecture historians have shown a growing interest in their oeuvre in recent years. This paper discusses the Guastavinos' work in its historic context, illustrating the technical innovations they introduced. The objective is to show that these vaults o...

  6. Open Hardware Business Models

    Directory of Open Access Journals (Sweden)

    Edy Ferreira

    2008-04-01

    Full Text Available In the September issue of the Open Source Business Resource, Patrick McNamara, president of the Open Hardware Foundation, gave a comprehensive introduction to the concept of open hardware, including some insights about the potential benefits for both companies and users. In this article, we present the topic from a different perspective, providing a classification of market offers from companies that are making money with open hardware.

  7. Vault prolapse treated by sacrocolpopexy | Cronjé | South African ...

    African Journals Online (AJOL)

    To evaluate the success rate of sacrocolpopexy in 153 patients with stage 3 and 4 vault prolapse. Methods. A retrospective review was done on 153 patient records from a database in a urogynaecological unit. For the sacrocolpopexy procedure, semi-absorbable mesh was placed along the anterior and posterior vaginal ...

  8. Improving Hardware Reusability: Software Defined Hardware

    Science.gov (United States)

    2017-03-01

    performance improvements over software, specialization is likely the future of hardware design. This trend will manifest in an increased demand for chip ...design methodologies is critical to meeting the incoming demand for chip diversity. Acknowledgements Research partially funded by DARPA Award Number...DARPA; and ASPIRE Lab industrial sponsors and affiliates Intel, Google, HPE, Huawei, LGE, Nokia, NVIDIA, Oracle, and Samsung. References [1

  9. Hardware Testing and System Evaluation: Procedures to Evaluate Commodity Hardware for Production Clusters

    Energy Technology Data Exchange (ETDEWEB)

    Goebel, J

    2004-02-27

    Without stable hardware any program will fail. The frustration and expense of supporting bad hardware can drain an organization, delay progress, and frustrate everyone involved. At Stanford Linear Accelerator Center (SLAC), we have created a testing method that helps our group, SLAC Computer Services (SCS), weed out potentially bad hardware and purchase the best hardware at the best possible cost. Commodity hardware changes often, so new evaluations happen periodically each time we purchase systems and minor re-evaluations happen for revised systems for our clusters, about twice a year. This general framework helps SCS perform correct, efficient evaluations. This article outlines SCS's computer testing methods and our system acceptance criteria. We expanded the basic ideas to other evaluations such as storage, and we think the methods outlined in this article has helped us choose hardware that is much more stable and supportable than our previous purchases. We have found that commodity hardware ranges in quality, so systematic method and tools for hardware evaluation were necessary. This article is based on one instance of a hardware purchase, but the guidelines apply to the general problem of purchasing commodity computer systems for production computational work.

  10. Special Analysis: Revision of Saltstone Vault 4 Disposal Limits (U)

    Energy Technology Data Exchange (ETDEWEB)

    Cook, J

    2005-05-26

    New disposal limits have been computed for Vault 4 of the Saltstone Disposal Facility based on several revisions to the models in the existing Performance Assessment and the Special Analysis issued in 2002. The most important changes are the use of a more rigorous groundwater flow and transport model, and consideration of radon emanation. Other revisions include refinement of the aquifer mesh to more accurately model the footprint of the vault, a new plutonium chemistry model accounting for the different transport properties of oxidation states III/IV and V/VI, use of variable infiltration rates to simulate degradation of the closure system, explicit calculation of gaseous releases and consideration of the effects of settlement and seismic activity on the vault structure. The disposal limits have been compared with the projected total inventory expected to be disposed in Vault 4. The resulting sum-of-fractions of the 1000-year disposal limits is 0.2, which indicates that the performance objectives and requirements of DOE 435.1 will not be exceeded. This SA has not altered the conceptual model (i.e., migration of radionuclides from the Saltstone waste form and Vault 4 to the environment via the processes of diffusion and advection) of the Saltstone PA (MMES 1992) nor has it altered the conclusions of the PA (i.e., disposal of the proposed waste in the SDF will meet DOE performance measures). Thus a PA revision is not required and this SA serves to update the disposal limits for Vault 4. In addition, projected doses have been calculated for comparison with the performance objectives laid out in 10 CFR 61. These doses are 0.05 mrem/year to a member of the public and 21.5 mrem/year to an inadvertent intruder in the resident scenario over a 10,000-year time-frame, which demonstrates that the 10 CFR 61 performance objectives will not be exceeded. This SA supplements the Saltstone PA and supersedes the two previous SAs (Cook et al. 2002; Cook and Kaplan 2003).

  11. Towards hardware-intrinsic security foundations and practice

    CERN Document Server

    Sadeghi, Ahmad-Reza; Tuyls, Pim

    2010-01-01

    Hardware-intrinsic security is a young field dealing with secure secret key storage. This book features contributions from researchers and practitioners with backgrounds in physics, mathematics, cryptography, coding theory and processor theory.

  12. Efflux kinetics and intracellular distribution of daunorubicin are not affected by major vault protein/lung resistance-related protein (vault) expression.

    NARCIS (Netherlands)

    Zon, van A; Mossink, MH; Schoester, M.; Scheper, R.J.; Sonneveld, P.; Wiemer, EA

    2004-01-01

    Vaults may contribute to multidrug resistance by transporting drugs away from their subcellular targets. To study the involvement of vaults in the extrusion of anthracyclines from the nucleus, we investigated the handling of daunorubicin by drug-sensitive and drug-resistant non-small lung cancer

  13. Neutron field inside a PET Cyclotron vault room

    Energy Technology Data Exchange (ETDEWEB)

    Vega C, H.R. [UAZ, C. Cipres 10, 98068 Zacatecas (Mexico); Mendez, R. [CIEMAT, Ave. Complutense 22, 28040 Madrid (Spain); Iniguez, M.P. [Universidad de Valladolid, Po Prado de la Magdalena s/n, 47011 Valladolid (Spain); Climent, J.M.; Penuelas, I. [Servicio de Medicina Nuclear de la Clinica Universitaria de Navarra, Pamplona (Spain); Barquero, R. [Hospital Universitario Rio Hortega, Valladolid (Spain)]. e-mail: fermineutron@yahoo.com

    2006-07-01

    The neutron field around a Positron Emission Tomography cyclotron was investigated during {sup 18} F radioisotope production with an 18 MeV proton beam. In this study the Ion Beam Application cyclotron, model Cyclone 18/9, was utilized. Measurements were carried out with a Bonner sphere neutron spectrometer with pairs of thermoluminescent dosemeters (TLD600 and TLD700) as thermal neutron detector. The TLDs readouts were utilized to unfold the neutron spectra at three different positions inside the cyclotron's vault room. With the spectra the Ambient dose equivalent was calculated. Neutron spectra unfolding were performed with the BUNKIUT code and the UTA4 response matrix. Neutron spectra were also determined by Monte Carlo calculations using a detailed model of cyclotron and vault room. (Author)

  14. Accounting for cranial vault growth in experimental design.

    Science.gov (United States)

    Power, Stephanie M; Matic, Damir B; Holdsworth, David W

    2014-05-01

    Earlier studies have not accounted for continued growth when using the rat calvarial defect model to evaluate bone healing in vivo. The purpose of this study was: 1) to calculate rat cranial vault growth over time; and 2) to determine the effects of accounting for growth on defect healing. Bilateral parietal defects were created in 10 adult Wistar rats. Serial microscopic computerized tomography scans were performed. Bone mineral content (BMC) measured according to standard technique and repeated accounting for cranial growth over time was compared with the use of parametric and nonparametric tests. Cranial vault growth continued through 22 weeks of age, increasing 7.5% in width and 9.1% in length, and calvarial defects expanded proportionately. BMC was greater within defects accounting for growth 2-12 weeks postoperatively (P accounting for cranial growth given advances in serial imaging techniques. Crown Copyright © 2014. Published by Mosby, Inc. All rights reserved.

  15. Hardware protection through obfuscation

    CERN Document Server

    Bhunia, Swarup; Tehranipoor, Mark

    2017-01-01

    This book introduces readers to various threats faced during design and fabrication by today’s integrated circuits (ICs) and systems. The authors discuss key issues, including illegal manufacturing of ICs or “IC Overproduction,” insertion of malicious circuits, referred as “Hardware Trojans”, which cause in-field chip/system malfunction, and reverse engineering and piracy of hardware intellectual property (IP). The authors provide a timely discussion of these threats, along with techniques for IC protection based on hardware obfuscation, which makes reverse-engineering an IC design infeasible for adversaries and untrusted parties with any reasonable amount of resources. This exhaustive study includes a review of the hardware obfuscation methods developed at each level of abstraction (RTL, gate, and layout) for conventional IC manufacturing, new forms of obfuscation for emerging integration strategies (split manufacturing, 2.5D ICs, and 3D ICs), and on-chip infrastructure needed for secure exchange o...

  16. Hardware removal - extremity

    Science.gov (United States)

    ... enable JavaScript. Surgeons use hardware such as pins, plates, or screws to help fix a broken bone ... SW, Hotchkiss RN, Pederson WC, Kozin SH, Cohen MS, eds. Green's Operative Hand Surgery . 7th ed. Philadelphia, ...

  17. Open Hardware at CERN

    CERN Multimedia

    CERN Knowledge Transfer Group

    2015-01-01

    CERN is actively making its knowledge and technology available for the benefit of society and does so through a variety of different mechanisms. Open hardware has in recent years established itself as a very effective way for CERN to make electronics designs and in particular printed circuit board layouts, accessible to anyone, while also facilitating collaboration and design re-use. It is creating an impact on many levels, from companies producing and selling products based on hardware designed at CERN, to new projects being released under the CERN Open Hardware Licence. Today the open hardware community includes large research institutes, universities, individual enthusiasts and companies. Many of the companies are actively involved in the entire process from design to production, delivering services and consultancy and even making their own products available under open licences.

  18. Software for Managing Inventory of Flight Hardware

    Science.gov (United States)

    Salisbury, John; Savage, Scott; Thomas, Shirman

    2003-01-01

    The Flight Hardware Support Request System (FHSRS) is a computer program that relieves engineers at Marshall Space Flight Center (MSFC) of most of the non-engineering administrative burden of managing an inventory of flight hardware. The FHSRS can also be adapted to perform similar functions for other organizations. The FHSRS affords a combination of capabilities, including those formerly provided by three separate programs in purchasing, inventorying, and inspecting hardware. The FHSRS provides a Web-based interface with a server computer that supports a relational database of inventory; electronic routing of requests and approvals; and electronic documentation from initial request through implementation of quality criteria, acquisition, receipt, inspection, storage, and final issue of flight materials and components. The database lists both hardware acquired for current projects and residual hardware from previous projects. The increased visibility of residual flight components provided by the FHSRS has dramatically improved the re-utilization of materials in lieu of new procurements, resulting in a cost savings of over $1.7 million. The FHSRS includes subprograms for manipulating the data in the database, informing of the status of a request or an item of hardware, and searching the database on any physical or other technical characteristic of a component or material. The software structure forces normalization of the data to facilitate inquiries and searches for which users have entered mixed or inconsistent values.

  19. A Comparison of Upper-Extremity Reaction Forces between the Yurchenko Vault and Floor Exercise

    OpenAIRE

    Matthew Kirk Seeley; Eadric Bressel

    2005-01-01

    The purpose of this study was to examine reaction forces transmitted to the upper extremities of high-level gymnasts during the round-off phase of the Yurchenko vault. A secondary purpose of this study was to compare reaction forces during the Yurchenko vault to reaction forces observed in a tumbling pass during the floor exercise. Ten high-level, female gymnasts volunteered to participate. Conditions of the independent variable were the Yurchenko vault and floor exercise; dependent variables...

  20. The effect of plyometric training on handspring vault performance in adolescent female gymnasts

    OpenAIRE

    Hall, Emma; Bishop, Daniel

    2014-01-01

    Purpose: Despite the huge amount of force exerted by both the upper and lower extremity musculature in gymnastic vaulting, there is scant research investigating the benefits that plyometric training can induce. The handspring vault is of paramount importance for a gymnast’s vaulting development, and requires both technical skill and power production to achieve success. The aim of this study was to determine the effects that plyometric training can have when added to habitual training on hands...

  1. NASA HUNCH Hardware

    Science.gov (United States)

    Hall, Nancy R.; Wagner, James; Phelps, Amanda

    2014-01-01

    What is NASA HUNCH? High School Students United with NASA to Create Hardware-HUNCH is an instructional partnership between NASA and educational institutions. This partnership benefits both NASA and students. NASA receives cost-effective hardware and soft goods, while students receive real-world hands-on experiences. The 2014-2015 was the 12th year of the HUNCH Program. NASA Glenn Research Center joined the program that already included the NASA Johnson Space Flight Center, Marshall Space Flight Center, Langley Research Center and Goddard Space Flight Center. The program included 76 schools in 24 states and NASA Glenn worked with the following five schools in the HUNCH Build to Print Hardware Program: Medina Career Center, Medina, OH; Cattaraugus Allegheny-BOCES, Olean, NY; Orleans Niagara-BOCES, Medina, NY; Apollo Career Center, Lima, OH; Romeo Engineering and Tech Center, Washington, MI. The schools built various parts of an International Space Station (ISS) middeck stowage locker and learned about manufacturing process and how best to build these components to NASA specifications. For the 2015-2016 school year the schools will be part of a larger group of schools building flight hardware consisting of 20 ISS middeck stowage lockers for the ISS Program. The HUNCH Program consists of: Build to Print Hardware; Build to Print Soft Goods; Design and Prototyping; Culinary Challenge; Implementation: Web Page and Video Production.

  2. Behavior of spent nuclear fuel and storage system components in dry interim storage. Revision 1

    Energy Technology Data Exchange (ETDEWEB)

    Johnson, A.B. Jr.; Gilbert, E.R.; Guenther, R.J.

    1983-02-01

    Irradiated nuclear fuel has been handled under dry conditions since the early days of nuclear reactor operation, and use of dry storage facilities for extended management of irradiated fuel began in 1964. Irradiated fuel is currently being stored dry in four types of facilities: dry wells, vaults, silos, and metal casks. Essentially all types of irradiated nuclear fuel are currently stored under dry conditions. Gas-cooled reactor (GCR) and liquid metal fast breeder reactor (LMFBR) fuels are stored in vaults and dry wells. Certain types of fuel are being stored in licensed dry storage facilities: Magnox fuel in vaults in the United Kingdom; organic-cooled reactor (OCR) fuel (clad with a zirconium alloy) in silos in Canada; and boiling water reactor (BWR) fuel (clad with Zircaloy) in a metal storage cask in Germany. Dry storage demonstrations are under way for Zircaloy-clad fuel from BWRs, pressurized heavy-water reactors (PHWRs), and pressurized water reactors (PWRs) in all four types of dry storage facilities. The demonstrations and related hot cell and laboratory tests are directed toward expanding the data base and establishing a licensing basis for dry storage of water reactor fuel. This report reviews the scope of dry interim storage technology, the performance of fuel and facility materials, the status of programs in several countries to license dry storage of water reactor fuel, and the characteristics of water reactor fuel that relate to dry storage conditions. 110 refs., 22 figs., 28 tabs.

  3. NGLW RCRA Storage Study

    Energy Technology Data Exchange (ETDEWEB)

    R. J. Waters; R. Ochoa; K. D. Fritz; D. W. Craig

    2000-06-01

    The Idaho Nuclear Technology and Engineering Center (INTEC) at the Idaho National Engineering and Environmental Laboratory contains radioactive liquid waste in underground storage tanks at the INTEC Tank Farm Facility (TFF). INTEC is currently treating the waste by evaporation to reduce the liquid volume for continued storage, and by calcination to reduce and convert the liquid to a dry waste form for long-term storage in calcine bins. Both treatment methods and activities in support of those treatment operations result in Newly Generated Liquid Waste (NGLW) being sent to TFF. The storage tanks in the TFF are underground, contained in concrete vaults with instrumentation, piping, transfer jets, and managed sumps in case of any liquid accumulation in the vault. The configuration of these tanks is such that Resource Conservation and Recovery Act (RCRA) regulations apply. The TFF tanks were assessed several years ago with respect to the RCRA regulations and they were found to be deficient. This study considers the configuration of the current tanks and the RCRA deficiencies identified for each. The study identifies four potential methods and proposes a means of correcting the deficiencies. The cost estimates included in the study account for construction cost; construction methods to minimize work exposure to chemical hazards, radioactive contamination, and ionizing radiation hazards; project logistics; and project schedule. The study also estimates the tank volumes benefit associated with each corrective action to support TFF liquid waste management planning.

  4. Computer hardware fault administration

    Science.gov (United States)

    Archer, Charles J.; Megerian, Mark G.; Ratterman, Joseph D.; Smith, Brian E.

    2010-09-14

    Computer hardware fault administration carried out in a parallel computer, where the parallel computer includes a plurality of compute nodes. The compute nodes are coupled for data communications by at least two independent data communications networks, where each data communications network includes data communications links connected to the compute nodes. Typical embodiments carry out hardware fault administration by identifying a location of a defective link in the first data communications network of the parallel computer and routing communications data around the defective link through the second data communications network of the parallel computer.

  5. Computer hardware for radiologists: Part I

    Directory of Open Access Journals (Sweden)

    Indrajit I

    2010-01-01

    Full Text Available Computers are an integral part of modern radiology practice. They are used in different radiology modalities to acquire, process, and postprocess imaging data. They have had a dramatic influence on contemporary radiology practice. Their impact has extended further with the emergence of Digital Imaging and Communications in Medicine (DICOM, Picture Archiving and Communication System (PACS, Radiology information system (RIS technology, and Teleradiology. A basic overview of computer hardware relevant to radiology practice is presented here. The key hardware components in a computer are the motherboard, central processor unit (CPU, the chipset, the random access memory (RAM, the memory modules, bus, storage drives, and ports. The personnel computer (PC has a rectangular case that contains important components called hardware, many of which are integrated circuits (ICs. The fiberglass motherboard is the main printed circuit board and has a variety of important hardware mounted on it, which are connected by electrical pathways called "buses". The CPU is the largest IC on the motherboard and contains millions of transistors. Its principal function is to execute "programs". A Pentium® 4 CPU has transistors that execute a billion instructions per second. The chipset is completely different from the CPU in design and function; it controls data and interaction of buses between the motherboard and the CPU. Memory (RAM is fundamentally semiconductor chips storing data and instructions for access by a CPU. RAM is classified by storage capacity, access speed, data rate, and configuration.

  6. The VMTG Hardware Description

    CERN Document Server

    Puccio, B

    1998-01-01

    The document describes the hardware features of the CERN Master Timing Generator. This board is the common platform for the transmission of General Timing Machine required by the CERN accelerators. In addition, the paper shows the various jumper options to customise the card which is compliant to the VMEbus standard.

  7. CERN Neutrino Platform Hardware

    CERN Document Server

    Nelson, Kevin

    2017-01-01

    My summer research was broadly in CERN's neutrino platform hardware efforts. This project had two main components: detector assembly and data analysis work for ICARUS. Specifically, I worked on assembly for the ProtoDUNE project and monitored the safety of ICARUS as it was transported to Fermilab by analyzing the accelerometer data from its move.

  8. Effect of Materials and Manufacturing on the Bending Stiffness of Vaulting Poles

    Science.gov (United States)

    Davis, C. L.; Kukureka, S. N.

    2012-01-01

    The increase in the world record height achieved in pole vaulting can be related to the improved ability of the athletes, in terms of their fitness and technique, and to the change in materials used to construct the pole. For example in 1960 there was a change in vaulting pole construction from bamboo to glass fibre reinforced polymer (GFRP)…

  9. Risk Management in the Original Extreme Sporting Event: The Pole Vault

    Science.gov (United States)

    Bemiller, Jim; Hardin, Robin

    2010-01-01

    The pole vault was considered the ultimate test of physical ability and daring before the advent of modern extreme sports such as skateboarding, snowboarding, and mountain biking. The inherent risks of the pole vault have been well documented. The National Center for Catastrophic Sport Injury Research reported in 2007 that the catastrophic injury…

  10. Fusée ceramic vaults and domes in the Netherlands

    NARCIS (Netherlands)

    Kamerling, M.W.

    2011-01-01

    This paper gives an overview of the fusée Ceramique vaults and domes constructed in The Netherlands just after World War II and describes the technique of construction as well as the advantages and disadvantages. Using only a minimum of concrete and steel, the environmental load of the vaults is

  11. Immobilized low-activity waste interim storage facility, Project W-465 conceptual design report

    Energy Technology Data Exchange (ETDEWEB)

    Pickett, W.W.

    1997-12-30

    This report outlines the design and Total Estimated Cost to modify the four unused grout vaults for the remote handling and interim storage of immobilized low-activity waste (ILAW). The grout vault facilities in the 200 East Area of the Hanford Site were constructed in the 1980s to support Tank Waste disposal activities. The facilities were to serve project B-714 which was intended to store grouted low-activity waste. The existing 4 unused grout vaults, with modifications for remote handling capability, will provide sufficient capacity for approximately three years of immobilized low activity waste (ILAW) production from the Tank Waste Remediation System-Privatization Vendors (TWRS-PV). These retrofit modifications to the grout vaults will result in an ILAW interim storage facility (Project W465) that will comply with applicable DOE directives, and state and federal regulations.

  12. The "Akopian" vault performed by elite male gymnasts: Which biomechanical variables are related to a judge's score?

    OpenAIRE

    Roman Farana; Jaroslav Uchytil; David Zahradník; Daniel Jandačka

    2015-01-01

    Background: A vaulting performance takes a short time and it is influenced by and affects the quantity of mechanical variables. The significant relationships between the vaulting score and specific aspects of the gymnast's vault should conduct coaches to monitor these variables as a part of training or routine testing. Objective: The aim of the current study was to determine the biomechanical variables that are related to a successful performance of the Akopian vaults performed by top level m...

  13. Novel Technique for the UX15 Cavern Vault Support System

    CERN Document Server

    Rammer, H

    2000-01-01

    The overall LHC project schedule requires the civil engineering work to begin before the final LEP shutdown. The new caverns for the ATLAS experiment will be built in and around the existing underground structures at point 1. In order to make the best possible use of the time available for the LHC civil engineering before the shutdown of LEP, a particular arrangement for the construction of the UX15 cavern vault has been developed. The basic concept of this arrangement consists of the excavation of the cavern top heading and the installation of the concrete vault immediately afterwards, prior to the subsequent bench excavation after LEP shutdown. A temporary support of the dead weight of the concrete roof will be achieved by the suspension of the roof by 38 no. pre-stressed ground anchors of 225 tons capacity each. This support system will work up to the construction of the cavern base slab and walls and the completion of the permanent concrete lining.

  14. DCSP hardware maintenance system

    Energy Technology Data Exchange (ETDEWEB)

    Pazmino, M.

    1995-11-01

    This paper discusses the necessary changes to be implemented on the hardware side of the DCSP database. DCSP is currently tracking hardware maintenance costs in six separate databases. The goal is to develop a system that combines all data and works off a single database. Some of the tasks that will be discussed in this paper include adding the capability for report generation, creating a help package and preparing a users guide, testing the executable file, and populating the new database with data taken from the old database. A brief description of the basic process used in developing the system will also be discussed. Conclusions about the future of the database and the delivery of the final product are then addressed, based on research and the desired use of the system.

  15. Hardware Accelerated Simulated Radiography

    Energy Technology Data Exchange (ETDEWEB)

    Laney, D; Callahan, S; Max, N; Silva, C; Langer, S; Frank, R

    2005-04-12

    We present the application of hardware accelerated volume rendering algorithms to the simulation of radiographs as an aid to scientists designing experiments, validating simulation codes, and understanding experimental data. The techniques presented take advantage of 32 bit floating point texture capabilities to obtain validated solutions to the radiative transport equation for X-rays. An unsorted hexahedron projection algorithm is presented for curvilinear hexahedra that produces simulated radiographs in the absorption-only regime. A sorted tetrahedral projection algorithm is presented that simulates radiographs of emissive materials. We apply the tetrahedral projection algorithm to the simulation of experimental diagnostics for inertial confinement fusion experiments on a laser at the University of Rochester. We show that the hardware accelerated solution is faster than the current technique used by scientists.

  16. Sterilization of space hardware.

    Science.gov (United States)

    Pflug, I. J.

    1971-01-01

    Discussion of various techniques of sterilization of space flight hardware using either destructive heating or the action of chemicals. Factors considered in the dry-heat destruction of microorganisms include the effects of microbial water content, temperature, the physicochemical properties of the microorganism and adjacent support, and nature of the surrounding gas atmosphere. Dry-heat destruction rates of microorganisms on the surface, between mated surface areas, or buried in the solid material of space vehicle hardware are reviewed, along with alternative dry-heat sterilization cycles, thermodynamic considerations, and considerations of final sterilization-process design. Discussed sterilization chemicals include ethylene oxide, formaldehyde, methyl bromide, dimethyl sulfoxide, peracetic acid, and beta-propiolactone.

  17. Server hardware trends

    CERN Multimedia

    CERN. Geneva

    2014-01-01

    This talk will cover the status of the current and upcoming offers on server platforms, focusing mainly on the processing and storage parts. Alternative solutions like Open Compute (OCP) will be quickly covered.

  18. Closure Report for Corrective Action Unit 135: Areas 25 Underground Storage Tanks, Nevada Test Site, Nevada

    Energy Technology Data Exchange (ETDEWEB)

    D. H. Cox

    2001-06-01

    Corrective Action Unit (CAU) 135, Area 25 Underground Storage Tanks, was closed in accordance with the approved Corrective Action Plan (DOE/NV, 2000). CAU 135 consists of three Corrective Action Sites (CAS). Two of these CAS's were identified in the Corrective Action Investigation Data Quality Objective meeting as being improperly identified as underground storage tanks. CAS 25-02-03 identified as the Deluge Valve Pit was actually an underground electrical vault and CAS 25-02-10 identified as an Underground Storage Tank was actually a former above ground storage tank filled with demineralized water. Both of these CAS's are recommended for a no further action closure. CAS 25-02-01 the Underground Storage Tanks commonly referred to as the Engine Maintenance Assembly and Disassembly Waste Holdup Tanks and Vault was closed by decontaminating the vault structure and conducting a radiological verification survey to document compliance with the Nevada Test Site unrestricted use release criteria. The Area 25 Underground Storage Tanks, (CAS 25-02-01), referred to as the Engine Maintenance, Assembly, and Disassembly (E-MAD) Waste Holdup Tanks and Vault, were used to receive liquid waste from all of the radioactive and cell service area drains at the E-MAD Facility. Based on the results of the Corrective Action Investigation conducted in June 1999, discussed in ''The Corrective Action Investigation Plan for Corrective Action Unit 135: Area 25 Underground Storage Tanks, Nevada Test Site, Nevada'' (DOE/NV, 199a), one sample from the radiological survey of the concrete vault interior exceeded radionuclide preliminary action levels. The analytes from the sediment samples exceeded the preliminary action levels for polychlorinated biphenyls, Resource Conservation and Recovery Act metals, total petroleum hydrocarbons as diesel-range organics, and radionuclides. The CAU 135 closure activities consisted of scabbling radiological ''hot spots

  19. Comparative Tests Between Shallow Downhole Installation and Classical Seismic Vaults

    Science.gov (United States)

    Charade, Olivier; Vergne, Jérôme; Bonaimé, Sébastien; Bonnin, Mickaël; Louis-Xavier, Thierry; Beucler, Eric; Manhaval, Bertrand; Arnold, Benoît

    2016-04-01

    The French permanent broadband network is engaged in a major evolution with the installation of a hundred of new stations within the forthcoming years. Since most of them will be located in open field environments, we are looking for a standardized installation method able to provide good noise level performance at a reasonable cost. Nowadays, the use of posthole seismometers that can be deployed at the bottom of shallow boreholes appears to be an affordable and alternative solution to more traditional installation methods such as seismic vaults or dedicated underground cellars. Here we present some comparative tests performed at different sites (including two GEOSCOPE stations), spanning various geological conditions. On each site, posthole sensors were deployed for several weeks to months at various depths from 1.5m up to 20m. We compare the seismic noise levels measured in the different boreholes with the one for a reference sensor either directly buried or installed in a tunnel, a cellar or a seismic vault. Apart from the microseism frequency band, seismic noise level in most of the boreholes equals or outperforms the one obtained for the reference sensors. At periods higher than 20s we observe a strong reduction of the seismic noise on the horizontal components in the deepest boreholes compared to near surface installations. This improvement can reach up to 30dB and appears to be mostly due to a reduction in tilt noise induced by wind or local pressure variations. However, the absolute noise level that can be achieved strongly depends on the local geology.

  20. A Comparison of Upper-Extremity Reaction Forces between the Yurchenko Vault and Floor Exercise.

    Science.gov (United States)

    Seeley, Matthew K; Bressel, Eadric

    2005-06-01

    The purpose of this study was to examine reaction forces transmitted to the upper extremities of high-level gymnasts during the round-off phase of the Yurchenko vault. A secondary purpose of this study was to compare reaction forces during the Yurchenko vault to reaction forces observed in a tumbling pass during the floor exercise. Ten high-level, female gymnasts volunteered to participate. Conditions of the independent variable were the Yurchenko vault and floor exercise; dependent variables were peak vertical and peak anterior-posterior reaction forces. Each participant performed three trials of both conditions with the trail hand contacting a force platform. Vertical and anterior-posterior reaction forces, normalized to body weight, were greater (p vault (2.38) than during the floor exercise round-off (2.15). Vertical reaction forces during the round-off phase of the Yurchenko vault and floor exercise round-off are similar to reaction forces transmitted to upper extremities during other gymnastic skills and ground reaction forces transmitted to lower extremities while running and walking at various speeds. Results of this study reveal a need for further research considering methods aimed at reducing reaction forces transmitted to the upper extremities during the Yurchenko vault and floor exercise. Key PointsDespite high difficulty and increased risk, a dearth of information exists concerning reaction forces transmitted to upper-extremities of high-level gymnasts performing the Yurchenko vault.Reaction forces experienced by high-level gymnasts performing the Yurchenko vault are relatively high; aforementioned forces are comparable to forces transmitted to lower-extremities during various activities and may be responsible for upper-extremity injury.Reaction forces observed during this study will serve as a baseline in the evaluation of methods purporting to reduce forces transmitted to upper-extremities during the Yurchenko vault.

  1. Target-directed running in gymnastics: a preliminary exploration of vaulting.

    Science.gov (United States)

    Bradshaw, Elizabeth

    2004-01-01

    Research to date has demonstrated the importance of running speed and an accurate take-off on gymnastics vaulting performance (Krug et al., 1998; Bohne et al., 2000). Current training practice for gymnastics vaulting is to stereotype the 15-25 m run-ups to the board, which assumes that a fast and reliable approach is best controlled predominantly without visual feedback. Incidences where gymnasts make errors during their run-ups, often landing onto the back of the board, occur frequently, even at the international level. The standard deviation method (e.g. Lee et al., 1982) for identifying visual regulation in long jump run-ups was employed in this first exploration of gymnastics vaulting to examine whether visual regulation processes are utilised. Secondly, the question of how a small number of gymnasts can run fast during the approach and perform more difficult vaults was addressed. Five elite female gymnasts aged 13-15 years performed five round-off entry vaults. One panning 50 Hz video camera recorded each trial from an elevated platform to evaluate the approach step, hurdle, and round-off characteristics, whilst two 250 Hz cameras recorded vaulting performance. Two qualified judges viewed each vaulting trial and provided a performance score. A precursor for a fast take-off from the board when vaulting is to utilise vision early to control the approach kinematics (p = 0.02). High take-off velocity was directly related to judge's score (p = 0.03). Coaches need to supplement gymnasts' vault training to include exercises that improve the gymnasts' ability to visually regulate their gait pattern whilst running.

  2. COMPUTER HARDWARE MARKING

    CERN Multimedia

    Groupe de protection des biens

    2000-01-01

    As part of the campaign to protect CERN property and for insurance reasons, all computer hardware belonging to the Organization must be marked with the words 'PROPRIETE CERN'.IT Division has recently introduced a new marking system that is both economical and easy to use. From now on all desktop hardware (PCs, Macintoshes, printers) issued by IT Division with a value equal to or exceeding 500 CHF will be marked using this new system.For equipment that is already installed but not yet marked, including UNIX workstations and X terminals, IT Division's Desktop Support Service offers the following services free of charge:Equipment-marking wherever the Service is called out to perform other work (please submit all work requests to the IT Helpdesk on 78888 or helpdesk@cern.ch; for unavoidable operational reasons, the Desktop Support Service will only respond to marking requests when these coincide with requests for other work such as repairs, system upgrades, etc.);Training of personnel designated by Division Leade...

  3. Foundations of hardware IP protection

    CERN Document Server

    Torres, Lionel

    2017-01-01

    This book provides a comprehensive and up-to-date guide to the design of security-hardened, hardware intellectual property (IP). Readers will learn how IP can be threatened, as well as protected, by using means such as hardware obfuscation/camouflaging, watermarking, fingerprinting (PUF), functional locking, remote activation, hidden transmission of data, hardware Trojan detection, protection against hardware Trojan, use of secure element, ultra-lightweight cryptography, and digital rights management. This book serves as a single-source reference to design space exploration of hardware security and IP protection. · Provides readers with a comprehensive overview of hardware intellectual property (IP) security, describing threat models and presenting means of protection, from integrated circuit layout to digital rights management of IP; · Enables readers to transpose techniques fundamental to digital rights management (DRM) to the realm of hardware IP security; · Introduce designers to the concept of salutar...

  4. Open hardware for open science

    CERN Multimedia

    CERN Bulletin

    2011-01-01

    Inspired by the open source software movement, the Open Hardware Repository was created to enable hardware developers to share the results of their R&D activities. The recently published CERN Open Hardware Licence offers the legal framework to support this knowledge and technology exchange.   Two years ago, a group of electronics designers led by Javier Serrano, a CERN engineer, working in experimental physics laboratories created the Open Hardware Repository (OHR). This project was initiated in order to facilitate the exchange of hardware designs across the community in line with the ideals of “open science”. The main objectives include avoiding duplication of effort by sharing results across different teams that might be working on the same need. “For hardware developers, the advantages of open hardware are numerous. For example, it is a great learning tool for technologies some developers would not otherwise master, and it avoids unnecessary work if someone ha...

  5. Space hardware microbial contamination

    Science.gov (United States)

    Baker, A.; Kern, R.; Mancinelli, R.; Venkateswaren, K.; Wainwright, N.

    Planetary Protection (PP) requirements imposed on unmanned planetary missions require that the spacecraft undergo rigorous bioload reduction prior to launch. The ability to quantitate bioburden on such spacecraft is dependent on developing new analytical methodologies that can be used to identify and trace biological contamination on flight hardware. The focus of new method development is to move forward and to augment the current spore analysis method which was first used on Viking. The ultimate goal of the new techniques is not to increase the cleanliness requirement currently levied on various missions, b ut instead to better understand the nature of the bioburden through the use of well-characterized standard methods. Subsequently an array of standard techniques is needed to provide various analytical methodologies that can be used to access bioburden, depending upon mission specifications. This poster will provide information on two workshops that have been held to review the status of the development of new quantitative techniques for determining the bioload on spacecraft at the time of launch. The purpose of the workshops was to review and revise NASA Standard Operation Procedure NPG:5340.1C "Microbiological Examination of Space Hardware and Associated Environments" to incorporate improvements in the procedure and to reflect current field practices. I addition the paneln reviewed the status of new analytical methods currently under study for planetary protection applications, defining expected research that would bring the individual methods to a point where they can be drafted for submittal to the NASA standard procedure process. The poster will highlight changes to current standard procedures as well as review the status of new methods currently being studied. Methods included Polymerase Chain Reaction (PCR), Epifluorescence Techniques, Live/Dead Cell Analysis, Capillary Electrophoresis of Amino Acids and Ionic Contaminants, High Sensitivity Assay for

  6. Health physics challenges involved with opening a "seventeen-inch" concrete waste vault.

    Science.gov (United States)

    Sullivan, Patrick T; Pizzulli, Michelle

    2005-05-01

    This paper describes the various activities involved with opening a sealed legacy "Seventeen-inch" concrete vault and the health physics challenges and solutions employed. As part of a legacy waste stream that was removed from the former Hazardous Waste Management Facility at Brookhaven National Laboratory, the "Seventeen-inch" concrete vault labeled 1-95 was moved to the new Waste Management Facility for ultimate disposal. Because the vault contained 239Pu foils with a total activity in excess of the transuranic waste limits, the foils needed to be removed and repackaged for disposal. Conventional diamond wire saws could not be used because of facility constraints, so this project relied mainly on manual techniques. The planning and engineering controls put in place enabled personnel to open the vault and remove the waste while keeping dose as low as reasonably achievable.

  7. Addendum to the composite analysis for the E-Area Vaults and Saltstone Disposal Facilities

    Energy Technology Data Exchange (ETDEWEB)

    Cook, J.R.

    2000-03-13

    This report documents the composite analysis performed on the two active SRS low-level radioactive waste disposal facilities. The facilities are the Z-Area Saltstone Disposal Facility and the E-Area Vaults Disposal Facility.

  8. Vault Safety and Inventory System users manual, PRIME 2350. Revision 1

    Energy Technology Data Exchange (ETDEWEB)

    Downey, N.J.

    1994-12-14

    This revision is issued to request review of the attached document: VSIS User Manual, PRIME 2350, which provides user information for the operation of the VSIS (Vault Safety and Inventory System). It describes operational aspects of Prime 2350 minicomputer and vault data acquisition equipment. It also describes the User`s Main Menu and menu functions, including REPORTS. Also, system procedures for the Prime 2350 minicomputer are covered.

  9. The Application of Carbon Composites in the Rehabilitation of Historic Baroque Vaults

    Directory of Open Access Journals (Sweden)

    Jiří Witzany

    2015-12-01

    Full Text Available The stabilization and reinforcement of damaged barrel vaults with lunettes over an arcaded walk, applying composite strips based on high-strength carbon fibers and epoxy resin, was performed during the restoration of a historic monastery. The application of reinforcing composite strips in the soffit of damaged barrel vaults was preceded by relatively extensive experimental research and theoretical analyses. This method significantly reduces the interventions into and the degradation of the original historic structure (surface application and is reversible.

  10. Analysis of Risk Factors for Post-Hysterectomy Vaginal Vault Prolapse

    Directory of Open Access Journals (Sweden)

    Mahmut Kuntay kuntay Kokanali

    2015-03-01

    Conclusions: Vault prolapse after hysterectomy is a relatively rare complication. Elderly age, obesity, chronic obstructive lung diseases, prior genital prolapse sugery, vaginal hysterectomy, genital prolapse as indication of hysterectomy and the number of vaginal delivery and #8805;2 increase vault prolapse risk. Identification of these risk factors is important to prevent this complication. [Cukurova Med J 2015; 40(1.000: 63-71

  11. Hardware Support for Embedded Java

    DEFF Research Database (Denmark)

    Schoeberl, Martin

    2012-01-01

    The general Java runtime environment is resource hungry and unfriendly for real-time systems. To reduce the resource consumption of Java in embedded systems, direct hardware support of the language is a valuable option. Furthermore, an implementation of the Java virtual machine in hardware enables...... worst-case execution time analysis of Java programs. This chapter gives an overview of current approaches to hardware support for embedded and real-time Java....

  12. A COMPARISON OF UPPER-EXTREMITY REACTION FORCES BETWEEN THE YURCHENKO VAULT AND FLOOR EXERCISE

    Directory of Open Access Journals (Sweden)

    Matthew Kirk Seeley

    2005-06-01

    Full Text Available The purpose of this study was to examine reaction forces transmitted to the upper extremities of high-level gymnasts during the round-off phase of the Yurchenko vault. A secondary purpose of this study was to compare reaction forces during the Yurchenko vault to reaction forces observed in a tumbling pass during the floor exercise. Ten high-level, female gymnasts volunteered to participate. Conditions of the independent variable were the Yurchenko vault and floor exercise; dependent variables were peak vertical and peak anterior-posterior reaction forces. Each participant performed three trials of both conditions with the trail hand contacting a force platform. Vertical and anterior-posterior reaction forces, normalized to body weight, were greater (p < 0.05 during the round-off phase of the Yurchenko vault (2.38 than during the floor exercise round-off (2.15. Vertical reaction forces during the round-off phase of the Yurchenko vault and floor exercise round-off are similar to reaction forces transmitted to upper extremities during other gymnastic skills and ground reaction forces transmitted to lower extremities while running and walking at various speeds. Results of this study reveal a need for further research considering methods aimed at reducing reaction forces transmitted to the upper extremities during the Yurchenko vault and floor exercise.

  13. Hardware for soft computing and soft computing for hardware

    CERN Document Server

    Nedjah, Nadia

    2014-01-01

    Single and Multi-Objective Evolutionary Computation (MOEA),  Genetic Algorithms (GAs), Artificial Neural Networks (ANNs), Fuzzy Controllers (FCs), Particle Swarm Optimization (PSO) and Ant colony Optimization (ACO) are becoming omnipresent in almost every intelligent system design. Unfortunately, the application of the majority of these techniques is complex and so requires a huge computational effort to yield useful and practical results. Therefore, dedicated hardware for evolutionary, neural and fuzzy computation is a key issue for designers. With the spread of reconfigurable hardware such as FPGAs, digital as well as analog hardware implementations of such computation become cost-effective. The idea behind this book is to offer a variety of hardware designs for soft computing techniques that can be embedded in any final product. Also, to introduce the successful application of soft computing technique to solve many hard problem encountered during the design of embedded hardware designs. Reconfigurable em...

  14. Hardware Removal in Craniomaxillofacial Trauma

    Science.gov (United States)

    Cahill, Thomas J.; Gandhi, Rikesh; Allori, Alexander C.; Marcus, Jeffrey R.; Powers, David; Erdmann, Detlev; Hollenbeck, Scott T.; Levinson, Howard

    2015-01-01

    Background Craniomaxillofacial (CMF) fractures are typically treated with open reduction and internal fixation. Open reduction and internal fixation can be complicated by hardware exposure or infection. The literature often does not differentiate between these 2 entities; so for this study, we have considered all hardware exposures as hardware infections. Approximately 5% of adults with CMF trauma are thought to develop hardware infections. Management consists of either removing the hardware versus leaving it in situ. The optimal approach has not been investigated. Thus, a systematic review of the literature was undertaken and a resultant evidence-based approach to the treatment and management of CMF hardware infections was devised. Materials and Methods A comprehensive search of journal articles was performed in parallel using MEDLINE, Web of Science, and ScienceDirect electronic databases. Keywords and phrases used were maxillofacial injuries; facial bones; wounds and injuries; fracture fixation, internal; wound infection; and infection. Our search yielded 529 articles. To focus on CMF fractures with hardware infections, the full text of English-language articles was reviewed to identify articles focusing on the evaluation and management of infected hardware in CMF trauma. Each article’s reference list was manually reviewed and citation analysis performed to identify articles missed by the search strategy. There were 259 articles that met the full inclusion criteria and form the basis of this systematic review. The articles were rated based on the level of evidence. There were 81 grade II articles included in the meta-analysis. Result Our meta-analysis revealed that 7503 patients were treated with hardware for CMF fractures in the 81 grade II articles. Hardware infection occurred in 510 (6.8%) of these patients. Of those infections, hardware removal occurred in 264 (51.8%) patients; hardware was left in place in 166 (32.6%) patients; and in 80 (15.6%) cases

  15. 324 Building radiochemical engineering cells, high-level vault, low-level vault, and associated areas closure plan

    Energy Technology Data Exchange (ETDEWEB)

    Barnett, J.M.

    1998-03-25

    The Hanford Site, located adjacent to and north of Richland, Washington, is operated by the US Department of Energy, Richland Operations Office (RL). The 324 Building is located in the 300 Area of the Hanford Site. The 324 Building was constructed in the 1960s to support materials and chemical process research and development activities ranging from laboratory/bench-scale studies to full engineering-scale pilot plant demonstrations. In the mid-1990s, it was determined that dangerous waste and waste residues were being stored for greater than 90 days in the 324 Building Radiochemical Engineering Cells (REC) and in the High-Level Vault/Low-Level Vault (HLV/LLV) tanks. [These areas are not Resource Conservation and Recovery Act of 1976 (RCRA) permitted portions of the 324 Building.] Through the Hanford Federal Facility Agreement and Consent Order (Tri-Party Agreement) Milestone M-89, agreement was reached to close the nonpermitted RCRA unit in the 324 Building. This closure plan, managed under TPA Milestone M-20-55, addresses the identified building areas targeted by the Tri-Party Agreement and provides commitments to achieve the highest degree of compliance practicable, given the special technical difficulties of managing mixed waste that contains high-activity radioactive materials, and the physical limitations of working remotely in the areas within the subject closure unit. This closure plan is divided into nine chapters. Chapter 1.0 provides the introduction, historical perspective, 324 Building history and current mission, and the regulatory basis and strategy for managing the closure unit. Chapters 2.0, 3.0, 4.0, and 5.0 discuss the detailed facility description, process information, waste characteristics, and groundwater monitoring respectively. Chapter 6.0 deals with the closure strategy and performance standard, including the closure activities for the B-Cell, D-Cell, HLV, LLV; piping and miscellaneous associated building areas. Chapter 7.0 addresses the

  16. BIOLOGICALLY INSPIRED HARDWARE CELL ARCHITECTURE

    DEFF Research Database (Denmark)

    2010-01-01

    Disclosed is a system comprising: - a reconfigurable hardware platform; - a plurality of hardware units defined as cells adapted to be programmed to provide self-organization and self-maintenance of the system by means of implementing a program expressed in a programming language defined as DNA...

  17. Secure coupling of hardware components

    NARCIS (Netherlands)

    Hoepman, J.H.; Joosten, H.J.M.; Knobbe, J.W.

    2011-01-01

    A method and a system for securing communication between at least a first and a second hardware components of a mobile device is described. The method includes establishing a first shared secret between the first and the second hardware components during an initialization of the mobile device and,

  18. Computer hardware for radiologists: Part 2

    Directory of Open Access Journals (Sweden)

    Indrajit I

    2010-01-01

    Full Text Available Computers are an integral part of modern radiology equipment. In the first half of this two-part article, we dwelt upon some fundamental concepts regarding computer hardware, covering components like motherboard, central processing unit (CPU, chipset, random access memory (RAM, and memory modules. In this article, we describe the remaining computer hardware components that are of relevance to radiology. "Storage drive" is a term describing a "memory" hardware used to store data for later retrieval. Commonly used storage drives are hard drives, floppy drives, optical drives, flash drives, and network drives. The capacity of a hard drive is dependent on many factors, including the number of disk sides, number of tracks per side, number of sectors on each track, and the amount of data that can be stored in each sector. "Drive interfaces" connect hard drives and optical drives to a computer. The connections of such drives require both a power cable and a data cable. The four most popular "input/output devices" used commonly with computers are the printer, monitor, mouse, and keyboard. The "bus" is a built-in electronic signal pathway in the motherboard to permit efficient and uninterrupted data transfer. A motherboard can have several buses, including the system bus, the PCI express bus, the PCI bus, the AGP bus, and the (outdated ISA bus. "Ports" are the location at which external devices are connected to a computer motherboard. All commonly used peripheral devices, such as printers, scanners, and portable drives, need ports. A working knowledge of computers is necessary for the radiologist if the workflow is to realize its full potential and, besides, this knowledge will prepare the radiologist for the coming innovations in the ′ever increasing′ digital future.

  19. Architecture - re-Construction - Geometry: a knowledge path applied to the study of Plantery's vaults in Turin

    Directory of Open Access Journals (Sweden)

    Roberta Spallone

    2012-06-01

    Full Text Available Plantery's vaults, by the name of the architect working in Turin since first years of '700, are composed by a main vault intersected by some axial and angular secondary vaults. Plantery's vaults allow to roof over unitary spaces obtaining effects of lightness also by small rises. Their diffusion, up to the '80s of the century, in boardrooms as palaces halls, and the richness of variations on the theme, justifies a research, that makes use of survey and digital modeling. This research is focused on the relationships between geometric models and built architecture, connected by use of materials, construction techniques and decorative styles.

  20. Electrochemical desalination of the ionic mixture measured in the vault of Rørby Church - Laboratory scale

    DEFF Research Database (Denmark)

    Rörig-Dalgaard, Inge; Bøllingtoft, P.

    2011-01-01

    Salt induced deterioration of the vault in Rørby Church has resulted in extensive deterioration of the vault itself and of the murals on the lower surface of the vault. The upper surface of the vault has previously been covered with cement mortar. After removing this cement mortar some of the bri......Salt induced deterioration of the vault in Rørby Church has resulted in extensive deterioration of the vault itself and of the murals on the lower surface of the vault. The upper surface of the vault has previously been covered with cement mortar. After removing this cement mortar some...... of the bricks erode and form brick powder. The brick powder was collected in 2002, 2005 and 2011 and measured for the most common salts in Danish vault structures. On the basis of the actual measured ions two different salt mixtures were made and used for contamination of brick specimens. By use of an applied...... be extracted electrochemically if the salts in the construction can be dissolved....

  1. Effect of materials and manufacturing on the bending stiffness of vaulting poles

    Science.gov (United States)

    Davis, C. L.; Kukureka, S. N.

    2012-09-01

    The increase in the world record height achieved in pole vaulting can be related to the improved ability of the athletes, in terms of their fitness and technique, and to the change in materials used to construct the pole. For example in 1960 there was a change in vaulting pole construction from bamboo to glass fibre reinforced polymer (GFRP) composites. The lighter GFRP pole enabled the athletes to have a faster run-up, resulting in a greater take-off speed, giving them more kinetic energy to convert into potential energy and hence height. GFRP poles also have a much higher failure stress than bamboo, so the poles were engineered to bend under the load of the athlete, thereby storing elastic strain energy that can be released as the pole straightens, resulting in greater energy efficiency. The bending also allowed athletes to change their vaulting technique from a style that involved the body remaining almost upright during the vault to one where the athlete goes over the bar with their feet upwards. Modern vaulting poles can be made from GFRP and/or carbon fibre reinforced polymer (CFRP) composites. The addition of carbon fibres maintains the mechanical properties of the pole, but allows a reduction in the weight. The number and arrangement of the fibres determines the mechanical properties, in particular the bending stiffness. Vaulting poles are also designed for an individual athlete to take into account each athlete’s ability and physical characteristics. The poles are rated by ‘weight’ to allow athletes to select an appropriate pole for their ability. This paper will review the development of vaulting poles and the requirements to maximize performance. The properties (bending stiffness and pre-bend) and microstructure (fibre volume fraction and lay-up) of typical vaulting poles will be discussed. Originally published as Davis C L and Kukureka S N (2004) Effect of materials and manufacturing on the bending stiffness of vaulting poles The Engineering of

  2. A new method for generating an invariant iris private key based on the fuzzy vault system.

    Science.gov (United States)

    Lee, Youn Joo; Park, Kang Ryoung; Lee, Sung Joo; Bae, Kwanghyuk; Kim, Jaihie

    2008-10-01

    Cryptographic systems have been widely used in many information security applications. One main challenge that these systems have faced has been how to protect private keys from attackers. Recently, biometric cryptosystems have been introduced as a reliable way of concealing private keys by using biometric data. A fuzzy vault refers to a biometric cryptosystem that can be used to effectively protect private keys and to release them only when legitimate users enter their biometric data. In biometric systems, a critical problem is storing biometric templates in a database. However, fuzzy vault systems do not need to directly store these templates since they are combined with private keys by using cryptography. Previous fuzzy vault systems were designed by using fingerprint, face, and so on. However, there has been no attempt to implement a fuzzy vault system that used an iris. In biometric applications, it is widely known that an iris can discriminate between persons better than other biometric modalities. In this paper, we propose a reliable fuzzy vault system based on local iris features. We extracted multiple iris features from multiple local regions in a given iris image, and the exact values of the unordered set were then produced using the clustering method. To align the iris templates with the new input iris data, a shift-matching technique was applied. Experimental results showed that 128-bit private keys were securely and robustly generated by using any given iris data without requiring prealignment.

  3. The Hecht vault performed at the 1995 World Gymnastics Championships: deterministic model and judges' scores.

    Science.gov (United States)

    Takei, Y; Blucker, E P; Nohara, H; Yamashita, N

    2000-11-01

    The aim of this study was to determine the mechanical variables that govern success of the Hecht vault. The participants were 122 male gymnasts from 30 countries performing the vault at the 1995 World Gymnastics Championships. The vaults were filmed using a Photosonics 16-mm motion picture camera operating at 100 Hz. Approximately 80 frames were digitized for each vault analysed. The method of Hay and Reid was used to develop a theoretical model to identify the mechanical and physical variables that determine linear and angular motions of the vault. Correlational analysis was used to establish the strength of the relationship between the causal mechanical variables identified in the model and the judges' scores. Significant correlations (P < 0.005) indicated that the following were important determinants of success: large horizontal and vertical velocities at take-off from the board and the horse; large vertical and angular distances of pre-flight; large vertical impulses of high force and short duration exerted on the horse and the resulting large changes in vertical velocity on the horse; and large horizontal and vertical distances and long times of post-flight. Of the 18 significant variables identified in the present study, the angular distance of pre- and post-flights, the horizontal velocity and angular momentum at take-off from the horse, and the average moment of inertia and duration of post-flight collectively accounted for 57% of the variation in the judges' scores.

  4. A hierarchical fingerprint alignment method and its application to fuzzy vault

    Science.gov (United States)

    Li, Peng; Yang, Xin; Zang, Yali; Cao, Kai; Tian, Jie

    2010-04-01

    Fuzzy vault is a practical and promising scheme, which can protect biometric templates and perform secure key management simultaneously. Aligning the query sample and the template sample in the encrypted domain remains a challenging task in the fingerprint-based fuzzy vault scheme. To some extent, all the existing fingerprint aligning methods in the encrypted domain have their own drawbacks, e.g., not enough alignment accuracy or information leakage because of publishing helper data. In this paper, a novel fingerprint aligning method is proposed, which integrates the fingerprint reference points and its neighboring region of interest(ROI) in a hierarchical manner. The concept of mutual information(MI) in the information theory is used to assess the coincidence extent of two fingerprints after being aligned. The novel alignment method is applied to fingerprint-based fuzzy vault implementation. Out of information leakage consideration, the orientation features of fingerprint minutiae are discarded and another distinguishing local feature, inter-minutiae ridge count, is used to replace the minutiae orientation in the implementation of fingerprint-based fuzzy vault. Experiment on FVC2002 DB2a is conducted to show the virtue of proposed alignment method and the promising performance of proposed fingerprint-based fuzzy vault implementation.

  5. Hardware for dynamic quantum computing.

    Science.gov (United States)

    Ryan, Colm A; Johnson, Blake R; Ristè, Diego; Donovan, Brian; Ohki, Thomas A

    2017-10-01

    We describe the hardware, gateware, and software developed at Raytheon BBN Technologies for dynamic quantum information processing experiments on superconducting qubits. In dynamic experiments, real-time qubit state information is fed back or fed forward within a fraction of the qubits' coherence time to dynamically change the implemented sequence. The hardware presented here covers both control and readout of superconducting qubits. For readout, we created a custom signal processing gateware and software stack on commercial hardware to convert pulses in a heterodyne receiver into qubit state assignments with minimal latency, alongside data taking capability. For control, we developed custom hardware with gateware and software for pulse sequencing and steering information distribution that is capable of arbitrary control flow in a fraction of superconducting qubit coherence times. Both readout and control platforms make extensive use of field programmable gate arrays to enable tailored qubit control systems in a reconfigurable fabric suitable for iterative development.

  6. Hardware for dynamic quantum computing

    Science.gov (United States)

    Ryan, Colm A.; Johnson, Blake R.; Ristè, Diego; Donovan, Brian; Ohki, Thomas A.

    2017-10-01

    We describe the hardware, gateware, and software developed at Raytheon BBN Technologies for dynamic quantum information processing experiments on superconducting qubits. In dynamic experiments, real-time qubit state information is fed back or fed forward within a fraction of the qubits' coherence time to dynamically change the implemented sequence. The hardware presented here covers both control and readout of superconducting qubits. For readout, we created a custom signal processing gateware and software stack on commercial hardware to convert pulses in a heterodyne receiver into qubit state assignments with minimal latency, alongside data taking capability. For control, we developed custom hardware with gateware and software for pulse sequencing and steering information distribution that is capable of arbitrary control flow in a fraction of superconducting qubit coherence times. Both readout and control platforms make extensive use of field programmable gate arrays to enable tailored qubit control systems in a reconfigurable fabric suitable for iterative development.

  7. NDAS Hardware Translation Layer Development

    Science.gov (United States)

    Nazaretian, Ryan N.; Holladay, Wendy T.

    2011-01-01

    The NASA Data Acquisition System (NDAS) project is aimed to replace all DAS software for NASA s Rocket Testing Facilities. There must be a software-hardware translation layer so the software can properly talk to the hardware. Since the hardware from each test stand varies, drivers for each stand have to be made. These drivers will act more like plugins for the software. If the software is being used in E3, then the software should point to the E3 driver package. If the software is being used at B2, then the software should point to the B2 driver package. The driver packages should also be filled with hardware drivers that are universal to the DAS system. For example, since A1, A2, and B2 all use the Preston 8300AU signal conditioners, then the driver for those three stands should be the same and updated collectively.

  8. Design and construction of the tensioned ties for UX15 cavern vault

    CERN Document Server

    Parkin, R J H

    2002-01-01

    Due to the programme constraints for the UX15 cavern set by CERN, it has been necessary to complete the concrete lining of the vault prior to the excavation of the bench. The vault lining is therefore being temporarily suspended from a number of pre-tensioned high capacity multi-strand tensioned ties. During excavation of the bench, additional loads will be imposed onto the vault lining due to ground displacements. In order to minimise the number of ties, the previously completed linings of the PX14 and PX16 access shafts will be used to support some of the load. Three-dimensional modelling has been undertaken to design the structures and determine the expected behaviour of this complex support system. Geotechnical instrumentation has been installed in the concrete linings and the ground to monitor loads and displacements during construction. After the cavern walls have been completed, the ties will be released.

  9. Influence of the moment exerted by the athlete on the pole in pole-vaulting performance.

    Science.gov (United States)

    Morlier, Julien; Mesnard, Michel

    2007-01-01

    Current studies on pole-vaulting focus mostly on energy transfer data [Ekevad, M., Lundberg, B., 1995. Simulation of "smart" pole vaulting. Journal of Biomechanics 28, 1079-1090; Ekevad, M., Lundberg, B., 1997. Influence of pole length and stiffness on the energy conversion in pole-vaulting. Journal of Biomechanics, 30, 259-264; Linthorne, N.P., 2000. Energy loss in the pole vault take-off and the advantage of the flexible pole. Sports Engineering 3, 205-218; Schade, F., Arampatzis, A., Bruggemann, G.P., 2006. Reproducibility of energy parameters in the pole vault. Journal of Biomechanics 39, 146-147.] and often fail to take into account the actions exerted on the pole [Arampatzis, Schade, Bruggemann, 2004. Effect of the pole-human body interaction on pole-vaulting performance. Journal of Biomechanics 37, 1353-1360]. The present study integrates the 3D kinematics data of the athlete but also the actions measured at the end of the pole in the planting box and on the track during the last stride before take-off. It proposes a mechanical model allowing determination of the pole-vaulter's actions on the pole. The model is based on a global mechanical approach. The pole-vaulter's action on his upper and lower hand is concentrated on one middle point to solve the dynamics problem. The model was applied to seven experienced pole-vaulters. The force and the moment exerted on the pole by the pole-vaulter during the last stride before take off and during jump stage, were calculated. This analysis of the compressive force and bending moment for seven pole-vaulters helps to highlight the impact of the moment in the performance. The conclusion is confirmed by an additional comparative study carried out on two pole-vaulters, with comparable morphologies and performing with the same pole.

  10. Is palatal vault height a determinant for nasopharyngeal carcinoma: A hypothesis?

    Science.gov (United States)

    Das, Sayan; Gupta, Tejpal; Dholam, Kanchan; Chouksey, Gunjan; Ghosh Laskar, Sarbani; Prakash Agarwal, Jai

    2015-11-01

    Although environmental and genetic factors are known for nasopharyngeal carcinoma, the present study is an attempt to provide a hypothesis behind the development of NPC with regards to the anatomical factor, the hypothesis being that patients with a deeper palatal vault tend to have a higher risk of developing nasopharyngeal cancers. The objective of this study was to find out the palatal vault height in patients with nasopharyngeal carcinoma and compare it with the palatal vault height in patients with oral carcinomas. The heights of the palatal vault of 20 consecutive patients with nasopharyngeal carcinoma and 20 patients with carcinoma of the oral cavity (except hard palate) as control were recorded. In addition, in patients with carcinoma of the nasopharynx the height of the palate on the CT scans was measured and correlation between these recordings were calculated. The palatal heights of the nasopharyngeal and oral cancer cohorts were compared using independent sample T test. A strong correlation was observed in the nasopharyngeal cancer cohort between the palatal height measured manually and the radiologically measured height on the CT scans (Pearson Correlation Coefficient - 0.633; p=0.003). The difference in the mean heights of the nasopharyngeal and oral cancer cohorts was statistically significant (p<0.001). Nasopharyngeal cancer patients tend to have a higher palatal vault height compared to those with carcinoma of oral cavity other than hard palate. In such palates with a deep vault, there is increased turbulent air flow leading to increased deposition of air-borne virus/carcinogens. Lingering of these agents may ultimately cause carcinoma of the nasopharynx. Copyright © 2015 Elsevier Ltd. All rights reserved.

  11. GOTHIC CHURCHES IN PARIS ST GERVAIS ET ST PROTAIS IMAGE MATCHING 3D RECONSTRUCTION TO UNDERSTAND THE VAULTS SYSTEM GEOMETRY

    Directory of Open Access Journals (Sweden)

    M. Capone

    2015-02-01

    benefits and the troubles. From a methodological point of view this is our workflow: - theoretical study about geometrical configuration of rib vault systems; - 3D model based on theoretical hypothesis about geometric definition of the vaults' form; - 3D model based on image matching 3D reconstruction methods; - comparison between 3D theoretical model and 3D model based on image matching;

  12. Radioactive air emissions notice of construction use of a portable exhauster at 244-AR vault. Revision 2

    Energy Technology Data Exchange (ETDEWEB)

    Carrell, D.J.

    1997-12-17

    This document serves as a notice of construction (NOC), pursuant to the requirements of Washington Administrative Code (WAC) 246-247-060, and as a request for approval to construct, pursuant to 40 Code of Federal Regulations (CFR) 61.96, a portable exhauster at the 244-AR Vault. The exhauster would be used during air jetting of accumulated liquids from the cell sumps into the tanks and to make transfers among the tanks within the vault when needed. The 244-AR Vault is considered to be a double-contained receiver tank (OCRT) based on its functional characteristics, although it is not listed as one of the five designated DCRTs in the 200 Area Tank Farm systems. Process operations at the vault have been inactive since 1978 and the vault`s two stacks have not operated since 1993. Since cessation of vault operations an extremely large amount of rain water and snow melt have accumulated in the cell sumps. The water level in the sumps is substantially above their respective operating levels and there is concern for leakage to the environment through containment failure due to corrosion from backed-up sump liquid. Active ventilation is required to provide contamination control during air jetting operations within the vault. It has been determined that it would not be cost effective to repair the existing exhaust systems to an operational condition; thus, a portable exhauster will be used to support the intermittent operations.

  13. Cranial vault trauma and selective mortality in medieval to early modern Denmark

    DEFF Research Database (Denmark)

    Boldsen, Jesper L; Milner, George R; Weise, Svenja

    2015-01-01

    To date, no estimates of the long-term effect of cranial vault fractures on the risk of dying have been generated from historical or prehistoric skeletons. Excess mortality provides a perspective on the efficacy of modern treatment, as well as the human cost of cranial injuries largely related...... to interpersonal violence in past populations. Three medieval to early modern Danish skeletal samples are used to estimate the effect of selective mortality on males with cranial vault injuries who survived long enough for bones to heal. The risk of dying for these men was 6.2 times higher than...

  14. Raspberry Pi hardware projects 1

    CERN Document Server

    Robinson, Andrew

    2013-01-01

    Learn how to take full advantage of all of Raspberry Pi's amazing features and functions-and have a blast doing it! Congratulations on becoming a proud owner of a Raspberry Pi, the credit-card-sized computer! If you're ready to dive in and start finding out what this amazing little gizmo is really capable of, this ebook is for you. Taken from the forthcoming Raspberry Pi Projects, Raspberry Pi Hardware Projects 1 contains three cool hardware projects that let you have fun with the Raspberry Pi while developing your Raspberry Pi skills. The authors - PiFace inventor, Andrew Robinson and Rasp

  15. Hardware emulation of Memristor based Ternary Content Addressable Memory

    KAUST Repository

    Bahloul, Mohamed A.

    2017-12-13

    MTCAM (Memristor Ternary Content Addressable Memory) is a special purpose storage medium in which data could be retrieved based on the stored content. Using Memristors as the main storage element provides the potential of achieving higher density and more efficient solutions than conventional methods. A key missing item in the validation of such approaches is the wide spread availability of hardware emulation platforms that can provide reliable and repeatable performance statistics. In this paper, we present a hardware MTCAM emulation based on 2-Transistors-2Memristors (2T2M) bit-cell. It builds on a bipolar memristor model with storing and fetching capabilities based on the actual current-voltage behaviour. The proposed design offers a flexible verification environment with quick design revisions, high execution speeds and powerful debugging techniques. The proposed design is modeled using VHDL and prototyped on Xilinx Virtex® FPGA.

  16. 16 CFR 1508.6 - Hardware.

    Science.gov (United States)

    2010-01-01

    ... 16 Commercial Practices 2 2010-01-01 2010-01-01 false Hardware. 1508.6 Section 1508.6 Commercial... FULL-SIZE BABY CRIBS § 1508.6 Hardware. (a) A crib shall be designed and constructed in a manner that eliminates from any hardware accessible to a child within the crib the possibility of the hardware's...

  17. Siim Nestor soovitab : Stereo ÖÖ. Mutant Disco. Beats from the Vault. Turbodisko / Siim Nestor

    Index Scriptorium Estoniae

    Nestor, Siim, 1974-

    2006-01-01

    Oma debüütalbumit "Migration" tutvustav ameerika diskor Alex Attias üritustel "Stereo ÖÖ" 19. mail Tallinnas Von Krahlis. Üritustest "Mutant Disco" 19. mail Tallinnas klubis Privé ja Tartus 20. mail klubis Illusion, "Beats from the Vault" 19. mail Tallinnas klubis Võit ja "Turbodisko" 20. mail Tallinnas klubis KuKu

  18. Cracking the Vault: Generation and analysis of a MVP knockout mouse model

    NARCIS (Netherlands)

    M.H. Mossink (Marieke)

    2003-01-01

    markdownabstract__Abstract__ In 1986 a novel, large-sized ribonucleoprotein complex was first described. The barrel-shaped structures were initially detected in preparations of clathrin-coated vesicles from rat liver and because they showed a morphology that resembled the vaulted ceilings in

  19. The influence of the vaulting table on the handspring front somersault.

    Science.gov (United States)

    Irwin, Gareth; Kerwin, David G

    2009-06-01

    The traditional "horse" was replaced by a new vaulting "table" in artistic gymnastics competitions in 2001. The aim of this study was to determine whether the table led to a change in vaulting technique. This was achieved by comparing three-dimensional video-based analyses (50Hz) of selected biomechanical discrete and continuous variables across four elite male gymnasts performing a series of handspring front somersault vaults on the traditional horse and the new table. Individual joint and inter-segment coupling (continuous relative phase) were used to quantify techniques used on the two apparatuses. Differences were attributed in part to the design and construction of the new table. No differences were observed for the approach and take-off from the board. Significant differences in hip flexion at board take-off and strike angle on the table were observed. One of the effects of the latter was an increase in vertical take-off velocity compared with the horse. Individual strategies were observed in hip and shoulder coordination patterns that were obscured when group data were considered. Close monitoring of the evolution of skill on this new apparatus is paramount for gymnastics coaching, and further studies of current elite competitive vaulting techniques are required.

  20. Effect of Plyometric Training on Handspring Vault Performance and Functional Power in Youth Female Gymnasts.

    Science.gov (United States)

    Hall, Emma; Bishop, Daniel C; Gee, Thomas I

    2016-01-01

    This study aimed to determine the effect of plyometric training (PT) when added to habitual gymnastic training (HT) on handspring vault (HV) performance variables. Twenty youth female competitive gymnasts (Age: 12.5 ± 1.67 y) volunteered to participate and were randomly assigned to two independent groups. The experimental plyometric training group (PTG) undertook a six-week plyometric program, involving two additional 45 min PT sessions a week, alongside their HT, while the control group (CG) performed regular HT only. Videography was used (120 Hz) in the sagittal plane to record both groups performing three HVs for both the baseline and post-intervention trials. Furthermore, participants completed a countermovement jump test (CMJ) to assess the effect of PT on functional power. Through the use of Quintic biomechanics software, significant improvements (P vault for the PTG. The CG demonstrated no improvement for all HV measures. A sport-specific PT intervention improved handspring vault performance measures and functional power when added to the habitual training of youth female gymnasts. The additional two hours plyometric training seemingly improved the power generating capacity of movement-specific musculature, which consequently improved aspects of vaulting performance. Future research is required to examine the whether the improvements are as a consequence of the additional volume of sprinting and jumping activities, as a result of the specific PT method or a combination of these factors.

  1. Reliability and variability of day-to-day vault training measures in artistic gymnastics.

    Science.gov (United States)

    Bradshaw, Elizabeth; Hume, Patria; Calton, Mark; Aisbett, Brad

    2010-06-01

    Inter-day training reliability and variability in artistic gymnastics vaulting was determined using a customised infra-red timing gate and contact mat timing system. Thirteen Australian high performance gymnasts (eight males and five females) aged 11-23 years were assessed during two consecutive days of normal training. Each gymnast completed a number of vault repetitions per daily session. Inter-day variability of vault run-up velocities (at -18 to -12 m, -12 to -6 m, -6 to -2 m, and -2 to 0 m from the nearest edge of the beat board), and board contact, pre-flight, and table contact times were determined using mixed modelling statistics to account for random (within-subject variability) and fixed effects (gender, number of subjects, number of trials). The difference in the mean (Mdiff) and Cohen's effect sizes for reliability assessment and intra-class correlation coefficients, and the coefficient of variation percentage (CV%) were calculated for variability assessment. Approach velocity (-18 to -2m, CV = 2.4-7.8%) and board contact time (CV = 3.5%) were less variable measures when accounting for day-to-day performance differences, than pre-flight time (CV = 17.7%) and table contact time (CV = 20.5%). While pre-flight and table contact times are relevant training measures, approach velocity and board contact time are more reliable when quantifying vaulting performance.

  2. The roche vault performed by elite gymnasts: somersaulting technique, deterministic model, and judges' scores.

    Science.gov (United States)

    Takei, Yoshiaki

    2007-02-01

    The purpose of the study was to determine the mechanical variables that are related to successful post-flight somersaulting performance of the Roche vault. The 23 Roche vaults performed during the 2000 Olympic Games were filmed by a 16-mm camera operating at 100 Hz. The 2-D direct linear transformation technique was used for spatial calibration. Approximately 60 frames were digitized per vault. The method of Hay and Reid (1988) was used to develop a deterministic model to identify the mechanical variables that govern linear and angular motions of the vault. Correlational analysis was used to establish the strength of the relationship between the mechanical variables identified and the judges' scores. Significant correlations indicated that the higher judges' scores were negatively related to five mechanical variables and positively related to seventeen variables in the model. The normalized horizontal displacement of body center of mass (CM) from the knee grasp to the peak of post-flight was the best single predictor of the judges' score and accounted for 50% of variation in the judges' score. Finally, the landing point deductions and the official horizontal distance of post-flight collectively accounted for 86% of the variance in the judges' scores.

  3. Cranial vault reconstruction using computer-designed polyetheretherketone (PEEK) implant: case report.

    Science.gov (United States)

    Chacón-Moya, Erika; Gallegos-Hernández, José Francisco; Piña-Cabrales, Sandra; Cohn-Zurita, Fabricio; Goné-Fernández, Alberto

    2009-01-01

    Reconstruction of the bones of the skull is a complex procedure and represents a challenge for the surgical team. It is generally performed in patients who have loss of the cranial vault secondary to chronic infection or uncontrolled osteoradionecrosis, indicating a greater chance of failure or rejection of the materials used for repair of the defect. Selection of material to replace the cranial vault is complex due to the diversity of existing products. The ideal material is inert, lightweight, easy to fit and adaptable to the defect, offering the best aesthetic and functional results. Computer design of the implant makes this process easier by providing an implant specific to each individual patient and defect. We report the case of a patient who was diagnosed with esthesioneuroblastoma and was treated with anterior craniofacial resection and radiotherapy. Osteomyelitis and osteoradionecrosis were consequent complications with loss of the cranial vault in the frontal region. The defect was reconstructed with a polyetheretherketone (PEEK) computer-designed implant based on the defect evaluated by computed tomography. Results obtained are shown below. The PEEK computer-designed implant is a safe and easy to use alternative with great adaptability to cranial vault defects.

  4. Grout to meet physical and chemical requirements for closure at Hanford grout vaults. Final report

    Energy Technology Data Exchange (ETDEWEB)

    1994-07-21

    The US Army Engineer Waterways Experiment Station (WES) developed a grout based on portland cement, Class F fly ash, and bentonite clay, for the Hanford Grout Vault Program. The purpose of this grout was to fill the void between a wasteform containing 106-AN waste and the vault cover blocks. Following a successful grout development program, heat output, volume change, and compressive strength were monitored with time in simulated repository conditions and in full-depth physical models. This research indicated that the cold-cap grout could achieve and maintain adequate volume stability and other required physical properties in the internal environment of a sealed vault. To determine if contact with 106-AN liquid waste would cause chemical deterioration of the cold-cap grout, cured specimens were immersed in simulated waste. Over a period of 21 days at 150 F, specimens increased in mass without significant changes in volume. X-ray diffraction of reacted specimens revealed crystallization of sodium aluminum silicate hydrate. Scanning electron microscopy used with X-ray fluorescence showed that clusters if this phase had formed in grout pores, increasing grout density and decreasing its effective porosity. Physical and chemical tests collectively indicate a sealing component. However, the Hanford Grout Vault Program was cancelled before completion of this research. This report summarizes close-out Waterways Experiment Station when the Program was cancelled.

  5. Paleogeomorphological method of the oil trap searches (with special reference to the Tatar vault)

    Energy Technology Data Exchange (ETDEWEB)

    Aikhutdinov, R.S.; Melnikov, S.N.

    1978-01-01

    At the slopes of the Tatar vault facing the Kama--Kinel trough system the buried Tournaisian surface is dissected mainly by karst forms. The erosion-karstic depressions controlled sedimentation and formation of various oil traps in the Lower Carboniferous rocks. The study results are the basis for improved methods of oil searches.

  6. Disposal Analysis of I-129 Bearing Waste Streams at the Intermediate Level Vault

    Energy Technology Data Exchange (ETDEWEB)

    Collard, L.B.

    2001-01-25

    This report examines the effects of new waste-specific sorption characteristics reported for I-129 bearing wastes on inventory limits in the Intermediate Level Vault (ILV). Inventory limits are described based on the revised performance assessment model using the waste-specific Kd's. Results are compared with inventory projections of waste streams for the next ten years.

  7. Laparoscopic Management of Vaginal Vault Prolapse Recurring after Pelvic Organ Prolapse Surgery.

    Science.gov (United States)

    Mearini, Luigi; Nunzi, Elisabetta; Di Biase, Manuel; Costantini, Elisabetta

    2016-01-01

    Despite the increasing success of surgery for pelvic organ prolapse, recurrent vaginal vault prolapse is not rare. We present a step-by-step laparoscopic approach with a sacral colpopexy (SC) for treatment of recurrent vault prolapse. From 2006, 25 women presenting with symptomatic recurrent vault prolapse were prospectively evaluated and treated with laparoscopic SC. This article briefly describes all of the steps that are required to conduct a proper surgery in such cases. After previous abdominal sacropexy, both the dissection of adherences and restoration of normal pelvic anatomy were challenging. As result, the overall operating time was longer in patients who had undergone abdominal sacropexy vs. vaginal route, p = 0.032. No significant peri- or postoperative complications were observed. At a mean follow-up of 41 months, all women presented with less than stage 2 prolapse and high levels of satisfaction. Despite the need for an intraoperative step-by-step surgical safety checklist, the laparoscopic repair of recurrent vault prolapse is technically feasible, safe and effective. © 2016 S. Karger AG, Basel.

  8. Catalytic asymmetric aza-Darzens reaction with a vaulted biphenanthrol magnesium phosphate salt.

    Science.gov (United States)

    Larson, Shawn E; Li, Guilong; Rowland, Gerald B; Junge, Denise; Huang, Rongcai; Woodcock, H Lee; Antilla, Jon C

    2011-05-06

    Conditions for a catalytic asymmetric aza-Darzens aziridine synthesis mediated by a vaulted biphenanthrol (VAPOL) magnesium phosphate salt is described. Using simple substrates, this methodology explores the scope and reactivity of a new magnesium catalyst for an aziridination reaction capable of building chirality and complexity simultaneously.

  9. Long-term quality-of-life outcome after mesh sacrocolpopexy for vaginal vault prolapse.

    LENUS (Irish Health Repository)

    Thomas, Arun Z

    2009-12-01

    To evaluate the long-term outcome of mesh sacrocolpopexy (MSC, which aims to restore normal pelvic floor anatomy to alleviate prolapse related symptoms) and its effect on patient\\'s quality of life, as women with vaginal vault prolapse commonly have various pelvic floor symptoms that can affect urinary, rectal and sexual function.

  10. The major vault protein is related to the toxic anion resistance protein (TelA) family.

    Science.gov (United States)

    Suprenant, Kathy A; Bloom, Nathan; Fang, Jianwen; Lushington, Gerald

    2007-03-01

    Vaults are barrel-shaped ribonucleoprotein particles that are abundant in certain tumors and multidrug resistant cancer cells. Prokaryotic relatives of the major vault protein, MVP, have not been identified. We used sequence analysis and molecular modeling to show that MVP and the toxic anion resistance protein, TelA of Rhodobacter sphaeroides strain 2.4.1, share a novel fold that consists of a three-stranded antiparallel beta-sheet. Because of this strong structural correspondence, we examined whether mammalian cell vaults respond to tellurite treatment. In the presence of the oxyanion tellurite, large vault aggregates, or vaultosomes, appear at the cell periphery in 15 min or less. Vaultosome formation is temperature-dependent, reversible, and occurs in normal human umbilical vein endothelial cells as well as transformed HeLa cervical cancer cells. Vaultosome formation is not restricted to tellurite and occurs in the presence of other toxic oxyanions (selenate, selinite, arsenate, arsenite, vanadate). In addition, vaultosomes form independently from other stress-induced ribonucleoprotein complexes, stress granules and aggresomes. Vaultosome formation is therefore a unique cellular response to an environmental toxin.

  11. Factors influencing performance in the Hecht vault and implications for modelling.

    Science.gov (United States)

    King, Mark A; Yeadon, Maurice R

    2005-01-01

    This paper investigated the factors that influence Hecht vault performance and assessed the level of model complexity required to give an adequate representation of vaulting. A five-segment planar simulation model with a visco-elastic shoulder joint and a torque generator at the shoulder joint was used to simulate the contact phase in vaulting. The model was customized to an elite gymnast by determining subject-specific segmental inertia and joint torque parameters. The simulation model was matched to a performance of the Hecht vault by varying the visco-elastic characteristics of the shoulders and the arm-horse interface and the activation time history of the shoulder torque generator until the best match was found. Perturbing the matching simulation demonstrated that appropriate initial kinematics are necessary for a successful performance. Fixing the hip and knee angles at their initial values had a small effect with 3 degrees less rotation. Applying shoulder torque during the contact phase also had a small effect with only a 7 degrees range in landing angles. Excluding the hand segment from the model was found to have a moderate effect with 15 degrees less rotation and the time of contact reduced by 38%. Removing shoulder elasticity resulted in 50 degrees less rotation. The use of a five-segment simulation model confirmed that the use of shoulder torque plays a minor role in vaulting performance and that having appropriate initial kinematics at touchdown is essential. However, factors such as shoulder elasticity and the hands which have previously been ignored also have a substantial influence on performance.

  12. [Abdominal sacrocolpopexy in surgical treatment of complete vaginal vault prolapse after hysterectomy].

    Science.gov (United States)

    Durdević, Srdan; Vejnović, Tihomir; Curcić, Aleksandar; Mladenović-Segedi, Ljiljana; Maksimović, Marko

    2008-01-01

    The vaginal vault prolapse after hysterectomy is a complex disorder, which can be associated with the prolapse of anterior or posterior vaginal wall or cystorectocele. The exact incidence is unknown, and is within the range from 1 - 43% of operated patients. In order to achieve the complete surgical reconstruction of the pelvic floor disorder, a surgeon must have good knowledge of normal anatomic relations of pelvic organs. Twenty-nine women with the vaginal vault prolapse after hysterectomy were operated at Clinic for Gynecology and Obstetrics in Novi Sad during the period fiom 1995 - 2007. After standard preoperative procedures, positioning of the patient and inferior medial abdominal incision, the supportive graft made of non-resorptive materials was fixed to the vaginal fornix and sacral periost from the promontory to the level of S 3-4 vertebrae. The average age of the patients was 61.4 years. The following supportive materials were used: mersilen mesh (16), allograft made of m. rectus abdominis fascia (5), prolen (4), fascia lata strip (2) and common Silk sutures (2). Additional operations (Moschowitz Douglasoraphy, Kelly-Marion anterior vaginal repair, colpoperineoplasty and Burchcolposuspension) were performed in 20 (68.9%) patients. There were 7 (23.8%) postoperative complications. The erosion of mersilen mesh was detected in 2 (6.8%) patients, and recurrence of vaginal vault prolaps and cystorectocele in 3 (10.2%) patients. According to other authors, the erosion of synthetic materials occurs in about 3.4%, and recurrence of vaginal vault prolaps in 0-22% of operated patients. The complete vaginal vault prolaps after hysterectomy is a complex anatomic disorder which has a great impact on the life quality and significantly disturbs patient s psychosocial sphere. Surgical treatment involves abdominal or vaginal access and is planned individually for each patient.

  13. Anthropometric and biomechanical field measures of floor and vault ability in 8 to 14 year old talent-selected gymnasts.

    Science.gov (United States)

    Bradshaw, Elizabeth J; Le Rossignol, Peter

    2004-07-01

    The aim of this study was to identify the anthropometric and physical prerequisites for high difficulty floor tumbling and vaulting. Twenty 8-14 year old female talent-selected gymnasts performed handstand push-offs, and single and multiple jumps on a portable Kistler force plate. The force curves were analysed using Kistler and Excel software to obtain peak displacement, peak take-off force, and power The gymnasts were also assessed for sprinting, with and without vaulting, and standing broad jump performances. Video footage from the vault take-off was analysed using Video Expert II software to obtain the horizontal and vertical take-off velocities. Each gymnast's best vault starting score, three best floor tumbling skills, and anthropometric characteristics were recorded. Statistical analysis included one-way analysis of variance (ANOVA) to examine the effect of age (8-10 years, 11-12 years, 13-14 years) on the performance measures and linear regression analysis with performance start score for vault or best floor tumbling score as the outcome variable. The best regression model for indicating vaulting talent had, as predictor variables, resultant velocity at take-off from the board, squat jump power, and average power during the last five jumps in the continuous bent-leg jump series. The best regression model for indicating floor tumbling ability had, as predictor variables, age, vault running velocity, and reduced ground contact time in a handstand push-off.

  14. Structural repairs to fire-damaged Guastavino tile vaults at Grand Central Terminal’s Oyster Bar

    Directory of Open Access Journals (Sweden)

    Robert Silman

    2007-12-01

    Full Text Available The fireproof character of Guastavino vaults, one of the major characteristics of their structure, has been demonstrated on several occasions over the past hundred and twenty years. The firm of Robert Silman Associates has verified the versatility and solidity of these vaults in several restoration works. This article deals with the fire that broke out on 29th June 1997 in the Oyster Bar at Grand Central Station, which did not impair the structural integrity of the Guastavino vaults so that only cosmetic repairs to the lowest layer of tiles were required.

  15. NeuroVault.org: A web-based repository for collecting and sharing unthresholded statistical maps of the human brain

    Directory of Open Access Journals (Sweden)

    Krzysztof Jacek Gorgolewski

    2015-04-01

    Full Text Available Here we present NeuroVault — a web based repository that allows researchers to store, share, visualize, and decode statistical maps of the human brain. NeuroVault is easy to use and employs modern web technologies to provide informative visualization of data without the need to install additional software. In addition, it leverages the power of the Neurosynth database to provide cognitive decoding of deposited maps. The data are exposed through a public REST API enabling other services and tools to take advantage of it. NeuroVault is a new resource for researchers interested in conducting meta- and coactivation analyses.

  16. Artificial Neural Network with Hardware Training and Hardware Refresh

    Science.gov (United States)

    Duong, Tuan A. (Inventor)

    2003-01-01

    A neural network circuit is provided having a plurality of circuits capable of charge storage. Also provided is a plurality of circuits each coupled to at least one of the plurality of charge storage circuits and constructed to generate an output in accordance with a neuron transfer function. Each of a plurality of circuits is coupled to one of the plurality of neuron transfer function circuits and constructed to generate a derivative of the output. A weight update circuit updates the charge storage circuits based upon output from the plurality of transfer function circuits and output from the plurality of derivative circuits. In preferred embodiments, separate training and validation networks share the same set of charge storage circuits and may operate concurrently. The validation network has a separate transfer function circuits each being coupled to the charge storage circuits so as to replicate the training network s coupling of the plurality of charge storage to the plurality of transfer function circuits. The plurality of transfer function circuits may be constructed each having a transconductance amplifier providing differential currents combined to provide an output in accordance with a transfer function. The derivative circuits may have a circuit constructed to generate a biased differential currents combined so as to provide the derivative of the transfer function.

  17. Hardware-Accelerated Simulated Radiography

    Energy Technology Data Exchange (ETDEWEB)

    Laney, D; Callahan, S; Max, N; Silva, C; Langer, S; Frank, R

    2005-08-04

    We present the application of hardware accelerated volume rendering algorithms to the simulation of radiographs as an aid to scientists designing experiments, validating simulation codes, and understanding experimental data. The techniques presented take advantage of 32-bit floating point texture capabilities to obtain solutions to the radiative transport equation for X-rays. The hardware accelerated solutions are accurate enough to enable scientists to explore the experimental design space with greater efficiency than the methods currently in use. An unsorted hexahedron projection algorithm is presented for curvilinear hexahedral meshes that produces simulated radiographs in the absorption-only regime. A sorted tetrahedral projection algorithm is presented that simulates radiographs of emissive materials. We apply the tetrahedral projection algorithm to the simulation of experimental diagnostics for inertial confinement fusion experiments on a laser at the University of Rochester.

  18. The principles of computer hardware

    CERN Document Server

    Clements, Alan

    2000-01-01

    Principles of Computer Hardware, now in its third edition, provides a first course in computer architecture or computer organization for undergraduates. The book covers the core topics of such a course, including Boolean algebra and logic design; number bases and binary arithmetic; the CPU; assembly language; memory systems; and input/output methods and devices. It then goes on to cover the related topics of computer peripherals such as printers; the hardware aspects of the operating system; and data communications, and hence provides a broader overview of the subject. Its readable, tutorial-based approach makes it an accessible introduction to the subject. The book has extensive in-depth coverage of two microprocessors, one of which (the 68000) is widely used in education. All chapters in the new edition have been updated. Major updates include: powerful software simulations of digital systems to accompany the chapters on digital design; a tutorial-based introduction to assembly language, including many exam...

  19. Scan image compression-encryption hardware system

    Science.gov (United States)

    Bourbakis, Nikolaos G.; Brause, R.; Alexopoulos, C.

    1995-04-01

    This paper deals with the hardware design of an image compression/encryption scheme called SCAN. The scheme is based on the principles and ideas reflected by the specification of the SCAN language. SCAN is a fractal based context-free language which accesses sequentially the data of a 2D array, by describing and generating a wide range (near (nxn)) of space filling curves (or SCAN patterns) from a short set of simple ones. The SCAN method uses the algorithmic description of each 2D image as SCAN patterns combinations for the compression and encryption of the image data. Note that each SCAN letter or word accesses the image data with a different order (or sequence), thus the application of a variety of SCAN words associated with the compression scheme will produce various compressed versions of the same image. The compressed versions are compared in memory size and the best of them with the smallest size in bits could be used for the image compression/encryption. Note that the encryption of the image data is a result of the great number of possible space filling curves which could be generated by SCAN. Since the software implementation of the SCAN compression/encryption scheme requires some time, the hardware design and implementation of the SCAN scheme is necessary in order to reduce the image compression/encryption time to the real-time one. The development of such an image compression encryption system will have a significant impact on the transmission and storage of images. It will be applicable in multimedia and transmission of images through communication lines.

  20. Adding EUNIS and VAULT rocket data to the VSO with Modern Perl frameworks

    Science.gov (United States)

    Mansky, Edmund

    2017-08-01

    A new Perl code is described, that uses the modern Object-oriented Moose framework, to add EUNIS and VAULT rocket data to the Virtual Solar Observatory website. The code permits the easy fixing of FITS header fields in the case where some FITS fields that are required are missing from the original data files. The code makes novel use of the Moose extensions “before” and “after” to build in dependencies so that database creation of tables occurs before the loading of data, and that the validation of file-dependent tables occurs after the loading is completed. Also described is the computation and loading of the deferred FITS field CHECKSUM into the database following the loading and validation of the file-dependent tables. The loading of the EUNIS 2006 and 2007 flight data, and the VAULT 2.0 flight data is described in detail as illustrative examples.

  1. Giant osteoma of the skull vault: A rare case of mixed variety

    Directory of Open Access Journals (Sweden)

    Harisha P.N.

    2016-12-01

    Full Text Available Osteoma is the most common primary bone tumor in the craniofacial skeleton. However, most of these are small, asymptomatic and arise from the facial bones or in relation to the paranasal sinuses. Cranial vault osteomas, that too giant and symptomatic are much rarer. We report a case of sixty year-old gentleman presented with a very slowly increasing, painless, hard swelling on the left side of his head. Computerized tomography scan showed the left parietal calvarial tumor to be having large exostotic and enostotic components. He underwent an en-bloc excision of the tumor and cranioplasty. Giant, symptomatic cranial vault osteoma with concurrent exostotic and enostotic components is extremely rare. These lesions can be safely and completely excised with careful planning and attention to detail.

  2. Vaginal vault recurrences of endometrial cancer in non-irradiated patients

    DEFF Research Database (Denmark)

    Hardarson, Hordur Alexander; Nyhøj Heidemann, Lene; Christensen, René dePont

    2015-01-01

    cancer limited to the vaginal vault. METHODS: Patients treated for recurrent endometrial cancer at Odense University Hospital, Denmark between 2003 and 2012 were identified, n = 118. Thirty-three patients had an isolated vaginal vault recurrence and were treated with either RT, ST or both. Re.......2-48%) and 0% (ST) (95 CI 0-60%). Two-year survival rates were 83% (RT) (95 CI 71-100%) and 100% (ST) (95 CI 40-100%) ST had one re-recurrence at 2.3 years. CONCLUSION: This study indicates that ST is an appropriate treatment for locally recurrent endometrial cancer. Our study involves a limited number......BACKGROUND: The treatment of locally recurrent endometrial cancer is based on limited evidence. The standard treatment is radiotherapy (RT) which is effective for local control and the effect has been documented in prospective studies. Investigations of surgical treatment (ST) of recurrences...

  3. Development of a New Cryptographic Construct Using Palmprint-Based Fuzzy Vault

    Science.gov (United States)

    Kumar, Amioy; Kumar, Ajay

    2009-12-01

    The combination of cryptology and biometrics has emerged as promising component of information security. Despite the current popularity of palmprint biometric, there has not been any attempt to investigate its usage for the fuzzy vault. This paper therefore investigates the possible usage of palmprint in fuzzy vault to develop a user friendly and reliable crypto system. We suggest the use of both symmetric and asymmetric approach for the encryption. The ciphertext of any document is generated by symmetric cryptosystem; the symmetric key is then encrypted by asymmetric approach. Further, Reed and Solomon codes are used on the generated asymmetric key to provide some error tolerance while decryption. The experimental results from the proposed approach on the palmprint images suggest its possible usage in an automated palmprint-based key generation system.

  4. Development of a New Cryptographic Construct Using Palmprint-Based Fuzzy Vault

    Directory of Open Access Journals (Sweden)

    Amioy Kumar

    2009-01-01

    Full Text Available The combination of cryptology and biometrics has emerged as promising component of information security. Despite the current popularity of palmprint biometric, there has not been any attempt to investigate its usage for the fuzzy vault. This paper therefore investigates the possible usage of palmprint in fuzzy vault to develop a user friendly and reliable crypto system. We suggest the use of both symmetric and asymmetric approach for the encryption. The ciphertext of any document is generated by symmetric cryptosystem; the symmetric key is then encrypted by asymmetric approach. Further, Reed and Solomon codes are used on the generated asymmetric key to provide some error tolerance while decryption. The experimental results from the proposed approach on the palmprint images suggest its possible usage in an automated palmprint-based key generation system.

  5. Hardware and software reliability estimation using simulations

    Science.gov (United States)

    Swern, Frederic L.

    1994-01-01

    The simulation technique is used to explore the validation of both hardware and software. It was concluded that simulation is a viable means for validating both hardware and software and associating a reliability number with each. This is useful in determining the overall probability of system failure of an embedded processor unit, and improving both the code and the hardware where necessary to meet reliability requirements. The methodologies were proved using some simple programs, and simple hardware models.

  6. Radiological performance assessment for the E-Area Vaults Disposal Facility. Appendices A through M

    Energy Technology Data Exchange (ETDEWEB)

    Cook, J.R.

    1994-04-15

    These document contains appendices A-M for the performance assessment. They are A: details of models and assumptions, B: computer codes, C: data tabulation, D: geochemical interactions, E: hydrogeology of the Savannah River Site, F: software QA plans, G: completeness review guide, H: performance assessment peer review panel recommendations, I: suspect soil performance analysis, J: sensitivity/uncertainty analysis, K: vault degradation study, L: description of naval reactor waste disposal, M: porflow input file. (GHH)

  7. CYP1A-immunopositive proteins in bivalves identified as cytoskeletal and major vault proteins

    DEFF Research Database (Denmark)

    Grøsvik, Bjørn Einar; Jonsson, Henrik; Rodríguez-Ortega, Manuel J

    2006-01-01

    actin (42 kDa) and major vault protein (102 kDa), while the main CYP1A-immunopositive protein in the clam Chamaelea gallina was the cytoskeletal protein tropomyosin (33 kDa). Anti-CYP1A cross-reactive bands of 48-54 and 75 kDa in M. edulis were observed but not identified in this study. Sequence...

  8. Treatment vault shielding for a flattening filter-free medical linear accelerator.

    Science.gov (United States)

    Kry, Stephen F; Howell, Rebecca M; Polf, Jerimy; Mohan, Radhe; Vassiliev, Oleg N

    2009-03-07

    The requirements for shielding a treatment vault with a Varian Clinac 2100 medical linear accelerator operated both with and without the flattening filter were assessed. Basic shielding parameters, such as primary beam tenth-value layers (TVLs), patient scatter fractions, and wall scatter fractions, were calculated using Monte Carlo simulations of 6, 10 and 18 MV beams. Relative integral target current requirements were determined from treatment planning studies of several disease sites with, and without, the flattening filter. The flattened beam shielding data were compared to data published in NCRP Report No. 151, and the unflattened beam shielding data were presented relative to the NCRP data. Finally, the shielding requirements for a typical treatment vault were determined for a single-energy (6 MV) linac and a dual-energy (6 MV/18 MV) linac. With the exception of large-angle patient scatter fractions and wall scatter fractions, the vault shielding parameters were reduced when the flattening filter was removed. Much of this reduction was consistent with the reduced average energy of the FFF beams. Primary beam TVLs were reduced by 12%, on average, and small-angle scatter fractions were reduced by up to 30%. Head leakage was markedly reduced because less integral target current was required to deliver the target dose. For the treatment vault examined in the current study, removal of the flattening filter reduced the required thickness of the primary and secondary barriers by 10-20%, corresponding to 18 m(3) less concrete to shield the single-energy linac and 36 m(3) less concrete to shield the dual-energy linac. Thus, a shielding advantage was found when the linac was operated without the flattening filter. This translates into a reduction in occupational exposure and/or the cost and space of shielding.

  9. Vaulting mechanics successfully predict decrease in walk?run transition speed with incline

    OpenAIRE

    Hubel, Tatjana Y.; Usherwood, James R.

    2013-01-01

    There is an ongoing debate about the reasons underlying gait transition in terrestrial locomotion. In bipedal locomotion, the ?compass gait?, a reductionist model of inverted pendulum walking, predicts the boundaries of speed and step length within which walking is feasible. The stance of the compass gait is energetically optimal?at walking speeds?owing to the absence of leg compression/extension; completely stiff limbs perform no work during the vaulting phase. Here, we extend theoretical co...

  10. Is Postoperative Intensive Care Unit Care Necessary following Cranial Vault Remodeling for Sagittal Synostosis?

    Science.gov (United States)

    Wolfswinkel, Erik M; Howell, Lori K; Fahradyan, Artur; Azadgoli, Beina; McComb, J Gordon; Urata, Mark M

    2017-12-01

    Of U.S. craniofacial and neurosurgeons, 94 percent routinely admit patients to the intensive care unit following cranial vault remodeling for correction of sagittal synostosis. This study aims to examine the outcomes and cost of direct ward admission following primary cranial vault remodeling for sagittal synostosis. An institutional review board-approved retrospective review was undertaken of the records of all patients who underwent primary cranial vault remodeling for isolated sagittal craniosynostosis from 2009 to 2015 at a single pediatric hospital. Patient demographics, perioperative course, and outcomes were recorded. One hundred ten patients met inclusion criteria with absence of other major medical problems. Average age at operation was 6.7 months, with a mean follow-up of 19.8 months. Ninety-eight patients (89 percent) were admitted to a general ward for postoperative care, whereas the remaining 12 (11 percent) were admitted to the intensive care unit for preoperative or perioperative concerns. Among ward-admitted patients, there were four (3.6 percent) minor complications; however, there were no major adverse events, with none necessitating intensive care unit transfers from the ward and no mortalities. Average hospital stay was 3.7 days. The institution's financial difference in cost of intensive care unit stay versus ward bed was $5520 on average per bed per day. Omitting just one intensive care unit postoperative day stay for this patient cohort would reduce projected health care costs by a total of $540,960 for the study period. Despite the common practice of postoperative admission to the intensive care unit following cranial vault remodeling for sagittal craniosynostosis, the authors suggest that postoperative care be considered on an individual basis, with only a small percentage requiring a higher level of care. Therapeutic, III.

  11. Infracoccygeal sacropexy in the treatment of vaginal vault prolapse: a prospective study

    Directory of Open Access Journals (Sweden)

    Ghanbari Z

    2007-09-01

    Full Text Available   Background: Vaginal vault prolapse is a significant longer-term complication in patients undergoing hysterectomy. An important cause is generally acknowledged to be weakness in the uterosacral and cardinal ligaments. Vaginal delivery is known to be a risk factor, and obesity and menopause are predisposing factors. Urogynecologists are constantly looking for simple, safe and effective ways to cure vaginal apex prolapse. Infracoccygeal sacropexy, also known as posterior intravaginal slingplasty, is a useful and less-invasive procedure, with low morbidity. The aim of this study is to confirm the efficacy, safety and long-term outcome of infracoccygeal sacropexy for the treatment of vault prolapse.Methods: In a prospective observational study, we performed infracoccygeal sacropexy to treat 26 patients who had at least grade 3 symptomatic vault prolapse secondary to transvaginal hysterectomy. Data collection included anatomic outcome, and intra- and post-operative complications.Results: The mean patient age was 67 years. The mean operation time was 30 minutes and mean blood loss was 130 ml. No intraoperative rectal perforation was seen, and all patients were discharged within 24 hours of surgery. The symptomatic cure of prolapse rate, urgency, nocturia and pelvic pain was 96.2%, 88.8%, 92.6% and 77% orderly. Only one tape rejection occurred in one of the 26 patients."n  Conclusion: Our initial experience with infracoccygeal sacropexy shows an efficacy similar to other more established surgical techniques for the cure of vault prolapse, but with less surgical morbidity. Therefore, the procedure is found to be efficient and safe, with shorter operation times, reduced postoperative complication and shorter hospital convalescence.

  12. Heat transfer performance uniformity factor for the basement floor made of brick vaults in historic buildings

    Directory of Open Access Journals (Sweden)

    Murgul Vera

    2017-01-01

    Full Text Available The paper exposes the calculation of Heat transfer performance uniformity factor for the basement floor made of brick vaults in residential historic buildings. It was determined that the temperature pattern on the floor surface of the premise could be characterized as uniform one. Heat transfer performance uniformity factor for the considered basement floor design can be ignored during the thermotechnical calculations. Thermal resistance calculation is performed for the overlap structure with the smallest thickness.

  13. Archaeological finds from the vaulted building at Krševica

    Directory of Open Access Journals (Sweden)

    Popović Petar

    2008-01-01

    Full Text Available The completely preserved building with barrel vault was discovered in 2008 in the course of investigation of the remains of an urban settlement dating from the 4th /3rd centuries BC at the site Kale in the village Krševica (southeast Serbia. We are presenting in this work the archaeological finds discovered in this structure. They included pottery, worked stone and many skeletons of horses and dogs that are assumed to be the ritual sacrifice.

  14. Effect of Plyometric Training on Handspring Vault Performance and Functional Power in Youth Female Gymnasts.

    Directory of Open Access Journals (Sweden)

    Emma Hall

    Full Text Available This study aimed to determine the effect of plyometric training (PT when added to habitual gymnastic training (HT on handspring vault (HV performance variables. Twenty youth female competitive gymnasts (Age: 12.5 ± 1.67 y volunteered to participate and were randomly assigned to two independent groups. The experimental plyometric training group (PTG undertook a six-week plyometric program, involving two additional 45 min PT sessions a week, alongside their HT, while the control group (CG performed regular HT only. Videography was used (120 Hz in the sagittal plane to record both groups performing three HVs for both the baseline and post-intervention trials. Furthermore, participants completed a countermovement jump test (CMJ to assess the effect of PT on functional power. Through the use of Quintic biomechanics software, significant improvements (P < 0.05 were found for the PTG for run-up velocity, take-off velocity, hurdle to board distance, board contact time, table contact time and post-flight time and CMJ height. However, there were no significant improvements on pre-flight time, shoulder angle or hip angle on the vault for the PTG. The CG demonstrated no improvement for all HV measures. A sport-specific PT intervention improved handspring vault performance measures and functional power when added to the habitual training of youth female gymnasts. The additional two hours plyometric training seemingly improved the power generating capacity of movement-specific musculature, which consequently improved aspects of vaulting performance. Future research is required to examine the whether the improvements are as a consequence of the additional volume of sprinting and jumping activities, as a result of the specific PT method or a combination of these factors.

  15. 16 CFR 1509.7 - Hardware.

    Science.gov (United States)

    2010-01-01

    ... 16 Commercial Practices 2 2010-01-01 2010-01-01 false Hardware. 1509.7 Section 1509.7 Commercial Practices CONSUMER PRODUCT SAFETY COMMISSION FEDERAL HAZARDOUS SUBSTANCES ACT REGULATIONS REQUIREMENTS FOR NON-FULL-SIZE BABY CRIBS § 1509.7 Hardware. (a) The hardware in a non-full-size baby crib shall be...

  16. Cytology for the detection of early recurrence of gynecologic cancer in the vaginal vault.

    Science.gov (United States)

    Lara, Lucia A S; de Andrade, Jurandyr M; Dos Reis, Francisco J C

    2014-01-01

    The real benefit of follow-up cervical cytology in women treated for gynecological cancer is unclear. This study was designed to assess the rate of success of cytological examinations in the detection of early vaginal recurrence of gynecological cancer in women found by other methods to have vaginal recurrence of cervical and endometrial cancer. Records of cytological examinations. Thirty-three women treated for early and invasive cervical and endometrial cancer with recurrence in the vaginal vault were retrospectively analyzed. Records from 1979 to 2010. Sixteen women (48.5%) had symptomatic vaginal recurrence associated with distant metastases, whereas 17 (51.5%) had vaginal recurrence only. Cytology was negative in 12 women (36.4%) with both symptomatic and asymptomatic recurrence and positive in the other 21 (63.6%). In 9 of these 21 women (42.9%), the disease was limited to the vaginal vault, whereas the remaining 12 (57.1%) presented with vaginal lesions associated with distant metastases. Cytology was positive in 9 of the 17 (52.9%) women whose recurrence was limited to the vaginal vault and negative in 8 (47.1%). Vaginal cytology yielded false-negative results in almost half of the women with vaginal recurrence of gynecological cancer. Patents of methods used for early diagnosis and detection of immortalization of cervical cancer are also reviewed in this article.

  17. Role of joint torques generated in an optimised Yurchenko layout vault.

    Science.gov (United States)

    Koh, Michael; Jennings, Les; Elliott, Bruce

    2003-07-01

    The purpose of the study was to quantify the muscle torques required in the performance of an optimised Yurchenko layout vault based on a five-segment rigid link model and using input data from an elite female gymnast. At impact, the wrist torque trajectory indicated an extension-flexion action while the shoulder was characterised by extension. The approximate 100 Nm (wrist flexor) and 125 Nm (shoulder extensor) respective peak torque magnitudes indicated that the impact action is not passive in nature. The contribution of joint torques to the adjoining segments was apportioned to the relative components namely; centripetal, gravity and net joint torque components. Despite the presence of both large wrist and shoulder joint torques, the net turning effect on the upper limb and hand segments about their centre of mass (CM) was small. The principal role of the upper limb joint torques was therefore to effect the appropriate joint motions and to support the weight of the gymnast. The performance of the optimum vault was primarily the result of the interplay between the centripetal and the net joint torque components at the wrist, hip and shoulder joints. This has implications to the performer in that successful execution of the vault is principally concerned with the ability to create a high angular momentum for horse impact and to then apply an appropriate level of joint torques that will make optimal use of the initial kinetic condition.

  18. Vaulting mechanics successfully predict decrease in walk–run transition speed with incline

    Science.gov (United States)

    Hubel, Tatjana Y.; Usherwood, James R.

    2013-01-01

    There is an ongoing debate about the reasons underlying gait transition in terrestrial locomotion. In bipedal locomotion, the ‘compass gait’, a reductionist model of inverted pendulum walking, predicts the boundaries of speed and step length within which walking is feasible. The stance of the compass gait is energetically optimal—at walking speeds—owing to the absence of leg compression/extension; completely stiff limbs perform no work during the vaulting phase. Here, we extend theoretical compass gait vaulting to include inclines, and find good agreement with previous observations of changes in walk–run transition speed (approx. 1% per 1% incline). We measured step length and frequency for humans walking either on the level or up a 9.8 per cent incline and report preferred walk–run, walk–compliant-walk and maximum walk–run transition speeds. While the measured ‘preferred’ walk–run transition speed lies consistently below the predicted maximum walking speeds, and ‘actual’ maximum walking speeds are clearly above the predicted values, the onset of compliant walking in level as well as incline walking occurs close to the predicted values. These findings support the view that normal human walking is constrained by the physics of vaulting, but preferred absolute walk–run transition speeds may be influenced by additional factors. PMID:23325739

  19. Vaulting mechanics successfully predict decrease in walk-run transition speed with incline.

    Science.gov (United States)

    Hubel, Tatjana Y; Usherwood, James R

    2013-04-23

    There is an ongoing debate about the reasons underlying gait transition in terrestrial locomotion. In bipedal locomotion, the 'compass gait', a reductionist model of inverted pendulum walking, predicts the boundaries of speed and step length within which walking is feasible. The stance of the compass gait is energetically optimal-at walking speeds-owing to the absence of leg compression/extension; completely stiff limbs perform no work during the vaulting phase. Here, we extend theoretical compass gait vaulting to include inclines, and find good agreement with previous observations of changes in walk-run transition speed (approx. 1% per 1% incline). We measured step length and frequency for humans walking either on the level or up a 9.8 per cent incline and report preferred walk-run, walk-compliant-walk and maximum walk-run transition speeds. While the measured 'preferred' walk-run transition speed lies consistently below the predicted maximum walking speeds, and 'actual' maximum walking speeds are clearly above the predicted values, the onset of compliant walking in level as well as incline walking occurs close to the predicted values. These findings support the view that normal human walking is constrained by the physics of vaulting, but preferred absolute walk-run transition speeds may be influenced by additional factors.

  20. A lime based mortar for thermal insulation of medieval church vaults

    DEFF Research Database (Denmark)

    Hansen, Tessa Kvist; Larsen, Poul Klenz; Hansen, Kurt Kielsgaard

    was measured to 0.08 W/mK, which is twice the value for mineral wool. It has 1/3 of the resistance to water vapour diffusion as brick, and a high capacity for liquid water absorption. This is a benefit in the case of rain leaking from the roof, because the water does not penetrate further down into the bricks.......There are 1700 medieval churches in Denmark, and many of these have brick vaults. The thickness is only 12 – 15 cm, and the heat loss through this building component is large. Thermal insulation has not been permitted until now in respect for the antiquarian values and doubts about the effect...... on water vapour transport through the vault, and the risk of condensation inside the insulation. A new mortar was developed for thermal insulation of bricks vaults, consisting mainly of expanded perlite, mixed with slaked lime. These materials are compatible with the fired clay bricks and the lime mortar...

  1. GENI: Grid Hardware and Software

    Energy Technology Data Exchange (ETDEWEB)

    None

    2012-01-09

    GENI Project: The 15 projects in ARPA-E’s GENI program, short for “Green Electricity Network Integration,” aim to modernize the way electricity is transmitted in the U.S. through advances in hardware and software for the electric grid. These advances will improve the efficiency and reliability of electricity transmission, increase the amount of renewable energy the grid can utilize, and provide energy suppliers and consumers with greater control over their power flows in order to better manage peak power demand and cost.

  2. Efficient architecture for spike sorting in reconfigurable hardware.

    Science.gov (United States)

    Hwang, Wen-Jyi; Lee, Wei-Hao; Lin, Shiow-Jyu; Lai, Sheng-Ying

    2013-11-01

    This paper presents a novel hardware architecture for fast spike sorting. The architecture is able to perform both the feature extraction and clustering in hardware. The generalized Hebbian algorithm (GHA) and fuzzy C-means (FCM) algorithm are used for feature extraction and clustering, respectively. The employment of GHA allows efficient computation of principal components for subsequent clustering operations. The FCM is able to achieve near optimal clustering for spike sorting. Its performance is insensitive to the selection of initial cluster centers. The hardware implementations of GHA and FCM feature low area costs and high throughput. In the GHA architecture, the computation of different weight vectors share the same circuit for lowering the area costs. Moreover, in the FCM hardware implementation, the usual iterative operations for updating the membership matrix and cluster centroid are merged into one single updating process to evade the large storage requirement. To show the effectiveness of the circuit, the proposed architecture is physically implemented by field programmable gate array (FPGA). It is embedded in a System-on-Chip (SOC) platform for performance measurement. Experimental results show that the proposed architecture is an efficient spike sorting design for attaining high classification correct rate and high speed computation.

  3. Inventory extension considerations for long-term storage at the nuclear materials storage facility

    Energy Technology Data Exchange (ETDEWEB)

    Olinger, C.T.; Stanbro, W.D.; Longmire, V.; Argo, P.E.; Nielson, S.M.

    1996-09-01

    Los Alamos National Laboratory is in the process of modifying its nuclear materials storage facility to a long-term storage configuration. In support of this effort, we examined technical and administrative means to extend periods between physical inventories. Both the frequency and sample size during a physical inventory could significantly impact required sizing of the non-destructive assay (NDA) laboratory as well as material handling capabilities. Several options are being considered, including (1) treating each storage location as a separate vault, (2) minimizing the number of items returned for quantitative analysis by optimizing the use of in situ confirmatory measurements, and (3) utilizing advanced monitoring technologies. Careful consideration of these parameters should allow us to achieve and demonstrate safe and secure storage while minimizing the impact on facility operations and without having to increase the size of the NDA laboratory beyond that required for anticipated shipping and receiving activities.

  4. A Hardware Track Finder for ATLAS Trigger

    CERN Document Server

    Volpi, G; The ATLAS collaboration; Andreazza, A; Citterio, M; Favareto, A; Liberali, V; Meroni, C; Riva, M; Sabatini, F; Stabile, A; Annovi, A; Beretta, M; Castegnaro, A; Bevacqua, V; Crescioli, F; Francesco, C; Dell'Orso, M; Giannetti, P; Magalotti, D; Piendibene, M; Roda, C; Sacco, I; Tripiccione, R; Fabbri, L; Franchini, M; Giorgi, F; Giannuzzi, F; Lasagni, F; Sbarra, C; Valentinetti, S; Villa, M; Zoccoli, A; Lanza, A; Negri, A; Vercesi, V; Bogdan, M; Boveia, A; Canelli, F; Cheng, Y; Dunford, M; Li, H L; Kapliy, A; Kim, Y K; Melachrinos, C; Shochet, M; Tang, F; Tang, J; Tuggle, J; Tompkins, L; Webster, J; Atkinson, M; Cavaliere, V; Chang, P; Kasten, M; McCarn, A; Neubauer, M; Hoff, J; Liu, T; Okumura, Y; Olsen, J; Penning, B; Todri, A; Wu, J; Drake, G; Proudfoot, J; Zhang, J; Blair, R; Anderson, J; Auerbach, B; Blazey, G; Kimura, N; Yorita, K; Sakurai, Y; Mitani, T; Iizawa, T

    2012-01-01

    The existing three level ATLAS trigger system is deployed to reduce the event rate from the bunch crossing rate of 40 MHz to ~400 Hz for permanent storage at the LHC design luminosity of 10^34 cm^-2 s^-1. When the LHC reaches beyond the design luminosity, the load on the Level-2 trigger system will significantly increase due to both the need for more sophisticated algorithms to suppress background and the larger event sizes. The Fast TracKer (FTK) is a custom electronics system that will operate at the full Level-1 accepted rate of 100 KHz and provide high quality tracks at the beginning of processing in the Level-2 trigger, by performing track reconstruction in hardware with massive parallelism of associative memories and FPGAs. The performance in important physics areas including b-tagging, tau-tagging and lepton isolation will be demonstrated with the ATLAS MC simulation at different LHC luminosities. The system design will be overviewed. The latest R&amp;amp;D progress of individual components...

  5. Travel Software using GPU Hardware

    CERN Document Server

    Szalwinski, Chris M; Dimov, Veliko Atanasov; CERN. Geneva. ATS Department

    2015-01-01

    Travel is the main multi-particle tracking code being used at CERN for the beam dynamics calculations through hadron and ion linear accelerators. It uses two routines for the calculation of space charge forces, namely, rings of charges and point-to-point. This report presents the studies to improve the performance of Travel using GPU hardware. The studies showed that the performance of Travel with the point-to-point simulations of space-charge effects can be speeded up at least 72 times using current GPU hardware. Simple recompilation of the source code using an Intel compiler can improve performance at least 4 times without GPU support. The limited memory of the GPU is the bottleneck. Two algorithms were investigated on this point: repeated computation and tiling. The repeating computation algorithm is simpler and is the currently recommended solution. The tiling algorithm was more complicated and degraded performance. Both build and test instructions for the parallelized version of the software are inclu...

  6. Hardware complications in scoliosis surgery

    Energy Technology Data Exchange (ETDEWEB)

    Bagchi, Kaushik; Mohaideen, Ahamed [Department of Orthopaedic Surgery and Musculoskeletal Services, Maimonides Medical Center, Brooklyn, NY (United States); Thomson, Jeffrey D. [Connecticut Children' s Medical Center, Department of Orthopaedics, Hartford, CT (United States); Foley, Christopher L. [Department of Radiology, Connecticut Children' s Medical Center, Hartford, Connecticut (United States)

    2002-07-01

    Background: Scoliosis surgery has undergone a dramatic evolution over the past 20 years with the advent of new surgical techniques and sophisticated instrumentation. Surgeons have realized scoliosis is a complex multiplanar deformity that requires thorough knowledge of spinal anatomy and pathophysiology in order to manage patients afflicted by it. Nonoperative modalities such as bracing and casting still play roles in the treatment of scoliosis; however, it is the operative treatment that has revolutionized the treatment of this deformity that affects millions worldwide. As part of the evolution of scoliosis surgery, newer implants have resulted in improved outcomes with respect to deformity correction, reliability of fixation, and paucity of complications. Each technique and implant has its own set of unique complications, and the surgeon must appreciate these when planning surgery. Materials and methods: Various surgical techniques and types of instrumentation typically used in scoliosis surgery are briefly discussed. Though scoliosis surgery is associated with a wide variety of complications, only those that directly involve the hardware are discussed. The current literature is reviewed and several illustrative cases of patients treated for scoliosis at the Connecticut Children's Medical Center and the Newington Children's Hospital in Connecticut are briefly presented. Conclusion: Spine surgeons and radiologists should be familiar with the different types of instrumentation in the treatment of scoliosis. Furthermore, they should recognize the clinical and roentgenographic signs of hardware failure as part of prompt and effective treatment of such complications. (orig.)

  7. Energy Storage.

    Science.gov (United States)

    Eaton, William W.

    Described are technological considerations affecting storage of energy, particularly electrical energy. The background and present status of energy storage by batteries, water storage, compressed air storage, flywheels, magnetic storage, hydrogen storage, and thermal storage are discussed followed by a review of development trends. Included are…

  8. EVALUATION OF SULFATE ATTACK ON SALTSTONE VAULT CONCRETE AND SALTSTONESIMCO TECHNOLOGIES, INC. PART1 FINAL REPORT

    Energy Technology Data Exchange (ETDEWEB)

    Langton, C

    2008-08-19

    This report summarizes the preliminary results of a durability analysis performed by SIMCO Technologies Inc. to assess the effects of contacting saltstone Vaults 1/4 and Disposal Unit 2 concretes with highly alkaline solutions containing high concentrations of dissolved sulfate. The STADIUM{reg_sign} code and data from two surrogate concretes which are similar to the Vaults 1/4 and Disposal Unit 2 concretes were used in the preliminary durability analysis. Simulation results for these surrogate concrete mixes are provided in this report. The STADIUM{reg_sign} code will be re-run using transport properties measured for the SRS Vaults 1/4 and Disposal Unit 2 concrete samples after SIMCO personnel complete characterization testing on samples of these materials. Simulation results which utilize properties measured for samples of Vaults 1/4 and Disposal Unit 2 concretes will be provided in Revision 1 of this report after property data become available. The modeling performed to date provided the following information on two concrete mixes that will be used to support the Saltstone PA: (1) Relationship between the rate of advancement of the sulfate front (depth of sulfate ion penetration into the concrete) and the rate of change of the concrete permeability and diffusivity. (2) Relationship between the sulfate ion concentration in the corrosive leachate and the rate of the sulfate front progression. (3) Equation describing the change in hydraulic properties (hydraulic conductivity and diffusivity) as a function of sulfate ion concentration in the corrosive leachate. These results have been incorporated into the current Saltstone PA analysis by G. Flach (Flach, 2008). In addition, samples of the Saltstone Vaults 1/4 and Disposal Unit 2 concretes have been prepared by SIMCO Technologies, Inc. Transport and physical properties for these materials are currently being measured and sulfate exposure testing to three high alkaline, high sulfate leachates provided by SRNL is

  9. Imaging of current spinal hardware: lumbar spine.

    Science.gov (United States)

    Ha, Alice S; Petscavage-Thomas, Jonelle M

    2014-09-01

    The purposes of this article are to review the indications for and the materials and designs of hardware more commonly used in the lumbar spine; to discuss alternatives for each of the types of hardware; to review normal postoperative imaging findings; to describe the appropriateness of different imaging modalities for postoperative evaluation; and to show examples of hardware complications. Stabilization and fusion of the lumbar spine with intervertebral disk replacement, artificial ligaments, spinous process distraction devices, plate-and-rod systems, dynamic posterior fusion devices, and newer types of material incorporation are increasingly more common in contemporary surgical practice. These spinal hardware devices will be seen more often in radiology practice. Successful postoperative radiologic evaluation of this spinal hardware necessitates an understanding of fundamental hardware design, physiologic objectives, normal postoperative imaging appearances, and unique complications. Radiologists may have little training and experience with the new and modified types of hardware used in the lumbar spine.

  10. Corrective Action Plan for Corrective Action Unit 135: Area 25 Underground Storage Tanks, Nevada Test Site, Nevada

    Energy Technology Data Exchange (ETDEWEB)

    D. H. Cox

    2000-07-01

    The Area 25 Underground Storage Tanks site Corrective Action Unit (CAU) 135 will be closed by unrestricted release decontamination and verification survey, in accordance with the Federal Facility Agreement and Consert Order (FFACO, 1996). The CAU includes one Corrective Action Site (CAS). The Area 25 Underground Storage Tanks, (CAS 25-02-01), referred to as the Engine-Maintenance Assembly and Disassembly (E-MAD) Waste Holdup Tanks and Vault, were used to receive liquid waste from all of the radioactive drains at the E-MAD Facility. Based on the results of the Corrective Action Investigation conducted in June 1999 discussed in the Corrective Action Investigation Plan for Corrective Action Unit 135: Area 25 Underground Storage Tanks, Nevada Test Site, Nevada (DOE/NV,1999a), one sample from the radiological survey of the concrete vault interior exceeded radionuclide preliminary action levels. The analytes from the sediment samples that exceeded the preliminary action levels are polychlorinated biphenyls, Resource Conservation and Recovery Act metals, total petroleum hydrocarbons as diesel-range organics, and radionuclides. Unrestricted release decontamination and verification involves removal of concrete and the cement-lined pump sump from the vault. After verification that the contamination has been removed, the vault will be repaired with concrete, as necessary. The radiological- and chemical-contaminated pump sump and concrete removed from the vault would be disposed of at the Area 5 Radioactive Waste Management Site. The vault interior will be field surveyed following removal of contaminated material to verify that unrestricted release criteria have been achieved.

  11. A strategy for load balancing in distributed storage systems

    CERN Multimedia

    CERN. Geneva

    2012-01-01

    Distributed storage systems are critical to the operation of the WLCG. These systems are not limited to fulfilling the long term storage requirements. They also serve data for computational analysis and other computational jobs. Distributed storage systems provide the ability to aggregate the storage and IO capacity of disks and tapes, but at the end of the day IO rate is still bound by the capabilities of the hardware, in particular the hard drives. Throughput of hard drives has increased dramatically over the decades, however for computational analysis IOPS is typically the limiting factor. To maximize return of investment, balancing IO load over available hardware is crucial. The task is made complicated by the common use of heterogeneous hardware and software environments that results from combining new and old hardware into a single storage system. This paper describes recent advances made in load balancing in the dCache distributed storage system. We describe a set of common requirements for load balan...

  12. A comparison of Coulomb and pseudo-Coulomb friction implementations: Application to the table contact phase of gymnastics vaulting.

    Science.gov (United States)

    Jackson, M I; Hiley, M J; Yeadon, M R

    2011-10-13

    In the table contact phase of gymnastics vaulting both dynamic and static friction act. The purpose of this study was to develop a method of simulating Coulomb friction that incorporated both dynamic and static phases and to compare the results with those obtained using a pseudo-Coulomb implementation of friction when applied to the table contact phase of gymnastics vaulting. Kinematic data were obtained from an elite level gymnast performing handspring straight somersault vaults using a Vicon optoelectronic motion capture system. An angle-driven computer model of vaulting that simulated the interaction between a seven segment gymnast and a single segment vaulting table during the table contact phase of the vault was developed. Both dynamic and static friction were incorporated within the model by switching between two implementations of the tangential frictional force. Two vaulting trials were used to determine the model parameters using a genetic algorithm to match simulations to recorded performances. A third independent trial was used to evaluate the model and close agreement was found between the simulation and the recorded performance with an overall difference of 13.5%. The two-state simulation model was found to be capable of replicating performance at take-off and also of replicating key contact phase features such as the normal and tangential motion of the hands. The results of the two-state model were compared to those using a pseudo-Coulomb friction implementation within the simulation model. The two-state model achieved similar overall results to those of the pseudo-Coulomb model but obtained solutions more rapidly. Copyright © 2011 Elsevier Ltd. All rights reserved.

  13. Overlapped checkpointing with hardware assist

    Energy Technology Data Exchange (ETDEWEB)

    Mitchell, Christopher J [Los Alamos National Laboratory; Nunez, James A [Los Alamos National Laboratory; Wang, Jun [U. OF CENTRAL FLORIDA (UCF)

    2009-01-01

    We present a new approach to handling the demanding I/O workload incurred during checkpoint writes encountered in High Performance Computing. Prior efforts to improve performance have been primarily bound by mechanical limitations of the hard drive. Our research surpasses this limitation by providing a method to: (1) write checkpoint data to a high-speed, non-volatile buffer, and (2) asynchronously write this data to permanent storage while resuming computation. This removes the hard drive from the critical data path because our I/O node based buffers isolate the compute nodes from the storage servers. This solution is feasible because of industry declines in cost for high-capacity, non-volatile storage technologies. Testing was conducted on a small-scale cluster to prove the design, and then scaled at Los Alamos National Laboratory. Results show a definitive speedup factor for select workloads over writing directly to a typical global parallel file system; the Panasas ActiveScale File System.

  14. Hardware support for software controlled fast reconfiguration of performance counters

    Science.gov (United States)

    Salapura, Valentina; Wisniewski, Robert W.

    2013-06-18

    Hardware support for software controlled reconfiguration of performance counters may include a plurality of performance counters collecting one or more counts of one or more selected activities. A storage element stores data value representing a time interval, and a timer element reads the data value and detects expiration of the time interval based on the data value and generates a signal. A plurality of configuration registers stores a set of performance counter configurations. A state machine receives the signal and selects a configuration register from the plurality of configuration registers for reconfiguring the one or more performance counters.

  15. The "Akopian" vault performed by elite male gymnasts: Which biomechanical variables are related to a judge's score?

    Directory of Open Access Journals (Sweden)

    Roman Farana

    2015-03-01

    Full Text Available Background: A vaulting performance takes a short time and it is influenced by and affects the quantity of mechanical variables. The significant relationships between the vaulting score and specific aspects of the gymnast's vault should conduct coaches to monitor these variables as a part of training or routine testing. Objective: The aim of the current study was to determine the biomechanical variables that are related to a successful performance of the Akopian vaults performed by top level male gymnasts during the World Cup competition. Methods: Fifteen top-level male gymnasts participated in this study. For the 3D analysis, two digital camcorders with a frame rate of 50 Hz were used. The data were digitized by the Simi motion software. The Hay and Reid method was used to identify the biomechanical variables that determine the linear and angular motions of the handspring and front somersault vaults. A correlation analysis was used to establish the relationship between the biomechanical variables and the judges' scores. The level of statistical significance was determined at the value of p < .05. Results: In the Akopian vaults, in five out of 24 variables arising from the deterministic model showed a significant relationship to the score. A significant correlation was found in the maximum height of the body center of mass in the second flight phase, in the height of the body center of mass at the mat touchdown, in the change of the vertical velocity during the take-off from the vaulting table, and in the duration of the second flight phase. Conclusions: The results of the study suggest that a successful execution of Akopian vaults and the achievement of a higher score required: to maximize the change in vertical velocity in the table contact phase and maximize vertical velocity in the table take-off phase; to maximize the amplitude of the second flight phase, which is determined by the duration of the second flight phase, by the maximum

  16. A prediction of an optimal performance of the handspring 1 1/2 front salto longhorse vault.

    Science.gov (United States)

    Gervais, P

    1994-01-01

    The handspring 1 1/2 front salto vault in the tucked position is deemed to be an important high-level vault. It was the compulsory vault of the 1988 Olympics and is a building block for more advanced skills in the handspring family. The purpose of this study was to predict an individual's optimal performance of a handspring 1 1/2 front salto vault. An assessment of the athlete's present performance ability was determined using cinematographical analysis of three trials. These trials were judged as being typical high-level performances of the vault. Secondly, an objective function was identified based on the performance result of points awarded. The objective function was composed of those performance variables that, if maximized, would result in minimal deductions. Postflight height and distance were identified as those variables. Angular momentum was included in a penalty function form to ensure that sufficient angular momentum was present for successful completion of the skill. A Lagrangian approach was used to derive the equations of motion and a Rayleigh-Ritz procedure, using fifth-degree polynomials, was used to represent and discretize the state variables. The predicted optimal performance of the skill displayed greater virtuosity in postflight height, distance and angular momentum when compared to the individual's best trial performance. The results of this study generally fall within the limits observed for elite vaulters.

  17. The influence of touchdown conditions and contact phase technique on post-flight height in the straight handspring somersault vault.

    Science.gov (United States)

    Yeadon, Maurice R; Jackson, Monique I; Hiley, Michael J

    2014-09-22

    In vaulting the gymnast must generate sufficient linear and angular momentum during the approach and table contact in order to complete the rotational requirements in the post-flight phase. This study investigated the effects of touchdown conditions and contact technique on peak post-flight height of a straight handspring somersault vault. A planar seven-segment torque-driven computer simulation model of the contact phase in vaulting was evaluated by varying joint torque activation time histories to match three performances of a straight handspring somersault vault by an elite gymnast. The closest matching simulation was used as a starting point to optimise peak post-flight height of the mass centre for a straight handspring somersault. It was found that optimising either the touchdown conditions or the contact technique increased post-flight height by 0.1m whereas optimising both together increased post-flight height by 0.4m above that of a simulation matching the recorded performance. Thus touchdown technique and contact technique make similar contributions to post-flight height in the straight handspring somersault vault. Increasing touchdown velocity and angular momentum lead to additional post-flight height although there was a critical value of vertical touchdown velocity beyond which post-flight height decreased. Copyright © 2014 Elsevier Ltd. All rights reserved.

  18. Masonry Vaults Subjected To Horizontal Loads: Experimental and Numerical Investigations to Evaluate the Effectiveness of A GFRM Reinforcement

    Science.gov (United States)

    Gattesco, Natalino; Boem, Ingrid

    2017-10-01

    The paper investigates the effectiveness of a modern reinforcement technique based on a Glass Fiber-Reinforced Mortar (GFRM) for the enhancement of the performances of existing masonry vaults subjected to horizontal seismic actions. In fact, the authors recently evidenced, through numerical simulations, that the typical simplified loading patterns generally adopted in the literature for the experimental tests, based on concentrated vertical loads at 1/4 of the span, are not reliable for such a purpose, due to an unrealistic stress distribution. Thus, experimental quasi-static cyclic tests on full-scale masonry vaults based on a specific setup, designed to apply a horizontal load pattern proportional to the mass, were performed. Three samples were tested: an unreinforced vault, a vault reinforced at the extrados and a vault reinforced at the intrados. The experimental results demonstrated the technique effectiveness in both strength and ductility. Moreover, numerical simulations were performed by adopting a simplified FE, smear-crack model, evidencing the good reliability of the prediction by comparison with the experimental results.

  19. Hardware Resource Allocation for Hardware/Software Partitioning in the LYCOS System

    DEFF Research Database (Denmark)

    Grode, Jesper Nicolai Riis; Madsen, Jan; Knudsen, Peter Voigt

    1998-01-01

    This paper presents a novel hardware resource allocation technique for hardware/software partitioning. It allocates hardware resources to the hardware data-path using information such as data-dependencies between operations in the application, and profiling information. The algorithm is useful...... as a designer's/design tool's aid to generate good hardware allocations for use in hardware/software partitioning. The algorithm has been implemented in a tool under the LYCOS system. The results show that the allocations produced by the algorithm come close to the best allocations obtained by exhaustive search...

  20. Hardware Resource Allocation for Hardware/Software Partitioning in the LYCOS System

    DEFF Research Database (Denmark)

    Grode, Jesper Nicolai Riis; Knudsen, Peter Voigt; Madsen, Jan

    1998-01-01

    This paper presents a novel hardware resource allocation technique for hardware/software partitioning. It allocates hardware resources to the hardware data-path using information such as data-dependencies between operations in the application, and profiling information. The algorithm is useful...... as a designer's/design tool's aid to generate good hardware allocations for use in hardware/software partitioning. The algorithm has been implemented in a tool under the LYCOS system. The results show that the allocations produced by the algorithm come close to the best allocations obtained by exhaustive search....

  1. Projecto de hardware digital orientado por objectos

    OpenAIRE

    Fernandes, João M.; Machado, Ricardo J.

    1997-01-01

    Os limites entre os domínios do software e do hardware são cada vez mais ténues, pelo que técnicas inicialmente experimentadas no software têm vindo a ser gradualmente aplicadas no hardware. Este artigo pretende descrever o estado actual da utilização da tecnologia de programação orientada por objectos no projecto de hardware digital. São analisadas as vantagens e implicações quando se introduzem conceitos ligados à tecnologia orientada por objectos em projectos de hardware e é apresent...

  2. Open-source hardware for medical devices.

    Science.gov (United States)

    Niezen, Gerrit; Eslambolchilar, Parisa; Thimbleby, Harold

    2016-04-01

    Open-source hardware is hardware whose design is made publicly available so anyone can study, modify, distribute, make and sell the design or the hardware based on that design. Some open-source hardware projects can potentially be used as active medical devices. The open-source approach offers a unique combination of advantages, including reducing costs and faster innovation. This article compares 10 of open-source healthcare projects in terms of how easy it is to obtain the required components and build the device.

  3. Thermal Hardware for the Thermal Analyst

    Science.gov (United States)

    Steinfeld, David

    2015-01-01

    The presentation will be given at the 26th Annual Thermal Fluids Analysis Workshop (TFAWS 2015) hosted by the Goddard Space Flight Center (GSFC) Thermal Engineering Branch (Code 545). NCTS 21070-1. Most Thermal analysts do not have a good background into the hardware which thermally controls the spacecraft they design. SINDA and Thermal Desktop models are nice, but knowing how this applies to the actual thermal hardware (heaters, thermostats, thermistors, MLI blanketing, optical coatings, etc...) is just as important. The course will delve into the thermal hardware and their application techniques on actual spacecraft. Knowledge of how thermal hardware is used and applied will make a thermal analyst a better engineer.

  4. COMPUTATIONAL VISION IN UV-MAPPING OF TEXTURED MESHES COMING FROM PHOTOGRAMMETRIC RECOVERY: UNWRAPPING FRESCOED VAULTS

    Directory of Open Access Journals (Sweden)

    P. G. Robleda

    2016-06-01

    Full Text Available Sometimes it is difficult to represent “on paper" the existing reality of architectonic elements, depending on the complexity of his geometry, but not only in cases with complex geometries: non-relief surfaces, can need a “special planar format” for its graphical representation. Nowadays, there are a lot of methods to obtain tridimensional recovery of our Cultural Heritage with different ranges of the relationship accuracy / costs, even getting high accuracy using “low-cost” recovery methods as digital photogrammetry, which allow us easily to obtain a graphical representation “on paper”: ortho-images of different points of view. This can be useful for many purposes but, for others, an orthographic projection is not really very interesting. In non-site restoration tasks of frescoed vaults, a “planar format” representation in needed to see in true magnitude the paintings represented on the intrados vault, because of the general methodology used: gluing the fresco on a fabric, removing the fresco-fabric from the support, moving to laboratory, removing the fresco from the fabric, restoring the fresco, gluing back the restored fresco on another fabric, laying the restored fresco on the original location and removing the fabric. Because of this, many times, an unfolded model is needed, in a similar way a cylinder or cone can be unfolded, but in this case with a texture included: UV unwrapping. Unfold and fold-back processes, can be especially interesting in restoration field of frescoed vaults and domes at: chromatic recovery of paintings, reconstruction of partially missed geometries, transference of paintings on surfaces, etc.

  5. A methodology for sunlight urban planning: a computer-based solar and sky vault obstruction analysis

    Energy Technology Data Exchange (ETDEWEB)

    Pereira, Fernando Oscar Ruttkay; Silva, Carlos Alejandro Nome [Federal Univ. of Santa Catarina (UFSC), Dept. of Architecture and Urbanism, Florianopolis, SC (Brazil); Turkienikz, Benamy [Federal Univ. of Rio Grande do Sul (UFRGS), Faculty of Architecture, Porto Alegre, RS (Brazil)

    2001-07-01

    The main purpose of the present study is to describe a planning methodology to improve the quality of the built environment based on the rational control of solar radiation and the view of the sky vault. The main criterion used to control the access and obstruction of solar radiation was the concept of desirability and undesirability of solar radiation. A case study for implementing the proposed methodology is developed. Although needing further developments to find its way into regulations and practical applications, the methodology has shown a strong potential to deal with an aspect that otherwise would be almost impossible. (Author)

  6. A lime based mortar for thermal insulation of medieval church vaults

    DEFF Research Database (Denmark)

    Larsen, P.K.; Hansen, Tessa Kvist

    . The lambda-value of the insulation mortar is 0.08 W/m K or twice the lambda-value for mineral wool. The water vapour permeability is equal to a medieval clay brick, and it has three times higher capacity for liquid water absorption. The mortar was applied to the top side of the vaults in a thickness of 10 cm......, despite a water vapour pressure gradient up to 500 Pa between the nave and attic. There was no reduction in energy consumption the first winter, possibly due to the increased heat loss related to the drying of the mortar....

  7. Restoration of the vault of the open chapel at teposcolula in Oaxaca; Mexico

    Directory of Open Access Journals (Sweden)

    Benjamín Ibarra Sevilla

    2007-12-01

    Full Text Available The extraordinary vault of this open chapel, one of the most unique examples of 16th century Latin-American architecture, has been subjected to a philological reconstruction as a result of its local and historiographic importance. The text describes, in the first place, the historical and architectural context of this building and goes on to describe its reconstruction, based on the remains conserved and historical and photographic data about its structure and increasing deterioration, the rules of stereotomy and the building methods used in its original construction.

  8. Structural consolidation in restoration. The vaults of Palladio’s villa Poiana

    Directory of Open Access Journals (Sweden)

    Francesco Doglioni

    2016-12-01

    Full Text Available The structural consolidation work on Villa Poiana, a unique work by Palladio designed and built using solely vaults without resorting to lineal structures, has given rise to an extraordinary interpretation of the evolution of the structural decay of the building over time. It is also a model intervention given its ability to adapt to this progressive history of lesions and deformation, designing added reinforcement based on the historic structure and its progressive reinforcements. The analysis of the damage that can be caused by interventions with reinforced concrete on historic structures is equally interesting due, among other reasons, to the great weight added to the structure.

  9. Radiological performance assessment for the E-Area Vaults Disposal Facility

    Energy Technology Data Exchange (ETDEWEB)

    Cook, J.R.

    2000-04-11

    This report is the first revision to ``Radiological Performance Assessment for the E-Area Vaults Disposal Facility, Revision 0'', which was issued in April 1994 and received conditional DOE approval in September 1994. The title of this report has been changed to conform to the current name of the facility. The revision incorporates improved groundwater modeling methodology, which includes a large data base of site specific geotechnical data, and special Analyses on disposal of cement-based wasteforms and naval wastes, issued after publication of Revision 0.

  10. Computerised tomography in the evaluation of expansile lesions arising from the skull vault in childhood - a report of 5 cases

    Energy Technology Data Exchange (ETDEWEB)

    Arthur, R.J.; Brunelle, F.

    1988-05-01

    Expansile lesions of the skull vault are rare in childhood, and often present as relatively asymptomatic calvarial swellings. The cases of 5 children with expansile lesions of the skull vault due to both benign and malignant primary bone lesions are described. The value of computerised tomography in demonstrating that the 'tumour' arises primarily from the skull vault as opposed to the underlying brain, and in demonstrating clinically unsuspected endocranial extension of the mass is described. The CT findings in 2 cases of aneurysmal bone cyst, including the significance of the presence of 'fluid levels' in reaching a definitive diagnosis are discussed. The successful pre-operative embolisation in one case of aneurysmal bone cyst is reported.

  11. Numerical and experimental analysis of an in-scale masonry cross-vault prototype up to failure

    Energy Technology Data Exchange (ETDEWEB)

    Rossi, Michela; Calderini, Chiara; Lagomarsino, Sergio [Department of Civil, Chemical and Environmental Engineering, University of Genoa, Via Montallegro 1, Genoa (Italy); Milani, Gabriele [Department of Architecture, Built Environment and Construction Engineering, Milan Polytechnic University, Piazza Leonardo da Vinci 32, Milan (Italy)

    2015-12-31

    A heterogeneous full 3D non-linear FE approach is validated against experimental results obtained on an in-scale masonry cross vault assembled with dry joints, and subjected to various loading conditions consisting on imposed displacement combinations to the abutments. The FE model relies into a discretization of the blocks by means of few rigid-infinitely resistant parallelepiped elements interacting by means of planar four-noded interfaces, where all the deformation (elastic and inelastic) occurs. The investigated response mechanisms of vault are the shear in-plane distortion and the longitudinal opening and closing mechanism at the abutments. After the validation of the approach on the experimentally tested cross-vault, a sensitivity analysis is conducted on the same geometry, but in real scale, varying mortar joints mechanical properties, in order to furnish useful hints for safety assessment, especially in presence of seismic action.

  12. Increased susceptibility of vault poly(ADP-ribose) polymerase-deficient mice to carcinogen-induced tumorigenesis.

    Science.gov (United States)

    Raval-Fernandes, Sujna; Kickhoefer, Valerie A; Kitchen, Christina; Rome, Leonard H

    2005-10-01

    Vault poly(ADP-ribose) polymerase (VPARP) and telomerase-associated protein 1 (TEP1) are components of the vault ribonucleoprotein complex. Vaults have been implicated in multidrug resistance of human tumors and are thought to be involved in macromolecular assembly and/or transport. Previous studies showed that VPARP-deficient mice were viable, fertile, and did not display any vault-related or telomerase-related phenotype, whereas disruption of telomerase-associated protein 1 in mice led to reduced stability of the vault RNA and affected its stable association with vaults, although there were no telomerase-related changes. In this study, we evaluated the susceptibility of Vparp-/- and Tep1-/- mice to dimethylhydrazine-induced colon tumorigenesis and urethane-induced lung tumorigenesis. Mice received i.p. injections of either 1 g/kg body weight of urethane twice a week for 2 weeks or 20 mg/kg body weight of dimethylhydrazine once a week for 10 weeks and were analyzed after 10 and 60 weeks, respectively. The colon tumor incidence and multiplicity were significantly higher and colon tumor latency was significantly shorter in Vparp-/- mice compared with wild-type mice. Increased colon tumor incidence, multiplicity, and reduced tumor latency were also seen in Tep1-/- mice, however, these results were statistically not significant. Lung tumor multiplicities were increased in both Vparp-/- and Tep1-/- mice but were not significant. The increase in carcinogen-induced tumors in VPARP-deficient mice is the only phenotype observed to date, and suggests a possible role for VPARP, directly or indirectly, in chemically induced neoplasia.

  13. Homology of the cranial vault in birds: new insights based on embryonic fate-mapping and character analysis.

    Science.gov (United States)

    Maddin, Hillary C; Piekarski, Nadine; Sefton, Elizabeth M; Hanken, James

    2016-08-01

    Bones of the cranial vault appear to be highly conserved among tetrapod vertebrates. Moreover, bones identified with the same name are assumed to be evolutionarily homologous. However, recent developmental studies reveal a key difference in the embryonic origin of cranial vault bones between representatives of two amniote lineages, mammals and birds, thereby challenging this view. In the mouse, the frontal is derived from cranial neural crest (CNC) but the parietal is derived from mesoderm, placing the CNC-mesoderm boundary at the suture between these bones. In the chicken, this boundary is located within the frontal. This difference and related data have led several recent authors to suggest that bones of the avian cranial vault are misidentified and should be renamed. To elucidate this apparent conflict, we fate-mapped CNC and mesoderm in axolotl to reveal the contributions of these two embryonic cell populations to the cranial vault in a urodele amphibian. The CNC-mesoderm boundary in axolotl is located between the frontal and parietal bones, as in the mouse but unlike the chicken. If, however, the avian frontal is regarded instead as a fused frontal and parietal (i.e. frontoparietal) and the parietal as a postparietal, then the cranial vault of birds becomes developmentally and topologically congruent with those of urodeles and mammals. This alternative hypothesis of cranial vault homology is also phylogenetically consistent with data from the tetrapod fossil record, where frontal, parietal and postparietal bones are present in stem lineages of all extant taxa, including birds. It further implies that a postparietal may be present in most non-avian archosaurs, but fused to the parietal or supraoccipital as in many extant mammals.

  14. Lessons learned from hardware and software upgrades of IT-DB services

    CERN Multimedia

    CERN. Geneva

    2014-01-01

    This talk gives an overview of recent changes in CERN database infrastructure. The presentation describes database service evolution, in particular new hardware & storage installation, integration with Agile infrastructure, complexity of validation strategy and finally the migration and upgrade process concerning the most critical database services.

  15. SU-E-T-267: Construction and Evaluation of a Neutron Wall to Shield a 15 MV Linac in a Low-Energy Vault.

    Science.gov (United States)

    Speiser, M; Hager, F; Foster, R; Solberg, T

    2012-06-01

    To design and quantify the shielding efficacy of an inner Borated Polyethylene (BPE)wall for a 15 MV linac in a low energy vault. A Varian TrueBeam linac with a maximum photon energy of 15 MV was installed in asmaller, preexisting vault. This vault originally housed a low-energy machine and did not havesufficient maze length recommended for neutron attenuation. Effective dose rate calculationswere performed using the Modified Kersey's Method as detailed in NCRP Report No. 151 andfound to be unacceptably high. An initial survey following the machine installation confirmedthese calculations. Rather than restrict the linac beam energy to 10 MV, BPE was investigatedas a neutron moderating addition. An inner wall and door were planned and constructed using4'×8'×1″ thick 5% BPE sheets. The resulting door and wall had 2″ of BPE; conduits and ductwork were also redesigned and shielded. A survey was conducted following construction of thewall. The vault modification reduced the expected effective dose at the vault door from 36.23to 0.010 mSv/week. As specific guidelines for vault modification are lacking, this project quantitativelydemonstrates the potential use of BPE for vault modification. Such modifications may provide alow-cost shielding solution to allow for the use of high energy modes in smaller treatment vaults. © 2012 American Association of Physicists in Medicine.

  16. Hybrid Interconnect Design for Heterogeneous Hardware Accelerators

    NARCIS (Netherlands)

    Pham-Quoc Cuong, P.

    2015-01-01

    Heterogeneous multicore systems are becoming increasingly important as the need for computation power grows, especially when we are entering into the big data era. As one of the main trends in heterogeneous multicore, hardware accelerator systems provide application specific hardware circuits and

  17. Relational Algebra as formalism for Hardware Design

    NARCIS (Netherlands)

    ten Berg, A.J.W.M.; ten Berg, A.J.W.M.; Huijs, C.; Krol, Th.

    1993-01-01

    This paper introduces relational algebra as an elegant formalism to describe hardware behaviour. Hardware behaviour is modelled by functions that are represented by sets of tables. Relational algebra, developed for designing large and consistent databases is capable to operate on sets of tables and

  18. Comparative Modal Analysis of Sieve Hardware Designs

    Science.gov (United States)

    Thompson, Nathaniel

    2012-01-01

    The CMTB Thwacker hardware operates as a testbed analogue for the Flight Thwacker and Sieve components of CHIMRA, a device on the Curiosity Rover. The sieve separates particles with a diameter smaller than 150 microns for delivery to onboard science instruments. The sieving behavior of the testbed hardware should be similar to the Flight hardware for the results to be meaningful. The elastodynamic behavior of both sieves was studied analytically using the Rayleigh Ritz method in conjunction with classical plate theory. Finite element models were used to determine the mode shapes of both designs, and comparisons between the natural frequencies and mode shapes were made. The analysis predicts that the performance of the CMTB Thwacker will closely resemble the performance of the Flight Thwacker within the expected steady state operating regime. Excitations of the testbed hardware that will mimic the flight hardware were recommended, as were those that will improve the efficiency of the sieving process.

  19. The continuous measurement of the springboard reaction force in gymnastic vaulting.

    Science.gov (United States)

    Sano, Shinya; Ikegami, Yasuo; Nunome, Hiroyuki; Apriantono, Tommy; Sakurai, Shinji

    2007-02-15

    A new method was established for the continuous measurement of force applied from a springboard to a gymnast in vaulting (board reaction force). Male gymnasts performed a handspring vault using a springboard mounted on force platforms. A high-speed video camera sampled the springboard motion at 500 Hz. The springboard was initially partitioned into 29 segments. The force due to the accelerative motion of the springboard was determined by summing the forces of the individual segments. The board reaction force acting on the gymnast was calculated by subtracting the force due to the accelerative motion of the springboard and weight from the force recorded by the force platform. The new method succeeded in illustrating transient changes of the board reaction force. The horizontal and vertical components of the peak values of the board reaction force were three and two times greater respectively than the average values. A series of tests was conducted to determine whether the number of segments of the springboard model could be reduced without affecting accuracy. A model consisting of only four segments produced almost the same accuracy as the 29-segment model. The simplified model is recommended as a more efficient method to measure board reaction force.

  20. Dynamic optimization: inverse analysis for the Yurchenko layout vault in women's artistic gymnastics.

    Science.gov (United States)

    Koh, Michael T H; Jennings, Leslie S

    2003-08-01

    The use of dynamic optimization to compute the trajectory of joint torques is not popular due to the large amount of computation required, the choice of initial "guesstimates" of torque values and the mathematical sophistication required to understand the technique. Modern optimal control algorithms circumvent most of these objections to the method. It is our aim to demonstrate that the dynamic optimization technique is feasible for complex movements, using the Yurchenko layout vault as an example. A dynamic optimization method to compute joint torques so that the histories of the angular orientations of the model segments closely approximate the corresponding observed angular coordinate histories is demonstrated with the Yurchenko layout vault using an optimal control package. The objective function used is a measure of distance of fitted segment angles to the data, plus the distance of the fitted whole body centre of mass (CM), from the whole body CM computed from the data. Including the CM into the objective function, facilitates the optimization process so as to obtain a set of torques which reproduced the data. The paper shows that the approach works well for the task examined, that is, where the dynamics of the system change during a movement (impact to postflight).

  1. A Computational Analysis of Bone Formation in the Cranial Vault in the Mouse

    Directory of Open Access Journals (Sweden)

    Chanyoung eLee

    2015-03-01

    Full Text Available Bones of the cranial vault are formed by the differentiation of mesenchymal cells into osteoblasts on a surface that surrounds the brain, eventually forming mineralized bone. Signaling pathways causative for the cell differentiation include the actions of extracellular proteins driven by information from genes. We assume that the interaction of cells and extracellular molecules which are associated with cell differentiation can be modeled using Turing’s reaction-diffusion model, a mathematical model for pattern formation controlled by two interacting molecules (activator and inhibitor. In this study we hypothesize that regions of high concentration of an activator develop into primary centers of ossification, the earliest sites of cranial vault bone. In addition to the Turing model, we use another diffusion equation to model a morphogen (potentially the same as the morphogen associated with formation of ossification centers associated with bone growth. These mathematical models were solved using the finite volume method. The computational domain and model parameters are determined using a large collection of experimental data showing skull bone formation in mouse at different embryonic days in both of normal and defect conditions. The results show that the relative locations of the five ossification centers that form in our model occur at the same position as those identified in experimental data. As bone grows from these ossification centers, sutures form between the bones.

  2. Frescoed Vaults: Accuracy Controlled Simplified Methodology for Planar Development of Three-Dimensional Textured Models

    Directory of Open Access Journals (Sweden)

    Marco Giorgio Bevilacqua

    2016-03-01

    Full Text Available In the field of documentation and preservation of cultural heritage, there is keen interest in 3D metric viewing and rendering of architecture for both formal appearance and color. On the other hand, operative steps of restoration interventions still require full-scale, 2D metric surface representations. The transition from 3D to 2D representation, with the related geometric transformations, has not yet been fully formalized for planar development of frescoed vaults. Methodologies proposed so far on this subject provide transitioning from point cloud models to ideal mathematical surfaces and projecting textures using software tools. The methodology used for geometry and texture development in the present work does not require any dedicated software. The different processing steps can be individually checked for any error introduced, which can be then quantified. A direct accuracy check of the planar development of the frescoed surface has been carried out by qualified restorers, yielding a result of 3 mm. The proposed methodology, although requiring further studies to improve automation of the different processing steps, allowed extracting 2D drafts fully usable by operators restoring the vault frescoes.

  3. Hardware removal after osseous free flap reconstruction.

    Science.gov (United States)

    Day, Kristine E; Desmond, Renee; Magnuson, J Scott; Carroll, William R; Rosenthal, Eben L

    2014-01-01

    Identifying risk factors for hardware removal in patients undergoing mandibular reconstruction with vascularized osseous free flaps remains a challenge. The purpose of this study is to identify potential risk factors, including osteocutaneous radial forearm versus fibular flap, for need for removal and to describe the fate of implanted hardware. Case series with chart review Setting Academic tertiary care medical center. Two hundred thirteen patients undergoing 227 vascularized osseous mandibular reconstructions between the years 2004 and 2012. Data were compiled through a manual chart review, and patients incurring hardware removals were identified. Thirty-four of 213 evaluable vascularized osseous free flaps (16%) underwent surgical removal of hardware. The average length of time to removal was 16.2 months (median 10 months), with the majority of removals occurring within the first year. Osteocutaneous radial forearm free flaps (OCRFFF) incurred a slightly higher percentage of hardware removals (9.9%) compared to fibula flaps (6.1%). Partial removal was performed in 8 of 34 cases, and approximately 38% of these required additional surgery for removal. Hardware removal was associated with continued tobacco use after mandibular reconstruction (P = .03). Removal of the supporting hardware most commonly occurs from infection or exposure in the first year. In the majority of cases the bone is well healed and the problem resolves with removal.

  4. Atomic memory access hardware implementations

    Science.gov (United States)

    Ahn, Jung Ho; Erez, Mattan; Dally, William J

    2015-02-17

    Atomic memory access requests are handled using a variety of systems and methods. According to one example method, a data-processing circuit having an address-request generator that issues requests to a common memory implements a method of processing the requests using a memory-access intervention circuit coupled between the generator and the common memory. The method identifies a current atomic-memory access request from a plurality of memory access requests. A data set is stored that corresponds to the current atomic-memory access request in a data storage circuit within the intervention circuit. It is determined whether the current atomic-memory access request corresponds to at least one previously-stored atomic-memory access request. In response to determining correspondence, the current request is implemented by retrieving data from the common memory. The data is modified in response to the current request and at least one other access request in the memory-access intervention circuit.

  5. Melton Valley Storage Tanks Capacity Increase Project, Oak Ridge National Laboratory, Oak Ridge, Tennessee

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    1995-04-01

    The US Department of Energy (DOE) proposes to construct and maintain additional storage capacity at Oak Ridge National Laboratory (ORNL), Oak Ridge, Tennessee, for liquid low-level radioactive waste (LLLW). New capacity would be provided by a facility partitioned into six individual tank vaults containing one 100,000 gallon LLLW storage tank each. The storage tanks would be located within the existing Melton Valley Storage Tank (MVST) facility. This action would require the extension of a potable water line approximately one mile from the High Flux Isotope Reactor (HFIR) area to the proposed site to provide the necessary potable water for the facility including fire protection. Alternatives considered include no-action, cease generation, storage at other ORR storage facilities, source treatment, pretreatment, and storage at other DOE facilities.

  6. Trocar-guided total tension-free vaginal mesh repair of post-hysterectomy vaginal vault prolapse.

    NARCIS (Netherlands)

    Milani, A.L.; Withagen, M.I.J.; Vierhout, M.E.

    2009-01-01

    INTRODUCTION AND HYPOTHESIS: The objective of this study was to report 1 year anatomical and functional outcomes of trocar-guided total tension-free vaginal mesh (Prolift) repair for post-hysterectomy vaginal vault prolapse with one continuous piece of polypropylene mesh. METHODS: We conducted a

  7. Mattia Preti’s vault in St John’s, Valletta: New light on a complex iconography

    DEFF Research Database (Denmark)

    Svenningsen, Jesper

    2015-01-01

    The article aims at casting new light on Mattia Preti’s well-known decoration of the vault of the conventual church of the Knight Hospitallers, now the Co-cathedral of Valletta. To a modern viewer the iconography of the decoration is all but simple. The iconographic scheme, I argue, seeks to clai...

  8. Major vault protein is expressed along the nucleus-neurite axis and associates with mRNAs in cortical neurons.

    Science.gov (United States)

    Paspalas, Constantinos D; Perley, Casey C; Venkitaramani, Deepa V; Goebel-Goody, Susan M; Zhang, YongFang; Kurup, Pradeep; Mattis, Joanna H; Lombroso, Paul J

    2009-07-01

    Major Vault Protein (MVP), the main constituent of the vault ribonucleoprotein particle, is highly conserved in eukaryotic cells and upregulated in a variety of tumors. Vaults have been speculated to function as cargo transporters in several cell lines, yet no work to date has characterized the protein in neurons. Here we first describe the cellular and subcellular expression of MVP in primate and rodent cerebral cortex, and in cortical neurons in vitro. In prefrontal, somatosensory and hippocampal cortices, MVP was predominantly expressed in pyramidal neurons. Immunogold labeled free and attached ribosomes, and structures reminiscent of vaults on the rough endoplasmic reticulum and the nuclear envelope. The nucleus was immunoreactive in association with nucleopores. Axons and particularly principal dendrites expressed MVP along individual microtubules, and in pre- and postsynaptic structures. Synapses were not labeled. Colocalization with microtubule-associated protein-2, tubulin, tau, and phalloidin was observed in neurites and growth cones in culture. Immunoprecipitation coupled with reverse transcription PCR showed that MVP associates with mRNAs that are known to be translated in response to synaptic activity. Taken together, our findings provide the first characterization of neuronal MVP along the nucleus-neurite axis and may offer new insights into its possible function(s) in the brain.

  9. Gothic Churches in Paris ST Gervais et ST Protais Image Matching 3d Reconstruction to Understand the Vaults System Geometry

    Science.gov (United States)

    Capone, M.; Campi, M.; Catuogno, R.

    2015-02-01

    This paper is part of a research about ribbed vaults systems in French Gothic Cathedrals. Our goal is to compare some different gothic cathedrals to understand the complex geometry of the ribbed vaults. The survey isn't the main objective but it is the way to verify the theoretical hypotheses about geometric configuration of the flamboyant churches in Paris. The survey method's choice generally depends on the goal; in this case we had to study many churches in a short time, so we chose 3D reconstruction method based on image dense stereo matching. This method allowed us to obtain the necessary information to our study without bringing special equipment, such as the laser scanner. The goal of this paper is to test image matching 3D reconstruction method in relation to some particular study cases and to show the benefits and the troubles. From a methodological point of view this is our workflow: - theoretical study about geometrical configuration of rib vault systems; - 3D model based on theoretical hypothesis about geometric definition of the vaults' form; - 3D model based on image matching 3D reconstruction methods; - comparison between 3D theoretical model and 3D model based on image matching;

  10. Kinematic analysis of "Lou Yun" vaults performed by top level male gymnasts: Relationship between kinematic variables and judges' score

    Directory of Open Access Journals (Sweden)

    Roman Farana

    2013-03-01

    Full Text Available BACKGROUND: In gymnastics judging, evaluation of routines in their execution is based on form and technique displayed during the performance. A vaulting performance takes a short time and is affected by the quantity of biomechanical variables. The significant relationships between the vault score and specific aspects of the gymnast’s vault should motivate coaches to monitor these variables as a part of training or routine testing. OBJECTIVE: The purpose of the study was to determine the biomechanical variables that are related to a successful performance of Lou Yun vaults performed by top level male gymnasts during the World Cup competition. METHODS: Ten top-level male gymnasts participated in this study. For the 3D kinematic analysis, two digital camcorders with a frame rate of 50 Hz were used. The data was digitized by Simi Motion software. The Hay and Reid method (1988 was used to identify the biomechanical variables that determine the linear motions of the Lou Yun vaults. A correlation analysis was used to establish the relationship between the biomechanical variables and the judges’ scores. The level of statistical significance was determined at the value of p RESULTS: Six out of 24 examined variables showed significant correlations with the scores. A significant correlation was found in the maximum height of the body centre of mass in the second flight phase (r = .68, in the height of centre of mass at mat touchdown (r = .75, in the relative height from table take-off to mat touchdown (r = –.85, in the duration of the table contact phase (r = –.71, in the duration of the second flight phase (r = .62 and in the vertical velocity of body centre of mass at table take-off (r = .70. CONCLUSIONS: The results of the study suggest that a successful execution of Lou Yun vaults and the achievement of a higher score required: to minimize duration of table support phase; to maximize the vertical velocity in the table take-off phase; to

  11. Hardware device binding and mutual authentication

    Energy Technology Data Exchange (ETDEWEB)

    Hamlet, Jason R; Pierson, Lyndon G

    2014-03-04

    Detection and deterrence of device tampering and subversion by substitution may be achieved by including a cryptographic unit within a computing device for binding multiple hardware devices and mutually authenticating the devices. The cryptographic unit includes a physically unclonable function ("PUF") circuit disposed in or on the hardware device, which generates a binding PUF value. The cryptographic unit uses the binding PUF value during an enrollment phase and subsequent authentication phases. During a subsequent authentication phase, the cryptographic unit uses the binding PUF values of the multiple hardware devices to generate a challenge to send to the other device, and to verify a challenge received from the other device to mutually authenticate the hardware devices.

  12. Hardware-in-the-Loop Testing

    Data.gov (United States)

    Federal Laboratory Consortium — RTC has a suite of Hardware-in-the Loop facilities that include three operational facilities that provide performance assessment and production acceptance testing of...

  13. Implementation of Hardware Accelerators on Zynq

    OpenAIRE

    Toft, Jakob Kenn; Nannarelli, Alberto

    2016-01-01

    In the recent years it has become obvious that the performance of general purpose processors are having trouble meeting the requirements of high performance computing applications of today. This is partly due to the relatively high power consumption, compared to the performance, of general purpose processors, which has made hardware accelerators an essential part of several datacentres and the worlds fastest super-computers. In this work, two different hardware accelerators were implemented o...

  14. Cooperative communications hardware, channel and PHY

    CERN Document Server

    Dohler, Mischa

    2010-01-01

    Facilitating Cooperation for Wireless Systems Cooperative Communications: Hardware, Channel & PHY focuses on issues pertaining to the PHY layer of wireless communication networks, offering a rigorous taxonomy of this dispersed field, along with a range of application scenarios for cooperative and distributed schemes, demonstrating how these techniques can be employed. The authors discuss hardware, complexity and power consumption issues, which are vital for understanding what can be realized at the PHY layer, showing how wireless channel models differ from more traditional

  15. Distribution of residual long-lived radioactivity in the inner concrete walls of a compact medical cyclotron vault room.

    Science.gov (United States)

    Fujibuchi, Toshioh; Nohtomi, Akihiro; Baba, Shingo; Sasaki, Masayuki; Komiya, Isao; Umedzu, Yoshiyuki; Honda, Hiroshi

    2015-01-01

    Compact medical cyclotrons have been set up to generate the nuclides necessary for positron emission tomography. In accelerator facilities, neutrons activate the concrete used to construct the vault room; this activation increases with the use of an accelerator. The activation causes a substantial radioactive waste management problem when facilities are decommissioned. In the present study, several concrete cores from the walls, ceiling and floor of a compact medical cyclotron vault room were samples 2 years after the termination of operations, and the radioactivity concentrations of radionuclides were estimated. Cylindrical concrete cores 5 cm in diameter and 10 cm in length were bored from the concrete wall, ceiling and floor. Core boring was performed at 18 points. The gamma-ray spectrum of each sample was measured using a high-purity germanium detector. The degree of activation of the concrete in the cyclotron vault room was analyzed, and the range and tendency toward activation in the vault room were examined. (60)Co and (152)Eu were identified by gamma-ray spectrometry of the concrete samples. (152)Eu and (60)Co are produced principally from the stable isotopes of europium and cobalt by neutron capture reactions. The radioactivity concentration did not vary much between the surface of the concrete and at a depth of 10 cm. Although the radioactivity concentration near the target was higher than the clearance level for radioactive waste indicated in IAEA RS-G-1.7, the mean radioactivity concentration in the walls and floor was lower than the clearance level. The radioactivity concentration of the inner concrete wall of the medical cyclotron vault room was not uniform. The areas exceeding the clearance level were in the vicinity of the target, but most of the building did not exceed the clearance levels.

  16. The role of mode of delivery on elastic fiber architecture and vaginal vault elasticity: a rodent model study.

    Science.gov (United States)

    Downing, Keith T; Billah, Mubashir; Raparia, Eva; Shah, Anup; Silverstein, Moshe C; Ahmad, Amanda; Boutis, Gregory S

    2014-01-01

    We report on an experimental study of the role of mode of delivery and pregnancy on the architecture of vaginal elastic fibers and vaginal vault elasticity in female Sprague-Dawley rats. In primiparous rats submitted to spontaneous or Cesarean delivery and virgin rats submitted to simulated delivery, the tortuosity of elastic fibers (defined as the ratio of length to end-to-end distance) was observed to decrease when measured from two days to two weeks postpartum. In addition, the measured tortuosity of elastic fibers in multiparous rats was greater than that of virgin rats. The tortuosity of elastic fibers of all rats measured at two days postpartum was found to be similar to that of multiparous rats. At two weeks postpartum the measured tortuosity of vaginal elastic fibers was indistinguishable from virgin rats, regardless of the delivery method. Borrowing from the field of polymer physics, a model is suggested that connects elastic fiber tortuosity to the resulting tension under an applied stress; fibers having high tortuosity are expected to provide less structural support than more linear, low tortuosity fibers. To probe the macroscopic effects in elasticity due to architectural changes observed in elastic fibers, we have measured the stiffness of the vaginal vault in each cohort using a pressure-infusion system. The vaginal vault stiffness of all primiparous rats measured two weeks postpartum was greater than that measured two days postpartum. In addition, the vaginal vault of virgin rats was stiffer than that of multiparous rats. These observations confirmed that vaginal vault elastic fibers undergo significant remodeling due to pregnancy and parturition, and that the complex remodeling may be a significant contributor to tissue elasticity. Remarkably, regardless of the mode of delivery or simulated tissue trauma, elastic fiber tortuosity is observed to decrease from two days to two weeks postpartum indicating the onset of repair and recovery of tissue

  17. Somersaulting techniques used in high-scoring and low-scoring Roche vaults performed by male Olympic gymnasts.

    Science.gov (United States)

    Takei, Yoshiaki; Dunn, J Hubert; Blucker, Erik P

    2007-04-01

    The aim of this study was to compare the somersaulting techniques used in the 16 highest-scoring and 16 lowest-scoring Roche vaults. Our hypothesis was that the gymnasts performing the highest-scoring Roche vaults would demonstrate a better technique than those performing the lowest-scoring Roche vaults while on the horse (pushing off the horse more effectively), somersaulting (executing most of the required somersaults higher in flight), and landing (showing a greater control). A 16-mm motion picture camera, operating at 100 Hz, recorded the vaults during the official competition. The two-dimensional direct linear transformation was used for spatial reconstruction. The results of t-tests (P gymnasts, the high-scoring gymnasts had: (1) greater height of body centre of mass and a more fully extended body position at the horse take-off; (2) greater height of body centre of mass at the peak of post-flight, knee release, and touchdown on the mat; (3) greater horizontal and vertical displacements of body centre of mass, greater somersaulting rotation, and longer time from the knee release to mat touchdown; and (d) markedly smaller landing point deductions. In conclusion, a successful Roche vault is likely when the focus is on: (a) leaving the horse with a large vertical velocity in an extended body position to achieve a high trajectory of centre of mass by first extending the legs, then immediately pushing off the horse vigorously, using the muscles of the upper extremity; (b) grasping the knees immediately after the take-off from the horse, achieving the tightly tucked body position early during the ascent to the peak, and completing two-thirds of the required somersaults at a great height; (c) releasing the knees and extending the body above the top level of the horse; and (d) contacting the mat with a high body centre of mass position.

  18. Global ex-situ crop diversity conservation and the Svalbard Global Seed Vault: assessing the current status.

    Science.gov (United States)

    Westengen, Ola T; Jeppson, Simon; Guarino, Luigi

    2013-01-01

    Ex-situ conservation of crop diversity is a global concern, and the development of an efficient and sustainable conservation system is a historic priority recognized in international law and policy. We assess the completeness of the safety duplication collection in the Svalbard Global Seed Vault with respect to data on the world's ex-situ collections as reported by the Food and Agriculture Organization of the United Nations. Currently, 774,601 samples are deposited at Svalbard by 53 genebanks. We estimate that more than one third of the globally distinct accessions of 156 crop genera stored in genebanks as orthodox seeds are conserved in the Seed Vault. The numbers of safety duplicates of Triticum (wheat), Sorghum (sorghum), Pennisetum (pearl millet), Eleusine (finger millet), Cicer (chickpea) and Lens (lentil) exceed 50% of the estimated numbers of distinct accessions in global ex-situ collections. The number of accessions conserved globally generally reflects importance for food production, but there are significant gaps in the safety collection at Svalbard in some genera of high importance for food security in tropical countries, such as Amaranthus (amaranth), Chenopodium (quinoa), Eragrostis (teff) and Abelmoschus (okra). In the 29 food-crop genera with the largest number of accessions stored globally, an average of 5.5 out of the ten largest collections is already represented in the Seed Vault collection or is covered by existing deposit agreements. The high coverage of ITPGRFA Annex 1 crops and of those crops for which there is a CGIAR mandate in the current Seed Vault collection indicates that existence of international policies and institutions are important determinants for accessions to be safety duplicated at Svalbard. As a back-up site for the global conservation system, the Seed Vault plays not only a practical but also a symbolic role for enhanced integration and cooperation for conservation of crop diversity.

  19. Global ex-situ crop diversity conservation and the Svalbard Global Seed Vault: assessing the current status.

    Directory of Open Access Journals (Sweden)

    Ola T Westengen

    Full Text Available Ex-situ conservation of crop diversity is a global concern, and the development of an efficient and sustainable conservation system is a historic priority recognized in international law and policy. We assess the completeness of the safety duplication collection in the Svalbard Global Seed Vault with respect to data on the world's ex-situ collections as reported by the Food and Agriculture Organization of the United Nations. Currently, 774,601 samples are deposited at Svalbard by 53 genebanks. We estimate that more than one third of the globally distinct accessions of 156 crop genera stored in genebanks as orthodox seeds are conserved in the Seed Vault. The numbers of safety duplicates of Triticum (wheat, Sorghum (sorghum, Pennisetum (pearl millet, Eleusine (finger millet, Cicer (chickpea and Lens (lentil exceed 50% of the estimated numbers of distinct accessions in global ex-situ collections. The number of accessions conserved globally generally reflects importance for food production, but there are significant gaps in the safety collection at Svalbard in some genera of high importance for food security in tropical countries, such as Amaranthus (amaranth, Chenopodium (quinoa, Eragrostis (teff and Abelmoschus (okra. In the 29 food-crop genera with the largest number of accessions stored globally, an average of 5.5 out of the ten largest collections is already represented in the Seed Vault collection or is covered by existing deposit agreements. The high coverage of ITPGRFA Annex 1 crops and of those crops for which there is a CGIAR mandate in the current Seed Vault collection indicates that existence of international policies and institutions are important determinants for accessions to be safety duplicated at Svalbard. As a back-up site for the global conservation system, the Seed Vault plays not only a practical but also a symbolic role for enhanced integration and cooperation for conservation of crop diversity.

  20. Maximal Power of the Lower Limbs of Youth Gymnasts and Biomechanical Indicators of the Forward Handspring Vault Versus the Sports Result.

    Science.gov (United States)

    Kochanowicz, Andrzej; Kochanowicz, Kazimierz; Niespodziúski, Bartłomiej; Mieszkowski, Jan; Aschenbrenner, Piotr; Bielec, Grzegorz; Szark-Eckardt, Mirosława

    2016-12-01

    The aim of the study was to define the relationship between maximal power of lower limbs, the biomechanics of the forward handspring vault and the score received during a gymnastics competition. The research involved 42 gymnasts aged 9-11 years competing in the Poland's Junior Championships. The study consisted of three stages: first -estimating the level of indicators of maximal power of lower limbs tested on a force plate during the countermovement jump; second - estimating the level of biomechanical indicators of the front handspring vault. For both mentioned groups of indicators and the score received by gymnasts during the vault, linear correlation analyses were made. The last stage consisted of conducting multiple regression analysis in order to predict the performance level of the front handspring vault. Results showed a positive correlation (0.401, p front handstand vault (13.38 ± 1.02 points). However, the highest significant (p < 0.001) correlation with the judges' score was revealed in the angle of the hip joint in the second phase of the flight (196.00 ± 16.64°) and the contact time of hands with the vault surface (0.264 ± 0.118 s), where correlation coefficients were: -0.671 and -0.634, respectively. In conclusion, the angles of the hip joint in the second phase of the flight and when the hands touched the vault surface proved to be the most important indicators for the received score.

  1. Nondestructive Analysis of MET-5 Paint Can at TA35 Building 2 A-Wing Vault

    Energy Technology Data Exchange (ETDEWEB)

    Desimone, David J. [Los Alamos National Lab. (LANL), Los Alamos, NM (United States); Vo, Duc Ta [Los Alamos National Lab. (LANL), Los Alamos, NM (United States)

    2016-11-03

    In Building 2 A-wing vault MET-5 has some drums and other packages they wanted NEN-1 help identifying nondestructively. Measurements using a mechanically cooled portable high-purity germanium HPGe Ortec detective were taken of a paint can container labeled DU-2A to determine if any radioactive material was inside. The HPGe detector measures the gamma rays emitted by radioactive material and displays it as a spectrum. The spectrum is used to identify this radioactive material by using appropriate analysis software and identifying the gamma ray peaks. A paint can container, DU-2A, was analyzed with PeakEasy 4.84 and FRAM 5.2. The FRAM report is shown. The enrichment is 0.091% U235 and 99.907% U238. This material is depleted uranium. The measurement was performed in the near field, and to extract a mass a far field measurement will need to be taken.

  2. Laparoscopic sacrocolpopexy compared with open abdominal sacrocolpopexy for vault prolapse repair: a randomised controlled trial.

    Science.gov (United States)

    Coolen, Anne-Lotte W M; van Oudheusden, Anique M J; Mol, Ben Willem J; van Eijndhoven, Hugo W F; Roovers, Jan-Paul W R; Bongers, Marlies Y

    2017-10-01

    The objective was to evaluate the functional outcome after laparoscopic sacrocolpopexy versus open sacrocolpopexy in women with vault prolapse. A multicentre randomised controlled trial was carried out at four teaching and two university hospitals in the Netherlands in women with symptomatic vault prolapse requiring surgical treatment. Participants were randomised for laparoscopic or open sacrocolpopexy. Primary outcome was disease-specific quality of life measured using the Urinary Distress Inventory (UDI) questionnaire at 12 months' follow-up. Secondary outcomes included anatomical outcome and perioperative data. We needed 74 participants to show a difference of 10 points on the prolapse domain of the UDI 12 months after surgery (power of 80%, α error 0.05). Between 2007 and 2012, a total of 74 women were randomised. Follow-up after 12 months showed no significant differences in domain scores of the UDI between the two groups. After 12 months, both groups reported a UDI score of 0.0 (IQR: 0-0) for the domain "genital prolapse", which was the primary outcome. There were no significant differences between the two groups (p = 0.93). The number of severe complications was 4 in the laparoscopic group versus 7 in the open abdominal group (RR 0.57; 95% CI 0.50-2.27). There was less blood loss and a shorter hospital stay after laparoscopy; 2 (IQR 2-3) versus 4 (IQR 3-5) days, which was statistically different. There was no significant difference in anatomical outcome at 12 months. Our trial provides evidence to support a laparoscopic approach when performing sacrocolpopexy, as there was less blood loss and hospital stay was shorter, whereas functional and anatomical outcome were not statistically different.

  3. Underground Parking structure built with deep foundations and vault precast elements in Spain

    Directory of Open Access Journals (Sweden)

    Fernández-Ordóñez, D.

    2012-09-01

    Full Text Available In many cases the only places available for the construction of a new car park are the existing streets or roads. These streets may also have important or historic buildings very close to the structure, which means that they cannot be disturbed in any way during the construction of the parking structure. In this particular case, the novelty is that the top deck is solved with a unique structure: a vault that interacts with the pile wall not only for vertical but also for horizontal loads due to the arch mechanism. The construction of the vault is solved as a large precast element of one piece of more than 16 in length and 2.40m in width, which is built in the factory, transported with the help of trucks and erected on site with large cranes.

    En muchos casos las únicas localizaciones para construir aparcamientos son las calles o carreteras. Estas calles también suelen tener alrededor importantes edificios históricos muy cercanos a la propia estructura. En este caso particular la novedad reside en que el forjado superior está resuelto con una estructura especial: una bóveda que interacciona con la pantalla de pilotes no solo en el sentido vertical sino también en el horizontal formando un verdadero mecanismo de arco. La construcción de la bóveda se ha resuelto con grandes elementos prefabricados de una pieza de más de 16m de longitud y de 2,40m de ancho. Se han fabricado en una factoría, transportados y montados en obra con grandes grúas.

  4. Design and Implementation of a Tool for Automating Cluster Configuration : For a Software Defined Storage System

    OpenAIRE

    Marakani, Sindhusha

    2015-01-01

    Context Traditional storage systems are proving to be inefficient to handle the growing storage need of a modern IT organization. The need for a cost effective and scalable storage framework has led to the development of a Software Defined Storage (SDS) solution. SDS can be defined as an enterprise class distributed storage solution that uses standard hardware, with all the important storage and management functions performed by an intelligent software. Configuring and maintenance of these st...

  5. The FTK: A Hardware Track Finder for the ATLAS Trigger

    CERN Document Server

    Alison, J; Anderson, J; Andreani, A; Andreazza, A; Annovi, A; Antonelli, M; Atkinson, M; Auerbach, B; Baines, J; Barberio, E; Beccherle, R; Beretta, M; Biesuz, N V; Blair, R; Blazey, G; Bogdan, M; Boveia, A; Britzger, D; Bryant, P; Burghgrave, B; Calderini, G; Cavaliere, V; Cavasinni, V; Chakraborty, D; Chang, P; Cheng, Y; Cipriani, R; Citraro, S; Citterio, M; Crescioli, F; Dell'Orso, M; Donati, S; Dondero, P; Drake, G; Gadomski, S; Gatta, M; Gentsos, C; Giannetti, P; Giulini, M; Gkaitatzis, S; Howarth, J W; Iizawa, T; Kapliy, A; Kasten, M; Kim, Y K; Kimura, N; Klimkovich, T; Kordas, K; Korikawa, T; Krizka, K; Kubota, T; Lanza, A; Lasagni, F; Liberali, V; Li, H L; Love, J; Luciano, P; Luongo, C; Magalotti, D; Melachrinos, C; Meroni, C; Mitani, T; Negri, A; Neroutsos, P; Neubauer, M; Nikolaidis, S; Okumura, Y; Pandini, C; Penning, B; Petridou, C; Piendibene, M; Proudfoot, J; Rados, P; Roda, C; Rossi, E; Sakurai, Y; Sampsonidis, D; Sampsonidou, D; Schmitt, S; Schoening, A; Shochet, M; Shojaii, S; Soltveit, H; Sotiropoulou, C L; Stabile, A; Tang, F; Testa, M; Tompkins, L; Vercesi, V; Villa, M; Volpi, G; Webster, J; Wu, X; Yorita, K; Yurkewicz, A; Zeng, J C; Zhang, J

    2014-01-01

    The ATLAS experiment trigger system is designed to reduce the event rate, at the LHC design luminosity of 1034 cm-2 s-1, from the nominal bunch crossing rate of 40 MHz to less than 1 kHz for permanent storage. During Run 1, the LHC has performed exceptionally well, routinely exceeding the design luminosity. From 2015 the LHC is due to operate with higher still luminosities. This will place a significant load on the High Level Trigger system, both due to the need for more sophisticated algorithms to reject background, and from the larger data volumes that will need to be processed. The Fast TracKer is a hardware upgrade for Run 2, consisting of a custom electronics system that will operate at the full rate for Level-1 accepted events of 100 kHz and provide high quality tracks at the beginning of processing in the High Level Trigger. This will perform track reconstruction using hardware with massive parallelism using associative memories and FPGAs. The availability of the full tracking information will enable r...

  6. A Hardware Track Trigger (FTK) for the ATLAS Trigger

    CERN Document Server

    Zhang, J; The ATLAS collaboration

    2014-01-01

    The design and studies of the performance for the ATLAS hardware Fast TracKer (FTK) are presented. The existing trigger system of the ATLAS experiment is deployed to reduce the event rate from the bunch crossing rate of 40 MHz to < 1 KHz for permanent storage at the LHC design luminosity of 10^34 cm^-2 s^-1. The LHC has performed exceptionally well and routinely exceeds the design luminosity and from 2015 is due to operate with higher still luminosities. This will place a significant load on the High Level trigger (HLT) system, both due to the need for more sophisticated algorithms to reject background, and from the larger data volumes that will need to be processed. The Fast TracKer is a custom electronics system that will operate at the full Level-1 accepted rate of 100 KHz and provide high quality tracks at the beginning of processing in the HLT. This will be performing by track reconstruction using hardware with massive parallelism using associative memories (AM) and FPGAs. The availability of the full...

  7. Quantitative hardware prediction modeling for hardware/software co-design

    NARCIS (Netherlands)

    Meeuws, R.J.

    2012-01-01

    Hardware estimation is an important factor in Hardware/Software Co-design. In this dissertation, we present the Quipu Modeling Approach, a high-level quantitative prediction model for HW/SW Partitioning using statistical methods. Our approach uses linear regression between software complexity

  8. Hardware Acceleration of Adaptive Neural Algorithms.

    Energy Technology Data Exchange (ETDEWEB)

    James, Conrad D. [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States)

    2017-11-01

    As tradit ional numerical computing has faced challenges, researchers have turned towards alternative computing approaches to reduce power - per - computation metrics and improve algorithm performance. Here, we describe an approach towards non - conventional computing that strengthens the connection between machine learning and neuroscience concepts. The Hardware Acceleration of Adaptive Neural Algorithms (HAANA) project ha s develop ed neural machine learning algorithms and hardware for applications in image processing and cybersecurity. While machine learning methods are effective at extracting relevant features from many types of data, the effectiveness of these algorithms degrades when subjected to real - world conditions. Our team has generated novel neural - inspired approa ches to improve the resiliency and adaptability of machine learning algorithms. In addition, we have also designed and fabricated hardware architectures and microelectronic devices specifically tuned towards the training and inference operations of neural - inspired algorithms. Finally, our multi - scale simulation framework allows us to assess the impact of microelectronic device properties on algorithm performance.

  9. A Hardware Abstraction Layer in Java

    DEFF Research Database (Denmark)

    Schoeberl, Martin; Korsholm, Stephan; Kalibera, Tomas

    2011-01-01

    Embedded systems use specialized hardware devices to interact with their environment, and since they have to be dependable, it is attractive to use a modern, type-safe programming language like Java to develop programs for them. Standard Java, as a platform-independent language, delegates access...... to devices, direct memory access, and interrupt handling to some underlying operating system or kernel, but in the embedded systems domain resources are scarce and a Java Virtual Machine (JVM) without an underlying middleware is an attractive architecture. The contribution of this article is a proposal...... for Java packages with hardware objects and interrupt handlers that interface to such a JVM. We provide implementations of the proposal directly in hardware, as extensions of standard interpreters, and finally with an operating system middleware. The latter solution is mainly seen as a migration path...

  10. Economic impact of syndesmosis hardware removal.

    Science.gov (United States)

    Lalli, Trapper A J; Matthews, Leslie J; Hanselman, Andrew E; Hubbard, David F; Bramer, Michelle A; Santrock, Robert D

    2015-09-01

    Ankle syndesmosis injuries are commonly seen with 5-10% of sprains and 10% of ankle fractures involving injury to the ankle syndesmosis. Anatomic reduction has been shown to be the most important predictor of clinical outcomes. Optimal surgical management has been a subject of debate in the literature. The method of fixation, number of screws, screw size, and number of cortices are all controversial. Postoperative hardware removal has also been widely debated in the literature. Some surgeons advocate for elective hardware removal prior to resuming full weightbearing. Returning to the operating room for elective hardware removal results in increased cost to the patient, potential for infection or complication(s), and missed work days for the patient. Suture button devices and bioabsorbable screw fixation present other options, but cortical screw fixation remains the gold standard. This retrospective review was designed to evaluate the economic impact of a second operative procedure for elective removal of 3.5mm cortical syndesmosis screws. Two hundred and two patients with ICD-9 code for "open treatment of distal tibiofibular joint (syndesmosis) disruption" were identified. The medical records were reviewed for those who underwent elective syndesmosis hardware removal. The primary outcome measurements included total hospital billing charges and total hospital billing collection. Secondary outcome measurements included average individual patient operative costs and average operating room time. Fifty-six patients were included in the study. Our institution billed a total of $188,271 (USD) and collected $106,284 (55%). The average individual patient operating room cost was $3579. The average operating room time was 67.9 min. To the best of our knowledge, no study has previously provided cost associated with syndesmosis hardware removal. Our study shows elective syndesmosis hardware removal places substantial economic burden on both the patient and the healthcare system

  11. Quantum neuromorphic hardware for quantum artificial intelligence

    Science.gov (United States)

    Prati, Enrico

    2017-08-01

    The development of machine learning methods based on deep learning boosted the field of artificial intelligence towards unprecedented achievements and application in several fields. Such prominent results were made in parallel with the first successful demonstrations of fault tolerant hardware for quantum information processing. To which extent deep learning can take advantage of the existence of a hardware based on qubits behaving as a universal quantum computer is an open question under investigation. Here I review the convergence between the two fields towards implementation of advanced quantum algorithms, including quantum deep learning.

  12. Human Centered Hardware Modeling and Collaboration

    Science.gov (United States)

    Stambolian Damon; Lawrence, Brad; Stelges, Katrine; Henderson, Gena

    2013-01-01

    In order to collaborate engineering designs among NASA Centers and customers, to in clude hardware and human activities from multiple remote locations, live human-centered modeling and collaboration across several sites has been successfully facilitated by Kennedy Space Center. The focus of this paper includes innovative a pproaches to engineering design analyses and training, along with research being conducted to apply new technologies for tracking, immersing, and evaluating humans as well as rocket, vehic le, component, or faci lity hardware utilizing high resolution cameras, motion tracking, ergonomic analysis, biomedical monitoring, wor k instruction integration, head-mounted displays, and other innovative human-system integration modeling, simulation, and collaboration applications.

  13. Hardware Accelerated Sequence Alignment with Traceback

    Directory of Open Access Journals (Sweden)

    Scott Lloyd

    2009-01-01

    in a timely manner. Known methods to accelerate alignment on reconfigurable hardware only address sequence comparison, limit the sequence length, or exhibit memory and I/O bottlenecks. A space-efficient, global sequence alignment algorithm and architecture is presented that accelerates the forward scan and traceback in hardware without memory and I/O limitations. With 256 processing elements in FPGA technology, a performance gain over 300 times that of a desktop computer is demonstrated on sequence lengths of 16000. For greater performance, the architecture is scalable to more processing elements.

  14. Comparative analyis of kinematic characteristics of motor actions of highly skilled and skilled female gymnasts during execution of «front handspring» type vault

    OpenAIRE

    Гамалій, Володимир; Хмельницька, Ірина; Крупеня, Світлана

    2014-01-01

    This paper presents a comparison of the kinematic characteristics of motor actions of skilled and highly skilled female gymnasts in the “front handspring” type vault on the table, based on the results of biomechanical analysis. The features of motor actions technique under a modified design of the apparatus have been studied. Statistically significant differences in the technique of kinematic characteristics of skilled and highly skilled female gymnasts during performance of vaults have been ...

  15. TARGET-DIRECTED RUNNING IN GYMNASTICS: THE ROLE OF THE SPRINGBOARD POSITION AS AN INFORMATIONAL SOURCE TO REGULATE HANDSPRINGS ON VAULT

    OpenAIRE

    T. Heinen; D. Jeraj; M. Thoeren; P.M. Vinken

    2011-01-01

    Empirical evidence highlights the role of visual information to control gymnastics vaulting and thus neglects a stereotyped approach run. However, there is no evidence on which informational source this regulation is based on. The aim of this study was to examine the position of the springboard as an informational source in the regulation of the handspring on vault. The hypothesis tested was that the action of running towards the springboard brings about changes in the approach run kinematics...

  16. SYNTHESIS OF INFORMATION SYSTEM FOR SMART HOUSE HARDWARE MANAGEMENT

    Directory of Open Access Journals (Sweden)

    Vikentyeva Olga Leonidovna

    2017-10-01

    Full Text Available Subject: smart house maintenance requires taking into account a number of factors: resource-saving, reduction of operational expenditures, safety enhancement, providing comfortable working and leisure conditions. Automation of the corresponding engineering systems of illumination, climate control, security as well as communication systems and networks via utilization of contemporary technologies (e.g., IoT - Internet of Things poses a significant challenge related to storage and processing of the overwhelmingly massive volume of data whose utilization extent is extremely low nowadays. Since a building’s lifespan is large enough and exceeds the lifespan of codes and standards that take into account the requirements of safety, comfort, energy saving, etc., it is necessary to consider management aspects in the context of rational use of large data at the stage of information modeling. Research objectives: increase the efficiency of managing the subsystems of smart buildings hardware on the basis of a web-based information system that has a flexible multi-level architecture with several control loops and an adaptation model. Materials and methods: since a smart house belongs to man-machine systems, the cybernetic approach is considered as the basic method for design and research of information management system. Instrumental research methods are represented by set-theoretical modelling, automata theory and architectural principles of organization of information management systems. Results: a flexible architecture of information system for management of smart house hardware subsystems has been synthesized. This architecture encompasses several levels: client level, application level and data level as well as three layers: presentation level, actuating device layer and analytics layer. The problem of growing volumes of information processed by realtime message controller is attended by employment of sensors and actuating mechanisms with configurable

  17. Quantitative estimation of the state of vault feet gymnasts on the different stages of the long-term training

    Directory of Open Access Journals (Sweden)

    O.V. Makarova

    2013-10-01

    Full Text Available The analysis of the vaults given about the state is conducted feet gymnasts on the different stages of the long-term training. 93 sportswomen of different qualification took part in research. The system of Big foot was used. It is set that on the early stages of the long-term training for gymnasts observed flattening heights of unevenness of navicular bone above the floor. With growth of qualification of sportswomen to avoid development of pathological changes of vaults feet actually not possibly. It is conditioned the rules of competitions to complication of competition compositions and technique of execution of elements of calisthenics. It is marked that appearance of flattening feet requires: corrections in the system of training; introduction of the specially developed methods on the removal of existent deformations; prophylaxis of flat-footedness; strengthening of musculoskeletal system feet.

  18. Natural radioactivity level in materials used for medieval vaulting in the territory of the central Balkan region

    Directory of Open Access Journals (Sweden)

    Bjelić Igor S.

    2016-01-01

    Full Text Available This work presents the results of an investigation undertaken to determine the level of natural radioactivity in the traditional building materials used for medieval indoor vaulted constructions in the territory of the central Balkan region. Indoor radiation exposure varies appreciably if it comes from the earth building materials, hence the presence of natural radioisotopes of 226Ra, 232Th, and 40K in masonry vaulted constructions was analyzed using gamma ray spectrometry. In addition, the internal health hazard index, the absorbed dose rates and the effective annual doses were calculated. The results were then compared both with the reported data from the previous studies concerning the territory of the Balkan Peninsula, as well as with the worldwide values for the materials of historic buildings. The results obtained from the materials examined in this paper all showed the radioactivity levels below the maximum permitted values. [Projekat Ministarstva nauke Republike Srbije, br. 171007 i br. 43009

  19. TARGET-DIRECTED RUNNING IN GYMNASTICS: THE ROLE OF THE SPRINGBOARD POSITION AS AN INFORMATIONAL SOURCE TO REGULATE HANDSPRINGS ON VAULT

    Directory of Open Access Journals (Sweden)

    T. Heinen

    2011-11-01

    Full Text Available Empirical evidence highlights the role of visual information to control gymnastics vaulting and thus neglects a stereotyped approach run. However, there is no evidence on which informational source this regulation is based on. The aim of this study was to examine the position of the springboard as an informational source in the regulation of the handspring on vault. The hypothesis tested was that the action of running towards the springboard brings about changes in the approach run kinematics and handspring kinematics that relate directly to the position of the springboard. Therefore, kinematics of N = 14 female expert gymnasts’ handsprings on vault and their approach runs were examined while manipulating the position of the springboard. The results revealed that expert gymnasts placed their feet on average in the same position on the springboard and adapted to the springboard position during the last three steps of the approach run. A smaller springboard distance to the front edge of the vaulting table resulted in a different hand placement on the vaulting table, a shorter first flight phase, a take-off angle closer to 90° and a longer second flight phase. Findings suggest that the position of the springboard is a relevant informational source in gymnastics vaulting. We state that knowledge about relationships between informational sources in the environment and the resulting regulatory processes in athletes may help coaches to develop specific training programmes in order to optimize performance in complex skills.

  20. Continental glaciation and its potential impact on a used-fuel disposal vault in the Canadian Shield

    Energy Technology Data Exchange (ETDEWEB)

    Ates, Y.; Bruneau, D.; Ridgway, W.R

    1997-09-01

    AECL has been assessing the concept of nuclear fuel waste disposal in a vault excavated at a depth ranging between 500 m and 1000 m in a plutonic rock mass of the Canadian Shield. Glaciation is a natural process that has occurred in the past, and is likely to occur in the future, thus causing changes in the loading conditions on the rock mass hosting the disposal vault. Because the rock mass is a natural barrier to the migration of radionuclides, it is important to evaluate its integrity under load changes caused by the glaciation process. Assuming that the magnitude and extent of the future glaciation will be similar to those of the past, we have reviewed published data pertaining to the last continental ice sheet that covered a large area of North America. Estimates have been madefor the magnitude of stresses due to ice sheet loading for a vault located at depths of 500 to 1000 m. These analyses have shown that the uniform loading of a continental ice sheet would reduce the deviatoric stresses in the Canadian Shield, creating more favourable conditions than those existing at the present time, namely, high horizontal stresses. The effects of surface erosion and increase in the in-situ shear stresses have also been examined. Based on the existing data and structural modelling studies, there would be no significant structural effect on a disposal vault located at 1000-m depth in a plutonic rock. At its maximum size, an ice sheet comparable to the Laurentide ice sheet could reactivate the faults and fracture zones along the perimeter areas. Our analyses have been based on fully drained conditions only. At a potential disposal site, it would be important also to consider the potential for excess pore pressure in the analyses. (author)

  1. Effect of theoretical biomechanics on open jump the platform jumps performance using jumps (vault) in artistic gymnastics

    OpenAIRE

    Hassan, Haider Saud; Hanna, Sura Jamil; Ameen, Ferdous Majeed

    2015-01-01

    The biomechanics is an important science the physical education, thereby sports analyzed and thereafter correct the technical errors. Gymnastics is more related with biomechanics than other sports, this science contribute in the analysis, illustration, understanding, and improvement of sports technique. This study aimed to identify the effectiveness of theoretical information on the Platform Jumps (Vault) Performance, and to identify the difference of the performance level between pre-test an...

  2. Effect of Accommodation on Vaulting and Movement of Posterior Chamber Phakic Lenses in Eyes With Implantable Collamer Lenses.

    Science.gov (United States)

    Lee, Hun; Kang, David Sung Yong; Ha, Byoung Jin; Choi, Moonjung; Kim, Eung Kweon; Seo, Kyoung Yul; Kim, Tae-Im

    2015-10-01

    To investigate and compare vaulting and movement changes during accommodation in eyes with the V4c and V4 implantable collamer lenses (ICL). Comparative, observational case series. The medical records of 35 eyes (18 patients) with the V4 ICL and 51 eyes (26 patients) with the V4c ICL were retrospectively examined and included in analyses. Anterior chamber depth (ACD), posterior corneal surface-to-ICL distance (endo-ICL distance), pupil size, and postoperative vaulting were evaluated using the Visante anterior chamber optical coherence tomography system. Images were taken during the nonaccommodative and accommodative states 3 months after ICL implantation. Refractive error, keratometry values, axial length, intraocular pressure, and central corneal thickness were evaluated at 3 months postoperatively. ICL vaulting did not significantly change during accommodation in eyes with either the V4 or V4c ICL (P = .532 for V4 ICL and P = .415 for V4c ICL). However, significant reductions in ACD, endo-ICL distance, and pupil size were observed during accommodation in both groups. In eyes with a V4 ICL, the change in [Δ] ACD was 0.2 ± 0.1 mm (P size was 0.5 ± 0.9 mm (P = .021). For eyes with the V4c ICL, ΔACD was 0.2 ± 0.2 mm (P size was 0.8 ± 1.2 mm (P affect ICL vaulting differently in eyes with either the V4 or V4C ICLs. Copyright © 2015 Elsevier Inc. All rights reserved.

  3. The role of mode of delivery on elastic fiber architecture and vaginal vault elasticity: a rodent model study

    OpenAIRE

    Downing, Keith; Billah, Mubashir; Raparia, Eva; Shah, Anup; Silverstein, Moshe; Ahmad, Amanda; Boutis, Gregory S.

    2013-01-01

    We report on an experimental study of the role of mode of delivery and pregnancy on the architecture of vaginal elastic fibers and vaginal vault elasticity in female Sprague-Dawley rats. In primiparous rats submitted to spontaneous or Cesarean delivery and virgin rats submitted to simulated delivery, the tortuosity of elastic fibers (defined as the ratio of length to end-to-end distance) was observed to decrease when measured two days to two weeks postpartum. In addition, the measured tortuos...

  4. External radiation therapy boost to the vaginal vault: feasibility of intracavitary dosimetry using a commercial diode system.

    Science.gov (United States)

    Settineri, N; Pergolizzi, S; Raffaele, L; Maisano, R; Russi, E G

    1999-04-01

    An overall check of the whole dosimetry procedure by intracavitary in vivo dosimetry, using n-type silicon diode dosimeter, was performed during 6-MV x-ray irradiation of the vaginal vault. The dose delivered to the isocenter by all treatment fields was evaluated. The diode dosimeter was calibrated against an ion chamber and tissue maximum ratio, field size factor, SSD factor, and temperature dependence studies were performed. Diode system accuracy, linearity, and reproducibility were also tested. Patients' dose data were collected and comparision was made with respect to treatment-planning dose calculations. Ten patients with cervical cancer and endometrial cancer were treated with surgery and irradiation. During the boost to the vaginal vault, a diode was inserted by an intravaginal device and the vaginal vault was the isocenter of the four fields. The field size generally was not larger than 10 x 10 cm2. Diode-measured "tissue maximum ratio" agreed to within 1% with those measured with an ion chamber in field from 7 x 7 to 10 x 10 cm2. The diode also exhibited a temperature dependence of 0.1% degrees C(-1). For 10 patients treated with a 6-MV beam, the agreement with treatment-planning dose calculations was shown to be better than +/-4%. The good accuracy and reproducibility of the diode system shows that determination of the dose at isocenter, for patients treated in the pelvic region, can be performed with n-type diodes accurately. On the other hand, in the vaginal vault boost, external-beam radiotherapy is delivered accurately and in vivo dosimetry is really not indicated.

  5. Spent-fuel dry-storage testing at E-MAD (March 1978-March 1982)

    Energy Technology Data Exchange (ETDEWEB)

    Unterzuber, R.; Milnes, R.D.; Marinkovich, B.A.; Kubancsek, G.M.

    1982-09-01

    From March 1978 through March 1982, spent fuel dry storage tests were conducted at the Engine Maintenance, Assembly and Disassembly (E-MAD) facility on the Nevada Test Site to confirm that commercial reactor spent fuel could be encapsulated and passively stored in one or more interim dry storage cell concepts. These tests were: electrically heated drywell, isolated and adjacent drywell, concrete silo, fuel assembly internal temperature measurement, and air-cooled vault. This document presents the test data and results as well as results from supporting test operations (spent fuel calorimetry and canister gas sampling).

  6. Speed test results and hardware/software study of computational speed problem, appendix D

    Science.gov (United States)

    1984-01-01

    The HP9845C is a desktop computer which is tested and evaluated for processing speed. A study was made to determine the availability and approximate cost of computers and/or hardware accessories necessary to meet the 20 ms sample period speed requirements. Additional requirements were that the control algorithm could be programmed in a high language and that the machine have sufficient storage to store the data from a complete experiment.

  7. A three dimensional observation of palatal vault growth in children using mixed effect analysis: a 9 year longitudinal study.

    Science.gov (United States)

    Yang, Sung-Tae; Kim, Hong-Kyun; Lim, Young Seol; Chang, Mi-Sook; Lee, Seung-Pyo; Park, Young-Seok

    2013-12-01

    The understanding of palatine vault growth in normal subjects is important to orthodontists. The aim of this study was to evaluate three dimensional (3D) longitudinal changes in the palatal vault from 6 to 14 years of age. Complete dental stone casts were biennially prepared for 50 subjects (25 girls and 25 boys) followed up from 6 to 14 years of age. Virtual casts were constructed using 3D laser scanning and reconstruction software. The reference gingival plane was constructed. The palatal heights were measured from a total of 12 quadrisectional points between the most gingival points of the palatal dentogingival junctions from the canine to the first molar. In addition, the palatal heights were measured from a total of 12 lateral and medial endpoints of the palatine rugae. The measurement changes over time were analyzed using a mixed-effect analysis. There were significant annual increases in all of the variables related to palatal height. However, the individual random variability at baseline was quite large. There was no significant sexual dimorphism in the linear measurements or in the annual increases as fixed effects in the model. During the observation period, increases in palatal vault height were significant in all regions. The growth pattern seemed to differ between genders even though it was not significant. More elaborate methodology is necessary to gain a better understanding of 3D palatal growth.

  8. NSun2-Mediated Cytosine-5 Methylation of Vault Noncoding RNA Determines Its Processing into Regulatory Small RNAs

    Directory of Open Access Journals (Sweden)

    Shobbir Hussain

    2013-07-01

    Full Text Available Autosomal-recessive loss of the NSUN2 gene has been identified as a causative link to intellectual disability disorders in humans. NSun2 is an RNA methyltransferase modifying cytosine-5 in transfer RNAs (tRNAs, yet the identification of cytosine methylation in other RNA species has been hampered by the lack of sensitive and reliable molecular techniques. Here, we describe miCLIP as an additional approach for identifying RNA methylation sites in transcriptomes. miCLIP is a customized version of the individual-nucleotide-resolution crosslinking and immunoprecipitation (iCLIP method. We confirm site-specific methylation in tRNAs and additional messenger and noncoding RNAs (ncRNAs. Among these, vault ncRNAs contained six NSun2-methylated cytosines, three of which were confirmed by RNA bisulfite sequencing. Using patient cells lacking the NSun2 protein, we further show that loss of cytosine-5 methylation in vault RNAs causes aberrant processing into Argonaute-associated small RNA fragments that can function as microRNAs. Thus, impaired processing of vault ncRNA may contribute to the etiology of NSun2-deficiency human disorders.

  9. Perioperative Outcomes and Management in Pediatric Complex Cranial Vault Reconstruction: A Multicenter Study from the Pediatric Craniofacial Collaborative Group.

    Science.gov (United States)

    Stricker, Paul A; Goobie, Susan M; Cladis, Franklyn P; Haberkern, Charles M; Meier, Petra M; Reddy, Srijaya K; Nguyen, Thanh T; Cai, Lingyu; Polansky, Marcia; Szmuk, Peter; Fiadjoe, John; Soneru, Codruta; Falcon, Ricardo; Petersen, Timothy; Kowalczyk-Derderian, Courtney; Dalesio, Nicholas; Budac, Stefan; Groenewald, Neels; Rubens, Daniel; Thompson, Douglas; Watts, Rheana; Gentry, Katherine; Ivanova, Iskra; Hetmaniuk, Mali; Hsieh, Vincent; Collins, Michael; Wong, Karen; Binstock, Wendy; Reid, Russell; Poteet-Schwartz, Kim; Gries, Heike; Hall, Rebecca; Koh, Jeffrey; Bannister, Carolyn; Sung, Wai; Jain, Ranu; Fernandez, Allison; Tuite, Gerald F; Ruas, Ernesto; Drozhinin, Oleg; Tetreault, Lisa; Muldowney, Bridget; Ricketts, Karene; Fernandez, Patrick; Sohn, Lisa; Hajduk, John; Taicher, Brad; Burkhart, Jessica; Wright, Allison; Kugler, Jane; Barajas-DeLoa, Lea; Gangadharan, Meera; Busso, Veronica; Stallworth, Kayla; Staudt, Susan; Labovsky, Kristen L; Glover, Chris D; Huang, Henry; Karlberg-Hippard, Helena; Capehart, Samantha; Streckfus, Cynthia; Nguyen, Kim-Phuong T; Manyang, Peter; Martinez, Jose Luis; Hansen, Jennifer K; Levy, Heather Mitzel; Brzenski, Alyssa; Chiao, Franklin; Ingelmo, Pablo; Mujallid, Razaz; Olutoye, Olutoyin A; Syed, Tariq; Benzon, Hubert; Bosenberg, Adrian

    2017-02-01

    The Pediatric Craniofacial Collaborative Group established the Pediatric Craniofacial Surgery Perioperative Registry to elucidate practices and outcomes in children with craniosynostosis undergoing complex cranial vault reconstruction and inform quality improvement efforts. The aim of this study is to determine perioperative management, outcomes, and complications in children undergoing complex cranial vault reconstruction across North America and to delineate salient features of current practices. Thirty-one institutions contributed data from June 2012 to September 2015. Data extracted included demographics, perioperative management, length of stay, laboratory results, and blood management techniques employed. Complications and outlier events were described. Outcomes analyzed included total blood donor exposures, intraoperative and perioperative transfusion volumes, and length of stay outcomes. One thousand two hundred twenty-three cases were analyzed: 935 children aged less than or equal to 24 months and 288 children aged more than 24 months. Ninety-five percent of children aged less than or equal to 24 months and 79% of children aged more than 24 months received at least one transfusion. There were no deaths. Notable complications included cardiac arrest, postoperative seizures, unplanned postoperative mechanical ventilation, large-volume transfusion, and unplanned second surgeries. Utilization of blood conservation techniques was highly variable. The authors present a comprehensive description of perioperative management, outcomes, and complications from a large group of North American children undergoing complex cranial vault reconstruction. Transfusion remains the rule for the vast majority of patients. The occurrence of numerous significant complications together with large variability in perioperative management and outcomes suggest targets for improvement.

  10. Design considerations for space flight hardware

    Science.gov (United States)

    Glover, Daniel

    1990-01-01

    The environmental and design constraints are reviewed along with some insight into the established design and quality assurance practices that apply to low earth orbit (LEO) space flight hardware. It is intended as an introduction for people unfamiliar with space flight considerations. Some basic data and a bibliography are included.

  11. Enabling Open Hardware through FOSS tools

    CERN Multimedia

    CERN. Geneva

    2016-01-01

    Software developers often take open file formats and tools for granted. When you publish code on github, you do not ask yourself if somebody will be able to open it and modify it. We need the same freedom in the open hardware world, to make it truly accessible for everyone.

  12. Remote hardware-reconfigurable robotic camera

    Science.gov (United States)

    Arias-Estrada, Miguel; Torres-Huitzil, Cesar; Maya-Rueda, Selene E.

    2001-10-01

    In this work, a camera with integrated image processing capabilities is discussed. The camera is based on an imager coupled to an FPGA device (Field Programmable Gate Array) which contains an architecture for real-time computer vision low-level processing. The architecture can be reprogrammed remotely for application specific purposes. The system is intended for rapid modification and adaptation for inspection and recognition applications, with the flexibility of hardware and software reprogrammability. FPGA reconfiguration allows the same ease of upgrade in hardware as a software upgrade process. The camera is composed of a digital imager coupled to an FPGA device, two memory banks, and a microcontroller. The microcontroller is used for communication tasks and FPGA programming. The system implements a software architecture to handle multiple FPGA architectures in the device, and the possibility to download a software/hardware object from the host computer into its internal context memory. System advantages are: small size, low power consumption, and a library of hardware/software functionalities that can be exchanged during run time. The system has been validated with an edge detection and a motion processing architecture, which will be presented in the paper. Applications targeted are in robotics, mobile robotics, and vision based quality control.

  13. QCE : A Simulator for Quantum Computer Hardware

    NARCIS (Netherlands)

    Michielsen, Kristel; Raedt, Hans De

    2003-01-01

    The Quantum Computer Emulator (QCE) described in this paper consists of a simulator of a generic, general purpose quantum computer and a graphical user interface. The latter is used to control the simulator, to define the hardware of the quantum computer and to debug and execute quantum algorithms.

  14. Proof Carrying Hardware based IP Protection

    Science.gov (United States)

    2017-03-01

    service to the hardware. Note that in this paper, we only consider Trojans which can be activated by a specific digital input vector. Further, we...acquisition,” IEEE Transactions on Information Forensics and Security, vol. 7, no. 1, pp. 25–40, 2012. [7] Y. Jin, B. Yang, and Y. Makris, “Cycle-accurate

  15. Efficient Runtime Management of Reconfigurable Hardware Resources

    NARCIS (Netherlands)

    Marconi, T.

    2011-01-01

    Runtime reconfigurable systems built upon devices with partial reconfiguration can provide reduction in overall hardware area, power efficiency, and economic cost in addition to the performance improvements due to better customization. However, the users of such systems have to be able to afford

  16. Environmental Control System Software & Hardware Development

    Science.gov (United States)

    Vargas, Daniel Eduardo

    2017-01-01

    ECS hardware: (1) Provides controlled purge to SLS Rocket and Orion spacecraft. (2) Provide mission-focused engineering products and services. ECS software: (1) NASA requires Compact Unique Identifiers (CUIs); fixed-length identifier used to identify information items. (2) CUI structure; composed of nine semantic fields that aid the user in recognizing its purpose.

  17. Hardware Accelerated Point Rendering of Isosurfaces

    DEFF Research Database (Denmark)

    Bærentzen, Jakob Andreas; Christensen, Niels Jørgen

    2003-01-01

    and that the advantage of rendering points as opposed to triangles increases with the size and complexity of the volumes. To gauge the visual quality of future hardware accelerated point rendering schemes, we have implemented a software based point rendering method and compare the quality to both MC and our OpenGL based...

  18. Microprocessor Design Using Hardware Description Language

    Science.gov (United States)

    Mita, Rosario; Palumbo, Gaetano

    2008-01-01

    The following paper has been conceived to deal with the contents of some lectures aimed at enhancing courses on digital electronic, microelectronic or VLSI systems. Those lectures show how to use a hardware description language (HDL), such as the VHDL, to specify, design and verify a custom microprocessor. The general goal of this work is to teach…

  19. Digital Hardware Design Teaching: An Alternative Approach

    Science.gov (United States)

    Benkrid, Khaled; Clayton, Thomas

    2012-01-01

    This article presents the design and implementation of a complete review of undergraduate digital hardware design teaching in the School of Engineering at the University of Edinburgh. Four guiding principles have been used in this exercise: learning-outcome driven teaching, deep learning, affordability, and flexibility. This has identified…

  20. Performance/price estimates for cortex-scale hardware: a design space exploration.

    Science.gov (United States)

    Zaveri, Mazad S; Hammerstrom, Dan

    2011-04-01

    In this paper, we revisit the concept of virtualization. Virtualization is useful for understanding and investigating the performance/price and other trade-offs related to the hardware design space. Moreover, it is perhaps the most important aspect of a hardware design space exploration. Such a design space exploration is a necessary part of the study of hardware architectures for large-scale computational models for intelligent computing, including AI, Bayesian, bio-inspired and neural models. A methodical exploration is needed to identify potentially interesting regions in the design space, and to assess the relative performance/price points of these implementations. As an example, in this paper we investigate the performance/price of (digital and mixed-signal) CMOS and hypothetical CMOL (nanogrid) technology based hardware implementations of human cortex-scale spiking neural systems. Through this analysis, and the resulting performance/price points, we demonstrate, in general, the importance of virtualization, and of doing these kinds of design space explorations. The specific results suggest that hybrid nanotechnology such as CMOL is a promising candidate to implement very large-scale spiking neural systems, providing a more efficient utilization of the density and storage benefits of emerging nano-scale technologies. In general, we believe that the study of such hypothetical designs/architectures will guide the neuromorphic hardware community towards building large-scale systems, and help guide research trends in intelligent computing, and computer engineering. Copyright © 2010 Elsevier Ltd. All rights reserved.

  1. Very broadband seismic background noise analysis of permanent good vaulted seismic stations

    Science.gov (United States)

    Abd el-aal, Abd el-aziz Khairy

    2013-04-01

    This paper describes the results of a preliminary study conducted to analyze seismic background noise at sites of recently deployed very broadband stations of the Egyptian National Seismological Network (ENSN). The main purpose of the study is to assess the effects of permanent seismic vault construction and also to establish characteristics and origin of seismic noise at those sites. Another goal of this study is to determine the time needed for noise at those sites to stabilize. The power spectral densities of background noise at short period band (SP), very broadband (VBB), and ultra long period band (ULP) for each component of each broadband seismometer deployed in the different investigated sites are calculated. A MATLAB code has been developed that manages data processing and data analysis and compares the results with the high-noise model (NHNM) and low-noise model (NLNM) of Peterson (1993). Based on the obtained analysis, the noise stability and the efficiency of each station to record regional and teleseismic events are measured. The results of this study could be used in the future to evaluate station quality, to improve those processes that require background noise values, such as automatic association, and to improve the estimation of station and network detection and location thresholds.

  2. Residual long-lived radioactivity distribution in the inner concrete wall of a cyclotron vault.

    Science.gov (United States)

    Kimura, K; Ishikawa, T; Kinno, M; Yamadera, A; Nakamura, T

    1994-12-01

    We measured the depth distribution of residual long-lived radioactivity in the inner concrete wall of a cyclotron vault by assaying concrete cores and we estimated the neutron flux distribution in the inner concrete wall by means of activation detectors. Nine long-lived radioactive nuclides (46Sc, 59Fe, 60Co, 65Zn, 134Cs, 152Eu, 154Eu, 22Na, and 54Mn) were identified from the gamma-ray spectra measured in the concrete samples. It was confirmed that the radionuclides induced by thermal neutrons through the (n, gamma) reaction are dominant, and that the induced activity by thermal neutrons is greatest at a depth of 5 to 10 cm rather than at the surface of the concrete and decreases exponentially beyond a depth of about 20 cm. By comparing the radioactivity and neutron flux distributions, we can estimate the induced long-lived radioactivity in concrete after a long period of operation from the short-term activation measurement.

  3. Effect of wind and altitude on record performance in foot races, pole vault, and long jump

    Science.gov (United States)

    Frohlich, Cliff

    1985-08-01

    Using only elementary physics, one can estimate the effect of wind and altitude on performance in several track and field events. Experiments have shown that the power lost to aerodynamic drag forces is about a tenth of the total power expended in running at sprint speeds. From this observation one can calculate the effect of wind or of air density changes on sprinting speed. In pole vaulting, the sprinter converts his kinetic energy into potential energy to clear the bar. In long jumping, he is a projectile, but he is prevented from reaching his optimum distance expected for his initial velocity by the height which he can attain during his jump. For each of these events, performance in moderate winds of 2.0 m/s or at altitudes comparable to Mexico City differ by several percent from performances at sea level or in still air. In longer running races and in bicycle races, aerodynamic forces play an important role in racing strategy. However, since the athletes perform in groups it is difficult to calculate the effect on individual performances.

  4. Konsolidierte Datenmodellierung von Versorgungsdaten mit dem Entity-Attribute-Value-Modell und Data Vault

    Directory of Open Access Journals (Sweden)

    Rauch, Jens

    2017-08-01

    Full Text Available Distributed and heterogeneous data must be integrated for health services research in a way, which is open to new requirements and easily expandable for new data sources. For data integration in the health services research domain, mainly data warehouses have been used that model data either as a dimensional or an entity-attribute-value (EAV model. However, these data models are either not flexible enough or lack data management capabilities, which makes longitudinal data analyses more difficult. We have extended the EAV approach with data vault modelling and hereby modelled the data structures of the hospital quality reports by the Gemeinsamer Bundesauschuss (G-BA and integrated data from the years 2011 to 2015 accordingly. This makes it possible to historicise metadata of features, in particular those of quality indicators, and establishes a high degree of extensibility towards new heterogeneous data sources. The proposed approach allows a free selection of the abstraction level for the entities to be modelled, so that a completely generic EAV model with historicised metadata can be created.

  5. Vaginal vault carcinoma as second primary in a treated case of ovarian cancer

    Directory of Open Access Journals (Sweden)

    Sushruta Shrivastava

    2012-01-01

    Full Text Available With the advances in the treatment of cancer, the chances of survival have increased today. The five-year relative survival rate is about 66%. With the increasing survival rate, it is important to identify the late effects of cancer and its therapy. One of the most serious events experienced by cancer survivors is the diagnosis of a new cancer. Case: A 32-year-old unmarried female diagnosed as ovarian cancer in the year 2010. She was treated with three cycles of chemotherapy followed by surgery. Histopathology was well-differentiated adenocarcinoma. She received three more cycles of chemotherapy after surgery. She was under follow-up and developed vaginal vault carcinoma after a disease-free interval of 2 years. The biopsy was suggestive of squamous cell carcinoma. She was treated with radiation for vaginal cancer successfully. This case indicates that female gynecological cancers with different histology may occur in minimum period of interval even in the absence of any predisposing factors like human papilloma virus infection.

  6. Materials used to build the wooden vault over the Plenary Hall in the Spanish Senate Buiding

    Directory of Open Access Journals (Sweden)

    Bustamante, R.

    2012-06-01

    Full Text Available The constituent materials used to build the wooden vault over the Plenary Hall in the Spain’s Senate Building (ca 1814-1820 are analyzed in this paper. Characteristics of gypsum mortar applied on pine beams, boards and blockboard, have been determined. The esparto (=needlegrass fibre provides a framework for the gypsum mortar to ensure adhesion and forming the surface of the dome. Physical-mechanical properties of the burnt clay-lightened gypsum mortars were determined with laboratory tests, while the composition of these materials was found with XRD,SEM and IR.

    En este artículo se analizan los materiales de la bóveda encamonada que cubre el Salón de Plenos del Senado de España (hacia 1814-1820. Se han determinado en particular las características físico-mecánicas del mortero de yeso aplicado sobre vigas, tablas y enlistonados de madera de pino, entomizados con fibra de esparto para asegurar la adherencia y conformar la superficie de la bóveda. Con los análisis de DRX, SEM e IR, se ha completado la caracterización del mortero que presenta adiciones de cerámica cocida.

  7. GE networked mass storage solutions supporting IEEE network mass storage model

    Science.gov (United States)

    Herzog, Donald

    1993-01-01

    The General Electric Government Communications Systems Department (GE/GCSD) has developed a near real time digital data storage and retrieval system that extends the capabilities currently available in today's marketplace. This system called DuraStore uses commercially available rotary tape drive technology with ANSI/IEEE standards for automated magnetic tape based data storage. It uses a nonproprietary approach to satisfy a wide range of data rates and storage capabilities requirements and is compliant with the IEEE Network Storage Model. Rotary tape drives, standard interfaces, application specific hardware/software, networked automated tape libraries, library administrator, write protection, volume/physical media linkages, and maximum resource utilization are addressed.

  8. Safety of Open Cranial Vault Surgery for Single-Suture Craniosynostosis: A Case for the Multidisciplinary Team.

    Science.gov (United States)

    Birgfeld, Craig B; Dufton, Lynette; Naumann, Heather; Hopper, Richard A; Gruss, Joseph S; Haberkern, Charles M; Speltz, Matthew L

    2015-10-01

    Single Suture Craniosynostosis (SSC) occurs in 1 in 2,500 live births and is the most common type of craniosynostosis treated in most centers. Surgical treatment has evolved over the past century and open techniques are tailored to the specific suture type. Additionally, the concept of multi-disciplinary team care has proliferated and is becoming the standard of care for SSC. The combination of these evolutions, we believe, has improved the safety of cranial vault surgery for SSC. A retrospective review of patients participating in the Infant Learning Project at Seattle Children's Hospital who underwent cranial vault surgery for treatment of SSC between 2002 and 2006 was performed. Pre-operative assessment, surgical techniques, anesthetic and intraoperative events and both intra-operative and post-operative adverse events were analyzed. Eighty eight patients fulfilled the inclusion criteria (42 sagittal, 23 metopic, 19 unicoronal, 4 lambdoid). Length of procedure varied (FOA 5.2 hrs, modified pi 2.5 hrs, total vault 4.9 hrs and switch cranioplasty 4.6 hrs), as did transfusion amount (FOA 385 mL, modified pi 216 mL, total vault 600 mL, switch cranioplasty 207 mL) although 99% of patients received a transfusion of some sort. There were no deaths and no major intraoperative complications. Minor events include; ET tube malposition (1), desaturation (1), acidosis (1), hypothermia (9), coagulopathy (2), Hct < 25 (55). Average hospital stay was 3.4 days with no major post-operative complications. One patient was readmitted to the ICU and 1 had a scalp hematoma, but no patients returned to the operating room within 6 months after surgery. The surgical treatment of SSC has evolved from lengthy, risky procedures to become almost routine at most craniofacial centers. Additionally, the care for patients with SSC has evolved from a single provider to a multidisciplinary team concept based around protocols for workup, delivery of anesthesia, streamlined surgical procedures and

  9. Energy storage

    CERN Document Server

    Brunet, Yves

    2013-01-01

    Energy storage examines different applications such as electric power generation, transmission and distribution systems, pulsed systems, transportation, buildings and mobile applications. For each of these applications, proper energy storage technologies are foreseen, with their advantages, disadvantages and limits. As electricity cannot be stored cheaply in large quantities, energy has to be stored in another form (chemical, thermal, electromagnetic, mechanical) and then converted back into electric power and/or energy using conversion systems. Most of the storage technologies are examined: b

  10. Evaluation of NetApp Cloud ONTAP and AltaVault using Amazon Web Services

    CERN Document Server

    Weisz, Michael

    2015-01-01

    As of now, the storage infrastructure at CERN almost exclusively consists of on-premise storage, i.e. storage which physically resides in the institution’s data center. While this offers certain advantages such as full control regarding data security, it also holds many challenges, most importantly in terms of flexibility and scalability. For instance, the provisioning of new on-site storage takes some time, since the required storage needs to be ordered, delivered, and installed first, before it can be used. Furthermore, there is certain maintenance work involved even after the initial setup inflicting ongoing costs of upkeep. At the same time, various cloud providers such as Amazon Web Services and Microsoft Azure have emerged during the last years, offering services to flexibly provision storage resources in the cloud in a scalable way. This project tries to explore and evaluate to what extend the on-site storage infrastructure at CERN could be extended using virtual NetApp storage offerings such as Clou...

  11. Maximal Power of the Lower Limbs of Youth Gymnasts and Biomechanical Indicators of the Forward Handspring Vault Versus the Sports Result

    Directory of Open Access Journals (Sweden)

    Kochanowicz Andrzej

    2016-12-01

    Full Text Available The aim of the study was to define the relationship between maximal power of lower limbs, the biomechanics of the forward handspring vault and the score received during a gymnastics competition. The research involved 42 gymnasts aged 9-11 years competing in the Poland’s Junior Championships. The study consisted of three stages: first -estimating the level of indicators of maximal power of lower limbs tested on a force plate during the countermovement jump; second - estimating the level of biomechanical indicators of the front handspring vault. For both mentioned groups of indicators and the score received by gymnasts during the vault, linear correlation analyses were made. The last stage consisted of conducting multiple regression analysis in order to predict the performance level of the front handspring vault. Results showed a positive correlation (0.401, p < 0.05 of lower limbs’ maximal power (1400 ± 502 W with the judges’ score for the front handstand vault (13.38 ± 1.02 points. However, the highest significant (p < 0.001 correlation with the judges’ score was revealed in the angle of the hip joint in the second phase of the flight (196.00 ± 16.64° and the contact time of hands with the vault surface (0.264 ± 0.118 s, where correlation coefficients were: -0.671 and -0.634, respectively. In conclusion, the angles of the hip joint in the second phase of the flight and when the hands touched the vault surface proved to be the most important indicators for the received score.

  12. Advanced hardware design for error correcting codes

    CERN Document Server

    Coussy, Philippe

    2015-01-01

    This book provides thorough coverage of error correcting techniques. It includes essential basic concepts and the latest advances on key topics in design, implementation, and optimization of hardware/software systems for error correction. The book’s chapters are written by internationally recognized experts in this field. Topics include evolution of error correction techniques, industrial user needs, architectures, and design approaches for the most advanced error correcting codes (Polar Codes, Non-Binary LDPC, Product Codes, etc). This book provides access to recent results, and is suitable for graduate students and researchers of mathematics, computer science, and engineering. • Examines how to optimize the architecture of hardware design for error correcting codes; • Presents error correction codes from theory to optimized architecture for the current and the next generation standards; • Provides coverage of industrial user needs advanced error correcting techniques.

  13. HARDWARE AND SOFTWARE STATUS OF QCDOC.

    Energy Technology Data Exchange (ETDEWEB)

    BOYLE,P.A.; CHEN,D.; CHRIST,N.H.; PETROV.K.; ET AL.

    2003-07-15

    QCDOC is a massively parallel supercomputer whose processing nodes are based on an application-specific integrated circuit (ASIC). This ASIC was custom-designed so that crucial lattice QCD kernels achieve an overall sustained performance of 50% on machines with several 10,000 nodes. This strong scalability, together with low power consumption and a price/performance ratio of $1 per sustained MFlops, enable QCDOC to attack the most demanding lattice QCD problems. The first ASICs became available in June of 2003, and the testing performed so far has shown all systems functioning according to specification. We review the hardware and software status of QCDOC and present performance figures obtained in real hardware as well as in simulation.

  14. The hardware accelerator array for logic simulation

    Energy Technology Data Exchange (ETDEWEB)

    Hansen, N H [Washington State Univ., Pullman, WA (USA)

    1991-05-01

    Hardware acceleration exploits the parallelism inherent in large circuit simulations to achieve significant increases in performance. Simulation accelerators have been developed based on the compiled code algorithm or the event-driven algorithm. The greater flexibility of the event-driven algorithm has resulted in several important developments in hardware acceleration architecture. Some popular commercial products have been developed based on the event-driven algorithm and data-flow architectures. Conventional data-flow architectures require complex switching networks to distribute operands among processing elements resulting in considerable overhead. An accelerator array architecture based on a nearest-neighbor communication has been developed in this thesis. The design is simulated in detail at the behavioral level. Its performance is evaluated and shown to be superior to that of a conventional data-flow accelerator. 14 refs., 48 figs., 5 tabs.

  15. Particle Transport Simulation on Heterogeneous Hardware

    CERN Multimedia

    CERN. Geneva

    2014-01-01

    CPUs and GPGPUs. About the speaker Vladimir Koylazov is CTO and founder of Chaos Software and one of the original developers of the V-Ray raytracing software. Passionate about 3D graphics and programming, Vlado is the driving force behind Chaos Group's software solutions. He participated in the implementation of algorithms for accurate light simulations and support for different hardware platforms, including CPU and GPGPU, as well as distributed calculat...

  16. Hex-Chrome Free Hardware - BAE Experience

    Science.gov (United States)

    2010-06-01

    Trane S 3201063A1 • TRW TS 2-25-60, Class A • Volkswagen TL 233 • Volvo VCS5737.29, .19 6/23/2010 Magni is one of several coatings, others such...installation and part must be revised. • Example: Panther FOV identified approximately 500 fasteners/ hardware that are being updated to “clean” within...particular program require coordination and funding to revise/ update (ex: MMPV common with MRAP) COTS, Government furnished, proprietary items and

  17. Instrumentation Hardware Abstraction Language (IHAL) Handbook

    Science.gov (United States)

    2017-01-01

    guidelines and thereby eliminating any misinterpretations that may exist. The RCC IRIG 106 sets forth standards for various aspects of telemetry (TM... community . At the time the task was initiated, IHAL had been shown to support configuration of analog signal conditioning hardware and pulse code...configurations were displayed in a single view. The settings on each device were then changed and immediately communicated to the appropriate vendor

  18. A hardware implementation of neural network with modified HANNIBAL architecture

    Energy Technology Data Exchange (ETDEWEB)

    Lee, Bum youb; Chung, Duck Jin [Inha University, Inchon (Korea, Republic of)

    1996-03-01

    A digital hardware architecture for artificial neural network with learning capability is described in this paper. It is a modified hardware architecture known as HANNIBAL(Hardware Architecture for Neural Networks Implementing Back propagation Algorithm Learning). For implementing an efficient neural network hardware, we analyzed various type of multiplier which is major function block of neuro-processor cell. With this result, we design a efficient digital neural network hardware using serial/parallel multiplier, and test the operation. We also analyze the hardware efficiency with logic level simulation. (author). 14 refs., 10 figs., 3 tabs.

  19. A Hardware Lab Anywhere At Any Time

    Directory of Open Access Journals (Sweden)

    Tobias Schubert

    2004-12-01

    Full Text Available Scientific technical courses are an important component in any student's education. These courses are usually characterised by the fact that the students execute experiments in special laboratories. This leads to extremely high costs and a reduction in the maximum number of possible participants. From this traditional point of view, it doesn't seem possible to realise the concepts of a Virtual University in the context of sophisticated technical courses since the students must be "on the spot". In this paper we introduce the so-called Mobile Hardware Lab which makes student participation possible at any time and from any place. This lab nevertheless transfers a feeling of being present in a laboratory. This is accomplished with a special Learning Management System in combination with hardware components which correspond to a fully equipped laboratory workstation that are lent out to the students for the duration of the lab. The experiments are performed and solved at home, then handed in electronically. Judging and marking are also both performed electronically. Since 2003 the Mobile Hardware Lab is now offered in a completely web based form.

  20. Software and hardware infrastructure for research in electrophysiology.

    Science.gov (United States)

    Mouček, Roman; Ježek, Petr; Vařeka, Lukáš; Rondík, Tomáš; Brůha, Petr; Papež, Václav; Mautner, Pavel; Novotný, Jiří; Prokop, Tomáš; Stěbeták, Jan

    2014-01-01

    As in other areas of experimental science, operation of electrophysiological laboratory, design and performance of electrophysiological experiments, collection, storage and sharing of experimental data and metadata, analysis and interpretation of these data, and publication of results are time consuming activities. If these activities are well organized and supported by a suitable infrastructure, work efficiency of researchers increases significantly. This article deals with the main concepts, design, and development of software and hardware infrastructure for research in electrophysiology. The described infrastructure has been primarily developed for the needs of neuroinformatics laboratory at the University of West Bohemia, the Czech Republic. However, from the beginning it has been also designed and developed to be open and applicable in laboratories that do similar research. After introducing the laboratory and the whole architectural concept the individual parts of the infrastructure are described. The central element of the software infrastructure is a web-based portal that enables community researchers to store, share, download and search data and metadata from electrophysiological experiments. The data model, domain ontology and usage of semantic web languages and technologies are described. Current data publication policy used in the portal is briefly introduced. The registration of the portal within Neuroscience Information Framework is described. Then the methods used for processing of electrophysiological signals are presented. The specific modifications of these methods introduced by laboratory researches are summarized; the methods are organized into a laboratory workflow. Other parts of the software infrastructure include mobile and offline solutions for data/metadata storing and a hardware stimulator communicating with an EEG amplifier and recording software.

  1. Software and Hardware Infrastructure for Research in Electrophysiology

    Directory of Open Access Journals (Sweden)

    Roman eMouček

    2014-03-01

    Full Text Available As in other areas of experimental science, operation of electrophysiological laboratory, design and performance of electrophysiological experiments, collection, storage and sharing of experimental data and metadata, analysis and interpretation of these data, and publication of results are time consuming activities. If these activities are well organized and supported by a suitable infrastructure, work efficiency of researchers increases significantly.This article deals with the main concepts, design, and development of software and hardware infrastructure for research in electrophysiology. The described infrastructure has been primarily developed for the needs of neuroinformatics laboratory at the University of West Bohemia, the Czech Republic. However, from the beginning it has been also designed and developed to be open and applicable in laboratories that do similar research.After introducing the laboratory and the whole architectural concept the individual parts of the infrastructure are described. The central element of the software infrastructure is a web-based portal that enables community researchers to store, share, download and search data and metadata from electrophysiological experiments. The data model, domain ontology and usage of semantic web languages and technologies are described. Current data publication policy used in the portal is briefly introduced. The registration of the portal within Neuroscience Information Framework is described. Then the methods used for processing of electrophysiological signals are presented. The specific modifications of these methods introduced by laboratory researches are summarized; the methods are organized into a laboratory workflow. Other parts of the software infrastructure include mobile and offline solutions for data/metadata storing and a hardware stimulator communicating with an EEG amplifier and recording software.

  2. Atomic storage

    CERN Multimedia

    Ricadela, A

    2003-01-01

    IBM is supplying CERN, the European Organization for Nuclear Research, with its Storage Tank file system virtualization software, 20 terabytes of storage capacity, and services under a three-year deal to build computer systems that will support the Large Hadron Collider accelerator (1 paragraph).

  3. Minimizing transfusions in primary cranial vault remodeling: the role of aminocaproic acid.

    Science.gov (United States)

    Oppenheimer, Adam J; Ranganathan, Kavitha; Levi, Benjamin; Strahle, Jennifer M; Kapurch, Joseph; Muraszko, Karin M; Buchman, Steven R

    2014-01-01

    Cranial vault remodeling (CVR) for craniosynostosis is a procedure with the potential for significant blood loss. Aminocaproic acid (ACA) has been used at our institution during CVR for its antifibrinolytic effects. The purpose of this study was to investigate the effect of ACA on blood loss and transfusion rates during primary CVR. Three hundred eighty-three patients with craniosynostosis underwent primary CVR at a single institution by a single surgeon over 15 years. Patients were included if they received either ACA or no antifibrinolytic. The estimated blood loss (EBL) and volume of blood transfused was recorded. Thrombotic-related complications were identified. Comparisons were made between subgroups using independent Student t test and Fisher exact test. Among the study population, 148 patients met inclusion criteria. ACA was given to 30 patients, while 118 patients received no antifibrinolytic. There was no difference in the average intraoperative EBL between the ACA (322 mL) and control groups (327 mL, P > 0.05). Additionally, the incidence of transfusion was not significantly different between subgroups (97% vs. 86%, respectively, P > 0.05). Patients treated with ACA, however, received lower average perioperative transfusion volumes (25.5 mL/kg) compared to control patients (53.3 mL/kg, P < 0.0001). Furthermore, patients in the ACA subgroup were less likely to require a second unit of blood (21% vs. 43%, P < 0.0001) and therefore had fewer exposures to donor blood antigens (ARR = 22%, NNT = 4.6). The use of intraoperative ACA minimizes blood transfusion volumes and donor exposures in children who undergo primary CVR for craniosynostosis. Antifibrinolytics should be considered for routine use in pediatric craniofacial surgery.

  4. Blood loss and transfusion requirements with epsilon-aminocaproic acid use during cranial vault reconstruction surgery.

    Science.gov (United States)

    Thompson, Mark E; Saadeh, Charles; Watkins, Phillip; Nagy, Laszlo; Demke, Joshua

    2017-02-01

    To determine whether epsilon-aminocaproic acid (EACA) load of 50 mg∙kg -1 before skin incision, and infusion of 25 mg∙kg -1 ∙h -1 until skin closure during cranial vault reconstruction (CVR) were associated with decreased estimated blood loss and transfusion requirements. Antifibrinolytic medications decrease bleeding and transfusion requirements during cardiothoracic and orthopedic surgeries with high blood loss, but practical reductions in blood loss and transfusion requirements have not been consistently realized in children undergoing CVR. Current dosing recommendations are derived from adult extrapolations, and may or may not have clinical relevance. Retrospective case-controlled study of 45 consecutive infants and children undergoing primary craniosynostosis surgery at Covenant Children's Hospital during years 2010-2014. Exclusion criteria included revision surgery, and chromosomal abnormalities associated with bleeding disorders. Blood loss and blood transfusion volumes as a percent of estimated blood volume were compared in the presence of EACA while controlling for age, suture phenotype, use of bone grafting, and length of surgery. Secondary outcomes measures included volume of crystalloid infused, length of hospital stay, and any postoperative intubation requirement. When analyzed based on length of surgery, EACA did reduce blood loss and blood transfusion (R 2 =0.19, P=.005 and R 2 =0.18, P=.010, respectively) with shorter surgeries. Using a standardized dosing regimen of EACA during craniosynostosis surgery, we found statistical significance in blood loss and transfusion requirements in surgeries of the shortest duration. We suspect this may be due to our selected dosing regimen, which may be lower than recently recommended. This study contributes to the growing body of evidence supporting EACA in CVR for craniosynostosis. Copyright © 2016 Elsevier Inc. All rights reserved.

  5. Prediction of neutron induced radioactivity in the concrete walls of a PET cyclotron vault room with MCNPX.

    Science.gov (United States)

    Martínez-Serrano, J Javier; Díez de los Ríos, Antonio

    2010-11-01

    The authors want to assess the relevance of the neutron activation of the concrete vault of the PET cyclotron at CIMES (Universidad de Malaga) by predicting specific activities of the main activation products in the vault and their variation profiles as a function of penetration depth into concrete at present and after 10 yr of cyclotron operation. The dual proton cyclotron is used for PET isotopes production, mainly 18F. During the years 2006 and 2008, the using rate has been 1 h/day at single beam (40 microA). From January 2008, using rate is 4 h/day at dual beam (80 microA). The energy of the cyclotron proton beam is 18 MeV. Four point locations were chosen on the walls of the cyclotron room to assess neutron induced activity concentrations. In each wall point location, neutron induced radionuclide specific activity was assessed from the wall surface to a depth of 120 cm within concrete. Simulations were carried out with the Monte Carlo based radiation transport code MCNPX (v2.6.0). According to MCNPX calculations, activity depth profiles of activation products studied, except 54Mn, have a maximum at variable depths from the wall surface never beyond 12 cm. 54Mn activity decreases exponentially in all the studied depth ranges within wall concrete. The activity of 152Eu, 154Eu, 60CO, 134Cs, 46Sc, and 65Zn decreases exponentially beyond a 30 cm depth into concrete. 54Mn activity presents the faster decrease within a concrete vault with an attenuation length of 21 cm. According to MCNPX estimations, present activity in the cyclotron vault is mostly due to 46Sc and 60Co, with highest specific activity near the vault surface of 146 +/- 16 and 50 +/- 4.6 Bq/kg, respectively. 46Sc and 60Co activity measurements near the surface wall present an acceptable match with the estimation within the uncertainties, but measured activities of the other radionuclides are quite over the MCNPX estimations. The calculations after 10 yr of cyclotron operation predict a slight increase

  6. Pre-Hardware Optimization of Spacecraft Image Processing Software Algorithms and Hardware Implementation

    Science.gov (United States)

    Kizhner, Semion; Flatley, Thomas P.; Hestnes, Phyllis; Jentoft-Nilsen, Marit; Petrick, David J.; Day, John H. (Technical Monitor)

    2001-01-01

    Spacecraft telemetry rates have steadily increased over the last decade presenting a problem for real-time processing by ground facilities. This paper proposes a solution to a related problem for the Geostationary Operational Environmental Spacecraft (GOES-8) image processing application. Although large super-computer facilities are the obvious heritage solution, they are very costly, making it imperative to seek a feasible alternative engineering solution at a fraction of the cost. The solution is based on a Personal Computer (PC) platform and synergy of optimized software algorithms and re-configurable computing hardware technologies, such as Field Programmable Gate Arrays (FPGA) and Digital Signal Processing (DSP). It has been shown in [1] and [2] that this configuration can provide superior inexpensive performance for a chosen application on the ground station or on-board a spacecraft. However, since this technology is still maturing, intensive pre-hardware steps are necessary to achieve the benefits of hardware implementation. This paper describes these steps for the GOES-8 application, a software project developed using Interactive Data Language (IDL) (Trademark of Research Systems, Inc.) on a Workstation/UNIX platform. The solution involves converting the application to a PC/Windows/RC platform, selected mainly by the availability of low cost, adaptable high-speed RC hardware. In order for the hybrid system to run, the IDL software was modified to account for platform differences. It was interesting to examine the gains and losses in performance on the new platform, as well as unexpected observations before implementing hardware. After substantial pre-hardware optimization steps, the necessity of hardware implementation for bottleneck code in the PC environment became evident and solvable beginning with the methodology described in [1], [2], and implementing a novel methodology for this specific application [6]. The PC-RC interface bandwidth problem for the

  7. Trusted Module Acquisition Through Proof-Carrying Hardware Intellectual Property

    Science.gov (United States)

    2015-05-22

    hardware intellectual property (PCHIP) framework, which aims to ensure the trustworthiness of third-party hardware IPs utilizing formal methods. We...published in non peer-reviewed journals: Final Report: Trusted Module Acquisition Through Proof-Carrying Hardware Intellectual Property Report Title By...borrowing ideas from the proof carrying code (PCC) in software domain, in this project we introduced the proof carrying hardware intellectual property

  8. The Impact of Flight Hardware Scavenging on Space Logistics

    Science.gov (United States)

    Oeftering, Richard C.

    2011-01-01

    For a given fixed launch vehicle capacity the logistics payload delivered to the moon may be only roughly 20 percent of the payload delivered to the International Space Station (ISS). This is compounded by the much lower flight frequency to the moon and thus low availability of spares for maintenance. This implies that lunar hardware is much more scarce and more costly per kilogram than ISS and thus there is much more incentive to preserve hardware. The Constellation Lunar Surface System (LSS) program is considering ways of utilizing hardware scavenged from vehicles including the Altair lunar lander. In general, the hardware will have only had a matter of hours of operation yet there may be years of operational life remaining. By scavenging this hardware the program, in effect, is treating vehicle hardware as part of the payload. Flight hardware may provide logistics spares for system maintenance and reduce the overall logistics footprint. This hardware has a wide array of potential applications including expanding the power infrastructure, and exploiting in-situ resources. Scavenging can also be seen as a way of recovering the value of, literally, billions of dollars worth of hardware that would normally be discarded. Scavenging flight hardware adds operational complexity and steps must be taken to augment the crew s capability with robotics, capabilities embedded in flight hardware itself, and external processes. New embedded technologies are needed to make hardware more serviceable and scavengable. Process technologies are needed to extract hardware, evaluate hardware, reconfigure or repair hardware, and reintegrate it into new applications. This paper also illustrates how scavenging can be used to drive down the cost of the overall program by exploiting the intrinsic value of otherwise discarded flight hardware.

  9. Vault-poly-ADP-ribose polymerase in the Octopus vulgaris brain: a regulatory factor of actin polymerization dynamic.

    Science.gov (United States)

    De Maio, Anna; Natale, Emiliana; Rotondo, Sergio; Di Cosmo, Anna; Faraone-Mennella, Maria Rosaria

    2013-09-01

    Our previous behavioural, biochemical and immunohistochemical analyses conducted in selected regions (supra/sub oesophageal masses) of the Octopus vulgaris brain detected a cytoplasmic poly-ADP-ribose polymerase (more than 90% of total enzyme activity). The protein was identified as the vault-free form of vault-poly-ADP-ribose polymerase. The present research extends and integrates the biochemical characterization of poly-ADP-ribosylation system, namely, reaction product, i.e., poly-ADP-ribose, and acceptor proteins, in the O. vulgaris brain. Immunochemical analyses evidenced that the sole poly-ADP-ribose acceptor was the octopus cytoskeleton 50-kDa actin. It was present in both free, endogenously poly-ADP-ribosylated form (70kDa) and in complex with V-poly-ADP-ribose polymerase and poly-ADP-ribose (260kDa). The components of this complex, alkali and high salt sensitive, were purified and characterized. The kind and the length of poly-ADP-ribose corresponded to linear chains of 30-35 ADP-ribose units, in accordance with the features of the polymer synthesized by the known vault-poly-ADP-ribose polymerase. In vitro experiments showed that V-poly-ADP-ribose polymerase activity of brain cytoplasmic fraction containing endogenous actin increased upon the addition of commercial actin and was highly reduced by ATP. Anti-actin immunoblot of the mixture in the presence and absence of ATP showed that the poly-ADP-ribosylation of octopus actin is a dynamic process balanced by the ATP-dependent polymerization of the cytoskeleton protein, a fundamental mechanism for synaptic plasticity. © 2013 Elsevier Inc. All rights reserved.

  10. Role of vault cytology in follow-up of hysterectomized women: results and inferences from a low resource setting.

    Science.gov (United States)

    Gupta, Sanjay; Sodhani, Pushpa; Singh, Veena; Sehgal, Ashok

    2013-09-01

    The study was undertaken to assess the utility of cervico-vaginal/vault cytology in the follow-up of women treated for cervical cancer and benign gynecological conditions. Records of 3,523 cervico-vaginal smears from 2,658 women who underwent hysterectomy and/or radiotherapy or chemotherapy, over a 10-year period were retrieved. Data was collected on type of treatment received, indication for hysterectomy, age of patient, presenting symptoms, stage of tumor, interval since treatment, cytology and biopsy results. The results of cytology versus other parameters were analyzed separately for women treated for cervical cancer and those hysterectomized for benign indications. Malignant cells were detected in 141/1949 (7.2%) follow-up smears from treated cervical cancer cases (140 recurrences and 1 VAIN). Around 92% of recurrences of cervical cancer were detected with in 2 years of follow-up and 75% of these women were symptomatic. Cytology first alerted the clinicians to a recurrence in a quarter of cases. On the other hand, VAIN was detected in 5/1079 (0.46%) vault smears from 997 women hysterectomized for benign gynecologic disease. All these women were asymptomatic and majority (80%) were detected in follow-up smears performed between 3 and 10 years. Vault cytology is an accurate tool to detect local recurrences/VAIN in women treated for cervical cancer or benign gynecological conditions. It may even first alert the clinicians to a possibility of recurrence. However, due to extremely low prevalence of VAIN/vaginal cancer, it seems unwarranted in women hysterectomized for benign indications, especially in resource constrained settings. Copyright © 2012 Wiley Periodicals, Inc., a Wiley company.

  11. Variation in NHS utilisation of vault smear tests in women post-hysterectomy: A study, using routinely collected datasets

    Directory of Open Access Journals (Sweden)

    Wilson Sue

    2008-03-01

    Full Text Available Abstract Background 20% of women living in the UK have a hysterectomy during their lifetime, levels are higher in the USA, making it one of the most commonly performed major surgical procedures. Understanding of the indications for hysterectomy and of the rationale for follow-up of women post hysterectomy is currently limited. Guidelines concerning follow-up by means of vaginal vault cytology tests exist but these are not based on 'gold standard' evidence. Furthermore, the extent to which current practice reflects these guidelines is unclear. This study aims to determine the factors associated with variability in hysterectomy rates and subsequent follow-up after surgery by use of the vaginal vault smear cytology test. Methods/Design All women resident in the West Midlands region, of the United Kingdom, who had a hysterectomy operation between 1st April 2002 and 30th March 2003 will be identified from the Hospital Episodes Statistics database which also contains proxy data on deprivation status, derived from postcode and self declared ethnicity. These data will be linked to regional cervical screening records for each woman and histopathology laboratory records from the relevant hospitals. Study objectives are to describe: Indications for the hysterectomy operation, histology at hysterectomy, subsequent follow-up by use or non-use of vaginal vault cytology tests and variation between histological groups. Additionally the data will be categorised according to a woman's cytology screening history prior to surgery (i.e. always normal, borderline, resolved abnormalities, CIN etc and these different groups compared. Variations in these outcomes according to age, deprivation and ethnic group will also be examined. Analysis will be undertaken using SPSS. Discussion This study will clarify patterns of current practice in one large English region and determine whether this practice reflects existing guidelines. The study will also strengthen the evidence

  12. Safe to Fly: Certifying COTS Hardware for Spaceflight

    Science.gov (United States)

    Fichuk, Jessica L.

    2011-01-01

    Providing hardware for the astronauts to use on board the Space Shuttle or International Space Station (ISS) involves a certification process that entails evaluating hardware safety, weighing risks, providing mitigation, and verifying requirements. Upon completion of this certification process, the hardware is deemed safe to fly. This process from start to finish can be completed as quickly as 1 week or can take several years in length depending on the complexity of the hardware and whether the item is a unique custom design. One area of cost and schedule savings that NASA implements is buying Commercial Off the Shelf (COTS) hardware and certifying it for human spaceflight as safe to fly. By utilizing commercial hardware, NASA saves time not having to develop, design and build the hardware from scratch, as well as a timesaving in the certification process. By utilizing COTS hardware, the current detailed certification process can be simplified which results in schedule savings. Cost savings is another important benefit of flying COTS hardware. Procuring COTS hardware for space use can be more economical than custom building the hardware. This paper will investigate the cost savings associated with certifying COTS hardware to NASA s standards rather than performing a custom build.

  13. Is Hardware Removal Recommended after Ankle Fracture Repair?

    Directory of Open Access Journals (Sweden)

    Hong-Geun Jung

    2016-01-01

    Full Text Available The indications and clinical necessity for routine hardware removal after treating ankle or distal tibia fracture with open reduction and internal fixation are disputed even when hardware-related pain is insignificant. Thus, we determined the clinical effects of routine hardware removal irrespective of the degree of hardware-related pain, especially in the perspective of patients’ daily activities. This study was conducted on 80 consecutive cases (78 patients treated by surgery and hardware removal after bony union. There were 56 ankle and 24 distal tibia fractures. The hardware-related pain, ankle joint stiffness, discomfort on ambulation, and patient satisfaction were evaluated before and at least 6 months after hardware removal. Pain score before hardware removal was 3.4 (range 0 to 6 and decreased to 1.3 (range 0 to 6 after removal. 58 (72.5% patients experienced improved ankle stiffness and 65 (81.3% less discomfort while walking on uneven ground and 63 (80.8% patients were satisfied with hardware removal. These results suggest that routine hardware removal after ankle or distal tibia fracture could ameliorate hardware-related pain and improves daily activities and patient satisfaction even when the hardware-related pain is minimal.

  14. FPGA Acceleration by Dynamically-Loaded Hardware Libraries

    DEFF Research Database (Denmark)

    Lomuscio, Andrea; Nannarelli, Alberto; Re, Marco

    Hardware acceleration is a viable solution to obtain energy efficiency in data intensive computation. In this work, we present a hardware framework to dynamically load hardware libraries, HLL, on reconfigurable platforms (FPGAs). Provided a library of application-specific processors, we load on...

  15. Unifying Approach to Software and Hardware Design for Scientific Calculations

    OpenAIRE

    Litvinov, G. L.; Maslov, V. P.; Rodionov, A. Ya.

    1999-01-01

    A unifying approach to software and hardware design generated by ideas of Idempotent Mathematics is discussed. The so-called idempotent correspondence principle for algorithms, programs and hardware units is described. A software project based on this approach is presented. Key words: universal algorithms, idempotent calculus, software design, hardware design, object oriented programming

  16. Is Hardware Removal Recommended after Ankle Fracture Repair?

    Science.gov (United States)

    Jung, Hong-Geun; Kim, Jin-Il; Park, Jae-Yong; Park, Jong-Tae; Eom, Joon-Sang; Lee, Dong-Oh

    2016-01-01

    The indications and clinical necessity for routine hardware removal after treating ankle or distal tibia fracture with open reduction and internal fixation are disputed even when hardware-related pain is insignificant. Thus, we determined the clinical effects of routine hardware removal irrespective of the degree of hardware-related pain, especially in the perspective of patients' daily activities. This study was conducted on 80 consecutive cases (78 patients) treated by surgery and hardware removal after bony union. There were 56 ankle and 24 distal tibia fractures. The hardware-related pain, ankle joint stiffness, discomfort on ambulation, and patient satisfaction were evaluated before and at least 6 months after hardware removal. Pain score before hardware removal was 3.4 (range 0 to 6) and decreased to 1.3 (range 0 to 6) after removal. 58 (72.5%) patients experienced improved ankle stiffness and 65 (81.3%) less discomfort while walking on uneven ground and 63 (80.8%) patients were satisfied with hardware removal. These results suggest that routine hardware removal after ankle or distal tibia fracture could ameliorate hardware-related pain and improves daily activities and patient satisfaction even when the hardware-related pain is minimal.

  17. [Anterior approach sacrospinous colpopexy in a patient with vaginal vault prolapse, stress urinary incontinence and cystocoele with lateral defect].

    Science.gov (United States)

    Malinowski, Andrzej; Bobin, Leszek; Maciołek-Blewniewska, Grazyna

    2006-03-01

    We present a case of vaginal vault prolapse after hysterectomy associated with cystocoele with central and lateral defect and stress urinary incontinence, that was treated surgically with employment of sacrospinous colpopexy through anterior approach (from paravesical space), combined with anterior colporrhaphy by double TOT approach method (that is a butterfly-shaped polipropylen mesh, which arms were carried through upper and lower parts of obturator foramens by tension-free method). There were no postoperative complications. A control examination at 1 and 3 months after the operation showed maintenance of normal anatomic relations, which were obtained as a result of repair, total control of urinary continence and full patient's satisfaction from the operation.

  18. Constraining ground motion parameters and determining the historic earthquake that damaged the vaults underneath the Old City of Jerusalem

    Science.gov (United States)

    Yagoda-Biran, G.; Hatzor, Y. H.

    2013-12-01

    Evidence for seismically induced damage are preserved in historic masonry structures below the Old City of Jerusalem at a site known locally as the 'Western Wall Tunnels' complex, possibly one of the most important tourist attractions in the world. In the tunnels, structures dated to 500 BC and up until modern times have been uncovered by recent archeological excavation. One of the interesting findings is a 100 m long bridge, composed of two rows of barrel vaults, believed to have been constructed during the 3rd century AD to allow easy access to the Temple Mount. In one of the vaults a single masonry block is displaced 7 cm downward with respect to its neighbors (see figure below). Since the damage seems seismically driven, back analysis of the damage with the numerical Discontinuous Deformation Analysis (DDA) method was performed, in order to constrain the peak ground acceleration (PGA) that had caused the damage. First the numerical method used for back analysis was verified with an analytical solution for the case of a rocking monolithic column, then validated with experimental results for site response analysis. The verification and validation prove the DDA is capable of handling dynamic and wave propagation problems. Next, the back analysis was performed. Results of the dynamic numerical simulations suggest that the damage observed at the vault was induced by seismic vibrations that must have taken place before the bridge was buried underground, namely when it was still in service. We find that the PGA required for causing the observed damage was high - between 1.5 and 2 g. The PGA calculated for Jerusalem on the basis of established attenuation relationships for historic earthquakes that struck the region during the relevant time period is about one order of magnitude lower: 0.14 and 0.48 g, for the events that took place at 362 and 746 AD, respectively. This discrepancy is explained by local site effects that must have amplified bedrock ground motions by a

  19. Hardware design to accelerate PNG encoder for binary mask compression on FPGA

    Science.gov (United States)

    Kachouri, Rostom; Akil, Mohamed

    2015-02-01

    PNG (Portable Network Graphics) is a lossless compression method for real-world pictures. Since its specification, it continues to attract the interest of the image processing community. Indeed, PNG is an extensible file format for portable and well-compressed storage of raster images. In addition, it supports all of Black and White (binary mask), grayscale, indexed-color, and truecolor images. Within the framework of the Demat+ project which intend to propose a complete solution for storage and retrieval of scanned documents, we address in this paper a hardware design to accelerate the PNG encoder for binary mask compression on FPGA. For this, an optimized architecture is proposed as part of an hybrid software and hardware co-operating system. For its evaluation, the new designed PNG IP has been implemented on the ALTERA Arria II GX EP2AGX125EF35" FPGA. The experimental results show a good match between the achieved compression ratio, the computational cost and the used hardware resources.

  20. Integrating new Storage Technologies into EOS

    Science.gov (United States)

    Peters, Andreas J.; van der Ster, Dan C.; Rocha, Joaquim; Lensing, Paul

    2015-12-01

    The EOS[1] storage software was designed to cover CERN disk-only storage use cases in the medium-term trading scalability against latency. To cover and prepare for long-term requirements the CERN IT data and storage services group (DSS) is actively conducting R&D and open source contributions to experiment with a next generation storage software based on CEPH[3] and ethernet enabled disk drives. CEPH provides a scale-out object storage system RADOS and additionally various optional high-level services like S3 gateway, RADOS block devices and a POSIX compliant file system CephFS. The acquisition of CEPH by Redhat underlines the promising role of CEPH as the open source storage platform of the future. CERN IT is running a CEPH service in the context of OpenStack on a moderate scale of 1 PB replicated storage. Building a 100+PB storage system based on CEPH will require software and hardware tuning. It is of capital importance to demonstrate the feasibility and possibly iron out bottlenecks and blocking issues beforehand. The main idea behind this R&D is to leverage and contribute to existing building blocks in the CEPH storage stack and implement a few CERN specific requirements in a thin, customisable storage layer. A second research topic is the integration of ethernet enabled disks. This paper introduces various ongoing open source developments, their status and applicability.

  1. Static Scheduling of Periodic Hardware Tasks with Precedence and Deadline Constraints on Reconfigurable Hardware Devices

    Directory of Open Access Journals (Sweden)

    Ikbel Belaid

    2011-01-01

    Full Text Available Task graph scheduling for reconfigurable hardware devices can be defined as finding a schedule for a set of periodic tasks with precedence, dependence, and deadline constraints as well as their optimal allocations on the available heterogeneous hardware resources. This paper proposes a new methodology comprising three main stages. Using these three main stages, dynamic partial reconfiguration and mixed integer programming, pipelined scheduling and efficient placement are achieved and enable parallel computing of the task graph on the reconfigurable devices by optimizing placement/scheduling quality. Experiments on an application of heterogeneous hardware tasks demonstrate an improvement of resource utilization of 12.45% of the available reconfigurable resources corresponding to a resource gain of 17.3% compared to a static design. The configuration overhead is reduced to 2% of the total running time. Due to pipelined scheduling, the task graph spanning is minimized by 4% compared to sequential execution of the graph.

  2. Space Telecommunications Radio Systems (STRS) Hardware Architecture Standard: Release 1.0 Hardware Section

    Science.gov (United States)

    Reinhart, Richard C.; Kacpura, Thomas J.; Smith, Carl R.; Liebetreu, John; Hill, Gary; Mortensen, Dale J.; Andro, Monty; Scardelletti, Maximilian C.; Farrington, Allen

    2008-01-01

    This report defines a hardware architecture approach for software-defined radios to enable commonality among NASA space missions. The architecture accommodates a range of reconfigurable processing technologies including general-purpose processors, digital signal processors, field programmable gate arrays, and application-specific integrated circuits (ASICs) in addition to flexible and tunable radiofrequency front ends to satisfy varying mission requirements. The hardware architecture consists of modules, radio functions, and interfaces. The modules are a logical division of common radio functions that compose a typical communication radio. This report describes the architecture details, the module definitions, the typical functions on each module, and the module interfaces. Tradeoffs between component-based, custom architecture and a functional-based, open architecture are described. The architecture does not specify a physical implementation internally on each module, nor does the architecture mandate the standards or ratings of the hardware used to construct the radios.

  3. Methodology for Assessing Reusability of Spaceflight Hardware

    Science.gov (United States)

    Childress-Thompson, Rhonda; Thomas, L. Dale; Farrington, Phillip

    2017-01-01

    In 2011 the Space Shuttle, the only Reusable Launch Vehicle (RLV) in the world, returned to earth for the final time. Upon retirement of the Space Shuttle, the United States (U.S.) no longer possessed a reusable vehicle or the capability to send American astronauts to space. With the National Aeronautics and Space Administration (NASA) out of the RLV business and now only pursuing Expendable Launch Vehicles (ELV), not only did companies within the U.S. start to actively pursue the development of either RLVs or reusable components, but entities around the world began to venture into the reusable market. For example, SpaceX and Blue Origin are developing reusable vehicles and engines. The Indian Space Research Organization is developing a reusable space plane and Airbus is exploring the possibility of reusing its first stage engines and avionics housed in the flyback propulsion unit referred to as the Advanced Expendable Launcher with Innovative engine Economy (Adeline). Even United Launch Alliance (ULA) has announced plans for eventually replacing the Atlas and Delta expendable rockets with a family of RLVs called Vulcan. Reuse can be categorized as either fully reusable, the situation in which the entire vehicle is recovered, or partially reusable such as the National Space Transportation System (NSTS) where only the Space Shuttle, Space Shuttle Main Engines (SSME), and Solid Rocket Boosters (SRB) are reused. With this influx of renewed interest in reusability for space applications, it is imperative that a systematic approach be developed for assessing the reusability of spaceflight hardware. The partially reusable NSTS offered many opportunities to glean lessons learned; however, when it came to efficient operability for reuse the Space Shuttle and its associated hardware fell short primarily because of its two to four-month turnaround time. Although there have been several attempts at designing RLVs in the past with the X-33, Venture Star and Delta Clipper

  4. List search hardware for interpretive software

    CERN Document Server

    Altaber, Jacques; Mears, B; Rausch, R

    1979-01-01

    Interpreted languages, e.g. BASIC, are simple to learn, easy to use, quick to modify and in general 'user-friendly'. However, a critically time consuming process during interpretation is that of list searching. A special microprogrammed device for fast list searching has therefore been developed at the SPS Division of CERN. It uses bit- sliced hardware. Fast algorithms perform search, insert and delete of a six-character name and its value in a list of up to 1000 pairs. The prototype shows retrieval times of the order of 10-30 microseconds. (11 refs).

  5. Development of Hardware Dual Modality Tomography System

    Directory of Open Access Journals (Sweden)

    R. M. Zain

    2009-06-01

    Full Text Available The paper describes the hardware development and performance of the Dual Modality Tomography (DMT system. DMT consists of optical and capacitance sensors. The optical sensors consist of 16 LEDs and 16 photodiodes. The Electrical Capacitance Tomography (ECT electrode design use eight electrode plates as the detecting sensor. The digital timing and the control unit have been developing in order to control the light projection of optical emitters, switching the capacitance electrodes and to synchronize the operation of data acquisition. As a result, the developed system is able to provide a maximum 529 set data per second received from the signal conditioning circuit to the computer.

  6. Hardware Trigger Processor for the MDT System

    CERN Document Server

    Costa De Paiva, Thiago; The ATLAS collaboration

    2017-01-01

    We are developing a low-latency hardware trigger processor for the Monitored Drift Tube system in the ATLAS Muon spectrometer. The processor will fit candidate Muon tracks in the drift tubes in real time, improving significantly the momentum resolution provided by the dedicated trigger chambers. We present a novel pure-FPGA implementation of a Legendre transform segment finder, an associative-memory alternative implementation, an ARM (Zynq) processor-based track fitter, and compact ATCA carrier board architecture. The ATCA architecture is designed to allow a modular, staged approach to deployment of the system and exploration of alternative technologies.

  7. Contamination Examples and Lessons from Low Earth Orbit Experiments and Operational Hardware

    Science.gov (United States)

    Pippin, Gary; Finckenor, Miria M.

    2009-01-01

    Flight experiments flown on the Space Shuttle, the International Space Station, Mir, Skylab, and free flyers such as the Long Duration Exposure Facility, the European Retrievable Carrier, and the EFFU, provide multiple opportunities for the investigation of molecular contamination effects. Retrieved hardware from the Solar Maximum Mission satellite, Mir, and the Hubble Space Telescope has also provided the means gaining insight into contamination processes. Images from the above mentioned hardware show contamination effects due to materials processing, hardware storage, pre-flight cleaning, as well as on-orbit events such as outgassing, mechanical failure of hardware in close proximity, impacts from man-made debris, and changes due to natural environment factors.. Contamination effects include significant changes to thermal and electrical properties of thermal control surfaces, optics, and power systems. Data from several flights has been used to develop a rudimentary estimate of asymptotic values for absorptance changes due to long-term solar exposure (4000-6000 Equivalent Sun Hours) of silicone-based molecular contamination deposits of varying thickness. Recommendations and suggestions for processing changes and constraints based on the on-orbit observed results will be presented.

  8. Alternative methods for dispoal of low-level radioactive wastes. Task 1. Description of methods and assessment of criteria. [Alternative methods are belowground vaults, aboveground vaults; earth mounded concrete bunkers, mined cavities, augered holes

    Energy Technology Data Exchange (ETDEWEB)

    Bennett, R.D.; Miller, W.O.; Warriner, J.B.; Malone, P.G.; McAneny, C.C.

    1984-04-01

    The study reported herein contains the results of Task 1 of a four-task study entitled Criteria for Evaluating Engineered Facilities. The overall objective of this study is to ensure that the criteria needed to evaluate five alternative low-level radioactive waste (LLW) disposal methods are available to the Nuclear Regulatory Commission (NRC) and the Agreement States. The alternative methods considered are belowground vaults, aboveground vaults, earth mounded concrete bunkers, mined cavities, and augered holes. Each of these alternatives is either being used by other countries for low-level radioactive waste (LLW) disposal or is being considered by other countries or US agencies. In this report the performance requirements are listed, each alternative is described, the experience gained with its use is discussed, and the performance capabilities of each method are addressed. Next, the existing 10 CFR Part 61 Subpart D criteria with respect to paragraphs 61.50 through 61.53, pertaining to site suitability, design, operations and closure, and monitoring are assessed for applicability to evaluation of each alternative. Preliminary conclusions and recommendations are offered on each method's suitability as an LLW disposal alternative, the applicability of the criteria, and the need for supplemental or modified criteria.

  9. ICPP calcined solids storage facility closure study. Volume III: Engineering design files

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    1998-02-01

    The following information was calculated to support cost estimates and radiation exposure calculations for closure activities at the Calcined Solids Storage Facility (CSSF). Within the estimate, volumes were calculated to determine the required amount of grout to be used during closure activities. The remaining calcine on the bin walls, supports, piping, and floor was also calculated to approximate the remaining residual calcine volumes at different stages of the removal process. The estimates for remaining calcine and vault void volume are higher than what would actually be experienced in the field, but are necessary for bounding purposes. The residual calcine in the bins may be higher than was is experienced in the field as it was assumed that the entire bin volume is full of calcine before removal activities commence. The vault void volumes are higher as the vault roof beam volumes were neglected. The estimations that follow should be considered rough order of magnitude, due to the time constraints as dictated by the project`s scope of work. Should more accurate numbers be required, a new analysis would be necessary.

  10. Comparison of postoperative vault height predictability using white-to-white or sulcus diameter-based sizing for the visian implantable collamer lens.

    Science.gov (United States)

    Reinstein, Dan Z; Lovisolo, Carlo F; Archer, Timothy J; Gobbe, Marine

    2013-01-01

    To compare vault height predictability of Implantable Collamer Lens (ICL; Staar Surgical) sizing using a sulcus diameter-based formula or the manufacturer-recommended white-to-white-based method. In 50 myopic eyes, ICL size was calculated using both a formula including sulcus diameter and the traditional formula based on white-to-white diameter. Sulcus diameter was measured using Artemis 2 very high-frequency (VHF) digital ultrasound (ArcScan Inc). Implantation was based on the sulcus diameter derived size. Actual postoperative vault height achieved was measured by VHF digital ultrasound scanning. Circle segment trigonometry was used to calculate the vault height that would have resulted had lens sizing been based on the white-to-white formula. The same lens size would have been used in 60% of eyes, a smaller lens would have been used in 34% of eyes and a larger lens in 6% of eyes had lens sizing been based on the white-to-white formula. Mean vault for eyes with lenses sized using the sulcus diameter formula was 0.37±0.16 mm (range: 0.08 to 0.92 mm), with 2% trigonometry predicted that the vault height would have been 0.24±0.28 mm (range: -0.31 to 0.92 mm), with 26% <0.09 mm had lens sizing been based on the white-to-white formula. Significantly better predictability of postoperative vault height was achieved by including sulcus diameter into the ICL sizing formula compared with using the traditional white-to-white-based formula. Copyright 2013, SLACK Incorporated.

  11. The VAULT2.0 Observing Campaign: A Comprehensive Investigation of the Chromosphere-Corona Interface at Sub-arcsecond scales

    Science.gov (United States)

    Vourlidas, A.; Korendyke, C.; Tun-Beltran, S. D.; Ugarte-Urra, I.; Morrill, J. S.; Warren, H. P.; Young, P.; De Pontieu, B.; Gauzzi, G.; Reardon, K.

    2014-12-01

    We report the first results from an observing campaign in support of the VAULT2.0 sounding rocket launch on September 30, 2014. VAULT2.0 is a Lya (1216Å) spectroheliograph capable of 0.3" (~250 km) spatial resolution. The objective of the VAULT2.0 project is the study of the chromosphere-corona interface. This interface has acquired renewed emphasis over the last few years, thanks to high-resolution observations from Hinode/SOT and EIS instruments and the Lya imaging from the two VAULT flights. The observations have shown that the upper chromosphere may play a more important role in heating the corona and in affecting EUV observations that previously thought: (1) by supplying the mass via Type-II spicules and, (2) by absorbing coronal emission. Many of the required clues for further progress are located in sub-arcsecond structures with temperatures between 10000 and 50000 K, a regime not accessible by Hinode or SDO. Lyman-alpha observations are, therefore, ideal, for filling in this gap. The observing campaign in support of the VAULT2.0 is closely coordinated with the Hinode and IRIS missions to study the mass/energy flow from the chromosphere to the corona with joint observations of type-II spicules, and the magnetic connectivity of coronal loops using the full imaging and spectral capabilities of IRIS, Hinode and SDO. Several ground-based observatories also provide important observations (IBIS, BBSO, SOLIS). The VAULT2.0 project is funded by the NASA LCAS program.

  12. Introduction to Hardware Security and Trust

    CERN Document Server

    Wang, Cliff

    2012-01-01

    The emergence of a globalized, horizontal semiconductor business model raises a set of concerns involving the security and trust of the information systems on which modern society is increasingly reliant for mission-critical functionality. Hardware-oriented security and trust issues span a broad range including threats related to the malicious insertion of Trojan circuits designed, e.g.,to act as a ‘kill switch’ to disable a chip, to integrated circuit (IC) piracy,and to attacks designed to extract encryption keys and IP from a chip. This book provides the foundations for understanding hardware security and trust, which have become major concerns for national security over the past decade.  Coverage includes security and trust issues in all types of electronic devices and systems such as ASICs, COTS, FPGAs, microprocessors/DSPs, and embedded systems.  This serves as an invaluable reference to the state-of-the-art research that is of critical significance to the security of,and trust in, modern society�...

  13. ISS Logistics Hardware Disposition and Metrics Validation

    Science.gov (United States)

    Rogers, Toneka R.

    2010-01-01

    I was assigned to the Logistics Division of the International Space Station (ISS)/Spacecraft Processing Directorate. The Division consists of eight NASA engineers and specialists that oversee the logistics portion of the Checkout, Assembly, and Payload Processing Services (CAPPS) contract. Boeing, their sub-contractors and the Boeing Prime contract out of Johnson Space Center, provide the Integrated Logistics Support for the ISS activities at Kennedy Space Center. Essentially they ensure that spares are available to support flight hardware processing and the associated ground support equipment (GSE). Boeing maintains a Depot for electrical, mechanical and structural modifications and/or repair capability as required. My assigned task was to learn project management techniques utilized by NASA and its' contractors to provide an efficient and effective logistics support infrastructure to the ISS program. Within the Space Station Processing Facility (SSPF) I was exposed to Logistics support components, such as, the NASA Spacecraft Services Depot (NSSD) capabilities, Mission Processing tools, techniques and Warehouse support issues, required for integrating Space Station elements at the Kennedy Space Center. I also supported the identification of near-term ISS Hardware and Ground Support Equipment (GSE) candidates for excessing/disposition prior to October 2010; and the validation of several Logistics Metrics used by the contractor to measure logistics support effectiveness.

  14. ARM assembly language with hardware experiments

    CERN Document Server

    Elahi, Ata

    2015-01-01

    This book provides a hands-on approach to learning ARM assembly language with the use of a TI microcontroller. The book starts with an introduction to computer architecture and then discusses number systems and digital logic. The text covers ARM Assembly Language, ARM Cortex Architecture and its components, and Hardware Experiments using TILM3S1968. Written for those interested in learning embedded programming using an ARM Microcontroller. ·         Introduces number systems and signal transmission methods   ·         Reviews logic gates, registers, multiplexers, decoders and memory   ·         Provides an overview and examples of ARM instruction set   ·         Uses using Keil development tools for writing and debugging ARM assembly language Programs   ·         Hardware experiments using a Mbed NXP LPC1768 microcontroller; including General Purpose Input/Output (GPIO) configuration, real time clock configuration, binary input to 7-segment display, creating ...

  15. Inimluud Mihkli kiriku võlvidelt / Human remains on the vaulted ceiling of Mihkli Church

    Directory of Open Access Journals (Sweden)

    Martin Malve

    2012-01-01

    Full Text Available Altogether 4029 human bones or their fragments from the C 13th–18th were gathered and analysed from soil on the vaults of Mihkli (St Michael’s Church in western Estonia during the rescue works in 2011 (photo 1. Ribs and vertebrae formed the majority of bones, but wholly preserved long bones and other larger bones, as well as, hand and foot bones that are quite typical among mixed human remains were almost absent in this case. Therefore, it can be concluded that during the earthworks larger bones were taken from the soil. The minimum number of adults was determined by the ribs of the right side. Only the ribs with preserved heads (figure 1 were used in calculations. The rib fragments indicate approximately 60 adults among the assorted bones. Judging by the radius, there were at least 16 children among the bone assemblage. Scarceness of children in the Mihkli church can be the result of poor preservation, smallness and fragility of their bones, but the possibility that subadult (child and juvenile burials were fewer in the destroyed part of the churchyard cannot be ruled out.Pathological analysis of the osteological material ascertained several diseases and traumas, the most common pathologies being connected to ageing, for example, wearing of joints (Osteoarthrosis. Various diseases related to degeneration of the spine were present – spondylosis, spondyloarthrosis and osteochondrosis. Compression fractures (fractura compressiva and Schmorl´s nodes (nodi Schmorl indicated strenuous physical activity and/or traumas. Dental diseases included caries (photo 2, alveolar reduction, hypoplasia and tooth abscesses. Several upper and lower jaws showed traces of ante mortem lost teeth (photo 3. In one case a canine of the right mandible of an adult man (age 45 + years had formed but had not erupted (photo 4.Various healed fractures of ribs and limb bones formed the bulk of traumas detected on the bones. Three right ribs had fractures in a stage of

  16. Estimate of Gaseous 14Carbon Concentrations Emanating from the Intermediate-Level Vault Disposal Facility

    Energy Technology Data Exchange (ETDEWEB)

    Kaplan, D

    2005-08-31

    {sup 14}Carbon-bearing resin waste will be disposed in the Low-Activity Waste (LAW) Intermediate Level Vaults (ILV) located in E-Area on the Savannah River Site (SRS). This waste will be buried in a cementitious environment in the vadose zone, i.e., the subsurface zone above the aquifer. As the resin ages, and equilibrates with slowly infiltrating water, it is expected that the {sup 14}C will partition to the solid, liquid, and gaseous phases. The objective of this task was to estimate the concentration of gaseous {sup 14}C in the waste pore space that is in contact with the resin leachate. The approach used to estimate this value was built largely around data generated from lysimeter studies that were conducted for 9 years. These lysimeters contained the same type of used resins (mixed-bed deionizer resins used in the purification of the heavy water moderator of SRS reactors) as are being disposed in the ILV. During the 9 year period, pore water {sup 14}C leaching concentrations were monitored to provide an excellent estimate of the long-term behavior of {sup 14}C release rates from the resins. Thermodynamic calculations were conducted to calculate {sup 14}CO{sub 2(g)} concentrations. These calculations included the {sup 14}C pore water data from the lysimeter study, and data from a field study that was a natural analogue to a long-term cementitious environment (Khoury et al. 1992). The calculations predicted an extremely low {sup 14}CO{sub 2(g)} concentration of 1.9 x 10{sup -7} Ci/m{sup 3} {sup 14}CO{sub 2(g)} in the air spaces above the resin leachate. This low concentrations is not surprising in light of both laboratory and field observations that concrete acts as a strong sorbent of CO{sub 2(g)}. This calculated {sup 14}CO{sub 2(g)} concentration will now be included in future risk calculations.

  17. Special Analysis for Disposal of High-Concentration I-129 Waste in the Intermediate-Level Vaults at the E-Area Low-Level Waste Facility

    Energy Technology Data Exchange (ETDEWEB)

    Collard, L.B.

    2000-09-26

    This revision was prepared to address comments from DOE-SR that arose following publication of revision 0. This Special Analysis (SA) addresses disposal of wastes with high concentrations of I-129 in the Intermediate-Level (IL) Vaults at the operating, low-level radioactive waste disposal facility (the E-Area Low-Level Waste Facility or LLWF) on the Savannah River Site (SRS). This SA provides limits for disposal in the IL Vaults of high-concentration I-129 wastes, including activated carbon beds from the Effluent Treatment Facility (ETF), based on their measured, waste-specific Kds.

  18. Hardware design of a submerged buoy system based on electromagnetic inductive coupling

    Directory of Open Access Journals (Sweden)

    Song Dalei

    2016-01-01

    Full Text Available This paper mainly introduces the hardware design of a new type of ocean buoy for multi-scale marine dynamic process. The buoy system can collect a number of real-time marine environment data and then transmit all the data back to the landing site through wireless module. The authors mainly designed the hardware circuit of the buoy system, including data collection system, data communication system, data storage system. Due to the buoy system will complete the marine observation work continuously for at least a month, so we add the low power consumption function which can realize the intermittent work for the data collection system. This paper also introduces the electromagnetic induction coupling technology of underwater sensors, the sea surface communication network technology, etc. The system can also extends to the ecological regional anomaly monitoring and the early warning of disaster weather.

  19. Cranial neural crest contributes to the bony skull vault in adult Xenopus laevis: insights from cell labeling studies.

    Science.gov (United States)

    Gross, Joshua B; Hanken, James

    2005-03-15

    As a step toward resolving the developmental origin of the ossified skull in adult anurans, we performed a series of cell labeling and grafting studies of the cranial neural crest (CNC) in the clawed frog, Xenopus laevis. We employ an indelible, fixative-stable fluorescent dextran as a cell marker to follow migration of the three embryonic streams of cranial neural crest and to directly assess their contributions to the bony skull vault, which forms weeks after hatching. The three streams maintain distinct boundaries in the developing embryo. Their cells proliferate widely through subsequent larval (tadpole) development, albeit in regionally distinct portions of the head. At metamorphosis, each stream contributes to the large frontoparietal bone, which is the primary constituent of the skull vault in adult anurans. The streams give rise to regionally distinct portions of the bone, thereby preserving their earlier relative position anteroposteriorly within the embryonic neural ridge. These data, when combined with comparable experimental observations from other model species, provide insights into the ancestral pattern of cranial development in tetrapod vertebrates as well as the origin of differences reported between birds and mammals. Copyright 2005 Wiley-Liss, Inc.

  20. An Open Hardware seismic data recorder - a solid basis for citizen science

    Science.gov (United States)

    Mertl, Stefan

    2015-04-01

    "Ruwai" is a 24-Bit Open Hardware seismic data recorder. It is built up of four stackable printed circuit boards fitting the Arduino Mega 2560 microcontroller prototyping platform. An interface to the BeagleBone Black single-board computer enables extensive data storage, -processing and networking capabilities. The four printed circuit boards provide a uBlox Lea-6T GPS module and real-time clock (GPS Timing shield), an Texas Instruments ADS1274 24-Bit analog to digital converter (ADC main shield), an analog input section with a Texas Instruments PGA281 programmable gain amplifier and an analog anti-aliasing filter (ADC analog interface pga) and the power conditioning based on 9-36V DC input (power supply shield). The Arduino Mega 2560 is used for controlling the hardware components, timestamping sampled data using the GPS timing information and transmitting the data to the BeagleBone Black single-board computer. The BeagleBone Black provides local data storage, wireless mesh networking using the optimized link state routing daemon and differential GNSS positioning using the RTKLIB software. The complete hardware and software is published under free software - or open hardware licenses and only free software (e.g. KiCad) was used for the development to facilitate the reusability of the design and increases the sustainability of the project. "Ruwai" was developed within the framework of the "Community Environmental Observation Network (CEON)" (http://www.mertl-research.at/ceon/) which was supported by the Internet Foundation Austria (IPA) within the NetIdee 2013 call.

  1. Hydrogen storage and delivery system development

    Energy Technology Data Exchange (ETDEWEB)

    Handrock, J.L.; Wally, K.; Raber, T.N. [Sandia National Labs., Livermore, CA (United States)

    1995-09-01

    Hydrogen storage and delivery is an important element in effective hydrogen utilization for energy applications and is an important part of the FY1994-1998 Hydrogen Program Implementation Plan. The purpose of this project is to develop a platform for the engineering evaluation of hydrogen storage and delivery systems with an added focus on lightweight hydride utilization. Hybrid vehicles represent the primary application area of interest, with secondary interests including such items as existing vehicles and stationary uses. The near term goal is the demonstration of an internal combustion engine/storage/delivery subsystem. The long term goal is optimization of storage technologies for both vehicular and industrial stationary uses. In this project an integrated approach is being used to couple system operating characteristics to hardware development. A model has been developed which integrates engine and storage material characteristics into the design of hydride storage and delivery systems. By specifying engine operating parameters, as well as a variety of storage/delivery design features, hydride bed sizing calculations are completed. The model allows engineering trade-off studies to be completed on various hydride material/delivery system configurations. A more generalized model is also being developed to allow the performance characteristics of various hydrogen storage and delivery systems to be compared (liquid, activated carbon, etc.). Many of the features of the hydride storage model are applicable to the development of this more generalized model.

  2. Energy storage cells

    Energy Technology Data Exchange (ETDEWEB)

    Gulia, N.V.

    1980-01-01

    The book deals with the characteristics and potentialities of energy storage cells of various types. Attention is given to electrical energy storage cells (electrochemical, electrostatic, and electrodynamic cells), mechanical energy storage cells (mechanical flywheel storage cells), and hybrid storage systems.

  3. Locating hardware faults in a parallel computer

    Science.gov (United States)

    Archer, Charles J.; Megerian, Mark G.; Ratterman, Joseph D.; Smith, Brian E.

    2010-04-13

    Locating hardware faults in a parallel computer, including defining within a tree network of the parallel computer two or more sets of non-overlapping test levels of compute nodes of the network that together include all the data communications links of the network, each non-overlapping test level comprising two or more adjacent tiers of the tree; defining test cells within each non-overlapping test level, each test cell comprising a subtree of the tree including a subtree root compute node and all descendant compute nodes of the subtree root compute node within a non-overlapping test level; performing, separately on each set of non-overlapping test levels, an uplink test on all test cells in a set of non-overlapping test levels; and performing, separately from the uplink tests and separately on each set of non-overlapping test levels, a downlink test on all test cells in a set of non-overlapping test levels.

  4. Communication Estimation for Hardware/Software Codesign

    DEFF Research Database (Denmark)

    Knudsen, Peter Voigt; Madsen, Jan

    1998-01-01

    to be general enough to be able to capture the characteristics of a wide range of communication protocols and yet to be sufficiently detailed as to allow the designer or design tool to efficiently explore tradeoffs between throughput, bus widths, burst/non-burst transfers and data packing strategies. Thus......This paper presents a general high level estimation model of communication throughput for the implementation of a given communication protocol. The model, which is part of a larger model that includes component price, software driver object code size and hardware driver area, is intended...... it provides a basis for decision making with respect to communication protocols/components and communication driver design in the initial design space exploration phase of a co-synthesis process where a large number of possibilities must be examined and where fast estimators are therefore necessary. The fill...

  5. Hardware codec for digital HDTV recording

    Science.gov (United States)

    Stammnitz, Peter; Boettcher, K.; Grueneberg, Kirsten A.; Hoefker, U.; Klein, H.

    1993-11-01

    For the purpose of digital recording of HDTV signals (EUREKA standard, 1250/50/2:1) a codec has been realized (HDI-codec) which can reduce the initial data rate from 1,152 GBit/s down to one fifth. According to the desired reduction, the playtime of a digital VCR (Video Cassette Recorder) can be increased from about 40 - 60 minutes up to at least the length of a feature film. This paper describes the hardware realization of the data rate reduction codec. Algorithms utilized for data rate reduction are adaptive intraframe/intrafield discrete cosine transform (DCT), adaptive quantization and variable length encoding (VLC). Interframe editing, multiple copy and shuttle mode are supported by a special codec architecture.

  6. Theorem Proving in Intel Hardware Design

    Science.gov (United States)

    O'Leary, John

    2009-01-01

    For the past decade, a framework combining model checking (symbolic trajectory evaluation) and higher-order logic theorem proving has been in production use at Intel. Our tools and methodology have been used to formally verify execution cluster functionality (including floating-point operations) for a number of Intel products, including the Pentium(Registered TradeMark)4 and Core(TradeMark)i7 processors. Hardware verification in 2009 is much more challenging than it was in 1999 - today s CPU chip designs contain many processor cores and significant firmware content. This talk will attempt to distill the lessons learned over the past ten years, discuss how they apply to today s problems, outline some future directions.

  7. Compressive Sensing Image Sensors-Hardware Implementation

    Directory of Open Access Journals (Sweden)

    Shahram Shirani

    2013-04-01

    Full Text Available The compressive sensing (CS paradigm uses simultaneous sensing and compression to provide an efficient image acquisition technique. The main advantages of the CS method include high resolution imaging using low resolution sensor arrays and faster image acquisition. Since the imaging philosophy in CS imagers is different from conventional imaging systems, new physical structures have been developed for cameras that use the CS technique. In this paper, a review of different hardware implementations of CS encoding in optical and electrical domains is presented. Considering the recent advances in CMOS (complementary metal–oxide–semiconductor technologies and the feasibility of performing on-chip signal processing, important practical issues in the implementation of CS in CMOS sensors are emphasized. In addition, the CS coding for video capture is discussed.

  8. Handbook of hardware/software codesign

    CERN Document Server

    Teich, Jürgen

    2017-01-01

    This handbook presents fundamental knowledge on the hardware/software (HW/SW) codesign methodology. Contributing expert authors look at key techniques in the design flow as well as selected codesign tools and design environments, building on basic knowledge to consider the latest techniques. The book enables readers to gain real benefits from the HW/SW codesign methodology through explanations and case studies which demonstrate its usefulness. Readers are invited to follow the progress of design techniques through this work, which assists readers in following current research directions and learning about state-of-the-art techniques. Students and researchers will appreciate the wide spectrum of subjects that belong to the design methodology from this handbook. .

  9. Current conveyors variants, applications and hardware implementations

    CERN Document Server

    Senani, Raj; Singh, A K

    2015-01-01

    This book serves as a single-source reference to Current Conveyors and their use in modern Analog Circuit Design. The authors describe the various types of current conveyors discovered over the past 45 years, details of all currently available, off-the-shelf integrated circuit current conveyors, and implementations of current conveyors using other, off-the-shelf IC building blocks. Coverage includes prominent bipolar/CMOS/Bi-CMOS architectures of current conveyors, as well as all varieties of starting from third generation current conveyors to universal current conveyors, their implementations and applications. •Describes all commercially available off-the-shelf IC current conveyors, as well as hardware implementations of current conveyors using other off-the-shelf ICs; • Describes numerous variants of current conveyors evolved over the past forty five years; • Describes a number of Bipolar/CMOS/Bi-CMOS architectures of current conveyors, along with their characteristic features; • Includes a comprehe...

  10. Protection of Accelerator Hardware: RF systems

    CERN Document Server

    Kim, S.-H.

    2016-01-01

    The radio-frequency (RF) system is the key element that generates electric fields for beam acceleration. To keep the system reliable, a highly sophisticated protection scheme is required, which also should be designed to ensure a good balance between beam availability and machine safety. Since RF systems are complex, incorporating high-voltage and high-power equipment, a good portion of machine downtime typically comes from RF systems. Equipment and component damage in RF systems results in long and expensive repairs. Protection of RF system hardware is one of the oldest machine protection concepts, dealing with the protection of individual high-power RF equipment from breakdowns. As beam power increases in modern accelerators, the protection of accelerating structures from beam-induced faults also becomes a critical aspect of protection schemes. In this article, an overview of the RF system is given, and selected topics of failure mechanisms and examples of protection requirements are introduced.

  11. Perspectives in Simulation Hardware and Software Architecture

    Directory of Open Access Journals (Sweden)

    W.O. Grierson

    1985-10-01

    Full Text Available Historically, analog and hybrid computer systems have provided effective real-time solutions for the simulation of large dynamic systems. In the mid 1970s, ADI concluded that these systems were no longer adequate to meet the demands of larger, more complex models and the demand for greater simulation accuracy. The decision was to design an all-digital system to satisfy these growing requirements (see Gilbert and Howe, (1978. This all-digital approach was called the SYSTEM 10. The SYSTEM 10 has been effective in solving time-critical simulation problems and in replacing the previous approach of utilizing hybrid computers. Recent advances in 100 K emitter coupled logic (ECL now make it possible to support a new generation of equipment that expands modeling capabilities to serve simulation needs. The hardware and software concepts of this system, called the SYSTEM 100, are the subject of this paper.

  12. Extravehicular Activity (EVA) Hardware & Operations Overview

    Science.gov (United States)

    Moore, Sandra; Marmolejo, Jose

    2014-01-01

    The objectives of this presentation are to: Define Extravehicular Activity (EVA), identify the reasons for conducting an EVA, and review the role that EVA has played in the space program; Identify the types of EVAs that may be performed; Describe some of the U.S. Space Station equipment and tools that are used during an EVA, such as the Extravehicular Mobility Unit (EMU), the Simplified Aid For EVA Rescue (SAFER), the International Space Station (ISS) Joint Airlock and Russian Docking Compartment 1 (DC-1), and EVA Tools & Equipment; Outline the methods and procedures of EVA Preparation, EVA, and Post-EVA operations; Describe the Russian spacesuit used to perform an EVA; Provide a comparison between U.S. and Russian spacesuit hardware and EVA support; and Define the roles that different training facilities play in EVA training.

  13. Energy Storage

    Energy Technology Data Exchange (ETDEWEB)

    Mukundan, Rangachary [Los Alamos National Lab. (LANL), Los Alamos, NM (United States)

    2014-09-30

    Energy storage technology is critical if the U.S. is to achieve more than 25% penetration of renewable electrical energy, given the intermittency of wind and solar. Energy density is a critical parameter in the economic viability of any energy storage system with liquid fuels being 10 to 100 times better than batteries. However, the economical conversion of electricity to fuel still presents significant technical challenges. This project addressed these challenges by focusing on a specific approach: efficient processes to convert electricity, water and nitrogen to ammonia. Ammonia has many attributes that make it the ideal energy storage compound. The feed stocks are plentiful, ammonia is easily liquefied and routinely stored in large volumes in cheap containers, and it has exceptional energy density for grid scale electrical energy storage. Ammonia can be oxidized efficiently in fuel cells or advanced Carnot cycle engines yielding water and nitrogen as end products. Because of the high energy density and low reactivity of ammonia, the capital cost for grid storage will be lower than any other storage application. This project developed the theoretical foundations of N2 catalysis on specific catalysts and provided for the first time experimental evidence for activation of Mo 2N based catalysts. Theory also revealed that the N atom adsorbed in the bridging position between two metal atoms is the critical step for catalysis. Simple electrochemical ammonia production reactors were designed and built in this project using two novel electrolyte systems. The first one demonstrated the use of ionic liquid electrolytes at room temperature and the second the use of pyrophosphate based electrolytes at intermediate temperatures (200 – 300 ºC). The mechanism of high proton conduction in the pyrophosphate materials was found to be associated with a polyphosphate second phase contrary to literature claims and ammonia production rates as high as 5X 10

  14. 15 MW HArdware-in-the-loop Grid Simulation Project

    Energy Technology Data Exchange (ETDEWEB)

    Rigas, Nikolaos [Clemson Univ., SC (United States); Fox, John Curtiss [Clemson Univ., SC (United States); Collins, Randy [Clemson Univ., SC (United States); Tuten, James [Clemson Univ., SC (United States); Salem, Thomas [Clemson Univ., SC (United States); McKinney, Mark [Clemson Univ., SC (United States); Hadidi, Ramtin [Clemson Univ., SC (United States); Gislason, Benjamin [Clemson Univ., SC (United States); Boessneck, Eric [Clemson Univ., SC (United States); Leonard, Jesse [Clemson Univ., SC (United States)

    2014-10-31

    The 15MW Hardware-in-the-loop (HIL) Grid Simulator project was to (1) design, (2) construct and (3) commission a state-of-the-art grid integration testing facility for testing of multi-megawatt devices through a ‘shared facility’ model open to all innovators to promote the rapid introduction of new technology in the energy market to lower the cost of energy delivered. The 15 MW HIL Grid Simulator project now serves as the cornerstone of the Duke Energy Electric Grid Research, Innovation and Development (eGRID) Center. This project leveraged the 24 kV utility interconnection and electrical infrastructure of the US DOE EERE funded WTDTF project at the Clemson University Restoration Institute in North Charleston, SC. Additionally, the project has spurred interest from other technology sectors, including large PV inverter and energy storage testing and several leading edge research proposals dealing with smart grid technologies, grid modernization and grid cyber security. The key components of the project are the power amplifier units capable of providing up to 20MW of defined power to the research grid. The project has also developed a one of a kind solution to performing fault ride-through testing by combining a reactive divider network and a large power converter into a hybrid method. This unique hybrid method of performing fault ride-through analysis will allow for the research team at the eGRID Center to investigate the complex differences between the alternative methods of performing fault ride-through evaluations and will ultimately further the science behind this testing. With the final goal of being able to perform HIL experiments and demonstration projects, the eGRID team undertook a significant challenge with respect to developing a control system that is capable of communicating with several different pieces of equipment with different communication protocols in real-time. The eGRID team developed a custom fiber optical network that is based upon FPGA

  15. PACE: A dynamic programming algorithm for hardware/software partitioning

    DEFF Research Database (Denmark)

    Knudsen, Peter Voigt; Madsen, Jan

    1996-01-01

    This paper presents the PACE partitioning algorithm which is used in the LYCOS co-synthesis system for partitioning control/dataflow graphs into hardware and software parts. The algorithm is a dynamic programming algorithm which solves both the problem of minimizing system execution time...... communication model and thus attempts to minimize communication overhead. The time-complexity of the algorithm is O(n2·𝒜) and the space-complexity is O(n·𝒜) where 𝒜 is the total area of the hardware chip and n the number of code fragments which may be placed in either hardware or software...... with a hardware area constraint and the problem of minimizing hardware area with a system execution time constraint. The target architecture consists of a single microprocessor and a single hardware chip (ASIC, FPGA, etc.) which are connected by a communication channel. The algorithm incorporates a realistic...

  16. Human cranial vault thickness in a contemporary sample of 1097 autopsy cases: relation to body weight, stature, age, sex and ancestry

    NARCIS (Netherlands)

    de Boer, H. H. Hans; van der Merwe, A. E. Lida; Soerdjbalie-Maikoe, V. Vidija

    2016-01-01

    The relation between human cranial vault thickness (CVT) and various elements of the physical anthropological biological profile is subject of ongoing discussion. Some results seem to indicate no correlation between CVT and the biological profile of the individual, whereas other results suggest that

  17. Expert System analysis of non-fuel assembly hardware and spent fuel disassembly hardware: Its generation and recommended disposal

    Energy Technology Data Exchange (ETDEWEB)

    Williamson, Douglas Alan [Univ. of Florida, Gainesville, FL (United States)

    1991-01-01

    Almost all of the effort being expended on radioactive waste disposal in the United States is being focused on the disposal of spent Nuclear Fuel, with little consideration for other areas that will have to be disposed of in the same facilities. one area of radioactive waste that has not been addressed adequately because it is considered a secondary part of the waste issue is the disposal of the various Non-Fuel Bearing Components of the reactor core. These hardware components fall somewhat arbitrarily into two categories: Non-Fuel Assembly (NFA) hardware and Spent Fuel Disassembly (SFD) hardware. This work provides a detailed examination of the generation and disposal of NFA hardware and SFD hardware by the nuclear utilities of the United States as it relates to the Civilian Radioactive Waste Management Program. All available sources of data on NFA and SFD hardware are analyzed with particular emphasis given to the Characteristics Data Base developed by Oak Ridge National Laboratory and the characterization work performed by Pacific Northwest Laboratories and Rochester Gas & Electric. An Expert System developed as a portion of this work is used to assist in the prediction of quantities of NFA hardware and SFD hardware that will be generated by the United States` utilities. Finally, the hardware waste management practices of the United Kingdom, France, Germany, Sweden, and Japan are studied for possible application to the disposal of domestic hardware wastes. As a result of this work, a general classification scheme for NFA and SFD hardware was developed. Only NFA and SFD hardware constructed of zircaloy and experiencing a burnup of less than 70,000 MWD/MTIHM and PWR control rods constructed of stainless steel are considered Low-Level Waste. All other hardware is classified as Greater-ThanClass-C waste.

  18. Why Open Source Hardware matters and why you should care

    OpenAIRE

    Gürkaynak, Frank K.

    2017-01-01

    Open source hardware is currently where open source software was about 30 years ago. The idea is well received by enthusiasts, there is interest and the open source hardware has gained visible momentum recently, with several well-known universities including UC Berkeley, Cambridge and ETH Zürich actively working on large projects involving open source hardware, attracting the attention of companies big and small. But it is still not quite there yet. In this talk, based on my experience on the...

  19. Hardware-Enabled Security Through On-Chip Reconfigurable Fabric

    Science.gov (United States)

    2016-02-05

    SECURITY CLASSIFICATION OF: The goal of this project was to enable hardware -based security techniques on future microprocessors in a way that they...can be added and updated after fabrication, similar to software, while maintaining the efficiency and the security of hardware . For this purpose, the...Mar-2011 31-May-2014 Approved for Public Release; Distribution Unlimited Final Report: Hardware -Enabled Security Through On-Chip Reconfigurable Fabric

  20. Reliable software for unreliable hardware a cross layer perspective

    CERN Document Server

    Rehman, Semeen; Henkel, Jörg

    2016-01-01

    This book describes novel software concepts to increase reliability under user-defined constraints. The authors’ approach bridges, for the first time, the reliability gap between hardware and software. Readers will learn how to achieve increased soft error resilience on unreliable hardware, while exploiting the inherent error masking characteristics and error (stemming from soft errors, aging, and process variations) mitigations potential at different software layers. · Provides a comprehensive overview of reliability modeling and optimization techniques at different hardware and software levels; · Describes novel optimization techniques for software cross-layer reliability, targeting unreliable hardware.

  1. Integrating new Storage Technologies into EOS

    CERN Document Server

    Peters, Andreas J; Rocha, Joaquim; Lensing, Paul

    2015-01-01

    The EOS[1] storage software was designed to cover CERN disk-only storage use cases in the medium-term trading scalability against latency. To cover and prepare for long-term requirements the CERN IT data and storage services group (DSS) is actively conducting R&D; and open source contributions to experiment with a next generation storage software based on CEPH[3] and ethernet enabled disk drives. CEPH provides a scale-out object storage system RADOS and additionally various optional high-level services like S3 gateway, RADOS block devices and a POSIX compliant file system CephFS. The acquisition of CEPH by Redhat underlines the promising role of CEPH as the open source storage platform of the future. CERN IT is running a CEPH service in the context of OpenStack on a moderate scale of 1 PB replicated storage. Building a 100+PB storage system based on CEPH will require software and hardware tuning. It is of capital importance to demonstrate the feasibility and possibly iron out bottlenecks and blocking issu...

  2. Does Receiving a Blood Transfusion Predict for Length of Stay in Children Undergoing Cranial Vault Remodeling for Craniosynostosis? Outcomes Using the Pediatric National Surgical Quality Improvement Program Dataset.

    Science.gov (United States)

    Markiewicz, Michael R; Alden, Tord; Momin, Mohmed Vasim; Olsson, Alexis B; Jurado, Ray J; Abdullah, Fizan; Miloro, Michael

    2017-08-01

    Recent interventions have aimed at reducing the need for blood transfusions in the perioperative period in patients with craniosynostosis undergoing cranial vault remodeling. However, little is known regarding whether the receipt of a blood transfusion influences the length of hospital stay. The purpose of this study was to assess whether the receipt of a blood transfusion in patients undergoing cranial vault remodeling is associated with an increased length of stay. To address the research purposes, we designed a retrospective cohort study using the 2014 Pediatric National Surgical Quality Improvement Program (NSQIP Peds) dataset. The primary predictor variable was whether patients received a blood transfusion during cranial vault remodeling. The primary outcome variable was length of hospital stay after the operation. The association between the receipt of blood transfusions and length of stay was assessed using the Student t test. The association between other covariates and the outcome variable was assessed using linear regression, analysis of variance, and the Tukey test for post hoc pair-wise comparisons. The sample was composed of 756 patients who underwent cranial vault remodeling: 503 who received blood transfusions and 253 who did not. The primary predictor variable of blood transfusion was associated with an increased length of stay (4.1 days vs 3.0 days, P = .03). Other covariates associated with an increased length of stay included race, American Society of Anesthesiologists status, premature birth, presence of a congenital malformation, and number of sutures involved in craniosynostosis. The receipt of a blood transfusion in the perioperative period in patients with craniosynostosis undergoing cranial vault remodeling was associated with an increased length of stay. Copyright © 2017 American Association of Oral and Maxillofacial Surgeons. Published by Elsevier Inc. All rights reserved.

  3. SALTSTONE VAULT CLASSIFICATION SAMPLES MODULAR CAUSTIC SIDE SOLVENT EXTRACTION UNIT/ACTINIDE REMOVAL PROCESS WASTE STREAM APRIL 2011

    Energy Technology Data Exchange (ETDEWEB)

    Eibling, R.

    2011-09-28

    Savannah River National Laboratory (SRNL) was asked to prepare saltstone from samples of Tank 50H obtained by SRNL on April 5, 2011 (Tank 50H sampling occurred on April 4, 2011) during 2QCY11 to determine the non-hazardous nature of the grout and for additional vault classification analyses. The samples were cured and shipped to Babcock & Wilcox Technical Services Group-Radioisotope and Analytical Chemistry Laboratory (B&W TSG-RACL) to perform the Toxic Characteristic Leaching Procedure (TCLP) and subsequent extract analysis on saltstone samples for the analytes required for the quarterly analysis saltstone sample. In addition to the eight toxic metals - arsenic, barium, cadmium, chromium, mercury, lead, selenium and silver - analytes included the underlying hazardous constituents (UHC) antimony, beryllium, nickel, and thallium which could not be eliminated from analysis by process knowledge. Additional inorganic species determined by B&W TSG-RACL include aluminum, boron, chloride, cobalt, copper, fluoride, iron, lithium, manganese, molybdenum, nitrate/nitrite as Nitrogen, strontium, sulfate, uranium, and zinc and the following radionuclides: gross alpha, gross beta/gamma, 3H, 60Co, 90Sr, 99Tc, 106Ru, 106Rh, 125Sb, 137Cs, 137mBa, 154Eu, 238Pu, 239/240Pu, 241Pu, 241Am, 242Cm, and 243/244Cm. B&W TSG-RACL provided subsamples to GEL Laboratories, LLC for analysis for the VOCs benzene, toluene, and 1-butanol. GEL also determines phenol (total) and the following radionuclides: 147Pm, 226Ra and 228Ra. Preparation of the 2QCY11 saltstone samples for the quarterly analysis and for vault classification purposes and the subsequent TCLP analyses of these samples showed that: (1) The saltstone waste form disposed of in the Saltstone Disposal Facility in 2QCY11 was not characteristically hazardous for toxicity. (2) The concentrations of the eight RCRA metals and UHCs identified as possible in the saltstone waste form were present at levels below the UTS. (3) Most of the

  4. Mechanics of Granular Materials labeled hardware

    Science.gov (United States)

    2000-01-01

    Mechanics of Granular Materials (MGM) flight hardware takes two twin double locker assemblies in the Space Shuttle middeck or the Spacehab module. Sand and soil grains have faces that can cause friction as they roll and slide against each other, or even cause sticking and form small voids between grains. This complex behavior can cause soil to behave like a liquid under certain conditions such as earthquakes or when powders are handled in industrial processes. MGM experiments aboard the Space Shuttle use the microgravity of space to simulate this behavior under conditions that carnot be achieved in laboratory tests on Earth. MGM is shedding light on the behavior of fine-grain materials under low effective stresses. Applications include earthquake engineering, granular flow technologies (such as powder feed systems for pharmaceuticals and fertilizers), and terrestrial and planetary geology. Nine MGM specimens have flown on two Space Shuttle flights. Another three are scheduled to fly on STS-107. The principal investigator is Stein Sture of the University of Colorado at Boulder. (Credit: NASA/MSFC).

  5. Hardware platform for multiple mobile robots

    Science.gov (United States)

    Parzhuber, Otto; Dolinsky, D.

    2004-12-01

    This work is concerned with software and communications architectures that might facilitate the operation of several mobile robots. The vehicles should be remotely piloted or tele-operated via a wireless link between the operator and the vehicles. The wireless link will carry control commands from the operator to the vehicle, telemetry data from the vehicle back to the operator and frequently also a real-time video stream from an on board camera. For autonomous driving the link will carry commands and data between the vehicles. For this purpose we have developed a hardware platform which consists of a powerful microprocessor, different sensors, stereo- camera and Wireless Local Area Network (WLAN) for communication. The adoption of IEEE802.11 standard for the physical and access layer protocols allow a straightforward integration with the internet protocols TCP/IP. For the inspection of the environment the robots are equipped with a wide variety of sensors like ultrasonic, infrared proximity sensors and a small inertial measurement unit. Stereo cameras give the feasibility of the detection of obstacles, measurement of distance and creation of a map of the room.

  6. Open Hardware For CERN's Accelerator Control Systems

    CERN Document Server

    van der Bij, E; Ayass, M; Boccardi, A; Cattin, M; Gil Soriano, C; Gousiou, E; Iglesias Gonsálvez, S; Penacoba Fernandez, G; Serrano, J; Voumard, N; Wlostowski, T

    2011-01-01

    The accelerator control systems at CERN will be renovated and many electronics modules will be redesigned as the modules they will replace cannot be bought anymore or use obsolete components. The modules used in the control systems are diverse: analog and digital I/O, level converters and repeaters, serial links and timing modules. Overall around 120 modules are supported that are used in systems such as beam instrumentation, cryogenics and power converters. Only a small percentage of the currently used modules are commercially available, while most of them had been specifically designed at CERN. The new developments are based on VITA and PCI-SIG standards such as FMC (FPGA Mezzanine Card), PCI Express and VME64x using transition modules. As system-on-chip interconnect, the public domain Wishbone specification is used. For the renovation, it is considered imperative to have for each board access to the full hardware design and its firmware so that problems could quickly be resolved by CERN engineers or its ...

  7. Nanorobot Hardware Architecture for Medical Defense.

    Science.gov (United States)

    Cavalcanti, Adriano; Shirinzadeh, Bijan; Zhang, Mingjun; Kretly, Luiz C

    2008-05-06

    This work presents a new approach with details on the integrated platform and hardware architecture for nanorobots application in epidemic control, which should enable real time in vivo prognosis of biohazard infection. The recent developments in the field of nanoelectronics, with transducers progressively shrinking down to smaller sizes through nanotechnology and carbon nanotubes, are expected to result in innovative biomedical instrumentation possibilities, with new therapies and efficient diagnosis methodologies. The use of integrated systems, smart biosensors, and programmable nanodevices are advancing nanoelectronics, enabling the progressive research and development of molecular machines. It should provide high precision pervasive biomedical monitoring with real time data transmission. The use of nanobioelectronics as embedded systems is the natural pathway towards manufacturing methodology to achieve nanorobot applications out of laboratories sooner as possible. To demonstrate the practical application of medical nanorobotics, a 3D simulation based on clinical data addresses how to integrate communication with nanorobots using RFID, mobile phones, and satellites, applied to long distance ubiquitous surveillance and health monitoring for troops in conflict zones. Therefore, the current model can also be used to prevent and save a population against the case of some targeted epidemic disease.

  8. Nanorobot Hardware Architecture for Medical Defense

    Directory of Open Access Journals (Sweden)

    Luiz C. Kretly

    2008-05-01

    Full Text Available This work presents a new approach with details on the integrated platform and hardware architecture for nanorobots application in epidemic control, which should enable real time in vivo prognosis of biohazard infection. The recent developments in the field of nanoelectronics, with transducers progressively shrinking down to smaller sizes through nanotechnology and carbon nanotubes, are expected to result in innovative biomedical instrumentation possibilities, with new therapies and efficient diagnosis methodologies. The use of integrated systems, smart biosensors, and programmable nanodevices are advancing nanoelectronics, enabling the progressive research and development of molecular machines. It should provide high precision pervasive biomedical monitoring with real time data transmission. The use of nanobioelectronics as embedded systems is the natural pathway towards manufacturing methodology to achieve nanorobot applications out of laboratories sooner as possible. To demonstrate the practical application of medical nanorobotics, a 3D simulation based on clinical data addresses how to integrate communication with nanorobots using RFID, mobile phones, and satellites, applied to long distance ubiquitous surveillance and health monitoring for troops in conflict zones. Therefore, the current model can also be used to prevent and save a population against the case of some targeted epidemic disease.

  9. Employing ISRU Models to Improve Hardware Design

    Science.gov (United States)

    Linne, Diane L.

    2010-01-01

    An analytical model for hydrogen reduction of regolith was used to investigate the effects of several key variables on the energy and mass performance of reactors for a lunar in-situ resource utilization oxygen production plant. Reactor geometry, reaction time, number of reactors, heat recuperation, heat loss, and operating pressure were all studied to guide hardware designers who are developing future prototype reactors. The effects of heat recuperation where the incoming regolith is pre-heated by the hot spent regolith before transfer was also investigated for the first time. In general, longer reaction times per batch provide a lower overall energy, but also result in larger and heavier reactors. Three reactors with long heat-up times results in similar energy requirements as a two-reactor system with all other parameters the same. Three reactors with heat recuperation results in energy reductions of 20 to 40 percent compared to a three-reactor system with no heat recuperation. Increasing operating pressure can provide similar energy reductions as heat recuperation for the same reaction times.

  10. Flow testing rear face hardware combinations

    Energy Technology Data Exchange (ETDEWEB)

    Haun, F.E. Jr.

    1962-06-01

    The purpose of these tests is to provide necessary laboratory data in support of an R,PEO program in determining the energy loss associated with various hardware size combinations on the rear face of the B-D-F reactors. The original method used to check for critical flow was determined to be faulty. A revised method demonstrated critical flow did occur in the 5/8-inch inconel connector and combination 1 fittings. The remaining fitting combinations with the 5/8-inch inconel and 3/4-inch aluminum connector were not rechecked because of the reaming of the I.D. to permit the continuation of the original tests. During test number 6, audible cavitation was heard with the highest severity at a point midway between pressure points 3 and 4 on the connector. This condition appeared again in tests 6A, 7, and 7A, with incipient cavitation at approximately 40 gpm in each test, regardless of the rear header pressure and/or temperature.

  11. Monte Carlo simulation of the neutron spectral fluence and dose equivalent for use in shielding a proton therapy vault

    Science.gov (United States)

    Zheng, Yuanshui; Newhauser, Wayne; Klein, Eric; Low, Daniel

    2014-01-01

    Neutron production is of principal concern when designing proton therapy vault shielding. Conventionally, neutron calculations are based on analytical methods, which do not accurately consider beam shaping components and nozzle shielding. The goal of this study was to calculate, using Monte Carlo modeling, the neutron spectral fluence and neutron dose equivalent generated by a realistic proton therapy nozzle and evaluate how these data could be used in shielding calculations. We modeled a contemporary passive scattering proton therapy nozzle in detail with the MCNPX simulation code. The neutron spectral fluence and dose equivalent at various locations in the treatment room were calculated and compared to those obtained from a thick iron target bombarded by parallel proton beams, the simplified geometry on which analytical methods are based. The neutron spectral fluence distributions were similar for both methods, with deeply penetrating high-energy neutrons (E > 10 MeV) being most prevalent along the beam central axis, and low-energy neutrons predominating the neutron spectral fluence in the lateral region. However, unlike the inverse square falloff used in conventional analytical methods, this study shows that the neutron dose equivalent per therapeutic dose in the treatment room decreased with distance approximately following a power law, with an exponent of about −1.63 in the lateral region and −1.73 in the downstream region. Based on the simulated data according to the detailed nozzle modeling, we developed an empirical equation to estimate the neutron dose equivalent at any location and distance in the treatment vault, e.g. for cases in which detailed Monte Carlo modeling is not feasible. We applied the simulated neutron spectral fluence and dose equivalent to a shielding calculation as an example. PMID:19887713

  12. Underground Storage Tanks - Storage Tank Locations

    Data.gov (United States)

    NSGIC Education | GIS Inventory — A Storage Tank Location is a DEP primary facility type, and its sole sub-facility is the storage tank itself. Storage tanks are aboveground or underground, and are...

  13. Ultrasound and clinical evaluation of soft-tissue versus hardware biceps tenodesis: is hardware tenodesis worth the cost?

    Science.gov (United States)

    Elkousy, Hussein; Romero, Jose A; Edwards, T Bradley; Gartsman, Gary M; O'Connor, Daniel P

    2014-02-01

    This study assesses the failure rate of soft-tissue versus hardware fixation of biceps tenodesis by ultrasound to determine if the expense of a hardware tenodesis technique is warranted. Seventy-two patients that underwent arthroscopic biceps tenodesis over a 3-year period were evaluated using postoperative ultrasonography and clinical examination. The tenodesis technique employed was either a soft-tissue technique with sutures or an interference screw technique using hardware based on surgeon preference. Patient age was 57.9 years on average with ultrasound and clinical examination done at an average of 9.3 months postoperatively. Thirty-one patients had a hardware technique and 41 a soft-tissue technique. Overall, 67.7% of biceps tenodesis done with hardware were intact, compared with 75.6% for the soft-tissue technique by ultrasound (P = .46). Clinical evaluation indicated that 80.7% of hardware techniques and 78% of soft-tissue techniques were intact. Average material cost to the hospital for the hardware technique was $514.32, compared with $32.05 for the soft-tissue technique. Biceps tenodesis success, as determined by clinical deformity and ultrasound, was not improved using hardware as compared to soft-tissue techniques. Soft-tissue techniques are equally efficacious and more cost effective than hardware techniques.

  14. Hardware packet pacing using a DMA in a parallel computer

    Science.gov (United States)

    Chen, Dong; Heidelberger, Phillip; Vranas, Pavlos

    2013-08-13

    Method and system for hardware packet pacing using a direct memory access controller in a parallel computer which, in one aspect, keeps track of a total number of bytes put on the network as a result of a remote get operation, using a hardware token counter.

  15. Teaching Robotics Software with the Open Hardware Mobile Manipulator

    Science.gov (United States)

    Vona, M.; Shekar, N. H.

    2013-01-01

    The "open hardware mobile manipulator" (OHMM) is a new open platform with a unique combination of features for teaching robotics software and algorithms. On-board low- and high-level processors support real-time embedded programming and motor control, as well as higher-level coding with contemporary libraries. Full hardware designs and…

  16. The role of the visual hardware system in rugby performance ...

    African Journals Online (AJOL)

    This study explores the importance of the 'hardware' factors of the visual system in the game of rugby. A group of professional and club rugby players were tested and the results compared. The results were also compared with the established norms for elite athletes. The findings indicate no significant difference in hardware ...

  17. The role of the visual hardware system in rugby performance ...

    African Journals Online (AJOL)

    This suggests that in the game of rugby the hardware skills may be of less importance and that visual enhancement programmes should focus more on improving the players' software skills. Key words: Vision, hardware, rugby, sports performance. (Af. J. Physical, Health Education, Recreation and Dance: 2003 Special ...

  18. [Hardware and software for X-ray therapy planning].

    Science.gov (United States)

    Zhizniakov, A L; Semenov, S I; Sushkova, L T; Troitskii, D P; Chirkov, K V

    2007-01-01

    Hardware, circuitry, and software suggested in this work make it possible to use the SLS-9 X-ray simulator for classical and computer tomographic imaging. The suggested hardware and software can be used as a basis for designing special-purpose tomographic systems.

  19. Impact of Recent Hardware and Software Trends on High Performance Transaction Processing and Analytics

    Science.gov (United States)

    Mohan, C.

    In this paper, I survey briefly some of the recent and emerging trends in hardware and software features which impact high performance transaction processing and data analytics applications. These features include multicore processor chips, ultra large main memories, flash storage, storage class memories, database appliances, field programmable gate arrays, transactional memory, key-value stores, and cloud computing. While some applications, e.g., Web 2.0 ones, were initially built without traditional transaction processing functionality in mind, slowly system architects and designers are beginning to address such previously ignored issues. The availability, analytics and response time requirements of these applications were initially given more importance than ACID transaction semantics and resource consumption characteristics. A project at IBM Almaden is studying the implications of phase change memory on transaction processing, in the context of a key-value store. Bitemporal data management has also become an important requirement, especially for financial applications. Power consumption and heat dissipation properties are also major considerations in the emergence of modern software and hardware architectural features. Considerations relating to ease of configuration, installation, maintenance and monitoring, and improvement of total cost of ownership have resulted in database appliances becoming very popular. The MapReduce paradigm is now quite popular for large scale data analysis, in spite of the major inefficiencies associated with it.

  20. Monitoring Particulate Matter with Commodity Hardware

    Science.gov (United States)

    Holstius, David

    Health effects attributed to outdoor fine particulate matter (PM 2.5) rank it among the risk factors with the highest health burdens in the world, annually accounting for over 3.2 million premature deaths and over 76 million lost disability-adjusted life years. Existing PM2.5 monitoring infrastructure cannot, however, be used to resolve variations in ambient PM2.5 concentrations with adequate spatial and temporal density, or with adequate coverage of human time-activity patterns, such that the needs of modern exposure science and control can be met. Small, inexpensive, and portable devices, relying on newly available off-the-shelf sensors, may facilitate the creation of PM2.5 datasets with improved resolution and coverage, especially if many such devices can be deployed concurrently with low system cost. Datasets generated with such technology could be used to overcome many important problems associated with exposure misclassification in air pollution epidemiology. Chapter 2 presents an epidemiological study of PM2.5 that used data from ambient monitoring stations in the Los Angeles basin to observe a decrease of 6.1 g (95% CI: 3.5, 8.7) in population mean birthweight following in utero exposure to the Southern California wildfires of 2003, but was otherwise limited by the sparsity of the empirical basis for exposure assessment. Chapter 3 demonstrates technical potential for remedying PM2.5 monitoring deficiencies, beginning with the generation of low-cost yet useful estimates of hourly and daily PM2.5 concentrations at a regulatory monitoring site. The context (an urban neighborhood proximate to a major goods-movement corridor) and the method (an off-the-shelf sensor costing approximately USD $10, combined with other low-cost, open-source, readily available hardware) were selected to have special significance among researchers and practitioners affiliated with contemporary communities of practice in public health and citizen science. As operationalized by

  1. FPGA BASED HARDWARE KEY FOR TEMPORAL ENCRYPTION

    Directory of Open Access Journals (Sweden)

    B. Lakshmi

    2010-09-01

    Full Text Available In this paper, a novel encryption scheme with time based key technique on an FPGA is presented. Time based key technique ensures right key to be entered at right time and hence, vulnerability of encryption through brute force attack is eliminated. Presently available encryption systems, suffer from Brute force attack and in such a case, the time taken for breaking a code depends on the system used for cryptanalysis. The proposed scheme provides an effective method in which the time is taken as the second dimension of the key so that the same system can defend against brute force attack more vigorously. In the proposed scheme, the key is rotated continuously and four bits are drawn from the key with their concatenated value representing the delay the system has to wait. This forms the time based key concept. Also the key based function selection from a pool of functions enhances the confusion and diffusion to defend against linear and differential attacks while the time factor inclusion makes the brute force attack nearly impossible. In the proposed scheme, the key scheduler is implemented on FPGA that generates the right key at right time intervals which is then connected to a NIOS – II processor (a virtual microcontroller which is brought out from Altera FPGA that communicates with the keys to the personal computer through JTAG (Joint Test Action Group communication and the computer is used to perform encryption (or decryption. In this case the FPGA serves as hardware key (dongle for data encryption (or decryption.

  2. A Practical Introduction to HardwareSoftware Codesign

    CERN Document Server

    Schaumont, Patrick R

    2013-01-01

    This textbook provides an introduction to embedded systems design, with emphasis on integration of custom hardware components with software. The key problem addressed in the book is the following: how can an embedded systems designer strike a balance between flexibility and efficiency? The book describes how combining hardware design with software design leads to a solution to this important computer engineering problem. The book covers four topics in hardware/software codesign: fundamentals, the design space of custom architectures, the hardware/software interface and application examples. The book comes with an associated design environment that helps the reader to perform experiments in hardware/software codesign. Each chapter also includes exercises and further reading suggestions. Improvements in this second edition include labs and examples using modern FPGA environments from Xilinx and Altera, which make the material applicable to a greater number of courses where these tools are already in use.  Mo...

  3. Applying IEEE storage system management standards at the National Storage Laboratory

    Energy Technology Data Exchange (ETDEWEB)

    Louis, S.; Hyer, S.W.

    1992-12-04

    Since its inception in 1990, the IEEE Storage System Standards Working Group has identified storage-system management as an area in need of further development The pressing need for standards in storage-system management arises from the requirement to exchange management information and to provide control in a consistent predictable manner between the components of a storage system. An appropriate set of management standards will allow multiple vendors to supply storage management subsystems or applications that are integral to or compatible with new storage systems conforming to future IEEE standards. An early, practical application of IEEE storage-system-management work is being pursued at the National Storage Laboratory (NSL), a recently-formed industrial collaboration at Lawrence Livermore National Laboratory. The NSL`s purpose is to develop advanced hardware and software technologies for high-performance, distributed storage systems. Since storage system management is of critical concern, it is being explored in depth at the NSL. Work was initiated to define basic management requirements and develop generalized graphical-user-interface tools using remote-procedure-call mechanisms to implement the NSL`s conceptual management framework. Several constraints were imposed on the development of early versions of this work to maintain compatibility with the NSL`s underlying UniTree-based software architecture and to provide timely prototypes and proof of concept. The project leverages the on-going standards work of the IEEE Storage System Standards Working Group (SSSWG) and also explores some of the relationships and interactions between IEEE storage-system management and more well known management methods for distributed systems and networks. It will have long term benefits by providing ``real-life`` storage-system-management requirements to the IEEE SSSWG for validation of evolving standards.

  4. A software and hardware architecture for a high-availability PACS.

    Science.gov (United States)

    Gutiérrez-Martínez, Josefina; Núñez-Gaona, Marco Antonio; Aguirre-Meneses, Heriberto; Delgado-Esquerra, Ruth Evelin

    2012-08-01

    Increasing radiology studies has led to the emergence of new requirements for management medical information, mainly affecting the storage of digital images. Today, it is a necessary interaction between workflow management and legal rules that govern it, to allow an efficient control of medical technology and associated costs. Another important topic that is growing in importance within the healthcare sector is compliance, which includes the retention of studies, information security, and patient privacy. Previously, we conducted a series of extensive analysis and measurements of pre-existing operating conditions. These studies and projects have been described in other papers. The first phase: hardware and software installation and initial tests were completed in March 2006. The storage phase was built step by step until the PACS-INR was totally completed. Two important aspects were considered in the integration of components: (1) the reliability and performance of the system to transfer and display DICOM images, and (2) the availability of data backups for disaster recovery and downtime scenarios. This paper describes the high-availability model for a large-scale PACS to support the storage and retrieve of data using CAS and DAS technologies to provide an open storage platform. This solution offers a simple framework that integrates and automates the information at low cost and minimum risk. Likewise, the model allows an optimized use of the information infrastructure in the clinical environment. The tests of the model include massive data migration, openness, scalability, and standard compatibility to avoid locking data into a proprietary technology.

  5. Disk storage at CERN

    CERN Document Server

    Mascetti, L; Chan, B; Espinal, X; Fiorot, A; Labrador, H Gonz; Iven, J; Lamanna, M; Presti, G Lo; Mościcki, JT; Peters, AJ; Ponce, S; Rousseau, H; van der Ster, D

    2015-01-01

    CERN IT DSS operates the main storage resources for data taking and physics analysis mainly via three system: AFS, CASTOR and EOS. The total usable space available on disk for users is about 100 PB (with relative ratios 1:20:120). EOS actively uses the two CERN Tier0 centres (Meyrin and Wigner) with 50:50 ratio. IT DSS also provide sizeable on-demand resources for IT services most notably OpenStack and NFS-based clients: this is provided by a Ceph infrastructure (3 PB) and few proprietary servers (NetApp). We will describe our operational experience and recent changes to these systems with special emphasis to the present usages for LHC data taking, the convergence to commodity hardware (nodes with 200-TB each with optional SSD) shared across all services. We also describe our experience in coupling commodity and home-grown solution (e.g. CERNBox integration in EOS, Ceph disk pools for AFS, CASTOR and NFS) and finally the future evolution of these systems for WLCG and beyond.

  6. Annex D-200 Area Interim Storage Area Final Safety Analysis Report [FSAR] [Section 1 & 2

    Energy Technology Data Exchange (ETDEWEB)

    CARRELL, R D

    2002-07-16

    The 200 Area Interim Storage Area (200 Area ISA) at the Hanford Site provides for the interim storage of non-defense reactor spent nuclear fuel (SNF) housed in aboveground dry cask storage systems. The 200 Area ISA is a relatively simple facility consisting of a boundary fence with gates, perimeter lighting, and concrete and gravel pads on which to place the dry storage casks. The fence supports safeguards and security and establishes a radiation protection buffer zone. The 200 Area ISA is nominally 200,000 ft{sup 2} and is located west of the Canister Storage Building (CSB). Interim storage at the 200 Area ISA is intended for a period of up to 40 years until the materials are shipped off-site to a disposal facility. This Final Safety Analysis Report (FSAR) does not address removal from storage or shipment from the 200 Area ISA. Three different SNF types contained in three different dry cask storage systems are to be stored at the 200 Area ISA, as follows: (1) Fast Flux Test Facility Fuel--Fifty-three interim storage casks (ISC), each holding a core component container (CCC), will be used to store the Fast Flux Test Facility (FFTF) SNF currently in the 400 Area. (2) Neutron Radiography Facility (NRF) TRIGA'--One Rad-Vault' container will store two DOT-6M3 containers and six NRF TRIGA casks currently stored in the 400 Area. (3) Commercial Light Water Reactor Fuel--Six International Standards Organization (ISO) containers, each holding a NAC-I cask4 with an inner commercial light water reactor (LWR) canister, will be used for commercial LWR SNF from the 300 Area. An aboveground dry cask storage location is necessary for the spent fuel because the current storage facilities are being shut down and deactivated. The spent fuel is being transferred to interim storage because there is no permanent repository storage currently available.

  7. Basic Considerations for Dry Storage of Spent Nuclear Fuels and Revisited CFD Thermal Analysis on the Concrete Cask

    Energy Technology Data Exchange (ETDEWEB)

    Noh, Jae Soo [ACT Co. Ltd., Daejeon (Korea, Republic of); Park, Younwon; Song, Sub Lee [BEES Inc., Daejeon (Korea, Republic of); Kim, Hyeun Min [KAIST, Daejeon (Korea, Republic of)

    2016-10-15

    The integrity of storage facility and also of the spent nuclear fuel itself is considered very important. Storage casks can be located in a designated area on a site or in a designated storage building. A number of different designs for dry storage have been developed and used in different countries. Dry storage system was classified into two categories by IAEA. One is container including cask and silo, the other one is vault. However, there is various way of categorization for dry storage system. Dry silo and cask are usually classified separately, so the dry storage system can be classified into three different types. Furthermore, dry cask storage can be categorized into two types based on the type of the materials, concrete cask and metal cask. In this paper, the design characteristics of dry storage cask are introduced and computational fluid dynamics (CFD) based thermal analysis for concrete cask is revisited. Basic principles for dry storage cask design were described. Based on that, thermal analysis of concrete dry cask was introduced from the study of H. M. Kim et al. From the CFD calculation, the temperature of concrete wall was maintained under the safety criteria. From this fundamental analysis, further investigations are expected. For example, thermal analysis on the metal cask, thermal analysis on horizontally laid spent nuclear fuel assemblies for transportation concerns, and investigations on better performance of natural air circulation in dry cask can be promising candidates.

  8. The Art of Space Flight Exercise Hardware: Design and Implementation

    Science.gov (United States)

    Beyene, Nahom M.

    2004-01-01

    The design of space flight exercise hardware depends on experience with crew health maintenance in a microgravity environment, history in development of flight-quality exercise hardware, and a foundation for certifying proper project management and design methodology. Developed over the past 40 years, the expertise in designing exercise countermeasures hardware at the Johnson Space Center stems from these three aspects of design. The medical community has steadily pursued an understanding of physiological changes in humans in a weightless environment and methods of counteracting negative effects on the cardiovascular and musculoskeletal system. The effects of weightlessness extend to the pulmonary and neurovestibular system as well with conditions ranging from motion sickness to loss of bone density. Results have shown losses in water weight and muscle mass in antigravity muscle groups. With the support of university-based research groups and partner space agencies, NASA has identified exercise to be the primary countermeasure for long-duration space flight. The history of exercise hardware began during the Apollo Era and leads directly to the present hardware on the International Space Station. Under the classifications of aerobic and resistive exercise, there is a clear line of development from the early devices to the countermeasures hardware used today. In support of all engineering projects, the engineering directorate has created a structured framework for project management. Engineers have identified standards and "best practices" to promote efficient and elegant design of space exercise hardware. The quality of space exercise hardware depends on how well hardware requirements are justified by exercise performance guidelines and crew health indicators. When considering the microgravity environment of the device, designers must consider performance of hardware separately from the combined human-in-hardware system. Astronauts are the caretakers of the hardware

  9. Modern Hardware Technologies and Software Techniques for On-Line Database Storage and Access.

    Science.gov (United States)

    1985-12-01

    Benefits of Bernoulli Disk D)rives **.*.*,***. 26. rensity and nata-Pate Comparison 0 9 0 0 0 0 I 1 3.)V- 26a. Arce’ss, rapacity anfi Seek...Toital capacity 2NI hytes 26:K fl’tesv 5.4h1’ htei 76 RM h i up Ave ~rage la’ency 17 tn.% 8 5 nis 2. 5 tn% R.3 rnv Transfer rate 3003K 250K 3MI QNKi...throuoh a quarter , ave lenot n." retardation plate, which brings the light back into focus* This changes the polarization characteristtcs of the beam

  10. Hardware Realization of Chaos Based Symmetric Image Encryption

    KAUST Repository

    Barakat, Mohamed L.

    2012-06-01

    This thesis presents a novel work on hardware realization of symmetric image encryption utilizing chaos based continuous systems as pseudo random number generators. Digital implementation of chaotic systems results in serious degradations in the dynamics of the system. Such defects are illuminated through a new technique of generalized post proceeding with very low hardware cost. The thesis further discusses two encryption algorithms designed and implemented as a block cipher and a stream cipher. The security of both systems is thoroughly analyzed and the performance is compared with other reported systems showing a superior results. Both systems are realized on Xilinx Vetrix-4 FPGA with a hardware and throughput performance surpassing known encryption systems.

  11. Routing Aware Switch Hardware Customization for Networks on Chips

    OpenAIRE

    Meloni, Paolo; Murali, Srinivasan; Carta, Salvatore; Camplani, Massimo; Raffo, Luigi; Micheli, Giovanni,

    2006-01-01

    Networks on Chip (NoC) has been proposed as a scalable and reusable solution for interconnecting the ever- growing number of processor/memory cores on a single silicon die. As the hardware complexity of a NoC is significant, methods for designing a NoC with low hardware overhead, matching the application requirements are essential. In this work, we present a method for reducing the hardware complexity of the NoC by automatically configuring the architecture of the NoC switches to suit the app...

  12. Recommendations to the NRC for review criteria for alternative methods of low-level radioactive waste disposal: Task 2a, Below-ground vaults

    Energy Technology Data Exchange (ETDEWEB)

    Denson, R.H.; Bennett, R.D.; Wamsley, R.M.; Bean, D.L.; Ainsworth, D.L.

    1987-12-01

    The US Army Engineer Waterways Experiment Station (WES) and the US Army Engineer Division, Huntsville (HNDED) have developed general design criteria and specific design review criteria for the below-ground vault (BGV) alternative method of low-level radioactive waste (LLW) disposal. A BGV is a reinforced concrete vault (floor, walls, and roof) placed underground below the frost line, and above the water table, surrounded by filter blanket and drainage zones and covered with a low permeability earth layer and top soil with vegetation. Eight major review criteria categories have been developed ranging from the loads imposed on the BGV structure through material quality and durability considerations. Specific design review criteria have been developed in detail for seven of the eight major categories. 59 refs., 14 figs., 2 tabs.

  13. Hardware Implementation of Serially Concatenated PPM Decoder

    Science.gov (United States)

    Moision, Bruce; Hamkins, Jon; Barsoum, Maged; Cheng, Michael; Nakashima, Michael

    2009-01-01

    A prototype decoder for a serially concatenated pulse position modulation (SCPPM) code has been implemented in a field-programmable gate array (FPGA). At the time of this reporting, this is the first known hardware SCPPM decoder. The SCPPM coding scheme, conceived for free-space optical communications with both deep-space and terrestrial applications in mind, is an improvement of several dB over the conventional Reed-Solomon PPM scheme. The design of the FPGA SCPPM decoder is based on a turbo decoding algorithm that requires relatively low computational complexity while delivering error-rate performance within approximately 1 dB of channel capacity. The SCPPM encoder consists of an outer convolutional encoder, an interleaver, an accumulator, and an inner modulation encoder (more precisely, a mapping of bits to PPM symbols). Each code is describable by a trellis (a finite directed graph). The SCPPM decoder consists of an inner soft-in-soft-out (SISO) module, a de-interleaver, an outer SISO module, and an interleaver connected in a loop (see figure). Each SISO module applies the Bahl-Cocke-Jelinek-Raviv (BCJR) algorithm to compute a-posteriori bit log-likelihood ratios (LLRs) from apriori LLRs by traversing the code trellis in forward and backward directions. The SISO modules iteratively refine the LLRs by passing the estimates between one another much like the working of a turbine engine. Extrinsic information (the difference between the a-posteriori and a-priori LLRs) is exchanged rather than the a-posteriori LLRs to minimize undesired feedback. All computations are performed in the logarithmic domain, wherein multiplications are translated into additions, thereby reducing complexity and sensitivity to fixed-point implementation roundoff errors. To lower the required memory for storing channel likelihood data and the amounts of data transfer between the decoder and the receiver, one can discard the majority of channel likelihoods, using only the remainder in

  14. Changes in frontal morphology after single-stage open posterior-middle vault expansion for sagittal craniosynostosis.

    Science.gov (United States)

    Khechoyan, David; Schook, Carolyn; Birgfeld, Craig B; Khosla, Rohit K; Saltzman, Babette; Teng, Chia Chi; Ettinger, Russell; Gruss, Joseph S; Ellenbogen, Richard; Hopper, Richard A

    2012-02-01

    There is controversy regarding whether the frontal bossing associated with sagittal synostosis requires direct surgical correction or spontaneously remodels after isolated posterior cranial expansion. The authors retrospectively measured changes in frontal bone morphology in patients with isolated sagittal synostosis 2 years after open posterior and midvault cranial expansion and compared these changes with those occurring in age-comparable healthy control groups. Forty-three patients age 1 year or younger (mean, 6 months) with sagittal synostosis underwent computed tomography scan digital analysis immediately after and 2 years after posterior-middle cranial vault expansion. Quantitative angular and linear measures were taken along the midsagittal and axial planes to capture both aspects of frontal bossing. The change in values over the 2 years were compared with healthy controls with normal computed tomography scans taken to rule out head trauma. All measures indicative of frontal bossing decreased significantly from the time of posterior-middle vault expansion to 2 years postoperatively. Whereas the majority of patients at time of the operation had frontal bossing measures greater than two standard deviations outside the age-comparable control mean, almost all patients were within two standard deviations of the norm 2 years later. Lateral forehead bossing and anterior cranial growth was greater the older the patient was at the time of the operation, suggesting that the more time that passed before the operation, the more compensatory anterior fossa growth occurred. Central forehead position relative to the anterior cranial base was greatest in the younger patients at the time of operation, suggesting that a central forehead bulge was an early compensatory response to premature sagittal fusion. As a group, patients with sagittal synostosis start to normalize their forehead morphology within 2 years if an isolated posterior operation is performed at 1 year of age

  15. Maximal Power of the Lower Limbs of Youth Gymnasts and Biomechanical Indicators of the Forward Handspring Vault Versus the Sports Result

    OpenAIRE

    Kochanowicz Andrzej; Kochanowicz Kazimierz; Niespodziúski Bartłomiej; Mieszkowski Jan; Aschenbrenner Piotr; Bielec Grzegorz; Szark-Eckardt Mirosława

    2016-01-01

    Abstract The aim of the study was to define the relationship between maximal power of lower limbs, the biomechanics of the forward handspring vault and the score received during a gymnastics competition. The research involved 42 gymnasts aged 9-11 years competing in the Poland?s Junior Championships. The study consisted of three stages: first -estimating the level of indicators of maximal power of lower limbs tested on a force plate during the countermovement jump; second - estimating the lev...

  16. Hardware locks for a real-time Java chip multiprocessor

    DEFF Research Database (Denmark)

    Strøm, Torur Biskopstø; Puffitsch, Wolfgang; Schoeberl, Martin

    2016-01-01

    A software locking mechanism commonly protects shared resources for multithreaded applications. This mechanism can, especially in chip-multiprocessor systems, result in a large synchronization overhead. For real-time systems in particular, this overhead increases the worst-case execution time...... and may void a task set's schedulability. This paper presents 2 hardware locking mechanisms to reduce the worst-case time required to acquire and release synchronization locks. These solutions are implemented for the chip-multiprocessor version of the Java Optimized Processor. The 2 hardware locking...... mechanisms are compared with a software locking solution as well as the original locking system of the processor. The hardware cost and performance are evaluated for all presented locking mechanisms. The performance of the better-performing hardware locks is comparable with that of the original single global...

  17. A versatile hardware platform for brain computer interfaces.

    Science.gov (United States)

    Garcia, Pablo A; Haberman, Marcelo; Spinelli, Enrique M

    2010-01-01

    This article presents the development of a versatile hardware platform for brain computer interfaces (BCI). The aim of this work is to produce a small, autonomous and configurable BCI platform adaptable to the user's needs.

  18. Scientific Computing Using Consumer Video-Gaming Hardware Devices

    CERN Document Server

    Volkema, Glenn

    2016-01-01

    Commodity video-gaming hardware (consoles, graphics cards, tablets, etc.) performance has been advancing at a rapid pace owing to strong consumer demand and stiff market competition. Gaming hardware devices are currently amongst the most powerful and cost-effective computational technologies available in quantity. In this article, we evaluate a sample of current generation video-gaming hardware devices for scientific computing and compare their performance with specialized supercomputing general purpose graphics processing units (GPGPUs). We use the OpenCL SHOC benchmark suite, which is a measure of the performance of compute hardware on various different scientific application kernels, and also a popular public distributed computing application, Einstein@Home in the field of gravitational physics for the purposes of this evaluation.

  19. Combining hardware and simulation for datacenter scaling studies

    DEFF Research Database (Denmark)

    Ruepp, Sarah Renée; Pilimon, Artur; Thrane, Jakob

    2017-01-01

    Datacenter networks are becoming crucial foundations for our information technology based society. However, commercial datacenter infrastructure is often unavailable to researchers for conducting experiments. In this work, we therefore elaborate on the possibility of combining commercial hardware...

  20. Hardware device to physical structure binding and authentication

    Energy Technology Data Exchange (ETDEWEB)

    Hamlet, Jason R.; Stein, David J.; Bauer, Todd M.

    2013-08-20

    Detection and deterrence of device tampering and subversion may be achieved by including a cryptographic fingerprint unit within a hardware device for authenticating a binding of the hardware device and a physical structure. The cryptographic fingerprint unit includes an internal physically unclonable function ("PUF") circuit disposed in or on the hardware device, which generate an internal PUF value. Binding logic is coupled to receive the internal PUF value, as well as an external PUF value associated with the physical structure, and generates a binding PUF value, which represents the binding of the hardware device and the physical structure. The cryptographic fingerprint unit also includes a cryptographic unit that uses the binding PUF value to allow a challenger to authenticate the binding.

  1. Hardware problems encountered in solar heating and cooling systems

    Science.gov (United States)

    Cash, M.

    1978-01-01

    Numerous problems in the design, production, installation, and operation of solar energy systems are discussed. Described are hardware problems, which range from simple to obscure and complex, and their resolution.

  2. Towards Software Defined Radios Using Coarse-Grained Reconfigurable Hardware

    NARCIS (Netherlands)

    Rauwerda, G.K.; Jha, N.K.; Heysters, P.M.; Smit, Gerardus Johannes Maria

    Mobile wireless terminals tend to become multimode wireless communication devices. Furthermore, these devices become adaptive. Heterogeneous reconfigurable hardware provides the flexibility, performance, and efficiency to enable the implementation of these devices. The implementation of a wideband

  3. Hardware Transactional Memory Optimization Guidelines, Applied to Ordered Maps

    DEFF Research Database (Denmark)

    Bonnichsen, Lars Frydendal; Probst, Christian W.; Karlsson, Sven

    2015-01-01

    synchronization method scales well. Recently, hardware transactional memory was introduced, which allows threads to use transactions instead of locks. So far, applying hardware transactional memory has shown mixed results. We believe this is because transactions are different from locks, and using them...... efficiently requires reasoning about those differences. In this paper we present 5 guidelines for applying hardware transactional memory efficiently, and apply the guidelines to BT-trees, a concurrent ordered map. Evaluating BT-trees on standard benchmarks shows that they are up to 5.3 times faster than...... traditional maps using hardware transactional memory, and up to 3.9 times faster than state of the art concurrent ordered maps....

  4. Dependable Benchmarking for Storage Systems in High-Energy Physics

    CERN Document Server

    Fleri Soler, Edward

    2017-01-01

    In high-energy physics, storage systems play a crucial role to store and secure very valuable data produced by complex experiments. The effectiveness and efficiency of data acquisition systems of such experiments depends directly on those of these storage systems. Coping with present day rates and reliability requirements of such experiments implies operating high-performance hardware under the best possible conditions, with a broad set of hardware and software parameters existing along the hierarchical levels, from networks down to drives. An extensive number of tests are required for the tuning of parameters to achieve optimised I/O operations. Current approaches to I/O optimisation generally consist of manual test execution and result taking. This approach lacks appropriate modularity, durability and reproducibility, attainable through dedicated testing facilities. The aim of this project is to conceive a user-friendly, dedicated storage benchmarking tool for the improved comparison of I/O parameters in re...

  5. A Survey on Hardware Implementations of Visual Object Trackers

    OpenAIRE

    El-Shafie, Al-Hussein A.; Habib, S. E. D.

    2017-01-01

    Visual object tracking is an active topic in the computer vision domain with applications extending over numerous fields. The main sub-tasks required to build an object tracker (e.g. object detection, feature extraction and object tracking) are computation-intensive. In addition, real-time operation of the tracker is indispensable for almost all of its applications. Therefore, complete hardware or hardware/software co-design approaches are pursued for better tracker implementations. This pape...

  6. Top Down Approach: SIMULINK Mixed Hardware / Software Design

    OpenAIRE

    Atat, Youssef; Rizk, Mostafa

    2012-01-01

    System-level design methodologies have been introduced as a solution to handle the design complexity of mixed Hardware / Software systems. In this paper we describe a system-level design flow starting from Simulink specification, focusing on concurrent hardware and software design and verification at four different abstraction levels: System Simulink model, Transaction Simulink model, Macro architecture, and micro architecture. We used the MP3 CodeC application, to validate our approach and m...

  7. The aerospace energy systems laboratory: Hardware and software implementation

    Science.gov (United States)

    Glover, Richard D.; Oneil-Rood, Nora

    1989-01-01

    For many years NASA Ames Research Center, Dryden Flight Research Facility has employed automation in the servicing of flight critical aircraft batteries. Recently a major upgrade to Dryden's computerized Battery Systems Laboratory was initiated to incorporate distributed processing and a centralized database. The new facility, called the Aerospace Energy Systems Laboratory (AESL), is being mechanized with iAPX86 and iAPX286 hardware running iRMX86. The hardware configuration and software structure for the AESL are described.

  8. Hardware And Software For Development Of Robot Arms

    Science.gov (United States)

    Usikov, Daniel

    1995-01-01

    System of modular, reusable hardware and software assembled for use in developing remotely controlled robotic arms. Includes (1) central computer and peripheral equipment at control and monitoring station and (2) remote mechanical platform that supports robotic arm. Central computer controls motor drives of robotic arm, but optically, platform holds on-board computer for autonomous operation. Consists mostly of commercial hardware and software. Simulated results of commands viewed in three dimensions.

  9. Memory Based Machine Intelligence Techniques in VLSI hardware

    OpenAIRE

    James, Alex Pappachen

    2012-01-01

    We briefly introduce the memory based approaches to emulate machine intelligence in VLSI hardware, describing the challenges and advantages. Implementation of artificial intelligence techniques in VLSI hardware is a practical and difficult problem. Deep architectures, hierarchical temporal memories and memory networks are some of the contemporary approaches in this area of research. The techniques attempt to emulate low level intelligence tasks and aim at providing scalable solutions to high ...

  10. Mass storage system reference model, Version 4

    Science.gov (United States)

    Coleman, Sam (Editor); Miller, Steve (Editor)

    1993-01-01

    The high-level abstractions that underlie modern storage systems are identified. The information to generate the model was collected from major practitioners who have built and operated large storage facilities, and represents a distillation of the wisdom they have acquired over the years. The model provides a common terminology and set of concepts to allow existing systems to be examined and new systems to be discussed and built. It is intended that the model and the interfaces identified from it will allow and encourage vendors to develop mutually-compatible storage components that can be combined to form integrated storage systems and services. The reference model presents an abstract view of the concepts and organization of storage systems. From this abstraction will come the identification of the interfaces and modules that will be used in IEEE storage system standards. The model is not yet suitable as a standard; it does not contain implementation decisions, such as how abstract objects should be broken up into software modules or how software modules should be mapped to hosts; it does not give policy specifications, such as when files should be migrated; does not describe how the abstract objects should be used or connected; and does not refer to specific hardware components. In particular, it does not fully specify the interfaces.

  11. Hardware Middleware for Person Tracking on Embedded Distributed Smart Cameras

    Directory of Open Access Journals (Sweden)

    Ali Akbar Zarezadeh

    2012-01-01

    Full Text Available Tracking individuals is a prominent application in such domains like surveillance or smart environments. This paper provides a development of a multiple camera setup with jointed view that observes moving persons in a site. It focuses on a geometry-based approach to establish correspondence among different views. The expensive computational parts of the tracker are hardware accelerated via a novel system-on-chip (SoC design. In conjunction with this vision application, a hardware object request broker (ORB middleware is presented as the underlying communication system. The hardware ORB provides a hardware/software architecture to achieve real-time intercommunication among multiple smart cameras. Via a probing mechanism, a performance analysis is performed to measure network latencies, that is, time traversing the TCP/IP stack, in both software and hardware ORB approaches on the same smart camera platform. The empirical results show that using the proposed hardware ORB as client and server in separate smart camera nodes will considerably reduce the network latency up to 100 times compared to the software ORB.

  12. Rapid Energy Estimation for Hardware-Software Codesign Using FPGAs

    Directory of Open Access Journals (Sweden)

    Prasanna ViktorK

    2006-01-01

    Full Text Available By allowing parts of the applications to be executed either on soft processors (as software programs or on customized hardware peripherals attached to the processors, FPGAs have made traditional energy estimation techniques inefficient for evaluating various design tradeoffs. In this paper, we propose a high-level simulation-based two-step rapid energy estimation technique for hardware-software codesign using FPGAs. In the first step, a high-level hardware-software cosimulation technique is applied to simulate both the hardware and software components of the target application. High-level simulation results of both software programs running on the processors and the customized hardware peripherals are gathered during the cosimulation process. In the second step, the high-level simulation results of the customized hardware peripherals are used to estimate the switching activities of their corresponding register-transfer/gate level ("low-level" implementations. We use this information to employ an instruction-level energy estimation technique and a domain-specific energy performance modeling technique to estimate the energy dissipation of the complete application. A Matlab/Simulink-based implementation of our approach and two numerical computation applications show that the proposed energy estimation technique can achieve more than 6000x speedup over low-level simulation-based techniques while sacrificing less than 10% estimation accuracy. Compared with the measured results, our experimental results show that the proposed technique achieves an average estimation error of less than 12%.

  13. Precontoured plating of clavicle fractures: decreased hardware-related complications?

    Science.gov (United States)

    VanBeek, Corinne; Boselli, Karen J; Cadet, Edwin R; Ahmad, Christopher S; Levine, William N

    2011-12-01

    Operative treatment of displaced midshaft clavicle fractures reportedly decreases the risk of symptomatic malunion, nonunion, and residual shoulder disability. Plating these fractures, however, may trade these complications for hardware-related problems. Low-profile anatomically precontoured plates may reduce the rates of plate prominence and hardware removal. We compared the outcomes after precontoured and noncontoured superior plating of acute displaced midshaft clavicle fractures. Primary outcomes were rate of plate prominence, rate of hardware removal, and rate of complications. Secondary outcomes were ROM and pain and function scores. We retrospectively reviewed 52 patients with 52 acute, displaced midshaft clavicle fractures treated with either noncontoured or precontoured superior clavicle plate fixation. Fourteen patients with noncontoured plates and 28 with precontoured plates were available for followup at a minimum of 1 year postoperatively. Postoperative assessment included ROM, radiographs, and subjective scores including visual analog scale for pain, American Shoulder and Elbow Surgeons questionnaire, and Simple Shoulder Test. Patients complained of prominent hardware in nine of 14 in the noncontoured group and nine of 28 in the precontoured group. Hardware removal rates were three of 14 in the noncontoured group and three of 28 in the precontoured group. Postoperative ROM and postoperative subjective scores were similar in the two groups. Precontoured plating versus noncontoured plating of displaced midshaft clavicle fractures results in a lower rate of plate prominence in patients who do not undergo hardware removal. Level III, therapeutic study. See Guidelines for Authors for a complete description of levels of evidence.

  14. On the use of inexact, pruned hardware in atmospheric modelling.

    Science.gov (United States)

    Düben, Peter D; Joven, Jaume; Lingamneni, Avinash; McNamara, Hugh; De Micheli, Giovanni; Palem, Krishna V; Palmer, T N

    2014-06-28

    Inexact hardware design, which advocates trading the accuracy of computations in exchange for significant savings in area, power and/or performance of computing hardware, has received increasing prominence in several error-tolerant application domains, particularly those involving perceptual or statistical end-users. In this paper, we evaluate inexact hardware for its applicability in weather and climate modelling. We expand previous studies on inexact techniques, in particular probabilistic pruning, to floating point arithmetic units and derive several simulated set-ups of pruned hardware with reasonable levels of error for applications in atmospheric modelling. The set-up is tested on the Lorenz '96 model, a toy model for atmospheric dynamics, using software emulation for the proposed hardware. The results show that large parts of the computation tolerate the use of pruned hardware blocks without major changes in the quality of short- and long-time diagnostics, such as forecast errors and probability density functions. This could open the door to significant savings in computational cost and to higher resolution simulations with weather and climate models.

  15. Technical basis for storage of Zircaloy-clad spent fuel in inert gases

    Energy Technology Data Exchange (ETDEWEB)

    Johnson, A.B. Jr.; Gilbert, E.R.

    1983-09-01

    This report summarizes the technical bases to establish safe conditions for dry storage of Zircaloy-clad fuel. Dry storage of fuel with zirconium alloy cladding has been licensed in Canada, the Federal Republic of Germany, and Switzerland. In addition, dry storage demonstrations, hot cell tests, and modeling have been conducted using Zircaloy-clad fuel. The demonstrations have included irradiated boiling water reactor, pressurized heavy-water reactor, and pressurized water reactor (PWR) fuel assemblies. Irradiated fuel has been emplaced in and retrieved from metal casks, dry wells, silos, and a vault. Dry storage tests and demonstrations have involved {similar_to}5,000 fuel rods, and {similar_to}600 rods have been monitored during dry storage in inert gases with maximum cladding temperatures ranging from 50 to 570{sup 0}C. Although some tests and demonstrations are still in progress, there is currently no evidence that any rods exposed to inert gases have failed (one PWR rod exposed to an air cover gas failed at {similar_to}70{sup 0}C). Based on this favorable experience, it is concluded that there is sufficient information on fuel rod behavior, storage conditions, and potential cladding failure mechanisms to support licensing of dry storage in the United States. This licensing position includes a requirement for inert cover gases and a maximum cladding temperature guideline of 380{sup 0}C for Zircaloy-clad fuel. Using an inert cover gas assures that even if fuel with cladding defects were placed in dry storage, or if defects develop during storage, the defects would not propagate. Tests and demonstrations involving Zircaloy-clad rods and assemblies with maximum cladding temperatures above 400{sup 0}C are in progress. When the results from these tests have been evaluated, the viability of higher temperature limits should be examined. Acceptable conditions for storage in air and dry storage of consolidated fuel are issues yet to be resolved.

  16. Successful treatment of groin pain syndrome in a pole-vault athlete with core stability exercise: a case report.

    Science.gov (United States)

    Dello Iacono, Antonio; Maffulli, Nicola; Laver, Lior; Padulo, Johnny

    2016-10-28

    The purpose of this case report is to present a case of groin pain in a pole vault athlete describing the biomechanical features of the injury`s mechanism, acute medical management, and its successful rehabilitation. A 22 years old professional pole-vaulter sustained an injury during a regular training session. The athlete reported significant left lower abdominal and left proximal adductor discomfort in all activities, including basic trunk motion when moving in bed, sit to stand, and walking, and was unable to return to the regular training. Clinical evaluation and imaging studies addressed the injury to a case of adductor-related groin pain associated with pubic symphysis degeneration. Treatment consisted of an exercise-based therapeutic protocol based on trunk and core muscle strengthening and stability program, with progressive motor and functional demands. Significant improvements in the overall clinical findings and functional outcomes were reported after 52 days of intervention when the athletes returned to his full athletic activity. These results suggest that an appropriate rehabilitation program, focused on trunk and core musculature stability exercise addressing to sport-related specific demands, should be considered as an optimal conservative method in the multidisciplinary approach for treatment of groin pain and prior to any surgical intervention.

  17. Laparoscopic trans teres vault suspension, a new laparoscopic method of treatment of female genital prolapse – a preliminary report

    Directory of Open Access Journals (Sweden)

    Ewa Milnerowicz-Nabzdyk

    2016-03-01

    Full Text Available Introduction : Pelvic organ prolapse (POP is treated with a great variety of procedures and none is fully satisfactory. The aim of the study was to introduce and evaluate the effectives of laparoscopic trans teres vault suspension (LTTVS technique as a new method for POP treatment. Material and methods: In the years 2013-2014, eight symptomatic women with grades II-IV POP underwent LTTVS procedure. The mean age of patients was 65.25 years (range from 52 to 76 years. The surgery encompassed total hysterectomy, suturing the vagina and fixation of uterosacral ligaments to the vaginal stump, fixation of stumps of round ligaments to the vaginal stump, and fixation of the vaginal stump to the anterior rectus fascia. Mean follow-up was 17.75 months (range from 6 to 27 months. Results : Eight patients were successfully operated. The symptoms of POP resolved after surgery and subjective quality of life increased. In one case a complication such as common fibular nerve injury appeared; however, it resolved after one month of physiotherapy. The other patient reported radiating pain down the leg after three months. No recurrence of vaginal stump prolapse was observed during the follow-up. Conclusions : LTTVS is a promising method for POP treatment. Due to repair with the use of native tissues, physiological placement of vaginal stump, and high efficacy it can be considered as an alternative to other POP surgeries. The method requires additional research on larger groups of patients.

  18. Seasonal thermal energy storage

    Energy Technology Data Exchange (ETDEWEB)

    Allen, R.D.; Kannberg, L.D.; Raymond, J.R.

    1984-05-01

    This report describes the following: (1) the US Department of Energy Seasonal Thermal Energy Storage Program, (2) aquifer thermal energy storage technology, (3) alternative STES technology, (4) foreign studies in seasonal thermal energy storage, and (5) economic assessment.

  19. Biomarker for Glycogen Storage Diseases

    Science.gov (United States)

    2017-07-03

    Fructose Metabolism, Inborn Errors; Glycogen Storage Disease; Glycogen Storage Disease Type I; Glycogen Storage Disease Type II; Glycogen Storage Disease Type III; Glycogen Storage Disease Type IV; Glycogen Storage Disease Type V; Glycogen Storage Disease Type VI; Glycogen Storage Disease Type VII; Glycogen Storage Disease Type VIII

  20. Real time hardware implementation of power converters for grid integration of distributed generation and STATCOM systems

    Science.gov (United States)

    Jaithwa, Ishan

    Deployment of smart grid technologies is accelerating. Smart grid enables bidirectional flows of energy and energy-related communications. The future electricity grid will look very different from today's power system. Large variable renewable energy sources will provide a greater portion of electricity, small DERs and energy storage systems will become more common, and utilities will operate many different kinds of energy efficiency. All of these changes will add complexity to the grid and require operators to be able to respond to fast dynamic changes to maintain system stability and security. This thesis investigates advanced control technology for grid integration of renewable energy sources and STATCOM systems by verifying them on real time hardware experiments using two different systems: d SPACE and OPAL RT. Three controls: conventional, direct vector control and the intelligent Neural network control were first simulated using Matlab to check the stability and safety of the system and were then implemented on real time hardware using the d SPACE and OPAL RT systems. The thesis then shows how dynamic-programming (DP) methods employed to train the neural networks are better than any other controllers where, an optimal control strategy is developed to ensure effective power delivery and to improve system stability. Through real time hardware implementation it is proved that the neural vector control approach produces the fastest response time, low overshoot, and, the best performance compared to the conventional standard vector control method and DCC vector control technique. Finally the entrepreneurial approach taken to drive the technologies from the lab to market via ORANGE ELECTRIC is discussed in brief.

  1. Storage standards for industrial explosives, May 2001

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    2001-05-01

    The storage standards for industrial explosives comprise the following 3 parts: (1) magazine storage standards, (2) storage operation principles, and (3) ruling and policy decisions for magazines built before May 31, 2001. There are many refinements and improvements in these revised storage standards which were first published in 1972. They come into force on May 31, 2001 and update and supersede the Revised 1982 Magazine Standards for Blasting Explosives and Detonators. The Explosives and Regulatory Division (ERD) of Natural Resources Canada worked with the Royal Canadian Mounted Police (RCMP) to develop and adopt a redesign of the walk-in magazine door to ensure greater security. The laminated door is mandatory for all new walk-in-type magazines immediately. For existing magazine installations, it will be phased in over a period of 5 to 10 years with most emphasis on those areas with a high risk of break-ins. ERD has also moved from heavy duty-locks to high-security locking hardware and is emphasizing better key control for magazines with no grandfathering on locking hardware. The wall thicknesses for the new Type 4 magazine standards have been upgraded from 5 to 7.6 cm for gravel and 15 cm for sand. Types 2, 3, 5, and 7 magazines will no longer be allowed under this new standard. Type 9 magazines will also be phased out over the next 5 years and will be replaced by an upgraded design similar to Type 4 magazine. Type 11 magazine standards have also been revised to use the ISO seacan container which has a newer door concept with ballistic materials in the walls. With these revised standards, only approved welding facilities across Canada will be issued design details of magazine doors. Each magazine will have a unique code of numbers corresponding to a tag and noted on the licence. Each of these storage standards has been upgraded to reflect higher security. tabs., figs.

  2. Hardware failure in patients with metastatic cancer to the spine.

    Science.gov (United States)

    Pedreira, Rachel; Abu-Bonsrah, Nancy; Karim Ahmed, A; De la Garza-Ramos, Rafael; Rory Goodwin, C; Gokaslan, Ziya L; Sacks, Justin; Sciubba, Daniel M

    2017-11-01

    The spine is the most common site of skeletal metastases, affecting approximately 30% of individuals with cancer. The aim of surgical treatment for metastatic spine disease is generally palliative to address pain and/or neurologic compromise, significantly improving patients' quality of life. Patients with metastatic spine disease, however, represent a vulnerable cohort and may have comorbidities or previous treatments that impair the structural integrity of spinal hardware. As such, identifying factors that may contribute to hardware failure is an essential component in treating individuals with metastatic spine disease. The aim of this study was to identify pre-operative risk factors associated with hardware failure in patients undergoing surgical treatment for metastatic spine disease. A retrospective cohort study was conducted to include patients surgically treated for metastatic spine tumors between 2003 and 2013, at a single institution. A univariate analysis was initially performed to identify associated factors. Any associated factor with a p-value failure of the spine instrumentation. 1 patient had metastatic prostate cancer, and 2 had metastatic breast cancer. Patient demographics, co-morbidities, tumor location, and primary tumor etiology were not found to be statistically significant, with respect to hardware failure. Predictive factors included in the multivariate model were other bone metastasis, visceral metastasis, brain metastasis, Modified Rankin scale, previous systemic chemotherapy, previous radiation to the spine, and mean survival. Previous radiation to the spine was the only factor to be significantly associated (p=0.029), present in all three patients with hardware failure. Of note, there was a trend indicating that patients with longer life expectancies were more likely to experience hardware failure (mean survival of 16.7months in non-failure cohort vs. 33months in failure cohort), though this did not achieve statistical significance due

  3. GOSH! A roadmap for open-source science hardware

    CERN Multimedia

    Stefania Pandolfi

    2016-01-01

    The goal of the Gathering for Open Science Hardware (GOSH! 2016), held from 2 to 5 March 2016 at IdeaSquare, was to lay the foundations of the open-source hardware for science movement.   The participants in the GOSH! 2016 meeting gathered in IdeaSquare. (Image: GOSH Community) “Despite advances in technology, many scientific innovations are held back because of a lack of affordable and customisable hardware,” says François Grey, a professor at the University of Geneva and coordinator of Citizen Cyberlab – a partnership between CERN, the UN Institute for Training and Research and the University of Geneva – which co-organised the GOSH! 2016 workshop. “This scarcity of accessible science hardware is particularly obstructive for citizen science groups and humanitarian organisations that don’t have the same economic means as a well-funded institution.” Instead, open sourcing science hardware co...

  4. Color science demonstration kit from open source hardware and software

    Science.gov (United States)

    Zollers, Michael W.

    2014-09-01

    Color science is perhaps the most universally tangible discipline within the optical sciences for people of all ages. Excepting a small and relatively well-understood minority, we can see that the world around us consists of a multitude of colors; yet, describing the "what", "why", and "how" of these colors is not an easy task, especially without some sort of equally colorful visual aids. While static displays (e.g., poster boards, etc.) serve their purpose, there is a growing trend, aided by the recent permeation of small interactive devices into our society, for interactive and immersive learning. However, for the uninitiated, designing software and hardware for this purpose may not be within the purview of all optical scientists and engineers. Enter open source. Open source "anything" are those tools and designs -- hardware or software -- that are available and free to use, often without any restrictive licensing. Open source software may be familiar to some, but the open source hardware movement is relatively new. These are electronic circuit board designs that are provided for free and can be implemented in physical hardware by anyone. This movement has led to the availability of some relatively inexpensive, but quite capable, computing power for the creation of small devices. This paper will showcase the design and implementation of the software and hardware that was used to create an interactive demonstration kit for color. Its purpose is to introduce and demonstrate the concepts of color spectra, additive color, color rendering, and metamers.

  5. OS friendly microprocessor architecture: Hardware level computer security

    Science.gov (United States)

    Jungwirth, Patrick; La Fratta, Patrick

    2016-05-01

    We present an introduction to the patented OS Friendly Microprocessor Architecture (OSFA) and hardware level computer security. Conventional microprocessors have not tried to balance hardware performance and OS performance at the same time. Conventional microprocessors have depended on the Operating System for computer security and information assurance. The goal of the OS Friendly Architecture is to provide a high performance and secure microprocessor and OS system. We are interested in cyber security, information technology (IT), and SCADA control professionals reviewing the hardware level security features. The OS Friendly Architecture is a switched set of cache memory banks in a pipeline configuration. For light-weight threads, the memory pipeline configuration provides near instantaneous context switching times. The pipelining and parallelism provided by the cache memory pipeline provides for background cache read and write operations while the microprocessor's execution pipeline is running instructions. The cache bank selection controllers provide arbitration to prevent the memory pipeline and microprocessor's execution pipeline from accessing the same cache bank at the same time. This separation allows the cache memory pages to transfer to and from level 1 (L1) caching while the microprocessor pipeline is executing instructions. Computer security operations are implemented in hardware. By extending Unix file permissions bits to each cache memory bank and memory address, the OSFA provides hardware level computer security.

  6. Technology for national asset storage systems

    Science.gov (United States)

    Coyne, Robert A.; Hulen, Harry; Watson, Richard

    1993-01-01

    An industry-led collaborative project, called the National Storage Laboratory, was organized to investigate technology for storage systems that will be the future repositories for our national information assets. Industry participants are IBM Federal Systems Company, Ampex Recording Systems Corporation, General Atomics DISCOS Division, IBM ADSTAR, Maximum Strategy Corporation, Network Systems Corporation, and Zitel Corporation. Industry members of the collaborative project are funding their own participation. Lawrence Livermore National Laboratory through its National Energy Research Supercomputer Center (NERSC) will participate in the project as the operational site and the provider of applications. The expected result is an evaluation of a high performance storage architecture assembled from commercially available hardware and software, with some software enhancements to meet the project's goals. It is anticipated that the integrated testbed system will represent a significant advance in the technology for distributed storage systems capable of handling gigabyte class files at gigabit-per-second data rates. The National Storage Laboratory was officially launched on 27 May 1992.

  7. Analysis of multi cloud storage applications for resource constrained mobile devices

    Directory of Open Access Journals (Sweden)

    Rajeev Kumar Bedi

    2016-09-01

    Full Text Available Cloud storage, which can be a surrogate for all physical hardware storage devices, is a term which gives a reflection of an enormous advancement in engineering (Hung et al., 2012. However, there are many issues that need to be handled when accessing cloud storage on resource constrained mobile devices due to inherent limitations of mobile devices as limited storage capacity, processing power and battery backup (Yeo et al., 2014. There are many multi cloud storage applications available, which handle issues faced by single cloud storage applications. In this paper, we are providing analysis of different multi cloud storage applications developed for resource constrained mobile devices to check their performance on the basis of parameters as battery consumption, CPU usage, data usage and time consumed by using mobile phone device Sony Xperia ZL (smart phone on WiFi network. Lastly, conclusion and open research challenges in these multi cloud storage apps are discussed.

  8. Aging adult skull vaults by applying the concept of fractal geometry to high-resolution computed tomography images.

    Science.gov (United States)

    Obert, Martin; Seyfried, Maren; Schumacher, Falk; Krombach, Gabriele A; Verhoff, Marcel A

    2014-09-01

    Aging human remains is a critical issue in anthropology and forensic medicine, and the search for accurate, new age-estimation methods is ongoing. In our study, we, therefore, explored a new approach to investigate a possible correlation between age-at-death (aad) and geometric irregularities in the bone structure of human skull caps. We applied the concept of fractal geometry and fractal dimension D analysis to describe heterogeneity within the bone structure. A high-resolution flat-panel computed tomography scanner (eXplore Locus Ultra) was used to obtain 229,500 images from 221 male and 120 female (total 341) European human skulls. Automated image analysis software was developed to evaluate the fractal dimension D, using the mass radius method. The frontal and the occipital portions of the skull caps of adult females and males were investigated separately. The age dependence of the fractal dimension D was studied by correlation analysis, and the prediction accuracy of age-at-death (aad) estimates for individual observations was calculated. D values for human skull caps scatter strongly as a function of age. We found sex-dependent correlation coefficients (CC) between D and age for adults (females CC=-0.67; males CC=-0.05). Prediction errors for aad estimates for individual observations were in the range of ±18 years at a 75% confidence interval. The detailed quantitative description of age-dependent irregularities in the bone microarchitecture of skull vaults through fractal dimension analysis does not, as we had hoped, enable a new aging method. Severe scattering of the data leads to an estimation error that is too great for this method to be of practical relevance in aad estimates. Thus, we disclosed an interesting sex difference. Copyright © 2014 Elsevier Ireland Ltd. All rights reserved.

  9. Hardware Realization of Chaos-based Symmetric Video Encryption

    KAUST Repository

    Ibrahim, Mohamad A.

    2013-05-01

    This thesis reports original work on hardware realization of symmetric video encryption using chaos-based continuous systems as pseudo-random number generators. The thesis also presents some of the serious degradations caused by digitally implementing chaotic systems. Subsequently, some techniques to eliminate such defects, including the ultimately adopted scheme are listed and explained in detail. Moreover, the thesis describes original work on the design of an encryption system to encrypt MPEG-2 video streams. Information about the MPEG-2 standard that fits this design context is presented. Then, the security of the proposed system is exhaustively analyzed and the performance is compared with other reported systems, showing superiority in performance and security. The thesis focuses more on the hardware and the circuit aspect of the system’s design. The system is realized on Xilinx Vetrix-4 FPGA with hardware parameters and throughput performance surpassing conventional encryption systems.

  10. XOR-FREE Implementation of Convolutional Encoder for Reconfigurable Hardware

    Directory of Open Access Journals (Sweden)

    Gaurav Purohit

    2016-01-01

    Full Text Available This paper presents a novel XOR-FREE algorithm to implement the convolutional encoder using reconfigurable hardware. The approach completely removes the XOR processing of a chosen nonsystematic, feedforward generator polynomial of larger constraint length. The hardware (HW implementation of new architecture uses Lookup Table (LUT for storing the parity bits. The design implements architectural reconfigurability by modifying the generator polynomial of the same constraint length and code rate to reduce the design complexity. The proposed architecture reduces the dynamic power up to 30% and improves the hardware cost and propagation delay up to 20% and 32%, respectively. The performance of the proposed architecture is validated in MATLAB Simulink and tested on Zynq-7 series FPGA.

  11. Bringing the power of dynamic languages to hardware control systems

    CERN Document Server

    Caicedo, J M; Neufeld, N

    2009-01-01

    Hardware control systems are normally programmed using high-performance languages like C or C++ and increasingly also Java. All these languages are strongly typed and compiled which brings usually good performance but at the cost of a longer development and testing cycle and the need for more programming expertise. Dynamic languages which were long thought to be too slow and not powerful enough for control purposes are, thanks to modern powerful computers and advanced implementation techniques, fast enough for many of these tasks. We present examples from the LHCb Experiment Control System (ECS), which is based on a commercial SCADA software. We have successfully used Python to integrate hardware devices into the ECS. We present the necessary lightweight middle-ware we have developed, including examples for controlling hardware and software devices. We also discuss the development cycle, tools used and compare the effort to traditional solutions.

  12. DAQ Hardware and software development for the ATLAS Pixel Detector

    CERN Document Server

    Stramaglia, Maria Elena; The ATLAS collaboration

    2015-01-01

    In 2014, the Pixel Detector of the ATLAS experiment was extended by about 12 million pixels with the installation of the Insertable B-Layer (IBL). Data-taking and tuning procedures have been implemented by employing newly designed read-out hardware, which supports the full detector bandwidth even for calibration. The hardware is supported by an embedded software stack running on the read-out boards. The same boards will be used to upgrade the read-out bandwidth for the two outermost layers of the ATLAS Pixel Barrel (54 million pixels). We present the IBL read-out hardware and the supporting software architecture used to calibrate and operate the 4-layer ATLAS Pixel detector. We discuss the technical implementations and status for data taking, validation of the DAQ system in recent cosmic ray data taking, in-situ calibrations, and results from additional tests in preparation for Run 2 at the LHC.

  13. Asymmetric Hardware Distortions in Receive Diversity Systems: Outage Performance Analysis

    KAUST Repository

    Javed, Sidrah

    2017-02-22

    This paper studies the impact of asymmetric hardware distortion (HWD) on the performance of receive diversity systems using linear and switched combining receivers. The asymmetric attribute of the proposed model motivates the employment of improper Gaussian signaling (IGS) scheme rather than the traditional proper Gaussian signaling (PGS) scheme. The achievable rate performance is analyzed for the ideal and non-ideal hardware scenarios using PGS and IGS transmission schemes for different combining receivers. In addition, the IGS statistical characteristics are optimized to maximize the achievable rate performance. Moreover, the outage probability performance of the receive diversity systems is analyzed yielding closed form expressions for both PGS and IGS based transmission schemes. HWD systems that employ IGS is proven to efficiently combat the self interference caused by the HWD. Furthermore, the obtained analytic expressions are validated through Monte-Carlo simulations. Eventually, non-ideal hardware transceivers degradation and IGS scheme acquired compensation are quantified through suitable numerical results.

  14. Mapping of topological quantum circuits to physical hardware.

    Science.gov (United States)

    Paler, Alexandru; Devitt, Simon J; Nemoto, Kae; Polian, Ilia

    2014-04-11

    Topological quantum computation is a promising technique to achieve large-scale, error-corrected computation. Quantum hardware is used to create a large, 3-dimensional lattice of entangled qubits while performing computation requires strategic measurement in accordance with a topological circuit specification. The specification is a geometric structure that defines encoded information and fault-tolerant operations. The compilation of a topological circuit is one important aspect of programming a quantum computer, another is the mapping of the topological circuit into the operations performed by the hardware. Each qubit has to be controlled, and measurement results are needed to propagate encoded quantum information from input to output. In this work, we introduce an algorithm for mapping an topological circuit to the operations needed by the physical hardware. We determine the control commands for each qubit in the computer and the relevant measurements that are needed to track information as it moves through the circuit.

  15. Hardware Architecture Study for NASA's Space Software Defined Radios

    Science.gov (United States)

    Reinhart, Richard C.; Scardelletti, Maximilian C.; Mortensen, Dale J.; Kacpura, Thomas J.; Andro, Monty; Smith, Carl; Liebetreu, John

    2008-01-01

    This study defines a hardware architecture approach for software defined radios to enable commonality among NASA space missions. The architecture accommodates a range of reconfigurable processing technologies including general purpose processors, digital signal processors, field programmable gate arrays (FPGAs), and application-specific integrated circuits (ASICs) in addition to flexible and tunable radio frequency (RF) front-ends to satisfy varying mission requirements. The hardware architecture consists of modules, radio functions, and and interfaces. The modules are a logical division of common radio functions that comprise a typical communication radio. This paper describes the architecture details, module definitions, and the typical functions on each module as well as the module interfaces. Trade-offs between component-based, custom architecture and a functional-based, open architecture are described. The architecture does not specify the internal physical implementation within each module, nor does the architecture mandate the standards or ratings of the hardware used to construct the radios.

  16. Modular particle filtering FPGA hardware architecture for brain machine interfaces.

    Science.gov (United States)

    Mountney, John; Obeid, Iyad; Silage, Dennis

    2011-01-01

    As the computational complexities of neural decoding algorithms for brain machine interfaces (BMI) increase, their implementation through sequential processors becomes prohibitive for real-time applications. This work presents the field programmable gate array (FPGA) as an alternative to sequential processors for BMIs. The reprogrammable hardware architecture of the FPGA provides a near optimal platform for performing parallel computations in real-time. The scalability and reconfigurability of the FPGA accommodates diverse sets of neural ensembles and a variety of decoding algorithms. Throughput is significantly increased by decomposing computations into independent parallel hardware modules on the FPGA. This increase in throughput is demonstrated through a parallel hardware implementation of the auxiliary particle filtering signal processing algorithm.

  17. Hardware Abstraction and Protocol Optimization for Coded Sensor Networks

    DEFF Research Database (Denmark)

    Nistor, Maricica; Lucani Rötter, Daniel Enrique; Barros, joao

    2014-01-01

    The design of the communication protocols in wireless sensor networks (WSNs) often neglects several key characteristics of the sensor's hardware, while assuming that the number of transmitted bits is the dominating factor behind the system's energy consumption. A closer look at the hardware...... specifications of common sensors reveals, however, that other equally important culprits exist, such as the reception and processing energy. Hence, there is a need for a more complete hardware abstraction of a sensor node to reduce effectively the total energy consumption of the network by designing energy......-efficient protocols that use such an abstraction, as well as mechanisms to optimize a communication protocol in terms of energy consumption. The problem is modeled for different feedback-based techniques, where sensors are connected to a base station, either directly or through relays. We show that for four example...

  18. DAQ hardware and software development for the ATLAS Pixel Detector

    CERN Document Server

    AUTHOR|(INSPIRE)INSPIRE-00372086; The ATLAS collaboration

    2016-01-01

    In 2014, the Pixel Detector of the ATLAS experiment has been extended by about 12 million pixels thanks to the installation of the Insertable B-Layer (IBL). Data-taking and tuning procedures have been implemented along with newly designed read-out hardware to support high bandwidth for data readout and calibration. The hardware is supported by an embedded software stack running on the read-out boards. The same boards will be used to upgrade the read-out bandwidth for the two outermost layers of the ATLAS Pixel Barrel (54 million pixels). We present the IBL read-out hardware and the supporting software architecture used to calibrate and operate the 4-layer ATLAS Pixel detector. We discuss the technical implementations and status for data taking, validation of the DAQ system in recent cosmic ray data taking, in-situ calibrations, and results from additional tests in preparation for Run 2 at the LHC.

  19. Rapid Energy Estimation for Hardware-Software Codesign Using FPGAs

    Directory of Open Access Journals (Sweden)

    Viktor K. Prasanna

    2006-09-01

    Full Text Available By allowing parts of the applications to be executed either on soft processors (as software programs or on customized hardware peripherals attached to the processors, FPGAs have made traditional energy estimation techniques inefficient for evaluating various design tradeoffs. In this paper, we propose a high-level simulation-based two-step rapid energy estimation technique for hardware-software codesign using FPGAs. In the first step, a high-level hardware-software cosimulation technique is applied to simulate both the hardware and software components of the target application. High-level simulation results of both software programs running on the processors and the customized hardware peripherals are gathered during the cosimulation process. In the second step, the high-level simulation results of the customized hardware peripherals are used to estimate the switching activities of their corresponding register-transfer/gate level (“low-level” implementations. We use this information to employ an instruction-level energy estimation technique and a domain-specific energy performance modeling technique to estimate the energy dissipation of the complete application. A Matlab/Simulink-based implementation of our approach and two numerical computation applications show that the proposed energy estimation technique can achieve more than 6000x speedup over low-level simulation-based techniques while sacrificing less than 10% estimation accuracy. Compared with the measured results, our experimental results show that the proposed technique achieves an average estimation error of less than 12%.

  20. Integrated circuit authentication hardware Trojans and counterfeit detection

    CERN Document Server

    Tehranipoor, Mohammad; Zhang, Xuehui

    2013-01-01

    This book describes techniques to verify the authenticity of integrated circuits (ICs). It focuses on hardware Trojan detection and prevention and counterfeit detection and prevention. The authors discuss a variety of detection schemes and design methodologies for improving Trojan detection techniques, as well as various attempts at developing hardware Trojans in IP cores and ICs. While describing existing Trojan detection methods, the authors also analyze their effectiveness in disclosing various types of Trojans, and demonstrate several architecture-level solutions. 

  1. Hardware Evaluation of the Horizontal Exercise Fixture with Weight Stack

    Science.gov (United States)

    Newby, Nate; Leach, Mark; Fincke, Renita; Sharp, Carwyn

    2009-01-01

    HEF with weight stack seems to be a very sturdy and reliable exercise device that should function well in a bed rest training setting. A few improvements should be made to both the hardware and software to improve usage efficiency, but largely, this evaluation has demonstrated HEF's robustness. The hardware offers loading to muscles, bones, and joints, potentially sufficient to mitigate the loss of muscle mass and bone mineral density during long-duration bed rest campaigns. With some minor modifications, the HEF with weight stack equipment provides the best currently available means of performing squat, heel raise, prone row, bench press, and hip flexion/extension exercise in a supine orientation.

  2. Computer organization and design the hardware/software interface

    CERN Document Server

    Hennessy, John L

    1994-01-01

    Computer Organization and Design: The Hardware/Software Interface presents the interaction between hardware and software at a variety of levels, which offers a framework for understanding the fundamentals of computing. This book focuses on the concepts that are the basis for computers.Organized into nine chapters, this book begins with an overview of the computer revolution. This text then explains the concepts and algorithms used in modern computer arithmetic. Other chapters consider the abstractions and concepts in memory hierarchies by starting with the simplest possible cache. This book di

  3. Towards Shop Floor Hardware Reconfiguration for Industrial Collaborative Robots

    DEFF Research Database (Denmark)

    Schou, Casper; Madsen, Ole

    2016-01-01

    In this paper we propose a roadmap for hardware reconfiguration of industrial collaborative robots. As a flexible resource, the collaborative robot will often need transitioning to a new task. Our goal is, that this transitioning should be done by the shop floor operators, not highly specialized...... engineers. The hard- ware reconfiguration framework adopts a modular architecture for the collabo- rative robot which dictates a clear segmentation of the robot into well-defined exchangeable modules. Four main objectives for the hardware reconfiguration framework; 1) Modular architecture, 2) Module...

  4. Electrical, electronics, and digital hardware essentials for scientists and engineers

    CERN Document Server

    Lipiansky, Ed

    2012-01-01

    A practical guide for solving real-world circuit board problems Electrical, Electronics, and Digital Hardware Essentials for Scientists and Engineers arms engineers with the tools they need to test, evaluate, and solve circuit board problems. It explores a wide range of circuit analysis topics, supplementing the material with detailed circuit examples and extensive illustrations. The pros and cons of various methods of analysis, fundamental applications of electronic hardware, and issues in logic design are also thoroughly examined. The author draws on more than tw

  5. Nios II hardware acceleration of the epsilon quadratic sieve algorithm

    Science.gov (United States)

    Meyer-Bäse, Uwe; Botella, Guillermo; Castillo, Encarnacion; García, Antonio

    2010-04-01

    The quadratic sieve (QS) algorithm is one of the most powerful algorithms to factor large composite primes used to break RSA cryptographic systems. The hardware structure of the QS algorithm seems to be a good fit for FPGA acceleration. Our new ɛ-QS algorithm further simplifies the hardware architecture making it an even better candidate for C2H acceleration. This paper shows our design results in FPGA resource and performance when implementing very long arithmetic on the Nios microprocessor platform with C2H acceleration for different libraries (GMP, LIP, FLINT, NRMP) and QS architecture choices for factoring 32-2048 bit RSA numbers.

  6. Hardware-assisted software clock synchronization for homogeneous distributed systems

    Science.gov (United States)

    Ramanathan, P.; Kandlur, Dilip D.; Shin, Kang G.

    1990-01-01

    A clock synchronization scheme that strikes a balance between hardware and software solutions is proposed. The proposed is a software algorithm that uses minimal additional hardware to achieve reasonably tight synchronization. Unlike other software solutions, the guaranteed worst-case skews can be made insensitive to the maximum variation of message transit delay in the system. The scheme is particularly suitable for large partially connected distributed systems with topologies that support simple point-to-point broadcast algorithms. Examples of such topologies include the hypercube and the mesh interconnection structures.

  7. On Issues of Precision for Hardware-based Volume Visualization

    Energy Technology Data Exchange (ETDEWEB)

    LaMar, E C

    2003-04-11

    This paper discusses issues with the limited precision of hardware-based volume visualization. We will describe the compositing OVER operator and how fixed-point arithmetic affects it. We propose two techniques to improve the precision of fixed-point compositing and the accuracy of hardware-based volume visualization. The first technique is to perform dithering of color and alpha values. The second technique we call exponent-factoring, and captures significantly more numeric resolution than dithering, but can only produce monochromatic images.

  8. A Computer Scientist’s Evaluation of Publically Available Hardware Trojan Benchmarks

    Science.gov (United States)

    2015-09-01

    in, design for trust, hardware intellectual property cores, Hardware Oriented Security and Trust, hardware synthesis, hardware Trojans, HDL...that this XOR gate also handles multiple bits, but that no visual cue is given. ...................................................16 Figure 4. Part...1-bit input clk is represented by graphical lows and highs, but multi-bit inputs are represented by numerical values. For clarity, we have edited

  9. Approach to underground characterization of a disposal vault in granite; Methode de caracterisation souterraine d`une enceinte de stockage dans la roche granitique

    Energy Technology Data Exchange (ETDEWEB)

    Everitt, R.A.; Martin, C.D.; Thompson, P.M.

    1994-12-01

    The concept of disposing of nuclear fuel waste by sealing it in a disposal vault in the Canadian Shield is being investigated as part of the Canadian Nuclear Fuel Waste Management Program. Engineered and natural barriers would isolate the waste from the biosphere. Underground characterization and testing have been under way since 1983 at the Underground Research Laboratory in support of this program. This report draws on experience gained at the URL to recommend an approach to underground characterization to obtain information to optimize the design of the excavation and the engineered barriers, and to provide a baseline against which to monitor the performance of the facility during and following its operation.

  10. Towards automated construction of dependable software/hardware systems

    Energy Technology Data Exchange (ETDEWEB)

    Yakhnis, A.; Yakhnis, V. [Pioneer Technologies & Rockwell Science Center, Albuquerque, NM (United States)

    1997-11-01

    This report contains viewgraphs on the automated construction of dependable computer architecture systems. The outline of this report is: examples of software/hardware systems; dependable systems; partial delivery of dependability; proposed approach; removing obstacles; advantages of the approach; criteria for success; current progress of the approach; and references.

  11. Use of Heritage Hardware on MPCV Exploration Flight Test One

    Science.gov (United States)

    Rains, George Edward; Cross, Cynthia D.

    2011-01-01

    Due to an aggressive schedule for the first orbital test flight of an unmanned Orion capsule, known as Exploration Flight Test One (EFT1), combined with severe programmatic funding constraints, an effort was made to identify heritage hardware, i.e., already existing, flight-certified components from previous manned space programs, which might be available for use on EFT1. With the end of the Space Shuttle Program, no current means exists to launch Multi Purpose Logistics Modules (MPLMs) to the International Space Station (ISS), and so the inventory of many flight-certified Shuttle and MPLM components are available for other purposes. Two of these items are the Shuttle Ground Support Equipment Heat Exchanger (GSE Hx) and the MPLM cabin Positive Pressure Relief Assembly (PPRA). In preparation for the utilization of these components by the Orion Program, analyses and testing of the hardware were performed. The PPRA had to be analyzed to determine its susceptibility to pyrotechnic shock, and vibration testing had to be performed, since those environments are predicted to be significantly more severe during an Orion mission than those the hardware was originally designed to accommodate. The GSE Hx had to be tested for performance with the Orion thermal working fluids, which are different from those used by the Space Shuttle. This paper summarizes the certification of the use of heritage hardware for EFT1.

  12. Hardware Approach for Real Time Machine Stereo Vision

    Directory of Open Access Journals (Sweden)

    Michael Tornow

    2006-02-01

    Full Text Available Image processing is an effective tool for the analysis of optical sensor information for driver assistance systems and controlling of autonomous robots. Algorithms for image processing are often very complex and costly in terms of computation. In robotics and driver assistance systems, real-time processing is necessary. Signal processing algorithms must often be drastically modified so they can be implemented in the hardware. This task is especially difficult for continuous real-time processing at high speeds. This article describes a hardware-software co-design for a multi-object position sensor based on a stereophotogrammetric measuring method. In order to cover a large measuring area, an optimized algorithm based on an image pyramid is implemented in an FPGA as a parallel hardware solution for depth map calculation. Object recognition and tracking are then executed in real-time in a processor with help of software. For this task a statistical cluster method is used. Stabilization of the tracking is realized through use of a Kalman filter. Keywords: stereophotogrammetry, hardware-software co-design, FPGA, 3-d image analysis, real-time, clustering and tracking.

  13. Hardware realization of an SVM algorithm implemented in FPGAs

    Science.gov (United States)

    Wiśniewski, Remigiusz; Bazydło, Grzegorz; Szcześniak, Paweł

    2017-08-01

    The paper proposes a technique of hardware realization of a space vector modulation (SVM) of state function switching in matrix converter (MC), oriented on the implementation in a single field programmable gate array (FPGA). In MC the SVM method is based on the instantaneous space-vector representation of input currents and output voltages. The traditional computation algorithms usually involve digital signal processors (DSPs) which consumes the large number of power transistors (18 transistors and 18 independent PWM outputs) and "non-standard positions of control pulses" during the switching sequence. Recently, hardware implementations become popular since computed operations may be executed much faster and efficient due to nature of the digital devices (especially concurrency). In the paper, we propose a hardware algorithm of SVM computation. In opposite to the existing techniques, the presented solution applies COordinate Rotation DIgital Computer (CORDIC) method to solve the trigonometric operations. Furthermore, adequate arithmetic modules (that is, sub-devices) used for intermediate calculations, such as code converters or proper sectors selectors (for output voltages and input current) are presented in detail. The proposed technique has been implemented as a design described with the use of Verilog hardware description language. The preliminary results of logic implementation oriented on the Xilinx FPGA (particularly, low-cost device from Artix-7 family from Xilinx was used) are also presented.

  14. Visual basic application in computer hardware control and data ...

    African Journals Online (AJOL)

    Speech Recognition Technology enables text acquisition via users' dictation and knowledge gain through system dictation. In this paper the application of speech recognition technology in hardware device control and data acquisition is experimented using Visual Basic and the Speech Application Programming Interface ...

  15. Security Primitives for Reconfigurable Hardware-Based Systems

    Science.gov (United States)

    2010-05-01

    based architectures. In Proceedings of the International Conference on Hardware/Software Codesign and System Synthesis (CODES+ ISSS ’07). FIORIN, L...and System Synthesis (CODES+ ISSS ’07). Received April 2008; revised October 2008; accepted March 2009 ACM Transactions on Reconfigurable Technology and Systems, Vol. 3, No. 2, Article 10, Pub. date: May 2010.

  16. Graph based communication analysis for hardware/software codesign

    DEFF Research Database (Denmark)

    Knudsen, Peter Voigt; Madsen, Jan

    1999-01-01

    In this paper we present a coarse grain CDFG (Control/Data Flow Graph) model suitable for hardware/software partitioning of single processes and demonstrate how it is necessary to perform various transformations on the graph structure before partitioning in order to achieve a structure that allows...

  17. Detecting System of Nested Hardware Virtual Machine Monitor

    Directory of Open Access Journals (Sweden)

    Artem Vladimirovich Iuzbashev

    2015-03-01

    Full Text Available Method of nested hardware virtual machine monitor detection was proposed in this work. The method is based on HVM timing attack. In case of HVM presence in system, the number of different instruction sequences execution time values will increase. We used this property as indicator in our detection.

  18. Hardware prototype with component specification and usage description

    NARCIS (Netherlands)

    Azam, Tre; Aswat, Soyeb; Klemke, Roland; Sharma, Puneet; Wild, Fridolin

    2017-01-01

    Following on from D3.1 and the final selection of sensors, in this D3.2 report we present the first version of the experience capturing hardware prototype design and API architecture taking into account the current limitations of the Hololens not being available until early next month in time for

  19. Know Your Personal Computer The Personal Computer Hardware

    Indian Academy of Sciences (India)

    Home; Journals; Resonance – Journal of Science Education; Volume 1; Issue 2. Know Your Personal Computer The Personal Computer Hardware. Siddhartha Kumar ... Author Affiliations. Siddhartha Kumar Ghoshal1. Supercomputer Education and Research Centre, Indian Institute of Science, Bangalore 560 012, India.

  20. Smart Home Hardware-in-the-Loop Testing

    Energy Technology Data Exchange (ETDEWEB)

    Pratt, Annabelle

    2017-07-12

    This presentation provides a high-level overview of NREL's smart home hardware-in-the-loop testing. It was presented at the Fourth International Workshop on Grid Simulator Testing of Energy Systems and Wind Turbine Powertrains, held April 25-26, 2017, hosted by NREL and Clemson University at the Energy Systems Integration Facility in Golden, Colorado.

  1. Foundations of digital signal processing theory, algorithms and hardware design

    CERN Document Server

    Gaydecki, Patrick

    2005-01-01

    An excellent introductory text, this book covers the basic theoretical, algorithmic and real-time aspects of digital signal processing (DSP). Detailed information is provided on off-line, real-time and DSP programming and the reader is effortlessly guided through advanced topics such as DSP hardware design, FIR and IIR filter design and difference equation manipulation.

  2. Hardware-in-the-loop testing of marine control system

    Directory of Open Access Journals (Sweden)

    Roger Skjetne

    2006-10-01

    Full Text Available Hardware-in-the-Loop (HIL testing is proposed as a new methodology for verification and certification of marine control systems. Formalizing such testing necessitates the development of a vocabulary and set of definitions. This paper treats these issues by constructing a framework suitable for industrial HIL test applications and certification of marine systems.

  3. Implementing Strategic Management of Producibility in Military Hardware Design

    Science.gov (United States)

    1985-05-01

    APPROVAL L~og No. OF TECHNICAL ARTICLE, PAPER OR SPEECH TO BE PRESENTED OR PUBLISH ED SubmIt 4 bcop" of Clearance Request and 2 copies of * spech or paper...in many free world nations. The common denominator is recognition that the development and acquisition process of military hardware mandates a team

  4. RDV77 VLBA Hardware/Software Correlator Comparisons

    Science.gov (United States)

    Gordon, David

    2010-01-01

    Results of a hardware vs. software correlation of the RDV77 session are presented. Group delays are found to agree (WRMS differences) at an average level of 4.2 psec and with a noise floor of 2.5 psec. These RDV77 comparisons agree well with several previous correlator comparison studies.

  5. An Integrated Hardware Array for Very High Speed Logic Simulation

    Directory of Open Access Journals (Sweden)

    E. Scott Fehr

    1996-01-01

    boolean evaluation and fanout switching circuits, while large scale parallelism is integrated at die level to reduce cost and communication delays. The results of this research form the basis for a multiple order of magnitude improvement in reported state-of-the-art cost-performance merit for hardware gate level simulation accelerators.

  6. Leveraging Information Technology. Track VI: Hardware/Software Strategies.

    Science.gov (United States)

    CAUSE, Boulder, CO.

    Seven papers from the 1987 CAUSE conference's Track VI, Hardware/Software Strategies, are presented. They include: "Integrated Systems--The Next Steps" (Morris A. Hicks); "Administrative Microcomputing--Roads Traveled, Lessons Learned" (David L. Smallen); "Murphy's First Law and Its Application to Administrative…

  7. TreeBASIS Feature Descriptor and Its Hardware Implementation

    Directory of Open Access Journals (Sweden)

    Spencer Fowers

    2014-01-01

    Full Text Available This paper presents a novel feature descriptor called TreeBASIS that provides improvements in descriptor size, computation time, matching speed, and accuracy. This new descriptor uses a binary vocabulary tree that is computed using basis dictionary images and a test set of feature region images. To facilitate real-time implementation, a feature region image is binary quantized and the resulting quantized vector is passed into the BASIS vocabulary tree. A Hamming distance is then computed between the feature region image and the effectively descriptive basis dictionary image at a node to determine the branch taken and the path the feature region image takes is saved as a descriptor. The TreeBASIS feature descriptor is an excellent candidate for hardware implementation because of its reduced descriptor size and the fact that descriptors can be created and features matched without the use of floating point operations. The TreeBASIS descriptor is more computationally and space efficient than other descriptors such as BASIS, SIFT, and SURF. Moreover, it can be computed entirely in hardware without the support of a CPU for additional software-based computations. Experimental results and a hardware implementation show that the TreeBASIS descriptor compares well with other descriptors for frame-to-frame homography computation while requiring fewer hardware resources.

  8. Aspects of system modelling in Hardware/Software partitioning

    DEFF Research Database (Denmark)

    Knudsen, Peter Voigt; Madsen, Jan

    1996-01-01

    This paper addresses fundamental aspects of system modelling and partitioning algorithms in the area of Hardware/Software Codesign. Three basic system models for partitioning are presented and the consequences of partitioning according to each of these are analyzed. The analysis shows...

  9. 3D IBFV : Hardware-Accelerated 3D Flow Visualization

    NARCIS (Netherlands)

    Telea, Alexandru; Wijk, Jarke J. van

    2003-01-01

    We present a hardware-accelerated method for visualizing 3D flow fields. The method is based on insertion, advection, and decay of dye. To this aim, we extend the texture-based IBFV technique for 2D flow visualization in two main directions. First, we decompose the 3D flow visualization problem in a

  10. Alternate Protocol for Detecting Biological Contamination on Sensitive Hardware

    Science.gov (United States)

    Berlin, David; Lalime, Erin; Carosso, Nancy

    2015-01-01

    The purpose of this project is to develop a sterile water based rapid bioburden test. Contamination engineers use two tests to assess the level of biological contamination on hardware: the rapid five minute bioburden test, which is a molecular screening for Adenosine triphosphate (ATP), a molecule found in all cells on the hardware, and a slower colony growth test, which is used to give a more accurate representation of the amount of microbes on the hardware. However, the rapid bioburden test has limited application because it leaves a residue that can be detrimental to sensitive hardware. This can cause project delays while waiting for the results from the three day colony growth test. We address this problem by adapting the commercial germicide based ATP system to a sterile water based system. The test works by reacting ATP with D-Luciferin and Luciferase protein to yield light. The light is then detected by a luminometer that outputs a Relative Light Unit (RLU) amount depending on how much ATP is present. To analyze the effectiveness of the new test, we developed a correlation between amounts of ATP and the RLU produced using the germicide based system. From these experiments, we've generated a consistent relationship between the two in the form of a power curve. From there, we developed a correlation curve between the amount of colonies and the RLU they produced. Initial tests of the new protocol have shown that the water based system isn't as sensitive as the germicide based test.

  11. Osseodensification for enhancement of spinal surgical hardware fixation.

    Science.gov (United States)

    Lopez, Christopher D; Alifarag, Adham M; Torroni, Andrea; Tovar, Nick; Diaz-Siso, J Rodrigo; Witek, Lukasz; Rodriguez, Eduardo D; Coelho, Paulo G

    2017-05-01

    Integration between implant and bone is an essential concept for osseous healing requiring hardware placement. A novel approach to hardware implantation, termed osseodensification, is described here as an effective alternative. 12 sheep averaging 65kg had fixation devices installed in their C2, C3, and C4 vertebral bodies; each device measured 4mm diameter×10mm length. The left-sided vertebral body devices were implanted using regular surgical drilling (R) while the right-sided devices were implanted using osseodensification drilling (OD). The C2 and C4 vertebra provided the t=0 in vivo time point, while the C3 vertebra provided the t=3 and t=6 week time points, in vivo. Structural competence of hardware was measured using biomechanical testing of pullout strength, while the quality and degree of new bone formation and remodeling was assessed via histomorphometry. Pullout strength demonstrated osseodensification drilling to provide superior anchoring when compared to the control group collapsed over time with statistical significance (phardware implantation encourages assessment of current surgical approaches to hardware implantation. Copyright © 2017 Elsevier Ltd. All rights reserved.

  12. Hardware Location and Clinical Outcome in Ulna Shortening Osteotomy.

    Science.gov (United States)

    Megerle, Kai; Hellmich, Susanne; Germann, Günter; Sauerbier, Michael

    2015-10-01

    The purpose of this study was to investigate the influence of plate location during ulna shortening osteotomy on the incidence of hardware irritation and clinical outcome. Forty patients (17 women, 23 men; mean age, 47 years) who underwent a shortening osteotomy of the ulna due to idiopathic ulna impaction syndrome were examined after a mean of 36 months. All complications and secondary procedures were extracted from the patients' records. The rate of hardware removal was higher in patients who had a dorsal placement of the plate in comparison with ulnar or palmar placements, although this difference was not statistically significant. Apart from hardware irritation, there were 4 nonunions, 1 secondary osteoarthritis of the distal radioulnar joint, and 1 case of chronic irritation of the dorsal branch of the ulnar nerve, which required secondary surgery. The incidence of secondary surgery other than hardware removal was not significantly related to the original location of the plate. Secondary surgery after ulnar shortening osteotomy is common. However, we found no difference in clinical outcomes based on plate location.

  13. Hiding State in CλaSH Hardware Descriptions

    NARCIS (Netherlands)

    Gerards, Marco Egbertus Theodorus; Baaij, C.P.R.; Kuper, Jan; Kooijman, Matthijs

    Synchronous hardware can be modelled as a mapping from input and state to output and a new state, such mappings are referred to as transition functions. It is natural to use a functional language to implement transition functions. The CaSH compiler is capable of translating transition functions to

  14. A Cache-Based Hardware Accelerator for Memory Data Movements

    NARCIS (Netherlands)

    Duarte, F.

    2008-01-01

    This dissertation presents a hardware accelerator that is able to accelerate large (including non-parallel) memory data movements, in particular memory copies, performed traditionally by the processors. As todays processors are tied with or have integrated caches with varying sizes (from several

  15. Cache-based memory copy hardware accelerator for multicore systems

    NARCIS (Netherlands)

    Duarte, F.; Wong, S.

    2010-01-01

    In this paper, we present a new architecture of the cache-based memory copy hardware accelerator in a multicore system supporting message passing. The accelerator is able to accelerate memory data movements, in particular memory copies. We perform an analytical analysis based on open-queuing theory

  16. Chip-Multiprocessor Hardware Locks for Safety-Critical Java

    DEFF Research Database (Denmark)

    Strøm, Torur Biskopstø; Puffitsch, Wolfgang; Schoeberl, Martin

    2013-01-01

    and may void a task set's schedulability. In this paper we present a hardware locking mechanism to reduce the synchronization overhead. The solution is implemented for the chip-multiprocessor version of the Java Optimized Processor in the context of safety-critical Java. The implementation is compared...

  17. Hardware Descriptive Languages: An Efficient Approach to Device ...

    African Journals Online (AJOL)

    Contemporarily, owing to astronomical advancements in the very large scale integration (VLSI) market segments, hardware engineers are now focusing on how to develop their new digital system designs in programmable languages like very high speed integrated circuit hardwaredescription language (VHDL) and Verilog ...

  18. Thermal and flow analysis of the Fluor Daniel, Inc., Nuclear Material Storage Facility renovation design (initial 30% effort of Title 1)

    Energy Technology Data Exchange (ETDEWEB)

    Steinke, R.G.; Mueller, C.; Knight, T.D.

    1998-03-01

    The computational fluid dynamics code CFX4.2 was used to evaluate steady-state thermal-hydraulic conditions in the Fluor Daniel, Inc., Nuclear Material Storage Facility renovation design (initial 30% of Title 1). Thirteen facility cases were evaluated with varying temperature dependence, drywell-array heat-source magnitude and distribution, location of the inlet tower, and no-flow curtains in the drywell-array vault. Four cases of a detailed model of the inlet-tower top fixture were evaluated to show the effect of the canopy-cruciform fixture design on the air pressure and flow distributions.

  19. Integrated Hardware and Software for No-Loss Computing

    Science.gov (United States)

    James, Mark

    2007-01-01

    When an algorithm is distributed across multiple threads executing on many distinct processors, a loss of one of those threads or processors can potentially result in the total loss of all the incremental results up to that point. When implementation is massively hardware distributed, then the probability of a hardware failure during the course of a long execution is potentially high. Traditionally, this problem has been addressed by establishing checkpoints where the current state of some or part of the execution is saved. Then in the event of a failure, this state information can be used to recompute that point in the execution and resume the computation from that point. A serious problem arises when one distributes a problem across multiple threads and physical processors is that one increases the likelihood of the algorithm failing due to no fault of the scientist but as a result of hardware faults coupled with operating system problems. With good reason, scientists expect their computing tools to serve them and not the other way around. What is novel here is a unique combination of hardware and software that reformulates an application into monolithic structure that can be monitored in real-time and dynamically reconfigured in the event of a failure. This unique reformulation of hardware and software will provide advanced aeronautical technologies to meet the challenges of next-generation systems in aviation, for civilian and scientific purposes, in our atmosphere and in atmospheres of other worlds. In particular, with respect to NASA s manned flight to Mars, this technology addresses the critical requirements for improving safety and increasing reliability of manned spacecraft.

  20. FHAST: FPGA-Based Acceleration of Bowtie in Hardware.

    Science.gov (United States)

    Fernandez, Edward B; Villarreal, Jason; Lonardi, Stefano; Najjar, Walid A

    2015-01-01

    While the sequencing capability of modern instruments continues to increase exponentially, the computational problem of mapping short sequenced reads to a reference genome still constitutes a bottleneck in the analysis pipeline. A variety of mapping tools (e.g., Bowtie, BWA) is available for general-purpose computer architectures. These tools can take many hours or even days to deliver mapping results, depending on the number of input reads, the size of the reference genome and the number of allowed mismatches or insertion/deletions, making the mapping problem an ideal candidate for hardware acceleration. In this paper, we present FHAST (FPGA hardware accelerated sequence-matching tool), a drop-in replacement for Bowtie that uses a hardware design based on field programmable gate arrays (FPGA). Our architecture masks memory latency by executing multiple concurrent hardware threads accessing memory simultaneously. FHAST is composed by multiple parallel engines to exploit the parallelism available to us on an FPGA. We have implemented and tested FHAST on the Convey HC-1 and later ported on the Convey HC-2ex, taking advantage of the large memory bandwidth available to these systems and the shared memory image between hardware and software. A preliminary version of FHAST running on the Convey HC-1 achieved up to 70x speedup compared to Bowtie (single-threaded). An improved version of FHAST running on the Convey HC-2ex FPGAs achieved up to 12x fold speed gain compared to Bowtie running eight threads on an eight-core conventional architecture, while maintaining almost identical mapping accuracy. FHAST is a drop-in replacement for Bowtie, so it can be incorporated in any analysis pipeline that uses Bowtie (e.g., TopHat).

  1. Design of a hierarchical software-defined storage system for data-intensive multi-tenant cloud applications

    OpenAIRE

    Maenhaut, Pieter-Jan; Moens, Hendrik; Volckaert, Bruno; Ongenae, Veerle; De Turck, Filip

    2015-01-01

    Software-Defined Storage (SDS) is an evolving concept in which the management and provisioning of data storage is decoupled from the physical storage hardware. Data-intensive multi-tenant SaaS applications running on the public cloud could benefit from the concepts introduced by SDS by managing the allocation of tenant data from the tenant's perspective, taking custom tenant policies and preferences into account. In this paper, we propose the design of a scalable multi-tenant SDS system....

  2. Evaluation of ZFS as an efficient WLCG storage backend

    Science.gov (United States)

    Ebert, M.; Washbrook, A.

    2017-10-01

    A ZFS based software raid system was tested for performance against a hardware raid system providing storage based on the traditional Linux file systems XFS and EXT4. These tests were done for a healthy raid array as well as for a degraded raid array and during the rebuild of a raid array. It was found that ZFS performs better in almost all test scenarios. In addition, distinct features of ZFS were tested for WLCG data storage use, like compression and higher raid levels with triple redundancy information. The long term reliability was observed after converting all production storage servers at the Edinburgh WLCG Tier-2 site to ZFS, resulting in about 1.2PB of ZFS based storage at this site.

  3. Hydrogen-Oxygen PEM Regenerative Fuel Cell Energy Storage System

    Science.gov (United States)

    Bents, David J.; Scullin, Vincent J.; Chang, Bei-Jiann; Johnson, Donald W.; Garcia, Christopher P.

    2005-01-01

    An introduction to the closed cycle hydrogen-oxygen polymer electrolyte membrane (PEM) regenerative fuel cell (RFC), recently constructed at NASA Glenn Research Center, is presented. Illustrated with explanatory graphics and figures, this report outlines the engineering motivations for the RFC as a solar energy storage device, the system requirements, layout and hardware detail of the RFC unit at NASA Glenn, the construction history, and test experience accumulated to date with this unit.

  4. Exact Regenerating Codes for Byzantine Fault Tolerance in Distributed Storage

    OpenAIRE

    Han, Yunghsiang S.; Zheng, Rong; Mow, Wai Ho

    2011-01-01

    Due to the use of commodity software and hardware, crash-stop and Byzantine failures are likely to be more prevalent in today's large-scale distributed storage systems. Regenerating codes have been shown to be a more efficient way to disperse information across multiple nodes and recover crash-stop failures in the literature. In this paper, we present the design of regeneration codes in conjunction with integrity check that allows exact regeneration of failed nodes and data reconstruction in ...

  5. POEMS syndrome (polyneuropathy, organomegaly, endocrinopathy, multiple myeloma and skin changes) with cranial vault plasmocytoma and the role of surgery in its management: a case report.

    Science.gov (United States)

    Plata Bello, Julio; Garcia-Marin, Victor

    2013-10-18

    POEMS syndrome (an acronym of polyneuropathy, organomegaly, endocrinopathy, multiple myeloma and skin changes) is a paraneoplastic disorder related to an underlying plasma cell dyscrasia. The development of such a syndrome is rare and its association with calvarial plasmocytoma is even less common, with only two previous reported cases. We describe, in detail, an unusual presentation of cranial plasmocytoma associated with POEMS syndrome and briefly discuss the possible role of surgery in the management of this disease. We present the case of a 45-year-old Caucasian man who was admitted to our department presenting with progressive weakness in his lower limbs, enlarged lymph nodes and a large mass on the scalp with intense bone erosion. POEMS criteria were present and pathological studies confirmed a Castleman's variant plasmocytoma. Clinical status improved noticeably after the excision of the plasmocytoma and the treatment was completed with radiotherapy and steroid pulse therapy. Cranial vault plasmocytoma and its association with POEMS syndrome are rare conditions with few previously reported cases. Although the role of surgery is not clearly defined in POEMS syndrome guidelines, the fact that there seems to be a better prognosis and clinical outcome when surgery is used as a part of the management in POEMS syndrome with cranial vault plasmocytoma is worth discussing.

  6. Composite hollow core vaults: An analysis of the Fusée Céramic System and the design of form-active environmental friendly roofs

    Directory of Open Access Journals (Sweden)

    Wim Kamerling

    2016-03-01

    Full Text Available Just after World-War II building materials were scarce, architects and engineers had to design buildings using not much cement and steel. In French an architect, Jacques Couëlle, had invented a system with céramique infill elements to reduce for structures of concrete the self-weight and need of cement and steel. In the fifties and sixties of the twentieth century these céramique elements, known as Fusée Céramique elements, were used widely in France, North Africa and the Netherlands, mostly for barrel vaults and shells. Nowadays most of these structures are pulled down and the remaining buildings do not meet the demands of the present concerning climate comfort, insulation and safety. This thesis analyses the structural design of cylindrical Fusée Céramique roofs in the context of those days. The effect of the céramique infill elements for the time dependent deformations, stiffness and load bearing capacity, including second order, is studied. To save the few remaining buildings for the coming generations the possibilities to strengthen these structures with slender light elements of steel are explored. The effect of the strengthening is described for a Fusée Céramique vault, designed and constructed in the past. Reinforced concrete is a widely used building material with many advantages. Unfortunately the production of both reinforcement and cement is quite energy intensive and causes the emission of greenhouse gasses as NO2, NO and CO2. Reducing the need of cement is a relative simple way to reduce the emission of these greenhouse gasses. In practice roofs are seldom really flat but curved or at least slightly inclined, to drain rainwater and snow. Structurally curved structures, transferring loads as a surface-active or form-active structural system, are very efficient. The need of material and the self-weight is pretty low. This can be very useful if in the future the potentials of roofs for producing food and energy are used more

  7. Composite hollow core vaults: An analysis of the Fusée Céramic System and the design of form-active environmental friendly roofs

    Directory of Open Access Journals (Sweden)

    Wim Kamerling

    2016-03-01

    Full Text Available Just after World-War II building materials were scarce, architects and engineers had to design buildings using not much cement and steel. In French an architect, Jacques Couëlle, had invented a system with céramique infill elements to reduce for structures of concrete the self-weight and need of cement and steel. In the fifties and sixties of the twentieth century these céramique elements, known as Fusée Céramique elements, were used widely in France, North Africa and the Netherlands, mostly for barrel vaults and shells. Nowadays most of these structures are pulled down and the remaining buildings do not meet the demands of the present concerning climate comfort, insulation and safety.This thesis analyses the structural design of cylindrical Fusée Céramique roofs in the context of those days. The effect of the céramique infill elements for the time dependent deformations, stiffness and load bearing capacity, including second order, is studied. To save the few remaining buildings for the coming generations the possibilities to strengthen these structures with slender light elements of steel are explored. The effect of the strengthening is described for a Fusée Céramique vault, designed and constructed in the past.Reinforced concrete is a widely used building material with many advantages. Unfortunately the production of both reinforcement and cement is quite energy intensive and causes the emission of greenhouse gasses as NO2, NO and CO2. Reducing the need of cement is a relative simple way to reduce the emission of these greenhouse gasses.In practice roofs are seldom really flat but curved or at least slightly inclined, to drain rainwater and snow. Structurally curved structures, transferring loads as a surface-active or form-active structural system, are very efficient. The need of material and the self-weight is pretty low. This can be very useful if in the future the potentials of roofs for producing food and energy are used more

  8. Fuel storage systems

    Energy Technology Data Exchange (ETDEWEB)

    Donakowski, T.D.; Tison, R.R.

    1979-08-01

    Storage technologies are characterized for solid, liquid, and gaseous fuels. Emphasis is placed on storage methods applicable to Integrated Community Energy Systems based on coal. Items discussed here include standard practice, materials and energy losses, environmental effects, operating requirements, maintenance and reliability, and cost considerations. All storage systems were found to be well-developed and to represent mature technologies; an exception may exist for low-Btu gas storage, which could have materials incompatability.

  9. Thermal energy storage

    Science.gov (United States)

    1980-01-01

    The planning and implementation of activities associated with lead center management role and the technical accomplishments pertaining to high temperature thermal energy storage subsystems are described. Major elements reported are: (1) program definition and assessment; (2) research and technology development; (3) industrial storage applications; (4) solar thermal power storage applications; and (5) building heating and cooling applications.

  10. Pit Water Storage Ottrupgaard

    DEFF Research Database (Denmark)

    Heller, Alfred

    2000-01-01

    The pit water storage, a seasonal thermal storage, was built in 1993 with floating lid and hybrid clay-polymer for pit lining. The storage was leaking severe and solutions were to be found. In the paper solutions for pit lining and floating lids are discussed, cost estimations given and coming...

  11. Advances in neuromorphic hardware exploiting emerging nanoscale devices

    CERN Document Server

    2017-01-01

    This book covers all major aspects of cutting-edge research in the field of neuromorphic hardware engineering involving emerging nanoscale devices. Special emphasis is given to leading works in hybrid low-power CMOS-Nanodevice design. The book offers readers a bidirectional (top-down and bottom-up) perspective on designing efficient bio-inspired hardware. At the nanodevice level, it focuses on various flavors of emerging resistive memory (RRAM) technology. At the algorithm level, it addresses optimized implementations of supervised and stochastic learning paradigms such as: spike-time-dependent plasticity (STDP), long-term potentiation (LTP), long-term depression (LTD), extreme learning machines (ELM) and early adoptions of restricted Boltzmann machines (RBM) to name a few. The contributions discuss system-level power/energy/parasitic trade-offs, and complex real-world applications. The book is suited for both advanced researchers and students interested in the field.

  12. Hardware support for CSP on a Java chip multiprocessor

    DEFF Research Database (Denmark)

    Gruian, Flavius; Schoeberl, Martin

    2013-01-01

    Due to memory bandwidth limitations, chip multiprocessors (CMPs) adopting the convenient shared memory model for their main memory architecture scale poorly. On-chip core-to-core communication is a solution to this problem, that can lead to further performance increase for a number of multithreaded...... applications. Programmatically, the Communicating Sequential Processes (CSPs) paradigm provides a sound computational model for such an architecture with message based communication. In this paper we explore hardware support for CSP in the context of an embedded Java CMP. The hardware support for CSP are on-chip...... communication channels, implemented by a ring-based network-on-chip (NoC), to reduce the memory bandwidth pressure on the shared memory.The presented solution is scalable and also specific for our limited resources and real-time predictability requirements. CMP architectures of three to eight processors were...

  13. Verification of OpenSSL version via hardware performance counters

    Science.gov (United States)

    Bruska, James; Blasingame, Zander; Liu, Chen

    2017-05-01

    Many forms of malware and security breaches exist today. One type of breach downgrades a cryptographic program by employing a man-in-the-middle attack. In this work, we explore the utilization of hardware events in conjunction with machine learning algorithms to detect which version of OpenSSL is being run during the encryption process. This allows for the immediate detection of any unknown downgrade attacks in real time. Our experimental results indicated this detection method is both feasible and practical. When trained with normal TLS and SSL data, our classifier was able to detect which protocol was being used with 99.995% accuracy. After the scope of the hardware event recording was enlarged, the accuracy diminished greatly, but to 53.244%. Upon removal of TLS 1.1 from the data set, the accuracy returned to 99.905%.

  14. Binary Associative Memories as a Benchmark for Spiking Neuromorphic Hardware

    Directory of Open Access Journals (Sweden)

    Andreas Stöckel

    2017-08-01

    Full Text Available Large-scale neuromorphic hardware platforms, specialized computer systems for energy efficient simulation of spiking neural networks, are being developed around the world, for example as part of the European Human Brain Project (HBP. Due to conceptual differences, a universal performance analysis of these systems in terms of runtime, accuracy and energy efficiency is non-trivial, yet indispensable for further hard- and software development. In this paper we describe a scalable benchmark based on a spiking neural network implementation of the binary neural associative memory. We treat neuromorphic hardware and software simulators as black-boxes and execute exactly the same network description across all devices. Experiments on the HBP platforms under varying configurations of the associative memory show that the presented method allows to test the quality of the neuron model implementation, and to explain significant deviations from the expected reference output.

  15. Fast and Reliable Mouse Picking Using Graphics Hardware

    Directory of Open Access Journals (Sweden)

    Hanli Zhao

    2009-01-01

    Full Text Available Mouse picking is the most commonly used intuitive operation to interact with 3D scenes in a variety of 3D graphics applications. High performance for such operation is necessary in order to provide users with fast responses. This paper proposes a fast and reliable mouse picking algorithm using graphics hardware for 3D triangular scenes. Our approach uses a multi-layer rendering algorithm to perform the picking operation in linear time complexity. The objectspace based ray-triangle intersection test is implemented in a highly parallelized geometry shader. After applying the hardware-supported occlusion queries, only a small number of objects (or sub-objects are rendered in subsequent layers, which accelerates the picking efficiency. Experimental results demonstrate the high performance of our novel approach. Due to its simplicity, our algorithm can be easily integrated into existing real-time rendering systems.

  16. Follow-the-Leader Control for the PIPS Prototype Hardware

    Science.gov (United States)

    Williams, Robert L. II; Lippitt, Thimas

    1996-01-01

    This report describes the payload inspection and processing system (PIPS), an automated system programmed off-line for inspection of space shuttle payloads after integration and prior to launch. PIPS features a hyper-redundant 18-degree of freedom (DOF) serpentine truss manipulator capable of snake like motions to avoid obstacles. During the summer of 1995, the author worked on the same project, developing a follow-the-leader (FTL) algorithm in graphical simulation which ensures whole arm collision avoidance by forcing ensuing links to follow the same tip trajectory. The summer 1996 work was to control the prototype PIPS hardware in follow-the-leader mode. The project was successful in providing FTL control in hardware. The STS-82 payload mockup was used in the laboratory to demonstrate serpentine motions to avoid obstacles in a realistic environment.

  17. Commercial Aircraft Maintenance Experience Relating to Engine External Hardware

    Science.gov (United States)

    Soditus, Sharon M.

    2006-01-01

    Airlines are extremely sensitive to the amount of dollars spent on maintaining the external engine hardware in the field. Analysis reveals that many problems revolve around a central issue, reliability. Fuel and oil leakage due to seal failure and electrical fault messages due to wire harness failures play a major role in aircraft delays and cancellations (D&C's) and scheduled maintenance. Correcting these items on the line requires a large investment of engineering resources and manpower after the fact. The smartest and most cost effective philosophy is to build the best hardware the first time. The only way to do that is to completely understand and model the operating environment, study the field experience of similar designs and to perform extensive testing.

  18. The LISA Pathfinder interferometry-hardware and system testing

    Energy Technology Data Exchange (ETDEWEB)

    Audley, H; Danzmann, K; MarIn, A Garcia; Heinzel, G; Monsky, A; Nofrarias, M; Steier, F; Bogenstahl, J [Albert-Einstein-Institut, Max-Planck-Institut fuer Gravitationsphysik und Universitaet Hannover, 30167 Hannover (Germany); Gerardi, D; Gerndt, R; Hechenblaikner, G; Johann, U; Luetzow-Wentzky, P; Wand, V [EADS Astrium GmbH, Friedrichshafen (Germany); Antonucci, F [Dipartimento di Fisica, Universita di Trento and INFN, Gruppo Collegato di Trento, 38050 Povo, Trento (Italy); Armano, M [European Space Astronomy Centre, European Space Agency, Villanueva de la Canada, 28692 Madrid (Spain); Auger, G; Binetruy, P [APC UMR7164, Universite Paris Diderot, Paris (France); Benedetti, M [Dipartimento di Ingegneria dei Materiali e Tecnologie Industriali, Universita di Trento and INFN, Gruppo Collegato di Trento, Mesiano, Trento (Italy); Boatella, C, E-mail: antonio.garcia@aei.mpg.de [CNES, DCT/AQ/EC, 18 Avenue Edouard Belin, 31401 Toulouse, Cedex 9 (France)

    2011-05-07

    Preparations for the LISA Pathfinder mission have reached an exciting stage. Tests of the engineering model (EM) of the optical metrology system have recently been completed at the Albert Einstein Institute, Hannover, and flight model tests are now underway. Significantly, they represent the first complete integration and testing of the space-qualified hardware and are the first tests on an optical system level. The results and test procedures of these campaigns will be utilized directly in the ground-based flight hardware tests, and subsequently during in-flight operations. In addition, they allow valuable testing of the data analysis methods using the MATLAB-based LTP data analysis toolbox. This paper presents an overview of the results from the EM test campaign that was successfully completed in December 2009.

  19. Hardware and software fault tolerance - A unified architectural approach

    Science.gov (United States)

    Lala, Jaynarayan H.; Alger, Linda S.

    1988-01-01

    The loss of hardware fault tolerance which often arises when design diversity is used to improve the fault tolerance of computer software is considered analytically, and a unified design approach is proposed to avoid the problem. The fundamental theory of fault-tolerant (FT) architectures is reviewed; the current status of design-diversity software development is surveyed; and the FT-processor/attached-processor (FTP/AP) architecture developed by Lala et al. (1986) is described in detail and illustrated with diagrams. FTP/AP is shown to permit efficient implementation of N-version FT software while still tolerating random hardware failures with very high coverage; the reliability is found to be significantly higher than that of conventional majority-vote N-version software.

  20. Reconfigurable hardware-software codesign methodology for protein identification.

    Science.gov (United States)

    Gudur, Venkateshwarlu Y; Thallada, Sandeep; Deevi, Abhinay R; Gande, Venkata Krishna; Acharyya, Amit; Bhandari, Vasundhra; Sharma, Paresh; Khursheed, Saqib; Naik, Ganesh R

    2016-08-01

    In this paper we propose an on-the-fly reconfigurable hardware-software codesign based reconfigurable solution for real-time protein identification. Reconfigurable string matching is performed in the disciplines of protein identification and biomarkers discovery. With the generation of plethora of sequenced data and number of biomarkers for several diseases, it is becoming necessary to have an accelerated processing and on-the-fly reconfigurable system design methodology to bring flexibility to its usage in the medical science community without the need of changing the entire hardware every time with the advent of new biomarker or protein. The proteome database of human at UniProtKB (Proteome ID up000005640) comprising of 42132 canonical and isoform proteins with variable database-size are used for testing the proposed design and the performance of the proposed system has been found to compare favorably with the state-of-the-art approaches with the additional advantage of real-time reconfigurability.