WorldWideScience

Sample records for heavily exploited open

  1. Open pit coal exploitation viability. Margarita mine. Case of study

    International Nuclear Information System (INIS)

    Veloza, Julia; Molina, Jorge; Mejia, Humberto

    2006-01-01

    This paper provides an analysis of financial viability, planning and design for the new coal open pit exploitation for La Margarita mine, with coal-resources estimated on 440.139,7 ton. Dimension, design and economic evaluation were possible by three exploitation methods: (multiple bench, open cast contour, and terraces). Net present values (NVP) were calculated: $c 817,5; $c 518,5 and $c 645,2 respectively for each method (given in million current Colombian pesos $. $c 2380 are equivalent to $us 1) and rate of return (ROR) 78,33%; 34,0% and 38,62% respectively for each method. These indicators served as a parameter to choose the multiple bench method, which should be recalculated because it was necessary to work jointly with two pits and making feasible the project. in addition a general environmental evaluation was done, which is vital for the exploitation. Important impacts on the flower, animals, air, water were found, and measures of control, prevention and mitigation were stated. it is expected that this paper can be useful as a technical-economical support for the development of the open pit exploitation in the margarita mine

  2. EXPLOITATION OF GLASS SAND ON THE OPEN PIT »VRTLINSKA« (MOSLAVINA, CROATIA

    Directory of Open Access Journals (Sweden)

    Slavko Vujec

    1994-12-01

    Full Text Available The exploitation of glass sand in Slavonia and Moslavina has a long tradition. The open-pit »Vrtlinska« is-accordirtg to its dimensions and production capacity the biggest one in this regions. Exploitation reserves within this open pit amount about 1 000 000 t glass sand of a very good quality, and the production capacity is 200 000 t yearly according to real needs during design and opening the pit, i. e. before the war. This article discusses geological and geomechanical characteristics of the deposit, as well as the exploitation process, which is considerably matching natural characteristics of the deposit. A more detailed description is given of the planned exploitation phase I above groundwater level which is carried out according to discontinuous system. For the exploitation of the depth part under groundwater level in the phase II, the necessity of further examination of hydrogeological characteristics of the deposit is presented, in order to acquire necessary information on groundwater regime and drainage conditions. Such knowledge will influence the choice of the most appropriate solutions in the exploitation of the depth part of the deposit.

  3. Mid-infrared plasmonic resonances exploiting heavily-doped Ge on Si

    Science.gov (United States)

    Biagioni, P.; Sakat, E.; Baldassarre, L.; Calandrini, E.; Samarelli, A.; Gallacher, K.; Frigerio, J.; Isella, G.; Paul, D. J.; Ortolani, M.

    2015-03-01

    We address the behavior of mid-infrared localized plasmon resonances in elongated germanium antennas integrated on silicon substrates. Calculations based on Mie theory and on the experimentally retrieved dielectric constant allow us to study the tunability and the figures of merit of plasmon resonances in heavily-doped germanium and to preliminarily compare them with those of the most established plasmonic material, gold.

  4. Fostering the Exploitation of Open Educational Resources

    Directory of Open Access Journals (Sweden)

    Thomas Richter

    2014-07-01

    Full Text Available The central concept behind Open Educational Resources (OER is opening up the access to educational resources for stakeholders who are not the usual target user group. This concept must be perceived as innovative because it describes a general economic and social paradigm shift: Education, which formerly was limited to a specific group of learners, now, is promoted as a public good. However, despite very good intentions, internationally agreed quality standards, and the availability of the required technological infrastructure, the critical threshold is not yet met. Due to several reasons, the usefulness of OER is often limited to the originally targeted context. Questions arise if the existing quality standards for Technology Enhanced Learning (TEL actually meet the specific requirements within the OER value chain, if the existing quality standards are applicable to OER in a meaningful way, and under which conditions related standards generally could support the exploitation of OER.We analyze quality standards for TEL and contrast the life cycle model of commercial learning resources against the life cycle model of OER. We investigate special demands on quality from the context of OER and, taking the former results into account, derive emergent quality criteria for OER. The paper concludes with recommendations for the design of OER and a future standard development.

  5. Getting More From Your Multicore: Exploiting OpenMP for Astronomy

    Science.gov (United States)

    Noble, M. S.

    2008-08-01

    Motivated by the emergence of multicore architectures, and the reality that parallelism is rarely used for analysis in observational astronomy, we demonstrate how general users may employ tightly-coupled multiprocessors in scriptable research calculations while requiring no special knowledge of parallel programming. Our method rests on the observation that much of the appeal of high-level vectorized languages like IDL or MatLab stems from relatively simple internal loops over regular array structures, and that these loops are highly amenable to automatic parallelization with OpenMP. We discuss how ISIS, an open-source astrophysical analysis system embedding the slang numerical language, was easily adapted to exploit this pattern. Drawing from a common astrophysical problem, model fitting, we present beneficial speedups for several machine and compiler configurations. These results complement our previous efforts with PVM, and together lead us to believe that ISIS is the only general purpose spectroscopy system in which such a range of parallelism - from single processors on multiple machines to multiple processors on single machines - has been demonstrated.

  6. Population genetics of four heavily exploited shark species around the Arabian Peninsula

    KAUST Repository

    Spaet, Julia L.Y.

    2015-05-01

    The northwestern Indian Ocean harbors a number of larger marine vertebrate taxa that warrant the investigation of genetic population structure given remarkable spatial heterogeneity in biological characteristics such as distribution, behavior, and morphology. Here, we investigate the genetic population structure of four commercially exploited shark species with different biological characteristics (Carcharhinus limbatus, Carcharhinus sorrah, Rhizoprionodon acutus, and Sphyrna lewini) between the Red Sea and all other water bodies surrounding the Arabian Peninsula. To assess intraspecific patterns of connectivity, we constructed statistical parsimony networks among haplotypes and estimated (1) population structure; and (2) time of most recent population expansion, based on mitochondrial control region DNA and a total of 20 microsatellites. Our analysis indicates that, even in smaller, less vagile shark species, there are no contemporary barriers to gene flow across the study region, while historical events, for example, Pleistocene glacial cycles, may have affected connectivity in C. sorrah and R. acutus. A parsimony network analysis provided evidence that Arabian S. lewini may represent a population segment that is distinct from other known stocks in the Indian Ocean, raising a new layer of conservation concern. Our results call for urgent regional cooperation to ensure the sustainable exploitation of sharks in the Arabian region.

  7. Opening of stripe mine Oslomej - West as a contribution to exploitation of coal in Kichevo basin and extension of exploitation period of TPP 'Oslomej' (Macedonia)

    International Nuclear Information System (INIS)

    Anastasovski, Vlade; Milevski, Trifun; Jolev, Slavcho; Panovski, Aleksandar

    1997-01-01

    Coal mining in the open mine 'Oslomej' in Macedonia has started 1980 and its regular coal production is 1,2 x 10 6 t per year. The whole coal produced in this mine is used for the Thermal Power Plant 'Oslomej', whose total installed capacity is 120 MW. Taking into consideration the planned exploitation dynamics, the coal reserves will meet the TPP needs for the next 4-5 years. In order to consolidate the coal reserves in the Kitchevo basin, a previous geologic examinations were carried out. In this paper economic, electro energetic and commercial justification of opening the stripe mine Oslomej - West is analysed

  8. DETERMINATION OF OPTIMAL CONTOURS OF OPEN PIT MINE DURING OIL SHALE EXPLOITATION, BY MINEX 5.2.3. PROGRAM

    Directory of Open Access Journals (Sweden)

    Miroslav Ignjatović

    2013-04-01

    Full Text Available By examination and determination of optimal solution of technological processes of exploitation and oil shale processing from Aleksinac site and with adopted technical solution and exploitation of oil shale, derived a technical solution that optimize contour of the newly defined open pit mine. In the world, this problem is solved by using a computer program that has become the established standard for quick and efficient solution for this problem. One of the computer’s program, which can be used for determination of the optimal contours of open pit mines is Minex 5.2.3. program, produced in Australia in the Surpac Minex Group Pty Ltd Company, which is applied at the Mining and Metallurgy Institute Bor (no. of licenses are SSI - 24765 and SSI - 24766. In this study, authors performed 11 optimization of deposit geo - models in Minex 5.2.3. based on the tests results, performed in a laboratory for soil mechanics of Mining and Metallurgy Institute, Bor, on samples from the site of Aleksinac deposits.

  9. Exploiting Open Environmental Data using Linked Data and Cloud Computing: the MELODIES project

    Science.gov (United States)

    Blower, Jon; Gonçalves, Pedro; Caumont, Hervé; Koubarakis, Manolis; Perkins, Bethan

    2015-04-01

    The European Open Data Strategy establishes important new principles that ensure that European public sector data will be released at no cost (or marginal cost), in machine-readable, commonly-understood formats, and with liberal licences enabling wide reuse. These data encompass both scientific data about the environment (from Earth Observation and other fields) and other public sector information, including diverse topics such as demographics, health and crime. Many open geospatial datasets (e.g. land use) are already available through the INSPIRE directive and made available through infrastructures such as the Global Earth Observation System of Systems (GEOSS). The intention of the Open Data Strategy is to stimulate the growth of research and value-adding services that build upon these data streams; however, the potential value inherent in open data, and the benefits that can be gained by combining previously-disparate sources of information are only just starting to become understood. The MELODIES project (Maximising the Exploitation of Linked Open Data In Enterprise and Science) is developing eight innovative and sustainable services, based upon Open Data, for users in research, government, industry and the general public in a broad range of societal and environmental benefit areas. MELODIES (http://melodiesproject.eu) is a European FP7 project that is coordinated by the University of Reading and has sixteen partners (including nine SMEs) from eight European countries. It started in November 2013 and will run for three years. The project is therefore in its early stages and therefore we will value the opportunity that this workshop affords to present our plans and interact with the wider Linked Geospatial Data community. The project is developing eight new services[1] covering a range of domains including agriculture, urban ecosystems, land use management, marine information, desertification, crisis management and hydrology. These services will combine Earth

  10. Hypoxic areas, density-dependence and food limitation drive the body condition of a heavily exploited marine fish predator

    DEFF Research Database (Denmark)

    Casini, Michele; Käll, Filip; Hansson, Martin

    2016-01-01

    Investigating the factors regulating fish condition is crucial in ecology and the management of exploited fish populations. The body condition of cod (Gadus morhua) in the Baltic Sea has dramatically decreased during the past two decades, with large implications for the fishery relying on this re...

  11. Spatial scale of similarity as an indicator of metacommunity stability in exploited marine systems.

    Science.gov (United States)

    Shackell, Nancy L; Fisher, Jonathan A D; Frank, Kenneth T; Lawton, Peter

    2012-01-01

    The spatial scale of similarity among fish communities is characteristically large in temperate marine systems: connectivity is enhanced by high rates of dispersal during the larval/juvenile stages and the increased mobility of large-bodied fish. A larger spatial scale of similarity (low beta diversity) is advantageous in heavily exploited systems because locally depleted populations are more likely to be "rescued" by neighboring areas. We explored whether the spatial scale of similarity changed from 1970 to 2006 due to overfishing of dominant, large-bodied groundfish across a 300 000-km2 region of the Northwest Atlantic. Annually, similarities among communities decayed slowly with increasing geographic distance in this open system, but through time the decorrelation distance declined by 33%, concomitant with widespread reductions in biomass, body size, and community evenness. The decline in connectivity stemmed from an erosion of community similarity among local subregions separated by distances as small as 100 km. Larger fish, of the same species, contribute proportionally more viable offspring, so observed body size reductions will have affected maternal output. The cumulative effect of nonlinear maternal influences on egg/larval quality may have compromised the spatial scale of effective larval dispersal, which may account for the delayed recovery of certain member species. Our study adds strong support for using the spatial scale of similarity as an indicator of metacommunity stability both to understand the spatial impacts of exploitation and to refine how spatial structure is used in management plans.

  12. Meaning, function and methods of the recultivation in mining exploitation

    OpenAIRE

    Dambov, Risto; Ljatifi, Ejup

    2015-01-01

    With the exploitation of mineral resources is performed degradation and deformation of the relief and the general part of surface of the Earth's crust. Depending on the type of open pit mine, this degradation can be expressed to a lesser or greater extent, and sometimes in several square kilometers. The exploitation of mineral resources is with unbreakable link with the environment. Very often it is said that mining is „enemy No. 1“ for environment. With exploitation comes to degradation of h...

  13. Views of Swedish commissioning parents relating to the exploitation discourse in using transnational surrogacy

    OpenAIRE

    Arvidsson, Anna; Johnsdotter, Sara; Essén, Birgitta

    2015-01-01

    Transnational surrogacy, when people travel abroad for reproduction with the help of a surrogate mother, is a heavily debated phenomenon. One of the most salient discourses on surrogacy is the one affirming that Westerners, in their quest for having a child, exploit poor women in countries such as India. As surrogacy within the Swedish health care system is not permitted, Swedish commissioning parents have used transnational surrogacy, and the majority has turned to India. This interview stud...

  14. The ESA Scientific Exploitation of Operational Missions element

    Science.gov (United States)

    Desnos, Yves-Louis; Regner, Peter; Delwart, Steven; Benveniste, Jerome; Engdahl, Marcus; Zehner, Claus; Mathieu, Pierre-Philippe; Bojkov, Bojan; Gascon, Ferran; Donlon, Craig; Davidson, Malcolm; Goryl, Philippe; Pinnock, Simon

    2015-04-01

    SEOM is a program element within the fourth period (2013-2017) of ESA's Earth Observation Envelope Programme (http://seom.esa.int/). The prime objective is to federate, support and expand the international research community that the ERS,ENVISAT and the Envelope programmes have built up over the last 25 years. It aims to further strengthen the leadership of the European Earth Observation research community by enabling them to extensively exploit future European operational EO missions. SEOM will enable the science community to address new scientific research that are opened by free and open access to data from operational EO missions. Based on community-wide recommendations for actions on key research issues, gathered through a series of international thematic workshops and scientific user consultation meetings, a work plan has been established and is approved every year by ESA Members States. The 2015 SEOM work plan is covering the organisation of three Science users consultation workshops for Sentinel1/3/5P , the launch of new R&D studies for scientific exploitation of the Sentinels, the development of open-source multi-mission scientific toolboxes, the organisation of advanced international training courses, summer schools and educational materials, as well as activities for promoting the scientific use of EO data. The first SEOM projects have been tendered since 2013 including the development of Sentinel toolboxes, advanced INSAR algorithms for Sentinel-1 TOPS data exploitation, Improved Atmospheric Spectroscopic data-base (IAS), as well as grouped studies for Sentinel-1, -2, and -3 land and ocean applications and studies for exploiting the synergy between the Sentinels. The status and first results from these SEOM projects will be presented and an outlook for upcoming SEOM studies will be given.

  15. OpenGL development cookbook

    CERN Document Server

    Movania, Muhammad Mobeen

    2013-01-01

    The book is written in a Cookbook format with practical recipes aimed at helping you exploit OpenGL to its full potential.This book is targeted towards intermediate OpenGL programmers. However, those who are new to OpenGL and know an alternate API like DirectX might also find these recipes useful to create OpenGL animations.

  16. Marine reserves and reproductive biomass: a case study of a heavily targeted reef fish.

    Directory of Open Access Journals (Sweden)

    Brett M Taylor

    Full Text Available Recruitment overfishing (the reduction of a spawning stock past a point at which the stock can no longer replenish itself is a common problem which can lead to a rapid and irreversible fishery collapse. Averting this disaster requires maintaining a sufficient spawning population to buffer stochastic fluctuations in recruitment of heavily harvested stocks. Optimal strategies for managing spawner biomass are well developed for temperate systems, yet remain uncertain for tropical fisheries, where the danger of collapse from recruitment overfishing looms largest. In this study, we explored empirically and through modeling, the role of marine reserves in maximizing spawner biomass of a heavily exploited reef fish, Lethrinus harak around Guam, Micronesia. On average, spawner biomass was 16 times higher inside the reserves compared with adjacent fished sites. Adult density and habitat-specific mean fish size were also significantly greater. We used these data in an age-structured population model to explore the effect of several management scenarios on L. harak demography. Under minimum-size limits, unlimited extraction and all rotational-closure scenarios, the model predicts that preferential mortality of larger and older fish prompt dramatic declines in spawner biomass and the proportion of male fish, as well as considerable declines in total abundance. For rotational closures this occurred because of the mismatch between the scales of recovery and extraction. Our results highlight how alternative management scenarios fall short in comparison to marine reserves in preserving reproductively viable fish populations on coral reefs.

  17. Further considerations for damping in heavily insulated pipe systems

    International Nuclear Information System (INIS)

    Anderson, M.J.; Lindquist, M.R.; Severud, L.K.

    1985-01-01

    Over the past several years a body of test data has been accumulated which demonstrates that damping in small diameter heavily insulated pipe systems is much larger than presently recommended by Regulatory Guide 1.61. This data is generally based on pipe systems using a stand-off insulation design with a heater annulus. Additional tests have how been completed on similar pipe systems using a strap-on insulation design without the heater annulus. Results indicate some reduction in damping over the stand-off designs. Test data has also been obtained on a larger sixteen-inch diameter heavily insulated pipe system. Results of these two additional test series are presented. Revised damping values for seismic design of heavily insulated pipe systems are then recommended

  18. Further considerations for damping in heavily insulated pipe systems

    International Nuclear Information System (INIS)

    Anderson, M.J.; Lindquist, M.R.; Severud, L.K.

    1985-01-01

    Over the past several years a body of test data has been accumulated which demonstrates that damping in small diameter heavily insulated pipe systems is much larger than presently recommended by Regulatory Code 1.61. This data is generally based on pipe systems using a stand-off insulation design with a heater annulus. Additional tests have now been completed on similar pipe systems using a strap-on insulation design without the heater annulus. Results indicate some reduction in damping over the stand-off designs. Test data has also been obtained on a larger sixteen-inch diameter heavily insulated pipe system. Results of these two additional test series are presented. Revised damping values for seismic design for heavily insulated pipe systems are then recommended

  19. Key issues for determining the exploitable water resources in a Mediterranean river basin.

    Science.gov (United States)

    Pedro-Monzonís, María; Ferrer, Javier; Solera, Abel; Estrela, Teodoro; Paredes-Arquiola, Javier

    2015-01-15

    One of the major difficulties in water planning is to determine the water availability in a water resource system in order to distribute water sustainably. In this paper, we analyze the key issues for determining the exploitable water resources as an indicator of water availability in a Mediterranean river basin. Historically, these territories are characterized by heavily regulated water resources and the extensive use of unconventional resources (desalination and wastewater reuse); hence, emulating the hydrological cycle is not enough. This analysis considers the Jucar River Basin as a case study. We have analyzed the different possible combinations between the streamflow time series, the length of the simulation period and the reliability criteria. As expected, the results show a wide dispersion, proving the great influence of the reliability criteria used for the quantification and localization of the exploitable water resources in the system. Therefore, it is considered risky to provide a single value to represent the water availability in the Jucar water resource system. In this sense, it is necessary that policymakers and stakeholders make a decision about the methodology used to determine the exploitable water resources in a river basin. Copyright © 2014 Elsevier B.V. All rights reserved.

  20. Efficient Depth Map Compression Exploiting Segmented Color Data

    DEFF Research Database (Denmark)

    Milani, Simone; Zanuttigh, Pietro; Zamarin, Marco

    2011-01-01

    performances is still an open research issue. This paper presents a novel compression scheme that exploits a segmentation of the color data to predict the shape of the different surfaces in the depth map. Then each segment is approximated with a parameterized plane. In case the approximation is sufficiently...

  1. Superconductivity in heavily boron-doped silicon carbide

    Directory of Open Access Journals (Sweden)

    Markus Kriener, Takahiro Muranaka, Junya Kato, Zhi-An Ren, Jun Akimitsu and Yoshiteru Maeno

    2008-01-01

    Full Text Available The discoveries of superconductivity in heavily boron-doped diamond in 2004 and silicon in 2006 have renewed the interest in the superconducting state of semiconductors. Charge-carrier doping of wide-gap semiconductors leads to a metallic phase from which upon further doping superconductivity can emerge. Recently, we discovered superconductivity in a closely related system: heavily boron-doped silicon carbide. The sample used for that study consisted of cubic and hexagonal SiC phase fractions and hence this led to the question which of them participated in the superconductivity. Here we studied a hexagonal SiC sample, free from cubic SiC phase by means of x-ray diffraction, resistivity, and ac susceptibility.

  2. Long-Term Stability of Oxide Nanowire Sensors via Heavily Doped Oxide Contact.

    Science.gov (United States)

    Zeng, Hao; Takahashi, Tsunaki; Kanai, Masaki; Zhang, Guozhu; He, Yong; Nagashima, Kazuki; Yanagida, Takeshi

    2017-12-22

    Long-term stability of a chemical sensor is an essential quality for long-term collection of data related to exhaled breath, environmental air, and other sources in the Internet of things (IoT) era. Although an oxide nanowire sensor has shown great potential as a chemical sensor, the long-term stability of sensitivity has not been realized yet due to electrical degradation under harsh sensing conditions. Here, we report a rational concept to accomplish long-term electrical stability of metal oxide nanowire sensors via introduction of a heavily doped metal oxide contact layer. Antimony-doped SnO 2 (ATO) contacts on SnO 2 nanowires show much more stable and lower electrical contact resistance than conventional Ti contacts for high temperature (200 °C) conditions, which are required to operate chemical sensors. The stable and low contact resistance of ATO was confirmed for at least 1960 h under 200 °C in open air. This heavily doped oxide contact enables us to realize the long-term stability of SnO 2 nanowire sensors while maintaining the sensitivity for both NO 2 gas and light (photo) detections. The applicability of our method is confirmed for sensors on a flexible polyethylene naphthalate (PEN) substrate. Since the proposed fundamental concept can be applied to various oxide nanostructures, it will give a foundation for designing long-term stable oxide nanomaterial-based IoT sensors.

  3. IT-Enabled Knowledge Creation for Open Innovation

    NARCIS (Netherlands)

    Eseryel, U. Yeliz

    2014-01-01

    Open innovation is increasingly important for researchers and practitioners alike. Open innovation is closely linked to knowledge creation in that, with open innovation, knowledge inflows and outflows are exploited for innovation. In the information systems field, open innovation has been closely

  4. Exploitation of Free Markets and Globalization to Finance Terrorists

    Science.gov (United States)

    2008-09-01

    is their capability to exploit the black market peso exchange or the international foreign exchange arbitrage . Under the scenario of a weak U.S...appears legitimate. By using intermediaries or legitimate businesses, the financial markets are wide open for terrorists to hedge funds and

  5. Exploiting IoT Technologies and Open Source Components for Smart Seismic Network Instrumentation

    Science.gov (United States)

    Germenis, N. G.; Koulamas, C. A.; Foundas, P. N.

    2017-12-01

    The data collection infrastructure of any seismic network poses a number of requirements and trade-offs related to accuracy, reliability, power autonomy and installation & operational costs. Having the right hardware design at the edge of this infrastructure, embedded software running inside the instruments is the heart of pre-processing and communication services implementation and their integration with the central storage and processing facilities of the seismic network. This work demonstrates the feasibility and benefits of exploiting software components from heterogeneous sources in order to realize a smart seismic data logger, achieving higher reliability, faster integration and less development and testing costs of critical functionality that is in turn responsible for the cost and power efficient operation of the device. The instrument's software builds on top of widely used open source components around the Linux kernel with real-time extensions, the core Debian Linux distribution, the earthworm and seiscomp tooling frameworks, as well as components from the Internet of Things (IoT) world, such as the CoAP and MQTT protocols for the signaling planes, besides the widely used de-facto standards of the application domain at the data plane, such as the SeedLink protocol. By using an innovative integration of features based on lower level GPL components of the seiscomp suite with higher level processing earthworm components, coupled with IoT protocol extensions to the latter, the instrument can implement smart functionality such as network controlled, event triggered data transmission in parallel with edge archiving and on demand, short term historical data retrieval.

  6. A Vision for Open Cyber-Scholarly Infrastructures

    Directory of Open Access Journals (Sweden)

    Costantino Thanos

    2016-05-01

    Full Text Available The characteristics of modern science, i.e., data-intensive, multidisciplinary, open, and heavily dependent on Internet technologies, entail the creation of a linked scholarly record that is online and open. Instrumental in making this vision happen is the development of the next generation of Open Cyber-Scholarly Infrastructures (OCIs, i.e., enablers of an open, evolvable, and extensible scholarly ecosystem. The paper delineates the evolving scenario of the modern scholarly record and describes the functionality of future OCIs as well as the radical changes in scholarly practices including new reading, learning, and information-seeking practices enabled by OCIs.

  7. The ESA Scientific Exploitation of Operational Missions element, first results

    Science.gov (United States)

    Desnos, Yves-Louis; Regner, Peter; Delwart, Steven; Benveniste, Jerome; Engdahl, Marcus; Mathieu, Pierre-Philippe; Gascon, Ferran; Donlon, Craig; Davidson, Malcolm; Pinnock, Simon; Foumelis, Michael; Ramoino, Fabrizio

    2016-04-01

    SEOM is a program element within the fourth period (2013-2017) of ESA's Earth Observation Envelope Programme (http://seom.esa.int/). The prime objective is to federate, support and expand the international research community that the ERS, ENVISAT and the Envelope programmes have built up over the last 25 years. It aims to further strengthen the leadership of the European Earth Observation research community by enabling them to extensively exploit future European operational EO missions. SEOM will enable the science community to address new scientific research that are opened by free and open access to data from operational EO missions. Based on community-wide recommendations for actions on key research issues, gathered through a series of international thematic workshops and scientific user consultation meetings, a work plan is established and is approved every year by ESA Members States. During 2015 SEOM, Science users consultation workshops have been organized for Sentinel1/3/5P ( Fringe, S3 Symposium and Atmospheric science respectively) , new R&D studies for scientific exploitation of the Sentinels have been launched ( S3 for Science SAR Altimetry and Ocean Color , S2 for Science,) , open-source multi-mission scientific toolboxes have been launched (in particular the SNAP/S1-2-3 Toolbox). In addition two advanced international training courses have been organized in Europe to exploit the new S1-A and S2-A data for Land and Ocean remote sensing (over 120 participants from 25 countries) as well as activities for promoting the first scientific results ( e.g. Chili Earthquake) . In addition the First EO Open Science 2.0 was organised at ESA in October 2015 with 225 participants from 31 countries bringing together young EO scientists and data scientists. During the conference precursor activities in EO Open Science and Innovation were presented, while developing a Roadmap preparing for future ESA scientific exploitation activities. Within the conference, the first

  8. Exploiting PV technology for basic need provision in Nigeria

    International Nuclear Information System (INIS)

    Gyoh, L.; Gyoh, S.

    2004-01-01

    Transitional economies are confronted with ever declining standard of living and low per capita income. Development institutions around the world have come to realize the strategic importance of Sustainable Energy as a Basic Need in the development process. Despite the efforts made by emerging democracies to eradicate poverty, there are still millions of people without access to electricity. Unreliable energy supply currently presents a constant obstacle to many poverty alleviation programmes. Against this background, some states government in Nigeria are exploiting the unique advantage offered by PV technology in the provision of Basic Needs. This study appraises some of the scheme in which the authors have been heavily involved with. This paper identifies some of the strategic policies that might accelerate the successful implementation of PV technology as a poverty alleviation tool in terms of electricity provision in transitional economies. (authors)

  9. Consensual exploitation : the moral wrong in exploitation and legal restrictions on consensual exploitative transactions

    OpenAIRE

    van der Neut, Wendy

    2014-01-01

    This thesis is about so-­‐called consensual exploitative transactions: transactions to which all parties agree voluntarily, and which are beneficial for all parties, but which are still widely considered exploitative, and for that reason legally restricted in many countries. The thesis asks two main questions: 1. What is wrong with consensual exploitation? 2.What implications does the answer to this question have for the legal restriction of consensual transactions ...

  10. Comparison on mechanical properties of heavily phosphorus- and arsenic-doped Czochralski silicon wafers

    Science.gov (United States)

    Yuan, Kang; Sun, Yuxin; Lu, Yunhao; Liang, Xingbo; Tian, Daxi; Ma, Xiangyang; Yang, Deren

    2018-04-01

    Heavily phosphorus (P)- and arsenic (As)-doped Czochralski silicon (CZ-Si) wafers generally act as the substrates for the epitaxial silicon wafers used to fabricate power and communication devices. The mechanical properties of such two kinds of n-type heavily doped CZ silicon wafers are vital to ensure the quality of epitaxial silicon wafers and the manufacturing yields of devices. In this work, the mechanical properties including the hardness, Young's modulus, indentation fracture toughness and the resistance to dislocation motion have been comparatively investigated for heavily P- and As-doped CZ-Si wafers. It is found that heavily P-doped CZ-Si possesses somewhat higher hardness, lower Young's modulus, larger indentation fracture toughness and stronger resistance to dislocation motion than heavily As-doped CZ-Si. The mechanisms underlying this finding have been tentatively elucidated by considering the differences in the doping effects of P and As in silicon.

  11. Commix: Automating Evaluation and Exploitation of Command Injection Vulnerabilities in Web Applications

    OpenAIRE

    Stasinopoulos, Anastasios; Ntantogian, Christoforos; Xenakis, Christos

    2018-01-01

    Despite the prevalence and the high impact of command injection attacks, little attention has been given by the research community to this type of code injections. Although there are many software tools to detect and exploit other types of code injections, such as SQL injections or Cross Site Scripting, there is no dedicated and specialized software that detects and exploits, automatically, command injection vulnerabilities. This paper proposes an open source tool that automates the process o...

  12. Exploiting Non-Markovianity for Quantum Control.

    Science.gov (United States)

    Reich, Daniel M; Katz, Nadav; Koch, Christiane P

    2015-07-22

    Quantum technology, exploiting entanglement and the wave nature of matter, relies on the ability to accurately control quantum systems. Quantum control is often compromised by the interaction of the system with its environment since this causes loss of amplitude and phase. However, when the dynamics of the open quantum system is non-Markovian, amplitude and phase flow not only from the system into the environment but also back. Interaction with the environment is then not necessarily detrimental. We show that the back-flow of amplitude and phase can be exploited to carry out quantum control tasks that could not be realized if the system was isolated. The control is facilitated by a few strongly coupled, sufficiently isolated environmental modes. Our paradigmatic example considers a weakly anharmonic ladder with resonant amplitude control only, restricting realizable operations to SO(N). The coupling to the environment, when harnessed with optimization techniques, allows for full SU(N) controllability.

  13. a Study of Oxygen Precipitation in Heavily Doped Silicon.

    Science.gov (United States)

    Graupner, Robert Kurt

    Gettering of impurities with oxygen precipitates is widely used during the fabrication of semiconductors to improve the performance and yield of the devices. Since the effectiveness of the gettering process is largely dependent on the initial interstitial oxygen concentration, accurate measurements of this parameter are of considerable importance. Measurements of interstitial oxygen following thermal cycles are required for development of semiconductor fabrication processes and for research into the mechanisms of oxygen precipitate nucleation and growth. Efforts by industrial associations have led to the development of standard procedures for the measurement of interstitial oxygen in wafers. However practical oxygen measurements often do not satisfy the requirements of such standard procedures. An additional difficulty arises when the silicon wafer has a low resitivity (high dopant concentration). In such cases the infrared light used for the measurement is severely attenuated by the electrons of holes introduced by the dopant. Since such wafers are the substrates used for the production of widely used epitaxial wafers, this measurement problem is economically important. Alternative methods such as Secondary Ion Mass Spectroscopy or Gas Fusion Analysis have been developed to measure oxygen in these cases. However, neither of these methods is capable of distinguishing interstitial oxygen from precipitated oxygen as required for precipitation studies. In addition to the commercial interest in heavily doped silicon substrates, they are also of interest for research into the role of point defects in nucleation and precipitation processes. Despite considerable research effort, there is still disagreement concerning the type of point defect and its role in semiconductor processes. Studies of changes in the interstitial oxygen concentration of heavily doped and lightly doped silicon wafers could help clarify the role of point defects in oxygen nucleation and precipitation

  14. Explosive phenomena in heavily irradiated NaCl

    NARCIS (Netherlands)

    denHartog, HW; Vainshtein, DI; Matthews, GE; Williams, RT

    1997-01-01

    In heavily irradiated NaCl crystals explosive phenomena can be initiated during irradiation or afterwards when samples are heated to temperatures between 100 and 250 degrees C. During irradiation of NaCl Na and Cl-2 precipitates and void structures are produced along with the accumulation of stored

  15. Growth and characterization of heavily doped silicon crystals

    Energy Technology Data Exchange (ETDEWEB)

    Scala, R.; Porrini, M. [MEMC Electronic Materials SpA, via Nazionale 59, 39012 Merano (Italy); Borionetti, G. [MEMC Electronic Materials SpA, viale Gherzi 31, Novara (Italy)

    2011-08-15

    Silicon crystals grown with the Czochralski method are still the most common material used for the production of electronic devices. In recent years, a growing need of large diameter crystals with increasingly higher doping levels is observed, especially to support the expanding market of discrete devices and its trend towards lower and lower resistivity levels for the silicon substrate. The growth of such heavily doped, large-diameter crystals poses several new challenges to the crystal grower, and the presence of a high dopant concentration in the crystal affects significantly its main properties, requiring also the development of dedicated characterization techniques. This paper illustrates the recent advances in the growth and characterization of silicon crystals heavily doped with antimony, arsenic, phosphorus and boron. (copyright 2011 WILEY-VCH Verlag GmbH and Co. KGaA, Weinheim) (orig.)

  16. A Multimodal Dialog System for Language Assessment: Current State and Future Directions. Research Report. ETS RR-17-21

    Science.gov (United States)

    Suendermann-Oeft, David; Ramanarayanan, Vikram; Yu, Zhou; Qian, Yao; Evanini, Keelan; Lange, Patrick; Wang, Xinhao; Zechner, Klaus

    2017-01-01

    We present work in progress on a multimodal dialog system for English language assessment using a modular cloud-based architecture adhering to open industry standards. Among the modules being developed for the system, multiple modules heavily exploit machine learning techniques, including speech recognition, spoken language proficiency rating,…

  17. The Ethics of Exploitation

    Directory of Open Access Journals (Sweden)

    Paul McLaughlin

    2008-11-01

    Full Text Available Philosophical inquiry into exploitation has two major deficiencies to date: it assumes that exploitation is wrong by definition; and it pays too much attention to the Marxian account of exploitation. Two senses of exploitation should be distinguished: the ‘moral’ or pejorative sense and the ‘non-moral’ or ‘non-prejudicial’ sense. By demonstrating the conceptual inadequacy of exploitation as defined in the first sense, and by defining exploitation adequately in the latter sense, we seek to demonstrate the moral complexity of exploitation. We contend, moreover, that moral evaluation of exploitation is only possible once we abandon a strictly Marxian framework and attempt, in the long run, to develop an integral ethic along Godwinian lines.

  18. Views of Swedish Commissioning Parents Relating to the Exploitation Discourse in Using Transnational Surrogacy

    Science.gov (United States)

    Arvidsson, Anna; Johnsdotter, Sara; Essén, Birgitta

    2015-01-01

    Transnational surrogacy, when people travel abroad for reproduction with the help of a surrogate mother, is a heavily debated phenomenon. One of the most salient discourses on surrogacy is the one affirming that Westerners, in their quest for having a child, exploit poor women in countries such as India. As surrogacy within the Swedish health care system is not permitted, Swedish commissioning parents have used transnational surrogacy, and the majority has turned to India. This interview study aimed to explore how commissioning parents negotiate the present discourses on surrogacy. Findings from the study suggest that the commissioning parents’ views on using surrogacy are influenced by competing discourses on surrogacy represented by media and surrogacy agencies. The use of this reproductive method resulted, then, in some ambiguity. Although commissioning parents defy the exploitation discourse by referring to what they have learnt about the surrogate mother’s life situation and by pointing at the significant benefits for her, they still had a request for regulation of surrogacy in Sweden, to better protect all parties involved. This study, then, gives a complex view on surrogacy, where the commissioning parents simultaneously argue against the exploitation discourse but at the same time are uncertain if the surrogate mothers are well protected in the surrogacy arrangements. Their responses to the situation endorse the need for regulation both in Sweden and India. PMID:25955178

  19. Views of Swedish commissioning parents relating to the exploitation discourse in using transnational surrogacy.

    Science.gov (United States)

    Arvidsson, Anna; Johnsdotter, Sara; Essén, Birgitta

    2015-01-01

    Transnational surrogacy, when people travel abroad for reproduction with the help of a surrogate mother, is a heavily debated phenomenon. One of the most salient discourses on surrogacy is the one affirming that Westerners, in their quest for having a child, exploit poor women in countries such as India. As surrogacy within the Swedish health care system is not permitted, Swedish commissioning parents have used transnational surrogacy, and the majority has turned to India. This interview study aimed to explore how commissioning parents negotiate the present discourses on surrogacy. Findings from the study suggest that the commissioning parents' views on using surrogacy are influenced by competing discourses on surrogacy represented by media and surrogacy agencies. The use of this reproductive method resulted, then, in some ambiguity. Although commissioning parents defy the exploitation discourse by referring to what they have learnt about the surrogate mother's life situation and by pointing at the significant benefits for her, they still had a request for regulation of surrogacy in Sweden, to better protect all parties involved. This study, then, gives a complex view on surrogacy, where the commissioning parents simultaneously argue against the exploitation discourse but at the same time are uncertain if the surrogate mothers are well protected in the surrogacy arrangements. Their responses to the situation endorse the need for regulation both in Sweden and India.

  20. Views of Swedish commissioning parents relating to the exploitation discourse in using transnational surrogacy.

    Directory of Open Access Journals (Sweden)

    Anna Arvidsson

    Full Text Available Transnational surrogacy, when people travel abroad for reproduction with the help of a surrogate mother, is a heavily debated phenomenon. One of the most salient discourses on surrogacy is the one affirming that Westerners, in their quest for having a child, exploit poor women in countries such as India. As surrogacy within the Swedish health care system is not permitted, Swedish commissioning parents have used transnational surrogacy, and the majority has turned to India. This interview study aimed to explore how commissioning parents negotiate the present discourses on surrogacy. Findings from the study suggest that the commissioning parents' views on using surrogacy are influenced by competing discourses on surrogacy represented by media and surrogacy agencies. The use of this reproductive method resulted, then, in some ambiguity. Although commissioning parents defy the exploitation discourse by referring to what they have learnt about the surrogate mother's life situation and by pointing at the significant benefits for her, they still had a request for regulation of surrogacy in Sweden, to better protect all parties involved. This study, then, gives a complex view on surrogacy, where the commissioning parents simultaneously argue against the exploitation discourse but at the same time are uncertain if the surrogate mothers are well protected in the surrogacy arrangements. Their responses to the situation endorse the need for regulation both in Sweden and India.

  1. Preparing organisations for employee-driven open innovation

    Directory of Open Access Journals (Sweden)

    Amundsen, O.

    2014-07-01

    Full Text Available The present study addresses the need to prepare organisations, small or large, for open innovation approaches, including the development of capacity to exploit the potential benefits of such principles through Employee-Driven Innovation (EDI. Based on interviews in 20 Norwegian enterprises, we propose that EDI is an under-explored opportunity in many organisations, and that the systematic introduction of EDI practices increases organisations' ability to exploit open innovation principles and favourably impacts the capacity for innovation. Specifically, EDI results in a more general interest in improvement among employees, increased engagement in innovation processes, and reduced opposition to change.

  2. STRESSES AND DEFORMABILITY OF ROCK MASS UPON OPEN PIT EXPLOITATION OF DIMENSION STONE

    Directory of Open Access Journals (Sweden)

    Siniša Dunda

    2003-12-01

    Full Text Available The appearance of increased stresses and deformability of rock mass in the quarry of Zečevo (exploitation field of Selca – island of Brač has caused a considerable decrease of usability of mineral raw materials, which put into question the survival of the pit. Therefore the research and measurements of the state of stresses and deformability of rock mass within the pit were carried out. Besides detailed laboratory testings (testings on small samples performed were trial in-situ testings on large samples including the corresponding numerical analyses. The exploitation of dimension stone by sowing regularly shaped rectangular blocks has been proved to be appropriate for in-situ testing of bending strength. The paper presents the results of carried out laboratory testings, in-situ testings of bending strength including measuring of deformations after sowing cuts and numerical analyses by which the possible range of horizontal stresses was determined. Since for the case of massive rocks, for which the continuum concept is applied, there are no specifically defined methods of corrections, presented is a possible relation for correction of input size values based on the carried out laboratory and in-situ testings.

  3. Exploitation rates of two benthic resources across management regimes in central Chile: Evidence of illegal fishing in artisanal fisheries operating in open access areas

    Science.gov (United States)

    Andreu-Cazenave, Miguel; Subida, Maria Dulce; Fernandez, Miriam

    2017-01-01

    There is an urgent need to quantify the impacts of artisanal fisheries and define management practices that allow for the recovery and conservation of exploited stocks. The extent of illegal catch is particularly critical as a driver of overexploitation in artisanal fisheries. However, the lack of data at proper spatial scales limits the evaluation of illegal fishing and effectiveness of management practices. We used a catch curve analysis to estimate total instantaneous mortality as a proxy of fishing pressure in the artisanal benthic fishery in central Chile. We compared the patterns of total mortality in fishing grounds under the well-studied territorial use rights for fisheries system (TURF) immersed in a landscape of open access areas (OAA; no access restriction), and from these patterns determined the extent of illegal fishing in open access areas focusing on the two most frequently extracted resources: locos (Concholepas concholepas) and keyhole limpets (Fissurella spp.). The beauty of this seascape is the presence of the no-take (NT) area of Las Cruces as control (no fishing), allowing us to estimate natural mortality. Loco exploitation is banned in OAAs. However, loco mortality in OAAs was 92% higher than in the NT, and 42% higher than in TURFs. Keyhole limpet mortality was similar between TURFs and the NT, but doubled in OAAs. We also found strong differences in mortality among fishing grounds with the same level of protection (i.e. TURFs), and over time. Our results highlight (a) the high level of illegal fishing that may occur in artisanal fisheries under traditional management regimes, and (b) that TURFs can be effective to reduce fishing mortality. However, large variability among TURFs suggests the need for a deeper understanding of the drivers of success of TURFs. PMID:28666013

  4. Exploitation rates of two benthic resources across management regimes in central Chile: Evidence of illegal fishing in artisanal fisheries operating in open access areas.

    Science.gov (United States)

    Andreu-Cazenave, Miguel; Subida, Maria Dulce; Fernandez, Miriam

    2017-01-01

    There is an urgent need to quantify the impacts of artisanal fisheries and define management practices that allow for the recovery and conservation of exploited stocks. The extent of illegal catch is particularly critical as a driver of overexploitation in artisanal fisheries. However, the lack of data at proper spatial scales limits the evaluation of illegal fishing and effectiveness of management practices. We used a catch curve analysis to estimate total instantaneous mortality as a proxy of fishing pressure in the artisanal benthic fishery in central Chile. We compared the patterns of total mortality in fishing grounds under the well-studied territorial use rights for fisheries system (TURF) immersed in a landscape of open access areas (OAA; no access restriction), and from these patterns determined the extent of illegal fishing in open access areas focusing on the two most frequently extracted resources: locos (Concholepas concholepas) and keyhole limpets (Fissurella spp.). The beauty of this seascape is the presence of the no-take (NT) area of Las Cruces as control (no fishing), allowing us to estimate natural mortality. Loco exploitation is banned in OAAs. However, loco mortality in OAAs was 92% higher than in the NT, and 42% higher than in TURFs. Keyhole limpet mortality was similar between TURFs and the NT, but doubled in OAAs. We also found strong differences in mortality among fishing grounds with the same level of protection (i.e. TURFs), and over time. Our results highlight (a) the high level of illegal fishing that may occur in artisanal fisheries under traditional management regimes, and (b) that TURFs can be effective to reduce fishing mortality. However, large variability among TURFs suggests the need for a deeper understanding of the drivers of success of TURFs.

  5. Exploitation rates of two benthic resources across management regimes in central Chile: Evidence of illegal fishing in artisanal fisheries operating in open access areas.

    Directory of Open Access Journals (Sweden)

    Miguel Andreu-Cazenave

    Full Text Available There is an urgent need to quantify the impacts of artisanal fisheries and define management practices that allow for the recovery and conservation of exploited stocks. The extent of illegal catch is particularly critical as a driver of overexploitation in artisanal fisheries. However, the lack of data at proper spatial scales limits the evaluation of illegal fishing and effectiveness of management practices. We used a catch curve analysis to estimate total instantaneous mortality as a proxy of fishing pressure in the artisanal benthic fishery in central Chile. We compared the patterns of total mortality in fishing grounds under the well-studied territorial use rights for fisheries system (TURF immersed in a landscape of open access areas (OAA; no access restriction, and from these patterns determined the extent of illegal fishing in open access areas focusing on the two most frequently extracted resources: locos (Concholepas concholepas and keyhole limpets (Fissurella spp.. The beauty of this seascape is the presence of the no-take (NT area of Las Cruces as control (no fishing, allowing us to estimate natural mortality. Loco exploitation is banned in OAAs. However, loco mortality in OAAs was 92% higher than in the NT, and 42% higher than in TURFs. Keyhole limpet mortality was similar between TURFs and the NT, but doubled in OAAs. We also found strong differences in mortality among fishing grounds with the same level of protection (i.e. TURFs, and over time. Our results highlight (a the high level of illegal fishing that may occur in artisanal fisheries under traditional management regimes, and (b that TURFs can be effective to reduce fishing mortality. However, large variability among TURFs suggests the need for a deeper understanding of the drivers of success of TURFs.

  6. Mission Exploitation Platform PROBA-V

    Science.gov (United States)

    Goor, Erwin

    2016-04-01

    VITO and partners developed an end-to-end solution to drastically improve the exploitation of the PROBA-V EO-data archive (http://proba-v.vgt.vito.be/), the past mission SPOT-VEGETATION and derived vegetation parameters by researchers, service providers and end-users. The analysis of time series of data (+1PB) is addressed, as well as the large scale on-demand processing of near real-time data. From November 2015 an operational Mission Exploitation Platform (MEP) PROBA-V, as an ESA pathfinder project, will be gradually deployed at the VITO data center with direct access to the complete data archive. Several applications will be released to the users, e.g. - A time series viewer, showing the evolution of PROBA-V bands and derived vegetation parameters for any area of interest. - Full-resolution viewing services for the complete data archive. - On-demand processing chains e.g. for the calculation of N-daily composites. - A Virtual Machine will be provided with access to the data archive and tools to work with this data, e.g. various toolboxes and support for R and Python. After an initial release in January 2016, a research platform will gradually be deployed allowing users to design, debug and test applications on the platform. From the MEP PROBA-V, access to Sentinel-2 and landsat data will be addressed as well, e.g. to support the Cal/Val activities of the users. Users can make use of powerful Web based tools and can self-manage virtual machines to perform their work on the infrastructure at VITO with access to the complete data archive. To realise this, private cloud technology (openStack) is used and a distributed processing environment is built based on Hadoop. The Hadoop ecosystem offers a lot of technologies (Spark, Yarn, Accumulo, etc.) which we integrate with several open-source components. The impact of this MEP on the user community will be high and will completely change the way of working with the data and hence open the large time series to a larger

  7. Heavily nitrogen doped, graphene supercapacitor from silk cocoon

    International Nuclear Information System (INIS)

    Sahu, Vikrant; Grover, Sonia; Tulachan, Brindan; Sharma, Meenakshi; Srivastava, Gaurav; Roy, Manas; Saxena, Manav; Sethy, Niroj; Bhargava, Kalpana; Philip, Deepu; Kim, Hansung; Singh, Gurmeet; Singh, Sushil Kumar; Das, Mainak; Sharma, Raj Kishore

    2015-01-01

    Doping of graphene with nitrogen is of much interest, since it improves the overall conductivity and supercapacitive properties. Besides conductivity, nitrogen doping also enhances the pseudo-capacitance due to fast and reversible surface redox processes. In this work, we have developed a cheap and easy process for synthesizing heavily nitrogen doped graphene (15% nitrogen) from non-mulberry silk cocoon membrane (Tassar, Antheraea mylitta) by pyrolyzing the cocoon at 400 °C in argon atmosphere. Further we have investigated the performance of this heavily ‘nitrogen doped graphene’ (NDG) in a supercapacitor device. Our results suggest that NDG obtained from cocoon has improved supercapacitor performance. The improved performance is due to the high electronegativity of nitrogen that forms dipoles on the graphene surface. These dipoles consequently enhance the tendency of graphene to attract charged species to its surface. This is a green and clean synthesis approach for developing electronic materials for energy applications

  8. The Morfeo Open Source Community: Building Technologies of the Future Web through Open Innovation

    OpenAIRE

    Lizcano Casas, David; Jiménez Gañán, Miguel; Soriano Camino, Francisco Javier; Hierro, Juan Jose; Martínez, Andres L.

    2009-01-01

    Nowadays enterprise collaboration is becoming essential for valuable innovation and competitive advantage. This collaboration has to be brought a step forward from technical collaboration till collective smart exploitation of global intelligence. Morfeo Open Source Community implements it as an open innovation schema of collaboration among SME’s, universities, research centres, public administration and major corporations. Its disruptive contribution to the state of the art is to manage the c...

  9. HARVESTING, INTEGRATING AND DISTRIBUTING LARGE OPEN GEOSPATIAL DATASETS USING FREE AND OPEN-SOURCE SOFTWARE

    Directory of Open Access Journals (Sweden)

    R. Oliveira

    2016-06-01

    Full Text Available Federal, State and Local government agencies in the USA are investing heavily on the dissemination of Open Data sets produced by each of them. The main driver behind this thrust is to increase agencies’ transparency and accountability, as well as to improve citizens’ awareness. However, not all Open Data sets are easy to access and integrate with other Open Data sets available even from the same agency. The City and County of Denver Open Data Portal distributes several types of geospatial datasets, one of them is the city parcels information containing 224,256 records. Although this data layer contains many pieces of information it is incomplete for some custom purposes. Open-Source Software were used to first collect data from diverse City of Denver Open Data sets, then upload them to a repository in the Cloud where they were processed using a PostgreSQL installation on the Cloud and Python scripts. Our method was able to extract non-spatial information from a ‘not-ready-to-download’ source that could then be combined with the initial data set to enhance its potential use.

  10. Optical Gaps in Pristine and Heavily Doped Silicon Nanocrystals: DFT versus Quantum Monte Carlo Benchmarks.

    Science.gov (United States)

    Derian, R; Tokár, K; Somogyi, B; Gali, Á; Štich, I

    2017-12-12

    We present a time-dependent density functional theory (TDDFT) study of the optical gaps of light-emitting nanomaterials, namely, pristine and heavily B- and P-codoped silicon crystalline nanoparticles. Twenty DFT exchange-correlation functionals sampled from the best currently available inventory such as hybrids and range-separated hybrids are benchmarked against ultra-accurate quantum Monte Carlo results on small model Si nanocrystals. Overall, the range-separated hybrids are found to perform best. The quality of the DFT gaps is correlated with the deviation from Koopmans' theorem as a possible quality guide. In addition to providing a generic test of the ability of TDDFT to describe optical properties of silicon crystalline nanoparticles, the results also open up a route to benchmark-quality DFT studies of nanoparticle sizes approaching those studied experimentally.

  11. Exploring, exploiting and evolving diversity of aquatic ecosystem models

    DEFF Research Database (Denmark)

    Janssen, Annette B G; Arhonditsis, George B.; Beusen, Arthur

    2015-01-01

    Here, we present a community perspective on how to explore, exploit and evolve the diversity in aquatic ecosystem models. These models play an important role in understanding the functioning of aquatic ecosystems, filling in observation gaps and developing effective strategies for water quality...... management. In this spirit, numerous models have been developed since the 1970s. We set off to explore model diversity by making an inventory among 42 aquatic ecosystem modellers, by categorizing the resulting set of models and by analysing them for diversity. We then focus on how to exploit model diversity...... available through open-source policies, to standardize documentation and technical implementation of models, and to compare models through ensemble modelling and interdisciplinary approaches. We end with our perspective on how the field of aquatic ecosystem modelling might develop in the next 5–10 years...

  12. Operation of heavily irradiated silicon detectors in non-depletion mode

    International Nuclear Information System (INIS)

    Verbitskaya, E.; Eremin, V.; Ilyashenko, I.; Li, Z.; Haerkoenen, J.; Tuovinen, E.; Luukka, P.

    2006-01-01

    The non-depletion detector operation mode has generally been disregarded as an option in high-energy physics experiments. In this paper, the non-depletion operation is examined by detailed analysis of the electric field distribution and the current pulse response of heavily irradiated silicon (Si) detectors. The previously reported model of double junction in heavily irradiated Si detector is further developed and a simulation of the current pulse response has been performed. It is shown that detectors can operate in a non-depletion mode due to the fact that the value of the electric field in a non-depleted region is high enough for efficient carrier drift. This electric field originates from the current flow through the detector and a consequent drop of the potential across high-resistivity bulk of a non-depleted region. It is anticipated that the electric field in a non-depleted region, which is still electrically neutral, increases with fluence that improves the non-depleted detector operation. Consideration of the electric field in a non-depleted region allows the explanation of the recorded double-peak current pulse shape of heavily irradiated Si detectors and definition of the requirements for the detector operational conditions. Detailed reconstruction of the electric field distribution gives new information on radiation effects in Si detectors

  13. TOOL: The Open Opinion Layer

    OpenAIRE

    Masum, Hassan

    2002-01-01

    Shared opinions drive society: what we read, how we vote, and where we shop are all heavily influenced by the choices of others. However, the cost in time and money to systematically share opinions remains high, while the actual performance history of opinion generators is often not tracked. This article explores the development of a distributed open opinion layer, which is given the generic name of TOOL. Similar to the evolution of network protocols as an underlying layer for many comput...

  14. Hacking the art of exploitation

    CERN Document Server

    Erickson, Jon

    2003-01-01

    A comprehensive introduction to the techniques of exploitation and creative problem-solving methods commonly referred to as "hacking," Hacking: The Art of Exploitation is for both technical and non-technical people who are interested in computer security. It shows how hackers exploit programs and write exploits, instead of just how to run other people's exploits. Unlike many so-called hacking books, this book explains the technical aspects of hacking, including stack based overflows, heap based overflows, string exploits, return-into-libc, shellcode, and cryptographic attacks on 802.11b.

  15. Exploiting first-class arrays in Fortran for accelerator programming

    International Nuclear Information System (INIS)

    Rasmussen, Craig E.; Weseloh, Wayne N.; Robey, Robert W.; Sottile, Matthew J.; Quinlan, Daniel; Overbey, Jeffrey

    2010-01-01

    Emerging architectures for high performance computing often are well suited to a data parallel programming model. This paper presents a simple programming methodology based on existing languages and compiler tools that allows programmers to take advantage of these systems. We will work with the array features of Fortran 90 to show how this infrequently exploited, standardized language feature is easily transformed to lower level accelerator code. Our transformations are based on a mapping from Fortran 90 to C++ code with OpenCL extensions. The sheer complexity of programming for clusters of many or multi-core processors with tens of millions threads of execution make the simplicity of the data parallel model attractive. Furthermore, the increasing complexity of todays applications (especially when convolved with the increasing complexity of the hardware) and the need for portability across hardware architectures make a higher-level and simpler programming model like data parallel attractive. The goal of this work has been to exploit source-to-source transformations that allow programmers to develop and maintain programs at a high-level of abstraction, without coding to a specific hardware architecture. Furthermore these transformations allow multiple hardware architectures to be targeted without changing the high-level source. It also removes the necessity for application programmers to understand details of the accelerator architecture or to know OpenCL.

  16. Exploitation of Labour and Exploitation of Commodities: a “New Interpretation”

    OpenAIRE

    Veneziani, Roberto; Yoshihara, Naoki

    2011-01-01

    In the standard Okishio-Morishima approach, the existence of profits is proved to be equivalent to the exploitation of labour. Yet, it can also be proved that the existence of profits is equivalent to the ‘exploitation’ of any good. Labour and commodity exploitation are just different numerical representations of the productiveness of the economy. This paper presents an alternative approach to exploitation theory which is related to the New Interpretation (Duménil 1980; Foley 1982). In this a...

  17. Remote Excavation of Heavily Contaminated UXO Sites. The Range Master

    National Research Council Canada - National Science Library

    Crandall, Alan L

    2007-01-01

    USA Environmental, Inc., and Timberline Environmental Services, Inc., developed the Range Master, a remote controlled scraper with an integrated power screen, to excavate and sift the top 12 inches of heavily contaminated UXO sites...

  18. Electrochemical Decontamination of Painted and Heavily Corroded Metals

    International Nuclear Information System (INIS)

    Marczak, S.; Anderson, J.; Dziewinski, J.

    1998-01-01

    The radioactive metal wastes that are generated from nuclear fuel plants and radiochemical laboratories are mainly contaminated by the surface deposition of radioactive isotopes. There are presently several techniques used in removing surface contamination involving physical and chemical processes. However, there has been very little research done in the area of soiled, heavily oxidized, and painted metals. Researchers at Los Alamos National Laboratory have been developing electrochemical procedures for the decontamination of bare and painted metal objects. These methods have been found to be effective on highly corroded as well as relatively new metals. This study has been successful in decontaminating projectiles and shrapnel excavated during environmental restoration projects after 40+ years of exposure to the elements. Heavily corroded augers used in sampling activities throughout the area were also successfully decontaminated. This process has demonstrated its effectiveness and offers several advantages over the present metal decontamination practices of media blasting and chemical solvents. These advantages include the addition of no toxic or hazardous chemicals, low operating temperature and pressure, and easily scaleable equipment. It is in their future plans to use this process in the decontamination of gloveboxes destined for disposal as TRU waste

  19. Exploitation and disadvantage

    NARCIS (Netherlands)

    Ferguson, B.

    2016-01-01

    According to some accounts of exploitation, most notably Ruth Sample's (2003) degradation-based account and Robert Goodin's (1987) vulnerability-based account, exploitation occurs when an advantaged party fails to constrain their advantage in light of another's disadvantage, regardless of the cause

  20. Open Data for Territorial Specialization Assessment Territorial Specialization in Attracting Local Development Funds: an Assessment. Procedure Based on Open Data and Open Tools

    Directory of Open Access Journals (Sweden)

    Giuseppe Las Casas

    2014-05-01

    Full Text Available The New Cohesion Policy opens to an integrated place-based approach for the improvement of territorial and social cohesion. The issue of territorial impact assessment of regional development policies highlight that data availability, open access to datasets in “near real-time”, participation, knowledge sharing, assumed importance within the development planning process. The contribution of ‘open data’ appears to be mature and in this paper we present an application of spatial analysis techniques for the evaluation of spatial effects of EU funds starting form open data by open-coesione. The application regards an internal areas of Basilicata Region: the Agri Valley. A complex contests in which an environmental and agricultural traditional vocation conflicts with a recent development of oil extraction industries. Conclusions regard further applications and perspectives for improving and supporting regional development planning considering the exploitation of open data sources and spatial analysis.

  1. Learning Metasploit exploitation and development

    CERN Document Server

    Balapure, Aditya

    2013-01-01

    A practical, hands-on tutorial with step-by-step instructions. The book will follow a smooth and easy-to-follow tutorial approach, covering the essentials and then showing the readers how to write more sophisticated exploits.This book targets exploit developers, vulnerability analysts and researchers, network administrators, and ethical hackers looking to gain advanced knowledge in exploitation development and identifying vulnerabilities. The primary goal is to take readers wishing to get into more advanced exploitation discovery and reaching the next level.Prior experience exploiting basic st

  2. Anthropology of sexual exploitation

    Directory of Open Access Journals (Sweden)

    Lalić Velibor

    2009-01-01

    Full Text Available In this paper, the authors observe sexual exploitation from an anthropological perspective. They analyze the rational, ethical, emotional and mythological dimensions of human sexuality. Consequently, after setting the phenomenon in a social and historical context, sexual exploitation is closely observed in the contemporary age. Based on thoughts of relevant thinkers, they make the conclusion that the elimination of sexual exploitation is not an utterly legal issue, but political and economical issues as well. Namely, legal norms are not sufficient to overcome sexual exploitation, but, political and economical relationships in contemporary societies, which will be based on sincere equal opportunities must be established.

  3. The exploitation argument against commercial surrogacy.

    Science.gov (United States)

    Wilkinson, Stephen

    2003-04-01

    This paper discusses the exploitation argument against commercial surrogacy: the claim that commercial surrogacy is morally objectionable because it is exploitative. The following questions are addressed. First, what exactly does the exploitation argument amount to? Second, is commercial surrogacy in fact exploitative? Third, if it were exploitative, would this provide a sufficient reason to prohibit (or otherwise legislatively discourage) it? The focus throughout is on the exploitation of paid surrogates, although it is noted that other parties (e.g. 'commissioning parents') may also be the victims of exploitation. It is argued that there are good reasons for believing that commercial surrogacy is often exploitative. However, even if we accept this, the exploitation argument for prohibiting (or otherwise legislatively discouraging) commercial surrogacy remains quite weak. One reason for this is that prohibition may well 'backfire' and lead to potential surrogates having to do other things that are more exploitative and/or more harmful than paid surrogacy. It is concluded therefore that those who oppose exploitation should (rather than attempting to stop particular practices like commercial surrogacy) concentrate on: (a) improving the conditions under which paid surrogates 'work'; and (b) changing the background conditions (in particular, the unequal distribution of power and wealth) which generate exploitative relationships.

  4. Intelligence, mapping, and geospatial exploitation system (IMAGES)

    Science.gov (United States)

    Moellman, Dennis E.; Cain, Joel M.

    1998-08-01

    This paper provides further detail to one facet of the battlespace visualization concept described in last year's paper Battlespace Situation Awareness for Force XXI. It focuses on the National Imagery and Mapping Agency (NIMA) goal to 'provide customers seamless access to tailorable imagery, imagery intelligence, and geospatial information.' This paper describes Intelligence, Mapping, and Geospatial Exploitation System (IMAGES), an exploitation element capable of CONUS baseplant operations or field deployment to provide NIMA geospatial information collaboratively into a reconnaissance, surveillance, and target acquisition (RSTA) environment through the United States Imagery and Geospatial Information System (USIGS). In a baseplant CONUS setting IMAGES could be used to produce foundation data to support mission planning. In the field it could be directly associated with a tactical sensor receiver or ground station (e.g. UAV or UGV) to provide near real-time and mission specific RSTA to support mission execution. This paper provides IMAGES functional level design; describes the technologies, their interactions and interdependencies; and presents a notional operational scenario to illustrate the system flexibility. Using as a system backbone an intelligent software agent technology, called Open Agent ArchitectureTM (OAATM), IMAGES combines multimodal data entry, natural language understanding, and perceptual and evidential reasoning for system management. Configured to be DII COE compliant, it would utilize, to the extent possible, COTS applications software for data management, processing, fusion, exploitation, and reporting. It would also be modular, scaleable, and reconfigurable. This paper describes how the OAATM achieves data synchronization and enables the necessary level of information to be rapidly available to various command echelons for making informed decisions. The reasoning component will provide for the best information to be developed in the timeline

  5. Cloud Based Earth Observation Data Exploitation Platforms

    Science.gov (United States)

    Romeo, A.; Pinto, S.; Loekken, S.; Marin, A.

    2017-12-01

    In the last few years data produced daily by several private and public Earth Observation (EO) satellites reached the order of tens of Terabytes, representing for scientists and commercial application developers both a big opportunity for their exploitation and a challenge for their management. New IT technologies, such as Big Data and cloud computing, enable the creation of web-accessible data exploitation platforms, which offer to scientists and application developers the means to access and use EO data in a quick and cost effective way. RHEA Group is particularly active in this sector, supporting the European Space Agency (ESA) in the Exploitation Platforms (EP) initiative, developing technology to build multi cloud platforms for the processing and analysis of Earth Observation data, and collaborating with larger European initiatives such as the European Plate Observing System (EPOS) and the European Open Science Cloud (EOSC). An EP is a virtual workspace, providing a user community with access to (i) large volume of data, (ii) algorithm development and integration environment, (iii) processing software and services (e.g. toolboxes, visualization routines), (iv) computing resources, (v) collaboration tools (e.g. forums, wiki, etc.). When an EP is dedicated to a specific Theme, it becomes a Thematic Exploitation Platform (TEP). Currently, ESA has seven TEPs in a pre-operational phase dedicated to geo-hazards monitoring and prevention, costal zones, forestry areas, hydrology, polar regions, urban areas and food security. On the technology development side, solutions like the multi cloud EO data processing platform provides the technology to integrate ICT resources and EO data from different vendors in a single platform. In particular it offers (i) Multi-cloud data discovery, (ii) Multi-cloud data management and access and (iii) Multi-cloud application deployment. This platform has been demonstrated with the EGI Federated Cloud, Innovation Platform Testbed Poland

  6. Exploitability Assessment with TEASER

    Science.gov (United States)

    2017-05-01

    for architectural neutral taint analysis on top of LLVM and QEMU. POC Proof of Concept : Demonstration of an exploit on a program . vii RCE Remote Code...bug with a Proof of Concept (POC), or input to a program demonstrating the ability to use a bug to exploit the application, to demonstrate the...often leads to either computationally difficult constraint solving problems or taint explosion. Given the computational difficulty of exploit

  7. A Multiprogramming Aware OpenMP Implementation

    Directory of Open Access Journals (Sweden)

    Vasileios K. Barekas

    2003-01-01

    Full Text Available In this work, we present an OpenMP implementation suitable for multiprogrammed environments on Intel-based SMP systems. This implementation consists of a runtime system and a resource manager, while we use the NanosCompiler to transform OpenMP-coded applications into code with calls to our runtime system. The resource manager acts as the operating system scheduler for the applications built with our runtime system. It executes a custom made scheduling policy to distribute the available physical processors to the active applications. The runtime system cooperates with the resource manager in order to adapt each application's generated parallelism to the number of processors allocated to it, according to the resource manager scheduling policy. We use the OpenMP version of the NAS Parallel Benchmark suite in order to evaluate the performance of our implementation. In our experiments we compare the performance of our implementation with that of a commercial OpenMP implementation. The comparison proves that our approach performs better both on a dedicated and on a heavily multiprogrammed environment.

  8. Two questions about surrogacy and exploitation.

    Science.gov (United States)

    Wertheimer, Alan

    1992-01-01

    In this article I will consider two related questions about surrogacy and exploitation: (1) Is surrogacy exploitative? (2) If surrogacy is exploitative, what is the moral force of this exploitation? Briefly stated, I shall argue that whether surrogacy is exploitative depends on whether exploitation must be harmful to the exploited party or whether (as I think) there can be mutually advantageous exploitation. It also depends on some facts about surrogacy about which we have little reliable evidence and on our philosophical view on what counts as a harm to the surrogate. Our answer to the second question will turn in part on the account of exploitation we invoke in answering the first question and in part on the way in which we resolve some other questions about the justification of state interference. I shall suggest, however, that if surrogacy is a form of voluntary and mutually advantageous exploitation, then there is a strong presumption that surrogacy contracts should be permitted and even enforceable, although that presumption may be overridden on other grounds.

  9. Opening the Dissertation: Overcoming Cultural Calcification and Agoraphobia

    Directory of Open Access Journals (Sweden)

    Denise Troll Covey

    2013-11-01

    Full Text Available This article places the struggle to open access to the dissertation in the context of the crisis in doctoral education and the transition from print to digital literacy. It explores the underlying cultural calcification and agoraphobia that deter engagement with openness. Solving the problems will require overhauling the curriculum and conventions of doctoral education. Opening access to dissertations is an important first step, but insufficient to end the crisis. Only opening other dimensions of the dissertation – the structure, media, notion of authorship, and methods of assessment – can foster the digital literacy needed to save PhD programs from extinction. If higher education institutions invested heavily in remedying obsolete practices, the remedies would reverberate throughout the academy, accelerate advancement in the disciplines, and revolutionize scholarly publishing. The article ends with a discussion of the significant role librarians could play in facilitating needed changes given appropriate institutional commitment.

  10. Exploit Kit traffic analysis

    OpenAIRE

    Καπίρης, Σταμάτης; Kapiris, Stamatis

    2017-01-01

    Exploit kits have become one of the most widespread and destructive threat that Internet users face on a daily basis. Since the first actor, which has been categorized as exploit kit, namely MPack, appeared in 2006, we have seen a new era on exploit kit variants compromising popular websites, infecting hosts and delivering destructive malware, following an exponentially evolvement to date. With the growing threat landscape, large enterprises to domestic networks, have starte...

  11. Assessing gear modifications needed to optimize yields in a heavily exploited, multi-species, seagrass and coral reef fishery.

    Science.gov (United States)

    Hicks, Christina C; McClanahan, Timothy R

    2012-01-01

    Effective management is necessary if small-scale fisheries, such as those found in mixed habitats including seagrass and coral reefs, are to continue providing food for many of the poorest communities of the world. Gear-based management, although under represented and under studied, has the potential to be adaptive, address multiple objectives, and be crafted to the socio-economic setting. Management effectiveness in seagrass and coral reef fisheries has generally been evaluated at the scale of the fish community. However, community level indicators can mask species-specific declines that provide significant portions of the fisheries yields and income. Using a unique dataset, containing ten years of species level length frequency catch data from a multi-gear, multi-species seagrass and coral reef fishery in Kenya, we evaluate species specific fishery statuses, compare gear use to gear regulations and estimate the potential needs for further gear restrictions. Despite the high diversity of the fishery, fifteen species represented over 90% of the catch, and only three species represented 60% of the catch. The three most abundant species in the catch, Lethrinus lentjan (Lacepède), Siganus sutor (Valenciennes) and Leptoscarus vaigiensis (Quoy & Gaimard) all showed evidence of growth overfishing. Lethrinus lentjan, with an exploitation rate of 0.82, also shows evidence of recruitment overfishing. Current legal but weakly enforced gear restrictions are capable of protecting a significant portion of the catch up to maturity but optimization of yield will require that the current mesh size be increased from 6.3 to 8.8 and 9.2 cm to increase yields of L. lentjan and S. sutor, respectively. Given the difficulties of enforcing mesh size, we recommend that the economic benefits of these larger mesh sizes be communicated and enforced through co-management. This abstract is also available in Kiswahili (Abstract S1).

  12. Assessing gear modifications needed to optimize yields in a heavily exploited, multi-species, seagrass and coral reef fishery.

    Directory of Open Access Journals (Sweden)

    Christina C Hicks

    Full Text Available Effective management is necessary if small-scale fisheries, such as those found in mixed habitats including seagrass and coral reefs, are to continue providing food for many of the poorest communities of the world. Gear-based management, although under represented and under studied, has the potential to be adaptive, address multiple objectives, and be crafted to the socio-economic setting. Management effectiveness in seagrass and coral reef fisheries has generally been evaluated at the scale of the fish community. However, community level indicators can mask species-specific declines that provide significant portions of the fisheries yields and income. Using a unique dataset, containing ten years of species level length frequency catch data from a multi-gear, multi-species seagrass and coral reef fishery in Kenya, we evaluate species specific fishery statuses, compare gear use to gear regulations and estimate the potential needs for further gear restrictions. Despite the high diversity of the fishery, fifteen species represented over 90% of the catch, and only three species represented 60% of the catch. The three most abundant species in the catch, Lethrinus lentjan (Lacepède, Siganus sutor (Valenciennes and Leptoscarus vaigiensis (Quoy & Gaimard all showed evidence of growth overfishing. Lethrinus lentjan, with an exploitation rate of 0.82, also shows evidence of recruitment overfishing. Current legal but weakly enforced gear restrictions are capable of protecting a significant portion of the catch up to maturity but optimization of yield will require that the current mesh size be increased from 6.3 to 8.8 and 9.2 cm to increase yields of L. lentjan and S. sutor, respectively. Given the difficulties of enforcing mesh size, we recommend that the economic benefits of these larger mesh sizes be communicated and enforced through co-management. This abstract is also available in Kiswahili (Abstract S1.

  13. Positron trapping in heavily irradiated semiconductors

    International Nuclear Information System (INIS)

    Moser, P.; Pautrat, J.L.; Corbel, C.; Hautojarvi, P.

    1985-01-01

    Vacancy processes are studied in several heavily irradiated semiconductors. Specimens are ZnTe, CdTe, CdTe (In), InP, InP (Cr), InP (Zn) and Ge. Irradiations are made at 20 K using a 3 MeV Van de Graaff electron accelerator. Doses are 4 x 10 18 e - /cm 2 . Lifetime measurements are made at 77 K at each step of an isochronal annealing (30 min 20 K). In each specimen, the results show a significant increase of the lifetime (+ 30 at + 50 ps) which anneals out in different steps restoring the initial lifetime. The steps are sharp (ΔT/T=0.3) with the exception of InP, InP(Cr), InP(Zn), (ΔT/T=0.9). Tentative interpretations are given

  14. Energy for lunar resource exploitation

    Science.gov (United States)

    Glaser, Peter E.

    1992-02-01

    Humanity stands at the threshold of exploiting the known lunar resources that have opened up with the access to space. America's role in the future exploitation of space, and specifically of lunar resources, may well determine the level of achievement in technology development and global economic competition. Space activities during the coming decades will significantly influence the events on Earth. The 'shifting of history's tectonic plates' is a process that will be hastened by the increasingly insistent demands for higher living standards of the exponentially growing global population. Key to the achievement of a peaceful world in the 21st century, will be the development of a mix of energy resources at a societally acceptable and affordable cost within a realistic planning horizon. This must be the theme for the globally applicable energy sources that are compatible with the Earth's ecology. It is in this context that lunar resources development should be a primary goal for science missions to the Moon, and for establishing an expanding human presence. The economic viability and commercial business potential of mining, extracting, manufacturing, and transporting lunar resource based materials to Earth, Earth orbits, and to undertake macroengineering projects on the Moon remains to be demonstrated. These extensive activities will be supportive of the realization of the potential of space energy sources for use on Earth. These may include generating electricity for use on Earth based on beaming power from Earth orbits and from the Moon to the Earth, and for the production of helium 3 as a fuel for advanced fusion reactors.

  15. Controlling open quantum systems: tools, achievements, and limitations

    International Nuclear Information System (INIS)

    Koch, Christiane P

    2016-01-01

    The advent of quantum devices, which exploit the two essential elements of quantum physics, coherence and entanglement, has sparked renewed interest in the control of open quantum systems. Successful implementations face the challenge of preserving relevant nonclassical features at the level of device operation. A major obstacle is decoherence, which is caused by interaction with the environment. Optimal control theory is a tool that can be used to identify control strategies in the presence of decoherence. Here we review recent advances in optimal control methodology that allow typical tasks in device operation for open quantum systems to be tackled and discuss examples of relaxation-optimized dynamics. Optimal control theory is also a useful tool to exploit the environment for control. We discuss examples and point out possible future extensions. (topical review)

  16. Near-infrared free carrier absorption in heavily doped silicon

    International Nuclear Information System (INIS)

    Baker-Finch, Simeon C.; McIntosh, Keith R.; Yan, Di; Fong, Kean Chern; Kho, Teng C.

    2014-01-01

    Free carrier absorption in heavily doped silicon can have a significant impact on devices operating in the infrared. In the near infrared, the free carrier absorption process can compete with band to band absorption processes, thereby reducing the number of available photons to optoelectronic devices such as solar cells. In this work, we fabricate 18 heavily doped regions by phosphorus and boron diffusion into planar polished silicon wafers; the simple sample structure facilitates accurate and precise measurement of the free carrier absorptance. We measure and model reflectance and transmittance dispersion to arrive at a parameterisation for the free carrier absorption coefficient that applies in the wavelength range between 1000 and 1500 nm, and the range of dopant densities between ∼10 18 and 3 × 10 20  cm −3 . Our measurements indicate that previously published parameterisations underestimate the free carrier absorptance in phosphorus diffusions. On the other hand, published parameterisations are generally consistent with our measurements and model for boron diffusions. Our new model is the first to be assigned uncertainty and is well-suited to routine device analysis

  17. A new measure of interpersonal exploitativeness

    Directory of Open Access Journals (Sweden)

    Amy B. Brunell

    2013-05-01

    Full Text Available Measures of exploitativeness evidence problems with validity and reliability. The present set of studies assessed a new measure (the Interpersonal Exploitativeness Scale that defines exploitativeness in terms of reciprocity. In Studies 1 and 2, 33 items were administered to participants. Exploratory and Confirmatory Factor Analysis demonstrated that a single factor consisting of six items adequately assess interpersonal exploitativeness. Study 3 results revealed that the Interpersonal Exploitativeness Scale was positively associated with normal narcissism, pathological narcissism, psychological entitlement, and negative reciprocity and negatively correlated with positive reciprocity. In Study 4, participants competed in a commons dilemma. Those who scored higher on the Interpersonal Exploitativeness Scale were more likely to harvest a greater share of resources over time, even while controlling for other relevant variables, such as entitlement. Together, these studies show the Interpersonal Exploitativeness Scale to be a valid and reliable measure of interpersonal exploitativeness. The authors discuss the implications of these studies.

  18. Exploiting on-node heterogeneity for in-situ analytics of climate simulations via a functional partitioning framework

    Science.gov (United States)

    Sapra, Karan; Gupta, Saurabh; Atchley, Scott; Anantharaj, Valentine; Miller, Ross; Vazhkudai, Sudharshan

    2016-04-01

    Efficient resource utilization is critical for improved end-to-end computing and workflow of scientific applications. Heterogeneous node architectures, such as the GPU-enabled Titan supercomputer at the Oak Ridge Leadership Computing Facility (OLCF), present us with further challenges. In many HPC applications on Titan, the accelerators are the primary compute engines while the CPUs orchestrate the offloading of work onto the accelerators, and moving the output back to the main memory. On the other hand, applications that do not exploit GPUs, the CPU usage is dominant while the GPUs idle. We utilized Heterogenous Functional Partitioning (HFP) runtime framework that can optimize usage of resources on a compute node to expedite an application's end-to-end workflow. This approach is different from existing techniques for in-situ analyses in that it provides a framework for on-the-fly analysis on-node by dynamically exploiting under-utilized resources therein. We have implemented in the Community Earth System Model (CESM) a new concurrent diagnostic processing capability enabled by the HFP framework. Various single variate statistics, such as means and distributions, are computed in-situ by launching HFP tasks on the GPU via the node local HFP daemon. Since our current configuration of CESM does not use GPU resources heavily, we can move these tasks to GPU using the HFP framework. Each rank running the atmospheric model in CESM pushes the variables of of interest via HFP function calls to the HFP daemon. This node local daemon is responsible for receiving the data from main program and launching the designated analytics tasks on the GPU. We have implemented these analytics tasks in C and use OpenACC directives to enable GPU acceleration. This methodology is also advantageous while executing GPU-enabled configurations of CESM when the CPUs will be idle during portions of the runtime. In our implementation results, we demonstrate that it is more efficient to use HFP

  19. L’iniziativa OpenDataNetwork, OpenData senza confini

    Directory of Open Access Journals (Sweden)

    Simone Giannechini

    2013-12-01

    Full Text Available In the last few years, the Open Data movement has made a significant impact on the IT world by bringing the att ention to an unexploited value represented by the tremendous amount of data that was kept hidden behind the gates of the existing infrastructures, both in public administrations and in private companies. This value can be declined in many ways depending on the perspective of the observer since unprecedented possibilities to correlate different sources of data to mine hidden trends and patt erns, can all at a sudden provide innovative ways to evaluate and monitor events and real life situation.After the initial period of the widespread adoption of the Open Data principles, we are now experimenting a situation where the amount of data available as Open Data is becoming overwhelming as such the need for some kind of coordinationeffort between different Open Data infrastructures is needed in order to make the data easier to browse and to exploit. This is the goal of the Open Data Network initiative. The Open Data Network initiative aim at bringing together a certain number ofItalian Public Administration with the goal of creating a standard infrastructure based on Open Source components suitable for the dissemination of data as Open Data. Moreover it aims at creating a network between each partner's node in order to ease the life of the end user as he will be allowed to access a central hub where all the information will be harvested, rather than having to deal with each single partner's infrastructure.

  20. Knowledge related activities in open innovation

    DEFF Research Database (Denmark)

    Pedrosa, Alex; Välling, Margus; Boyd, Britta

    2013-01-01

    interaction in open innovation. Despite valuable insights into the importance of the variety of external knowledge sources to enhance (open) innovation, research has overlooked so far that managers’ characteristics and practices are relevant for the absorption of external knowledge in open innovation. Thus......Theory and practice both have recognised the importance of external knowledge to enhance organisations’ innovation performance. Due to organisations’ growing interest in effectively collaborating with external knowledge sources, research has investigated the importance of firm-external stakeholder......, the purpose of this study is to explore how organisations’ absorptive capacity – exploration, transformation, and exploitation – becomes manifested in managers’ characteristics and practices in open innovation. This article reports on the findings obtained from four case studies of manufacturing and service...

  1. EXPLOITATION OF GRANITE BOULDER

    Directory of Open Access Journals (Sweden)

    Ivan Cotman

    1994-12-01

    Full Text Available The processes of forming, petrography, features, properties and exploitation of granite boulders are described. The directional drilling and black powder blasting is the succesful method in exploitation of granite boulders (boulder technology (the paper is published in Croatian.

  2. Addition of sunitinib to cetuximab and irinotecan in patients with heavily pre-treated advanced colorectal cancer

    DEFF Research Database (Denmark)

    Qvortrup, Camilla; Jensen, Benny Vittrup; Jørgensen, Trine Lembrecht

    2010-01-01

    Results of continuous sunitinib, in combination with cetuximab and irinotecan every other week (SIC) for compassionate use in heavily pre-treated patients with mCRC are presented.......Results of continuous sunitinib, in combination with cetuximab and irinotecan every other week (SIC) for compassionate use in heavily pre-treated patients with mCRC are presented....

  3. Gemcitabine and capecitabine for heavily pre-treated metastatic colorectal cancer patients

    DEFF Research Database (Denmark)

    Spindler, Karen-Lise G; Pallisgaard, Niels; Andersen, Rikke F

    2014-01-01

    AIM: We investigated the efficacy and safety of capecitabine and gemcitabin (GemCap) in heavily pre-treated, therapy-resistant metastatic colorectal cancer (mCRC) patients and the clinical importance of cell-free DNA (cfDNA) measurement. PATIENTS AND METHODS: Patients' inclusion criteria included...

  4. COGEMA: Geological exploitation and supervision concerning the open pits of the Herault Division

    International Nuclear Information System (INIS)

    Delorme, D.

    1989-01-01

    Cogema mines since 1974 near Lodeve (Herault) the uranium deposits located in the eastern part of the Permian basin of Lodeve. These mining operations are carried out open cast and underground by the Herault Mining Division. The methods used for mining the deposit underground at Mas Lavayre in the most important uranium mine of Western Europe were previously described. The object of the present article is to describe the methods applied to mine the deposits by open cast working, for which it is essential in view of the complex geometry of the mineralizations to have a high-quality geological supervision to ensure a good selective recovery of the ore. 9 figs., 9 refs [fr

  5. Exploiting VM/XA

    International Nuclear Information System (INIS)

    Boeheim, C.

    1990-03-01

    The Stanford Linear Accelerator Center has recently completed a conversion to IBM's VM/XA SP Release 2 operating system. The primary physics application had been constrained by the previous 16 megabyte memory limit. Work is underway to enable this application to exploit the new features of VM/XA. This paper presents a brief tutorial on how to convert an application to exploit VM/XA and discusses some of the SLAC experiences in doing so. 13 figs

  6. Exploiting communication concurrency on high performance computing systems

    Energy Technology Data Exchange (ETDEWEB)

    Chaimov, Nicholas [Univ. of Oregon, Eugene, OR (United States); Ibrahim, Khaled Z. [Lawrence Berkeley National Lab. (LBNL), Berkeley, CA (United States); Williams, Samuel [Lawrence Berkeley National Lab. (LBNL), Berkeley, CA (United States); Iancu, Costin [Lawrence Berkeley National Lab. (LBNL), Berkeley, CA (United States)

    2015-01-01

    Although logically available, applications may not exploit enough instantaneous communication concurrency to maximize hardware utilization on HPC systems. This is exacerbated in hybrid programming models such as SPMD+OpenMP. We present the design of a "multi-threaded" runtime able to transparently increase the instantaneous network concurrency and to provide near saturation bandwidth, independent of the application configuration and dynamic behavior. The runtime forwards communication requests from application level tasks to multiple communication servers. Our techniques alleviate the need for spatial and temporal application level message concurrency optimizations. Experimental results show improved message throughput and bandwidth by as much as 150% for 4KB bytes messages on InfiniBand and by as much as 120% for 4KB byte messages on Cray Aries. For more complex operations such as all-to-all collectives, we observe as much as 30% speedup. This translates into 23% speedup on 12,288 cores for a NAS FT implemented using FFTW. We also observe as much as 76% speedup on 1,500 cores for an already optimized UPC+OpenMP geometric multigrid application using hybrid parallelism.

  7. ‘Closed Open Innovation’ or ‘Openly Closed Innovation’ – Which way is for world-first innovations?

    DEFF Research Database (Denmark)

    Li-Ying, Jason

    2014-01-01

    outcome measures. Therefore, the aim of this paper is to fill in this research gap in both theory and empirics. My typology is theoretically based on the Schumpeterian innovation types (Mark I and Mark II) on the one hand and the rich literature on firms’ external knowledge searching on the other hand....... The Closed Open Innovation refers to those innovations that are internally developed but draw heavily on external scientific/technical knowledge. The Openly Closed Innovation refers to those innovations that are externally developed but meanwhile draw mainly on internal scientific/technical knowledge....... The dataset used in this study is the Canadian Technological Innovation Dataset, which was obtained from a population survey for 1635 major industrial innovations in Canada during the period from 1945 to 1980. Based on a binary logistic regression model, the results show that totally closed innovation modes...

  8. Proba-V Mission Exploitation Platform

    Science.gov (United States)

    Goor, E.

    2017-12-01

    VITO and partners developed the Proba-V Mission Exploitation Platform (MEP) as an end-to-end solution to drastically improve the exploitation of the Proba-V (an EC Copernicus contributing mission) EO-data archive, the past mission SPOT-VEGETATION and derived vegetation parameters by researchers, service providers (e.g. the EC Copernicus Global Land Service) and end-users. The analysis of time series of data (PB range) is addressed, as well as the large scale on-demand processing of near real-time data on a powerful and scalable processing environment. New features are still developed, but the platform is yet fully operational since November 2016 and offers A time series viewer (browser web client and API), showing the evolution of Proba-V bands and derived vegetation parameters for any country, region, pixel or polygon defined by the user. Full-resolution viewing services for the complete data archive. On-demand processing chains on a powerfull Hadoop/Spark backend. Virtual Machines can be requested by users with access to the complete data archive mentioned above and pre-configured tools to work with this data, e.g. various toolboxes and support for R and Python. This allows users to immediately work with the data without having to install tools or download data, but as well to design, debug and test applications on the platform. Jupyter Notebooks is available with some examples python and R projects worked out to show the potential of the data. Today the platform is already used by several international third party projects to perform R&D activities on the data, and to develop/host data analysis toolboxes. From the Proba-V MEP, access to other data sources such as Sentinel-2 and landsat data is also addressed. Selected components of the MEP are also deployed on public cloud infrastructures in various R&D projects. Users can make use of powerful Web based tools and can self-manage virtual machines to perform their work on the infrastructure at VITO with access to

  9. The economics of exploiting gas hydrates

    International Nuclear Information System (INIS)

    Döpke, Lena-Katharina; Requate, Till

    2014-01-01

    We investigate the optimal exploitation of methane hydrates, a recent discovery of methane resources under the sea floor, mainly located along the continental margins. Combustion of methane (releasing CO2) and leakage through blow-outs (releasing CH4) contribute to the accumulation of greenhouse gases. A second externality arises since removing solid gas hydrates from the sea bottom destabilizes continental margins and thus increases the risk of marine earthquakes. We show that in such a model three regimes can occur: i) resource exploitation will be stopped in finite time, and some of the resource will stay in situ, ii) the resource will be used up completely in finite time, and iii) the resource will be exhausted in infinite time. We also show how to internalize the externalities by policy instruments. - Highlights: • We set up a model of optimal has hydrate exploitation • We incorporate to types of damages: contribution to global warming and geo-hazards • We characterize optimal exploitation paths and study decentralization with an exploitation tax. • Three regimes can occur: • i) exploitation in finite time and some of the stock remaining in situ, • ii) exploitation in finite time and the resource will be exhausted, • iii) exploitation and exhaustion in infinite time

  10. Balancing Information Analysis and Decision Value: A Model to Exploit the Decision Process

    Science.gov (United States)

    2011-12-01

    technical intelli- gence e.g. signals and sensors (SIGINT and MASINT), imagery (!MINT), as well and human and open source intelligence (HUMINT and OSINT ...Clark 2006). The ability to capture large amounts of da- ta and the plenitude of modem intelligence information sources provides a rich cache of...many tech- niques for managing information collected and derived from these sources , the exploitation of intelligence assets for decision-making

  11. Quantum Oscillator in the Thermostat as a Model in the Thermodynamics of Open Quantum Systems

    OpenAIRE

    Sukhanov, Aleksander

    2005-01-01

    The quantum oscillator in the thermostat is considered as the model of an open quantum system. Our analysis will be heavily founded on the use of the Schroedinger generalized uncertainties relations (SUR). Our first aim is to demonstrate that for the quantum oscillator the state of thermal equilibrium belongs to the correlated coherent states (CCS), which imply the saturation of SUR at any temperature. The obtained results open the perspective for the search of some statistical theory, which ...

  12. Exploitation in International Paid Surrogacy Arrangements

    OpenAIRE

    Wilkinson, Stephen

    2015-01-01

    Abstract Many critics have suggested that international paid surrogacy is exploitative. Taking such concerns as its starting point, this article asks: (1) how defensible is the claim that international paid surrogacy is exploitative and what could be done to make it less exploitative? (2) In the light of the answer to (1), how strong is the case for prohibiting it? Exploitation could in principle be dealt with by improving surrogates' pay and conditions. However, doing so may exacerbate probl...

  13. Custom OpenStreetMap Rendering – OpenTrackMap Experience

    Directory of Open Access Journals (Sweden)

    Radek Bartoň

    2010-02-01

    Full Text Available After 5 years of its existence, the OpenSteetMap [1] is becoming to be an important and valuable source of a geographic data for all people on the world. Although initially targeted to provide a map of cities for routing services, it can be exploited to other and often unexpected purposes. Such an utilization is an effort to map a network of hiking tracks of the Czech Tourist Club [2].  To support and apply this endeavour, the OpenTrackMap [3] project was started. Its aim is to primarily provide a customized rendering style for Mapnik renderer which emphasizes map features important to tourists and displays a layer with hiking tracks. This article presents obstacles which such project must face and it can be used as a tutorial for other projects of similar type.

  14. Profits and Exploitation: A Reappraisal

    OpenAIRE

    Yoshihara, Naoki; Veneziani, Roberto

    2011-01-01

    This paper provides a mathematical analysis of the Marxian theory of the exploitation of labour in general equilibrium models. The two main definitions of Marxian exploitation in the literature, proposed by Morishima (1974) and Roemer (1982), respectively, are analysed in the context of general convex economies. It is shown that, contrary to the received view, in general these definitions do not preserve the so-called Fundamental Marxian Theorem (FMT), which states that the exploitation of la...

  15. Proba-V Mission Exploitation Platform

    Science.gov (United States)

    Goor, Erwin; Dries, Jeroen

    2017-04-01

    VITO and partners developed the Proba-V Mission Exploitation Platform (MEP) as an end-to-end solution to drastically improve the exploitation of the Proba-V (a Copernicus contributing mission) EO-data archive (http://proba-v.vgt.vito.be/), the past mission SPOT-VEGETATION and derived vegetation parameters by researchers, service providers and end-users. The analysis of time series of data (+1PB) is addressed, as well as the large scale on-demand processing of near real-time data on a powerful and scalable processing environment. Furthermore data from the Copernicus Global Land Service is in scope of the platform. From November 2015 an operational Proba-V MEP environment, as an ESA operation service, is gradually deployed at the VITO data center with direct access to the complete data archive. Since autumn 2016 the platform is operational and yet several applications are released to the users, e.g. - A time series viewer, showing the evolution of Proba-V bands and derived vegetation parameters from the Copernicus Global Land Service for any area of interest. - Full-resolution viewing services for the complete data archive. - On-demand processing chains on a powerfull Hadoop/Spark backend e.g. for the calculation of N-daily composites. - Virtual Machines can be provided with access to the data archive and tools to work with this data, e.g. various toolboxes (GDAL, QGIS, GrassGIS, SNAP toolbox, …) and support for R and Python. This allows users to immediately work with the data without having to install tools or download data, but as well to design, debug and test applications on the platform. - A prototype of jupyter Notebooks is available with some examples worked out to show the potential of the data. Today the platform is used by several third party projects to perform R&D activities on the data, and to develop/host data analysis toolboxes. In parallel the platform is further improved and extended. From the MEP PROBA-V, access to Sentinel-2 and landsat data will

  16. Conditions of Antonin seam exploitation in the open pit Druzba near Sokolov with regard to the protection of thermal and mineral water resources in Karlovy Vary

    International Nuclear Information System (INIS)

    Grmela, A.; Sterba, J.

    1997-01-01

    From new structural-tectonic findings concerning the extent and character of the Nove Sedlo fault in the area of the Druzba open pit in the Sokolov Basin, it is evident that it is a form of listric fault of shallow range, ending in an intermediate slip. This finding has a decisive relevance for deciding as to the current placement of the pit in the protection zone of Karlovy Vary's thermal springs. For the purposes of the exploitation of the Antonin seam, it is necessary to create a network of multipurpose bore holes at the bottom of the pit and in front of the working face for the regulation of pressure in the basal aquifer and to ensure unity of monitoring and its complex evaluation on the basis of numerical modelling of the hydrodynamic state of the basal aquifer and the geotechnical processes of the seam's impermeable bedrock. 4 refs

  17. Organising new business development: Open Innovation at Degussa

    NARCIS (Netherlands)

    Bröring, S.; Herzog, P.

    2008-01-01

    Abstract: Purpose - To analyse different organizational tools of business development used in practice. This analysis seeks to address the question of how an organization can achieve the recurring shift from exploration to exploitation and at the same time manage to balance its open and closed

  18. Redefining Exploitation

    DEFF Research Database (Denmark)

    Agarwala, Rina

    2016-01-01

    This article examines how self-employed workers are organizing in the garments and waste collection industries in India. Although the question of who is profiting from self-employed workers’ labor is complex, the cases outlined in this paper highlight telling instances of how some self......-employed workers are organizing as workers. They are fighting labor exploitation by redefining the concept to include additional exploitation axes (from the state and middle class) and forms (including sexual). In doing so, they are redefining potential solutions, including identities and material benefits, to fit...... their unique needs. By expanding the category of “workers” beyond those defined by a narrow focus on a standard employer-employee relationship, these movements are also fighting exclusion from earlier labor protections by increasing the number of entitled beneficiaries. These struggles provide an important...

  19. Workplace Bullying

    Directory of Open Access Journals (Sweden)

    Devi Akella

    2016-02-01

    Full Text Available Previous research on workplace bullying has narrowed its subjective boundaries by drawing heavily from psychological and social-psychological perspectives. However, workplace bullying can also be understood as an endemic feature of capitalist employment relationship. Labor process theory with its core characteristics of power, control, and exploitation of labor can effectively open and allow further exploration of workplace bullying issues. This article aims to make a contribution by examining workplace bullying from the historical and political contexts of society to conceptualize it as a control tool to sustain the capitalist exploitative regime with empirical support from an ethnographic case study within the health care sector.

  20. Assessing the Validity of Automated Webcrawlers as Data Collection Tools to Investigate Online Child Sexual Exploitation.

    Science.gov (United States)

    Westlake, Bryce; Bouchard, Martin; Frank, Richard

    2017-10-01

    The distribution of child sexual exploitation (CE) material has been aided by the growth of the Internet. The graphic nature and prevalence of the material has made researching and combating difficult. Although used to study online CE distribution, automated data collection tools (e.g., webcrawlers) have yet to be shown effective at targeting only relevant data. Using CE-related image and keyword criteria, we compare networks starting from CE websites to those from similar non-CE sexuality websites and dissimilar sports websites. Our results provide evidence that (a) webcrawlers have the potential to provide valid CE data, if the appropriate criterion is selected; (b) CE distribution is still heavily image-based suggesting images as an effective criterion; (c) CE-seeded networks are more hub-based and differ from non-CE-seeded networks on several website characteristics. Recommendations for improvements to reliable criteria selection are discussed.

  1. Regulatory Framework on Exploration and Exploitation of Croatian Part of Adriatic

    International Nuclear Information System (INIS)

    Mudric, M.

    2015-01-01

    for the publication of the information on major hazard indicators by the Member States, and the Directive 2013/30/EU of the European Parliament and of the Council of 12 June 2013 on safety of offshore oil and gas operations and amending Directive 2004/35/EC. The General Framework (Plan and Program) of Exploration and Exploitation of Hydrocarbons in the Adriatic envisages 29 exploration fields, and 10 companies have recently been granted a license to initiate the exploration of 10 exploration fields. In accordance with the Act on exploration and exploitation of hydrocarbons, the duration of exploitation cycle is set to 25 years, with the possibility of further extension. In addition, two Croatian maritime ports opened for international trade (the Port of Ploce and the Port of Rijeka) have been centered out as the potential logistics ports for the planned offshore activities. (author).

  2. "A Tale of Two Programs": Interrogating "Open(closed)ness" and "Cultural Diversity" through Critical Observations of Two Japanese University English Language Programs

    Science.gov (United States)

    Toh, Glenn

    2015-01-01

    Japan is known to be a country that manicures its socio-cultural borders. In this article I will examine discourses regarding openness, closedness and cultural diversity in relation to policies and practices that draw heavily on mythologies of English language as an inroad to greater openness and diversity. To do this I will examine two English…

  3. Open Access Publishing - Strengths and Strategies

    Science.gov (United States)

    Rasmussen, Martin

    2010-05-01

    The journal crisis and the demand for free accessibility to the results of publicly funded research were the main drivers of the Open Access movement since the late 1990's. Besides many academic institutions that support the different ways of Open Access publishing, there is a growing number of publishing houses that are specialized on this new access and business model of scholarly literature. The lecture provides an overview of the different kinds of Open Access publishing, discusses the variety of underlying business models, names the advantages and potentials for researches and the public, and overcomes some objections against Open Access. Besides the increased visibility and information supply, the topic of copyrights and exploitation rights will be discussed. Furthermore, it is a central aim of the presentation to show that Open Access does not only support full peer-review, but also provides the potential for even enhanced quality assurance. The financing of business models based on open accessible literature is another important part to be outlined in the lecture.

  4. Exploration, Exploitation, and Organizational Coordination Mechanisms

    Directory of Open Access Journals (Sweden)

    Silvio Popadiuk

    2016-03-01

    Full Text Available This paper presents an empirical relationship among exploration, exploitation, and organizational coordination mechanisms, classified as the centralization of decision-making, formalization, and connectedness. In order to analyze the findings of this survey, we used two techniques: Principal Component Analysis (PCA and Partial Least Squares Path Modeling (PLS-PM. Our analysis was supported by 249 answers from managers of companies located in Brazil (convenience sampling. Contrary to expectations, centralization and exploitation were negatively associated. Our data supports the research hypothesis that formalization is positively associated with exploitation. Although the relationship between formalization and exploration were significant, the result is contrary to the research hypothesis that we made. The relationships among connectedness and exploitation, and connectedness and exploration were both positive and significant. This relationship means that the more connectedness increases, the higher the likelihood of exploitation and exploration.

  5. NuSTAR observations of heavily obscured quasars at z ~ 0.5

    DEFF Research Database (Denmark)

    Lansbury, G. B.; Alexander, D. M.; Del Moro, A.

    2014-01-01

    We present NuSTAR hard X-ray observations of three Type 2 quasars at z ≈ 0.4-0.5, optically selected from the Sloan Digital Sky Survey. Although the quasars show evidence for being heavily obscured, Compton-thick systems on the basis of the 2-10 keV to [O III] luminosity ratio and multiwavelength...

  6. Exploiting the Poor

    DEFF Research Database (Denmark)

    Kamp Justesen, Mogens; Bjørnskov, Christian

    2014-01-01

    While extant research has focused on the causes and consequences of corruption at the macro-level, less effort has been devoted to understanding the micro-foundation of corruption. We argue that poor people are more likely to be victims of corrupt behavior by street-level bureaucrats as the poor...... often rely heavily on services provided by governments. We test this proposition using micro-level survey data from the Afrobaromenter. Multilevel regressions across 18 countries show that poor people are much more prone to experience having to pay bribes to government officials....

  7. Targeting multiple heterogeneous hardware platforms with OpenCL

    Science.gov (United States)

    Fox, Paul A.; Kozacik, Stephen T.; Humphrey, John R.; Paolini, Aaron; Kuller, Aryeh; Kelmelis, Eric J.

    2014-06-01

    The OpenCL API allows for the abstract expression of parallel, heterogeneous computing, but hardware implementations have substantial implementation differences. The abstractions provided by the OpenCL API are often insufficiently high-level to conceal differences in hardware architecture. Additionally, implementations often do not take advantage of potential performance gains from certain features due to hardware limitations and other factors. These factors make it challenging to produce code that is portable in practice, resulting in much OpenCL code being duplicated for each hardware platform being targeted. This duplication of effort offsets the principal advantage of OpenCL: portability. The use of certain coding practices can mitigate this problem, allowing a common code base to be adapted to perform well across a wide range of hardware platforms. To this end, we explore some general practices for producing performant code that are effective across platforms. Additionally, we explore some ways of modularizing code to enable optional optimizations that take advantage of hardware-specific characteristics. The minimum requirement for portability implies avoiding the use of OpenCL features that are optional, not widely implemented, poorly implemented, or missing in major implementations. Exposing multiple levels of parallelism allows hardware to take advantage of the types of parallelism it supports, from the task level down to explicit vector operations. Static optimizations and branch elimination in device code help the platform compiler to effectively optimize programs. Modularization of some code is important to allow operations to be chosen for performance on target hardware. Optional subroutines exploiting explicit memory locality allow for different memory hierarchies to be exploited for maximum performance. The C preprocessor and JIT compilation using the OpenCL runtime can be used to enable some of these techniques, as well as to factor in hardware

  8. Conditions required for opening of a commercial mineral deposit

    International Nuclear Information System (INIS)

    Shastry, S.

    1991-01-01

    It has been observed that once a mineral deposit is discovered and ore reserves are estimation, it is presumed that the deposit is commercially exploitable. Estimation of ore reserves, alone is not sufficient to consider a deposit exploitable. There are many more investigation necessary to make a deposit commercially mineable. Data regarding rock characteristics, behaviour of the ore body, hydrological conditions, extraction properties of ore, disposal of mine water and waste rock and suitable sites for mill tailings disposal, are required to be collected for assessing the opening of a new deposit. In this paper all these conditions are discussed

  9. Organ sales: exploitative at any price?

    Science.gov (United States)

    Lawlor, Rob

    2014-05-01

    In many cases, claims that a transaction is exploitative will focus on the details of the transaction, such as the price paid or conditions. For example, in a claim that a worker is exploited, the grounds for the claim are usually that the pay is not sufficient or the working conditions too dangerous. In some cases, however, the claim that a transaction is exploitative is not seen to rely on these finer details. Many, for example, claim that organ sales would be exploitative, in a way that doesn't seem to depend on the details. This article considers, but ultimately rejects, a number of arguments which could be used to defend this sort of claim. © 2012 John Wiley & Sons Ltd.

  10. Functional MR imaging on an open 1T MR imaging system: exploiting the advantages of an open MR imaging system for functional MR imaging

    NARCIS (Netherlands)

    van de Giessen, E.; Groot, P. F. C.; Booij, J.; van den Brink, W.; Veltman, D. J.; Nederveen, A. J.

    2011-01-01

    Open MR imaging scanners are designed for imaging of specific patient groups that cannot be routinely scanned with conventional MR imaging scanners (eg, patients with obesity and claustrophobia). This study aims to determine whether BOLD sensitivity on an open 1T scanner is adequate for fMRI for

  11. Herbivory eliminates fitness costs of mutualism exploiters.

    Science.gov (United States)

    Simonsen, Anna K; Stinchcombe, John R

    2014-04-01

    A common empirical observation in mutualistic interactions is the persistence of variation in partner quality and, in particular, the persistence of exploitative phenotypes. For mutualisms between hosts and symbionts, most mutualism theory assumes that exploiters always impose fitness costs on their host. We exposed legume hosts to mutualistic (nitrogen-fixing) and exploitative (non-nitrogen-fixing) symbiotic rhizobia in field conditions, and manipulated the presence or absence of insect herbivory to determine if the costly fitness effects of exploitative rhizobia are context-dependent. Exploitative rhizobia predictably reduced host fitness when herbivores were excluded. However, insects caused greater damage on hosts associating with mutualistic rhizobia, as a consequence of feeding preferences related to leaf nitrogen content, resulting in the elimination of fitness costs imposed on hosts by exploitative rhizobia. Our experiment shows that herbivory is potentially an important factor in influencing the evolutionary dynamic between legumes and rhizobia. Partner choice and host sanctioning are theoretically predicted to stabilize mutualisms by reducing the frequency of exploitative symbionts. We argue that herbivore pressure may actually weaken selection on choice and sanction mechanisms, thus providing one explanation of why host-based discrimination mechanisms may not be completely effective in eliminating nonbeneficial partners. © 2014 The Authors. New Phytologist © 2014 New Phytologist Trust.

  12. ANALYSIS OF ANDROID VULNERABILITIES AND MODERN EXPLOITATION TECHNIQUES

    Directory of Open Access Journals (Sweden)

    Himanshu Shewale

    2014-03-01

    Full Text Available Android is an operating system based on the Linux kernel. It is the most widely used and popular operating system among Smartphones and portable devices. Its programmable and open nature attracts attackers to take undue advantage. Android platform allows developers to freely access and modify source code. But at the same time it increases the security issue. A user is likely to download and install malicious applications written by software hackers. This paper focuses on understanding and analyzing the vulnerabilities present in android platform. In this paper firstly we study the android architecture; analyze the existing threats and security weaknesses. Then we identify various exploit mitigation techniques to mitigate known vulnerabilities. A detailed analysis will help us to identify the existing loopholes and it will give strategic direction to make android operating system more secure.

  13. Conductivity and superconductivity in heavily vacant diamond

    Directory of Open Access Journals (Sweden)

    S A Jafari

    2009-08-01

    Full Text Available   Motivated by the idea of impurity band superconductivity in heavily Boron doped diamond, we investigate the doping of various elements into diamond to address the question, which impurity band can offer a better DOS at the Fermi level. Surprisingly, we find that the vacancy does the best job in producing the largest DOS at the Fermi surface. To investigate the effect of disorder in Anderson localization of the resulting impurity band, we use a simple tight-binding model. Our preliminary study based on the kernel polynomial method shows that the impurity band is already localized at the concentration of 10-3. Around the vacancy concentration of 0.006 the whole spectrum of diamond becomes localized and quantum percolation takes place. Therefore to achieve conducting bands at concentrations on the scale of 5-10 percent, one needs to introduce correlations such as hopping among the vacancies .

  14. Dissemination and Exploitation Strategy

    DEFF Research Database (Denmark)

    Badger, Merete; Monaco, Lucio; Fransson, Torsten

    of Technology in Sweden, Politecnico di Torino in Italy, and Eindhoven University of Technology in the Netherlands. The project is partially funded by the European Commission under the 7th Framework Programme (project no. RI-283746). This report describes the final dissemination and exploitation strategy...... for project Virtual Campus Hub. A preliminary dissemination and exploitation plan was setup early in the project as described in the deliverable D6.1 Dissemination strategy paper - preliminary version. The plan has been revised on a monthly basis during the project’s lifecycle in connection with the virtual...

  15. Open-source tools for data mining.

    Science.gov (United States)

    Zupan, Blaz; Demsar, Janez

    2008-03-01

    With a growing volume of biomedical databases and repositories, the need to develop a set of tools to address their analysis and support knowledge discovery is becoming acute. The data mining community has developed a substantial set of techniques for computational treatment of these data. In this article, we discuss the evolution of open-source toolboxes that data mining researchers and enthusiasts have developed over the span of a few decades and review several currently available open-source data mining suites. The approaches we review are diverse in data mining methods and user interfaces and also demonstrate that the field and its tools are ready to be fully exploited in biomedical research.

  16. Exploitative and Deceptive Resource Acquisition Strategies

    Directory of Open Access Journals (Sweden)

    Joshua J. Reynolds

    2015-07-01

    Full Text Available Life history strategy (LHS and life history contingencies (LHCs should theoretically influence the use of exploitative and deceptive resource acquisition strategies. However, little research has been done in this area. The purpose of the present work was to create measures of exploitative strategies and test the predictions of life history theory. Pilot studies developed and validated a behavioral measure of cheating called the Dot Game. The role of individual LHS and LHCs (manipulated via validated story primes on cheating was investigated in Study 1. Studies 2a through 2c were conducted to develop and validate a self-report measure called the Exploitative and Deceptive Resource Acquisition Strategy Scale (EDRASS. Finally, Study 3 investigated life history and EDRASS. Results indicated that while LHS influences exploitative strategies, life history contingences had little effect. Implications of these findings are discussed.

  17. Trajectories and cycles of sexual exploitation and trafficking for sexual exploitation of women in the Peruvian Amazon

    OpenAIRE

    Mujica, Jaris

    2015-01-01

    The commercial sexual exploitation is a constant activity in the Peruvian Amazon. Around the river port of Pucallpa in ucayali region, the practice appears systematically: teenage attend taverns around the port, and those dedicated to the work of cooking camps logging, are victims of constant exploitation and many also of trafficking. this article aims to reconstruct the path of life and reproductive cycle of the forms of exploitation in a sample of 20 women, and focuses on: (i) evidence of s...

  18. The HACMS program: using formal methods to eliminate exploitable bugs.

    Science.gov (United States)

    Fisher, Kathleen; Launchbury, John; Richards, Raymond

    2017-10-13

    For decades, formal methods have offered the promise of verified software that does not have exploitable bugs. Until recently, however, it has not been possible to verify software of sufficient complexity to be useful. Recently, that situation has changed. SeL4 is an open-source operating system microkernel efficient enough to be used in a wide range of practical applications. Its designers proved it to be fully functionally correct, ensuring the absence of buffer overflows, null pointer exceptions, use-after-free errors, etc., and guaranteeing integrity and confidentiality. The CompCert Verifying C Compiler maps source C programs to provably equivalent assembly language, ensuring the absence of exploitable bugs in the compiler. A number of factors have enabled this revolution, including faster processors, increased automation, more extensive infrastructure, specialized logics and the decision to co-develop code and correctness proofs rather than verify existing artefacts. In this paper, we explore the promise and limitations of current formal-methods techniques. We discuss these issues in the context of DARPA's HACMS program, which had as its goal the creation of high-assurance software for vehicles, including quadcopters, helicopters and automobiles.This article is part of the themed issue 'Verified trustworthy software systems'. © 2017 The Authors.

  19. The HACMS program: using formal methods to eliminate exploitable bugs

    Science.gov (United States)

    Launchbury, John; Richards, Raymond

    2017-01-01

    For decades, formal methods have offered the promise of verified software that does not have exploitable bugs. Until recently, however, it has not been possible to verify software of sufficient complexity to be useful. Recently, that situation has changed. SeL4 is an open-source operating system microkernel efficient enough to be used in a wide range of practical applications. Its designers proved it to be fully functionally correct, ensuring the absence of buffer overflows, null pointer exceptions, use-after-free errors, etc., and guaranteeing integrity and confidentiality. The CompCert Verifying C Compiler maps source C programs to provably equivalent assembly language, ensuring the absence of exploitable bugs in the compiler. A number of factors have enabled this revolution, including faster processors, increased automation, more extensive infrastructure, specialized logics and the decision to co-develop code and correctness proofs rather than verify existing artefacts. In this paper, we explore the promise and limitations of current formal-methods techniques. We discuss these issues in the context of DARPA’s HACMS program, which had as its goal the creation of high-assurance software for vehicles, including quadcopters, helicopters and automobiles. This article is part of the themed issue ‘Verified trustworthy software systems’. PMID:28871050

  20. Yield strength of a heavily drawn Cu-20% Nb filamentary microcomposite

    International Nuclear Information System (INIS)

    Hong, S.I.

    1998-01-01

    It has been well documented that heavily-drawn, copper-niobium microcomposites possess high strength and high conductivity. Since niobium has little solubility in copper, the conductivity of the copper is not strongly affected by the addition of niobium. Following extensive mechanical deformation of Cu-Nb, niobium dendrites transform into fine niobium ribbons as a result of the niobium texture upon drawing. This nanostructure contributes to the ultrahigh strength of Cu-Nb microcomposites. The strength of heavily deformed Cu-Nb exceeds that predicted by the rule-of-mixtures (ROM), and a fundamental understanding of the strengthening mechanisms involved has been the subject of much discussion. Spitzig and his coworkers suggests a barrier strengthening model while Funkenbusch and Courtney believe that stored dislocations have a role in substructural hardening. Hangen and Raabe recently proposed an analytical model for the calculation of the yield strength of Cu-Nb microcomposite. The model of Hangen and Raabe and that of Spitzig and his coworkers have a great deal of resemblance since both models attribute the strength to the difficulty of propagating plastic flow through the interface. The purpose of this study was to enhance the understanding of the strengthening mechanisms associated with Cu-Nb microcomposites by examining the previous studies on mechanical and microstructural stability of Cu-based microcomposites

  1. Answer selection in a multi-stream open domain question answering system

    NARCIS (Netherlands)

    Jijkoun, V.; de Rijke, M.; McDonald, S.; Tait, J.

    2004-01-01

    Question answering systems aim to meet users' information needs by returning exact answers in response to a question. Traditional open domain question answering systems are built around a single pipeline architecture. In an attempt to exploit multiple resources as well as multiple answering

  2. Exploitation in International Paid Surrogacy Arrangements.

    Science.gov (United States)

    Wilkinson, Stephen

    2016-05-01

    Many critics have suggested that international paid surrogacy is exploitative. Taking such concerns as its starting point, this article asks: (1) how defensible is the claim that international paid surrogacy is exploitative and what could be done to make it less exploitative? (2) In the light of the answer to (1), how strong is the case for prohibiting it? Exploitation could in principle be dealt with by improving surrogates' pay and conditions. However, doing so may exacerbate problems with consent. Foremost amongst these is the argument that surrogates from economically disadvantaged countries cannot validly consent because their background circumstances are coercive. Several versions of this argument are examined and I conclude that at least one has some merit. The article's overall conclusion is that while ethically there is something to be concerned about, paid surrogacy is in no worse a position than many other exploitative commercial transactions which take place against a backdrop of global inequality and constrained options, such as poorly-paid and dangerous construction work. Hence, there is little reason to single surrogacy out for special condemnation. On a policy level, the case for prohibiting international commercial surrogacy is weak, despite legitimate concerns about consent and background poverty.

  3. Exploitation in International Paid Surrogacy Arrangements

    Science.gov (United States)

    Wilkinson, Stephen

    2015-01-01

    Abstract Many critics have suggested that international paid surrogacy is exploitative. Taking such concerns as its starting point, this article asks: (1) how defensible is the claim that international paid surrogacy is exploitative and what could be done to make it less exploitative? (2) In the light of the answer to (1), how strong is the case for prohibiting it? Exploitation could in principle be dealt with by improving surrogates' pay and conditions. However, doing so may exacerbate problems with consent. Foremost amongst these is the argument that surrogates from economically disadvantaged countries cannot validly consent because their background circumstances are coercive. Several versions of this argument are examined and I conclude that at least one has some merit. The article's overall conclusion is that while ethically there is something to be concerned about, paid surrogacy is in no worse a position than many other exploitative commercial transactions which take place against a backdrop of global inequality and constrained options, such as poorly‐paid and dangerous construction work. Hence, there is little reason to single surrogacy out for special condemnation. On a policy level, the case for prohibiting international commercial surrogacy is weak, despite legitimate concerns about consent and background poverty. PMID:27471338

  4. AFM of metallic nano-particles and nano-structures in heavily irradiated NaCl

    NARCIS (Netherlands)

    Gaynutdinov, R; Vainshtein, DI; Hak, SJ; Tolstikhina, A; Den Hartog, HW

    2003-01-01

    AFM investigations are reported for heavily, electron irradiated NaCl crystals in ultra high vacuum (UHV) in the non-contact mode-with an UHV AFM/STM Omicron system. To avoid chemical reactions between the radiolytic Na and oxygen and water, the irradiated samples were cleaved and prepared for the

  5. Tracking with heavily irradiated silicon detectors operated at cryogenic temperatures

    International Nuclear Information System (INIS)

    Casagrande, L.; Barnett, B.M.; Bartalina, P.

    1999-01-01

    In this work, the authors show that a heavily irradiated double-sided silicon microstrip detector recovers its performance when operated at cryogenic temperatures. A DELPHI microstrip detector, irradiated to a fluence of ∼4 x 10 14 p/cm 2 , no longer operational at room temperature, cannot be distinguished from a non-irradiated one when operated at T < 120 K. Besides confirming the previously observed Lazarus effect in single diodes, these results establish, for the first time, the possibility of using standard silicon detectors for tracking applications in extremely demanding radiation environments

  6. Theoretical investigation of the heavily-doped semiconductor aspect of ultra-dilute GaAsN

    Science.gov (United States)

    Sukpitak, Jessada; Sa-yakanit, Virulh

    2015-12-01

    The model of GaAs1- y N y ( y = 0.001) as a heavily-doped semiconductor in the ultra-dilute region is attentively examined. The model enables GaAsN to be viewed as a disordered assembly of three-dimensional quantum dots (potential wells) caused by random potential fluctuations from nitrogen pairs in the system. Consequently, Feynman's path-integration technique is applied in order to quantify the density of states (DOS) in the vicinity of the conduction band edge. The obtained DOS tail, even though overestimated, still clearly shows a much shorter tail than that the experimental result does. This shows that the heavily-doped semiconductor viewpoint is not proper for GaAsN, not even in the ultra-dilute region. Furthermore, this also suggests that the impurity wave function overlap is not a basic mechanism of band gap reduction.

  7. Population genetics of four heavily exploited shark species around the Arabian Peninsula

    KAUST Repository

    Spaet, Julia L.Y.; Jabado, Rima W.; Henderson, Aaron C.; Moore, Alec B. M.; Berumen, Michael L.

    2015-01-01

    The northwestern Indian Ocean harbors a number of larger marine vertebrate taxa that warrant the investigation of genetic population structure given remarkable spatial heterogeneity in biological characteristics such as distribution, behavior

  8. Exploitation and exploration dynamics in recessionary times

    OpenAIRE

    Walrave, B.

    2012-01-01

    Firm performance largely depends on the ability to adapt to, and exploit, changes in the business environment. That is, firms should maintain ecological fitness by reconfiguring their resource base to cope with emerging threats and explore new opportunities, while at the same time exploiting existing resources. As such, firms possessing the ability to simultaneously perform exploitative and explorative initiatives are more resilient. In this respect, the performance implications of balancing ...

  9. OpenMP Issues Arising in the Development of Parallel BLAS and LAPACK Libraries

    Directory of Open Access Journals (Sweden)

    C. Addison

    2003-01-01

    Full Text Available Dense linear algebra libraries need to cope efficiently with a range of input problem sizes and shapes. Inherently this means that parallel implementations have to exploit parallelism wherever it is present. While OpenMP allows relatively fine grain parallelism to be exploited in a shared memory environment it currently lacks features to make it easy to partition computation over multiple array indices or to overlap sequential and parallel computations. The inherent flexible nature of shared memory paradigms such as OpenMP poses other difficulties when it becomes necessary to optimise performance across successive parallel library calls. Notions borrowed from distributed memory paradigms, such as explicit data distributions help address some of these problems, but the focus on data rather than work distribution appears misplaced in an SMP context.

  10. Poverty-Exploitation-Alienation.

    Science.gov (United States)

    Bronfenbrenner, Martin

    1980-01-01

    Illustrates how knowledge derived from the discipline of economics can be used to help shed light on social problems such as poverty, exploitation, and alienation, and can help decision makers form policy to minimize these and similar problems. (DB)

  11. Laboratorial studies on the seepage impact in open-channel flow turbulence

    Energy Technology Data Exchange (ETDEWEB)

    Herrera Granados, Oscar; Kostecki, Stanislaw, E-mail: Oscar.Herrera-Granados@pwr.wroc.pi [Institute of Geotechnics and Hydro-engineering (I-10), Wroclaw University of Technology. Plac Grunwaldzki 9 D-2 p.112. 50-377 Wroclaw (Poland)

    2011-12-22

    In natural streams, the interaction between water in motion and movable beds derives in transport of material. This is a fact that causes several problems for river regulation, above all in streams which were heavily modified by human interferences. Therefore, to find solutions or at least to alleviate the negative effects that sediment transport can bring with is a topic to be researched. The impact of seepage on river sedimentation processes and open-channel flow is important for environmental issues but it is commonly neglected by water specialists. The present contribution presents the output of a series of experimental works where the influence of seepage on the open channel turbulence is analyzed at the laboratory scale. Even though that the magnitude of the groundwater flow is significantly smaller than the magnitude of the open channel flow; the output of the experiments demonstrates that seepage not only modifies the water-sediment interaction as demonstrated Herrera Granados (2008; 2010); but also is affecting the velocity field and turbulence dynamics of the open-channel flow.

  12. Laboratorial studies on the seepage impact in open-channel flow turbulence

    International Nuclear Information System (INIS)

    Herrera Granados, Oscar; Kostecki, Stanislaw

    2011-01-01

    In natural streams, the interaction between water in motion and movable beds derives in transport of material. This is a fact that causes several problems for river regulation, above all in streams which were heavily modified by human interferences. Therefore, to find solutions or at least to alleviate the negative effects that sediment transport can bring with is a topic to be researched. The impact of seepage on river sedimentation processes and open-channel flow is important for environmental issues but it is commonly neglected by water specialists. The present contribution presents the output of a series of experimental works where the influence of seepage on the open channel turbulence is analyzed at the laboratory scale. Even though that the magnitude of the groundwater flow is significantly smaller than the magnitude of the open channel flow; the output of the experiments demonstrates that seepage not only modifies the water-sediment interaction as demonstrated Herrera Granados (2008; 2010); but also is affecting the velocity field and turbulence dynamics of the open-channel flow.

  13. Open Innovation and Business Model: A Brazilian Company Case Study

    Directory of Open Access Journals (Sweden)

    Elzo Alves Aranha

    2015-12-01

    Full Text Available Open Innovation is increasingly being introduced in international and national organizations for the creation of value. Open innovation is a practical tool, requiring new strategies and decisions from managers for the exploitation of innovative activities. The basic question that this study seeks to answer is linked to the practice of open innovation in connection with the open business model geared towards the creation of value in a Brazilian company. This paper aims to present a case study that illustrates how open innovation offers resources to change the open business model in order to create value for the Brazilian company. The case study method of a company in the sector of pharma-chemical products was used. The results indicate that internal sources of knowledge, external sources of knowledge and accentuate working partnerships were adopted by company as strategies to offer resources to change the open business model in order to create value.

  14. Earth observation open science and innovation

    CERN Document Server

    Aubrecht, Christoph

    2018-01-01

    This book is published open access under a CC BY 4.0 license. Over  the  past  decades,  rapid developments in digital and sensing technologies, such  as the Cloud, Web and Internet of Things, have dramatically changed the way we live and work. The digital transformation is revolutionizing our ability to monitor our planet and transforming the  way we access, process and exploit Earth Observation data from satellites. This book reviews these megatrends and their implications for the Earth Observation community as well as the wider data economy. It provides insight into new paradigms of Open Science and Innovation applied to space data, which are characterized by openness, access to large volume of complex data, wide availability of new community tools, new techniques for big data analytics such as Artificial Intelligence, unprecedented level of computing power, and new types of collaboration among researchers, innovators, entrepreneurs and citizen scientists. In addition, this book aims to provide reade...

  15. Survival, growth and reproduction by big-leaf mahogany (Swietenia macrophylla) in open clearing vs. forested conditions in Brazil

    Science.gov (United States)

    James Grogan; Mark Schulze; Jurandir Galvao

    2010-01-01

    Big-leaf mahogany (Swietenia macrophylla) trees are often retained in agricultural fields and pastures for seed and timber production after selective logging and forest clearing in the Brazilian Amazon. At a forest management site in southeast Para´, we censused trees growing scattered across a large open clearing after forest removal and in heavily disturbed forest...

  16. Simulation of coupled geochemical reactions and hydrodynamical processes in porous media - application to CO2 storage and uranium exploitation

    International Nuclear Information System (INIS)

    Lagneau, Vincent

    2013-01-01

    This report is a snapshot after sixteen years of research in the field of reactive transport, since the beginning of my Ph.D. in 1997. The research revolves around two poles: on the one hand the development of the reactive transport code Hytec, on the other hand application of the code in different fields of the Earth Sciences. The first two parts of the report detail several key points from this research work, most of them published or being published, following the dual development/application logic. The last part opens towards interesting future work. Development of a reactive transport code: The first part, mostly numeric analysis, details the main features of the code Hytec, in which I have been heavily involved since I joined the laboratory. The underlying equations of the model are given. The resolution methods rely on a finite volume discretization over a Voronoi mesh for the whole hydrodynamic part (flow, transport, heat). Coupling between chemistry and transport is performed through a sequential iterative scheme. Specific developments are then presented. The feedback of chemistry on transport requires specific coupling treatment to ensure convergence to the correct solution: the effects need to be taken care of within the coupling iterations. Dual porosity simulation can be elegantly simulated by duplicating the chemical nodes. Integrating the simulation of gases have implications on the flow (simultaneous resolution of the pressure and saturation equations), and transport-solver (species in the gas phase independently of the water phase), and finally coupling with chemistry and gas-water equilibrium. Applications The Hytec code is used in various domains of the Earth Sciences, in and out our laboratory notably by the members of the consortium Pole Geochimie Transport (Reactive transport group). The document details two families of applications I have been particularly interested in over these years. The geologic storage of CO 2 is a potential technology

  17. Radiation environmental impact assessment of copper exploitation

    International Nuclear Information System (INIS)

    Fan Guang; Wen Zhijian

    2010-01-01

    The radiation environmental impact of mineral exploitation on the surrounding environment has become a public concern. This paper presents the radiation environmental impact assessment of copper exploitation. Based on the project description and detailed investigations of surrounding environment, systematic radiation environmental impacts have been identified. The environmental impacts are assessed during both construction and operation phase. The environmental protection measures have also been proposed. The related conclusion and measures can play an active role in copper exploitation and environmental protection. (authors)

  18. An X-ray wave theory for heavily distorted crystals. 1

    International Nuclear Information System (INIS)

    Ohkawa, T.; Hashimoto, H.

    1985-01-01

    An X-ray diffraction theory is developed of monochromatic waves having spherical wave front, which is applicable to an interpretation of divergent X-ray diffraction images of crystals containing arbitral types of strain field. The theory is divided into two parts. In part I, Takagi's theory is expanded by introducing amplitude and phase correction functions and a new improved representation for the X-ray diffraction theory is given. In part II dispersion surfaces in heavily distorted crystals are discussed, and in the discussion the resonance shift functions are introduced. These formulations can lead to a complete understanding of the extinction phenomena. (author)

  19. False gold: Safely navigating open access publishing to avoid predatory publishers and journals.

    Science.gov (United States)

    McCann, Terence V; Polacsek, Meg

    2018-04-01

    The aim of this study was to review and discuss predatory open access publishing in the context of nursing and midwifery and develop a set of guidelines that serve as a framework to help clinicians, educators and researchers avoid predatory publishers. Open access publishing is increasingly common across all academic disciplines. However, this publishing model is vulnerable to exploitation by predatory publishers, posing a threat to nursing and midwifery scholarship and practice. Guidelines are needed to help researchers recognize predatory journals and publishers and understand the negative consequences of publishing in them. Discussion paper. A literature search of BioMed Central, CINAHL, MEDLINE with Full Text and PubMed for terms related to predatory publishing, published in the period 2007-2017. Lack of awareness of the risks and pressure to publish in international journals, may result in nursing and midwifery researchers publishing their work in dubious open access journals. Caution should be taken prior to writing and submitting a paper, to avoid predatory publishers. The advantage of open access publishing is that it provides readers with access to peer-reviewed research as soon as it is published online. However, predatory publishers use deceptive methods to exploit open access publishing for their own profit. Clear guidelines are needed to help researchers navigate safely open access publishing. A deeper understanding of the risks of predatory publishing is needed. Clear guidelines should be followed by nursing and midwifery researchers seeking to publish their work in open access journals. © 2017 John Wiley & Sons Ltd.

  20. Open innovation: A preliminary model from the Knowledge-based Theory

    Directory of Open Access Journals (Sweden)

    Rocío González-Sánchez

    2011-04-01

    Full Text Available Purpose: The open innovation paradigm is an alternative and/or complementary way to knowledge management processes in its various stages, questioning the basic assumptions where some of the technological innovation strategies and processes are based on. The new logic of innovation process exploits knowledge dissemination through new innovation communities, on the one hand, and, considers of strategic value the external access to intangible resources. Thus, this approach supposes an alternative view to the traditional close innovation, focused on the exclusive exploitation of value innovations. This paper aims to contribute to building an integrated model of key factors to success in open innovation processes. It is analyzed for the role that certain key knowledge management decisions have on the results of open innovation projects, to facilitate the change process and provide new capacity or skills to do so. Design/methodology/approach: Through the review of theoretical and empirical literature, we show the main variables related to the functioning of open innovation systems, and establish various propositions about the meaning and intensity of such relationships.Findings: The management of open innovation project improves through three external factors: technical leadership based on experience, the intensive use of ICT, which allows a multilateral communication, and the existence of intermediate agents or facilitators with a strong neutral attitude. The results also depend on internal factors: the link function, the search routines, the establishment of incentive systems to encourage proactivity and organizational culture.Originality/value: In the absence of full proposals to guide effective decision making on both the management of relationships between organizations, as well as factors inherent to each of them, this paper proposes an exploratory model that integrates the key success factors in open innovation processes.

  1. More than Just Openness: Developing and Validating a Measure of Targeted Parent-Child Communication about Alcohol

    OpenAIRE

    Miller-Day, Michelle; Kam, Jennifer A.

    2010-01-01

    Research addressing parent-child communication on the topic of alcohol use relies heavily on assessing frequency of discussions and general assessments of openness in parent-child communication, ignoring the complexity of this communication phenomenon. This study adds to the literature by articulating a conceptualization and developing a measurement of parent-child communication—targeted parent-child communication about alcohol—and comparing the efficacy of targeted parent-child communication...

  2. Multi-annual fluctuations in reconstructed historical time-series of a European lobster (Homarus gammarus population disappear at increased exploitation levels.

    Directory of Open Access Journals (Sweden)

    Andreas Sundelöf

    Full Text Available Through the history of ecology, fluctuations of populations have been a dominating topic, and endogenous causes of fluctuations and oscillations have been recognized and studied for more than 80 years. Here we analyzed an historical dataset, covering more than 130 years, of European lobster (Homarus gammarus catches. The data shows periodic fluctuations, which are first dampened and then disappear over time. The disappearance of the periodicity coincided with a substantial increase in fishing effort and the oscillations have not reappeared in the time series. The shifting baseline syndrome has changed our perception of not only the status of the stock, but also the regulating pressures. We describe the transition of a naturally regulated lobster population into a heavily exploited fisheries controlled stock. This is shown by the incorporation of environmental and endogenous processes in generalized additive models, autocorrelation functions and periodicity analyses of time-series.

  3. Open source tools for fluorescent imaging.

    Science.gov (United States)

    Hamilton, Nicholas A

    2012-01-01

    As microscopy becomes increasingly automated and imaging expands in the spatial and time dimensions, quantitative analysis tools for fluorescent imaging are becoming critical to remove both bottlenecks in throughput as well as fully extract and exploit the information contained in the imaging. In recent years there has been a flurry of activity in the development of bio-image analysis tools and methods with the result that there are now many high-quality, well-documented, and well-supported open source bio-image analysis projects with large user bases that cover essentially every aspect from image capture to publication. These open source solutions are now providing a viable alternative to commercial solutions. More importantly, they are forming an interoperable and interconnected network of tools that allow data and analysis methods to be shared between many of the major projects. Just as researchers build on, transmit, and verify knowledge through publication, open source analysis methods and software are creating a foundation that can be built upon, transmitted, and verified. Here we describe many of the major projects, their capabilities, and features. We also give an overview of the current state of open source software for fluorescent microscopy analysis and the many reasons to use and develop open source methods. Copyright © 2012 Elsevier Inc. All rights reserved.

  4. Competing Discourses about Youth Sexual Exploitation in Canadian News Media.

    Science.gov (United States)

    Saewyc, Elizabeth M; Miller, Bonnie B; Rivers, Robert; Matthews, Jennifer; Hilario, Carla; Hirakata, Pam

    2013-10-01

    Media holds the power to create, maintain, or break down stigmatizing attitudes, which affect policies, funding, and services. To understand how Canadian news media depicts the commercial sexual exploitation of children and youth, we examined 835 Canadian newspaper articles from 1989-2008 using a mixed methods critical discourse analysis approach, comparing representations to existing research about sexually exploited youth. Despite research evidence that equal rates of boys and girls experience exploitation, Canadian news media depicted exploited youth predominantly as heterosexual girls, and described them alternately as victims or workers in a trade, often both in the same story. News media mentioned exploiters far less often than victims, and portrayed them almost exclusively as male, most often called 'customers' or 'consumers,' and occasionally 'predators'; in contrast, research has documented the majority of sexually exploited boys report female exploiters. Few news stories over the past two decades portrayed the diversity of victims, perpetrators, and venues of exploitation reported in research. The focus on victims but not exploiters helps perpetuate stereotypes of sexual exploitation as business or a 'victimless crime,' maintains the status quo, and blurs responsibility for protecting youth under the UN Convention on the Rights of the Child. Health care providers and researchers can be advocates for accuracy in media coverage about sexual exploitation; news reporters and editors should focus on exploiters more than victims, draw on existing research evidence to avoid perpetuating stereotypes, and use accurate terms, such as commercial sexual exploitation, rather than terms related to business or trade.

  5. Simulated population responses of common carp to commercial exploitation

    Energy Technology Data Exchange (ETDEWEB)

    Weber, Michael J.; Hennen, Matthew J.; Brown, Michael L.

    2011-12-01

    Common carp Cyprinus carpio is a widespread invasive species that can become highly abundant and impose deleterious ecosystem effects. Thus, aquatic resource managers are interested in controlling common carp populations. Control of invasive common carp populations is difficult, due in part to the inherent uncertainty of how populations respond to exploitation. To understand how common carp populations respond to exploitation, we evaluated common carp population dynamics (recruitment, growth, and mortality) in three natural lakes in eastern South Dakota. Common carp exhibited similar population dynamics across these three systems that were characterized by consistent recruitment (ages 3 to 15 years present), fast growth (K = 0.37 to 0.59), and low mortality (A = 1 to 7%). We then modeled the effects of commercial exploitation on size structure, abundance, and egg production to determine its utility as a management tool to control populations. All three populations responded similarly to exploitation simulations with a 575-mm length restriction, representing commercial gear selectivity. Simulated common carp size structure modestly declined (9 to 37%) in all simulations. Abundance of common carp declined dramatically (28 to 56%) at low levels of exploitation (0 to 20%) but exploitation >40% had little additive effect and populations were only reduced by 49 to 79% despite high exploitation (>90%). Maximum lifetime egg production was reduced from 77 to 89% at a moderate level of exploitation (40%), indicating the potential for recruitment overfishing. Exploitation further reduced common carp size structure, abundance, and egg production when simulations were not size selective. Our results provide insights to how common carp populations may respond to exploitation. Although commercial exploitation may be able to partially control populations, an integrated removal approach that removes all sizes of common carp has a greater chance of controlling population abundance

  6. Managing the Innovators for Exploration and Exploitation

    Directory of Open Access Journals (Sweden)

    C. Annique UN

    2007-09-01

    Full Text Available I analyze how to manage employees to achieve a balance between exploration and exploitation in large established firms. Previous studies suggest that, although firms need to undertake both exploration and exploitation simultaneously, this is difficult either because of the scarcity of resources or because of the incompatibility of these two processes. Proposed solutions have been ambidexterity, punctuated equilibrium or specialization. I suggest another method: managing employees. Specifically, I argue that using the so-called “innovative” system of human resource management practices, consisting of team-based incentive system, team-based job design, and job rotation, enables the firm to undertake exploration and exploitation simultaneously because it provides the psychological safety for people to explore new knowledge to make novel products and develops employees to have the perspective-taking capability that enables the integration of knowledge cross-functionally for efficiency. Using the so-called “traditional” system of human resource management practices, consisting of individual-based incentive system, individual-based job design, and no job rotation, has limited impact on either exploration or exploitation because it does not create the psychological safety for people to explore new knowledge and does not develop the perspective-taking capability needed for exploitation. Moreover, mixing practices from both systems is better than only using the traditional system in achieving exploration or exploitation, but less effective than only using the innovative system as the mix of practices can create inconsistent expectations on employees.

  7. Transnational gestational surrogacy: does it have to be exploitative?

    Science.gov (United States)

    Kirby, Jeffrey

    2014-01-01

    This article explores the controversial practice of transnational gestational surrogacy and poses a provocative question: Does it have to be exploitative? Various existing models of exploitation are considered and a novel exploitation-evaluation heuristic is introduced to assist in the analysis of the potentially exploitative dimensions/elements of complex health-related practices. On the basis of application of the heuristic, I conclude that transnational gestational surrogacy, as currently practiced in low-income country settings (such as rural, western India), is exploitative of surrogate women. Arising out of consideration of the heuristic's exploitation conditions, a set of public education and enabled choice, enhanced protections, and empowerment reforms to transnational gestational surrogacy practice is proposed that, if incorporated into a national regulatory framework and actualized within a low income country, could possibly render such practice nonexploitative.

  8. Spin-adapted open-shell time-dependent density functional theory. II. Theory and pilot application.

    Science.gov (United States)

    Li, Zhendong; Liu, Wenjian; Zhang, Yong; Suo, Bingbing

    2011-04-07

    The excited states of open-shell systems calculated by unrestricted Kohn-Sham-based time-dependent density functional theory (U-TD-DFT) are often heavily spin-contaminated and hence meaningless. This is solved ultimately by the recently proposed spin-adapted time-dependent density functional theory (TD-DFT) (S-TD-DFT) [J. Chem. Phys. 133, 064106 (2010)]. Unlike the standard restricted open-shell Kohn-Sham-based TD-DFT (R-TD-DFT) which can only access the singlet-coupled single excitations, the S-TD-DFT can capture both the singlet- and triplet-coupled single excitations with the same computational effort as the U-TD-DFT. The performances of the three approaches (U-TD-DFT, R-TD-DFT, and S-TD-DFT) are compared for both the spin-conserving and spin-flip excitations of prototypical open-shell systems, the nitrogen (N(2)(+)) and naphthalene (C(10)H(8)(+)) cations. The results show that the S-TD-DFT gives rise to balanced descriptions of excited states of open-shell systems.

  9. Exploitation as the Unequal Exchange of Labour : An Axiomatic Approach

    OpenAIRE

    Yoshihara, Naoki; Veneziani, Roberto

    2009-01-01

    In subsistence economies with general convex technology and rational optimising agents, a new, axiomatic approach is developed, which allows an explicit analysis of the core positive and normative intuitions behind the concept of exploitation. Three main new axioms, called Labour Exploitation in Subsistence Economies , Relational Exploitation , and Feasibility of Non-Exploitation , are presented and it is proved that they uniquely characterise a definition of exploitation conceptually related...

  10. EU Enlargement: Migration flows from Central and Eastern Europe into the Nordic countries - exploiting a natural experiment

    DEFF Research Database (Denmark)

    Pedersen, Peder J.; Pytlikova, Mariola

    In this paper we look at migration flows from 10 Central and Eastern European Countries (CEEC) to 5 Nordic countries over the years 1985 - 2007. We exploit a natural experiment that arose from the fact that while Sweden opened its labour market from the day one of the 2004 EU enlargement......, and Finland and Iceland from year 2006, the other Nordic countries chose a transition period in relation to the "new" EU members. The results based on a differences-in-differences estimator show that the estimated effect of the opening of the Swedish, Finnish and Icelandic labour markets on migration from...... the CEECs that entered the EU in 2004 is not significantly different from zero. However, the effect of the opening of the Swedish and Finnish labour markets in 2007 on migration from the 2007 EU entrants, Bulgaria and Romania, is significantly positive. Further, we are interested in the overall effect...

  11. Overlapping Communication and Computation with OpenMP and MPI

    Directory of Open Access Journals (Sweden)

    Timothy H. Kaiser

    2001-01-01

    Full Text Available Machines comprised of a distributed collection of shared memory or SMP nodes are becoming common for parallel computing. OpenMP can be combined with MPI on many such machines. Motivations for combing OpenMP and MPI are discussed. While OpenMP is typically used for exploiting loop-level parallelism it can also be used to enable coarse grain parallelism, potentially leading to less overhead. We show how coarse grain OpenMP parallelism can also be used to facilitate overlapping MPI communication and computation for stencil-based grid programs such as a program performing Gauss-Seidel iteration with red-black ordering. Spatial subdivision or domain decomposition is used to assign a portion of the grid to each thread. One thread is assigned a null calculation region so it was free to perform communication. Example calculations were run on an IBM SP using both the Kuck & Associates and IBM compilers.

  12. SEXUAL EXPLOITATION AND ABUSE BY UN PEACEKEEPERS ...

    African Journals Online (AJOL)

    Allaiac

    sexual exploitation of children by peacekeepers is particularly insidious. ... sexual exploitation and abuse should involve an understanding of the social .... The charges of sexual misconduct, and the consequent media exposure, have ..... awareness programmes such as video tapes, lectures and training manuals, designed.

  13. Dual Inhibition of EGFR and VEGF in Heavily Pretreated Patients with Metastatic Colorectal Cancer

    DEFF Research Database (Denmark)

    Larsen, Finn Ole; Markussen, Alice; Nielsen, Dorte

    2017-01-01

    : The combination of irinotecan, bevacizumab, and cetuximab/panitumumab is safe and shows a toxicity profile corresponding to what is expected from the agents alone. The results indicate that the combination in the 4th line may result in a high rate of disease control in heavily pretreated patients with metastatic...

  14. Exploitation and exploration dynamics in recessionary times

    NARCIS (Netherlands)

    Walrave, B.

    2012-01-01

    Firm performance largely depends on the ability to adapt to, and exploit, changes in the business environment. That is, firms should maintain ecological fitness by reconfiguring their resource base to cope with emerging threats and explore new opportunities, while at the same time exploiting

  15. Main principles of developing exploitation models of semiconductor devices

    Science.gov (United States)

    Gradoboev, A. V.; Simonova, A. V.

    2018-05-01

    The paper represents primary tasks, solutions of which allow to develop the exploitation modes of semiconductor devices taking into account complex and combined influence of ionizing irradiation and operation factors. The structure of the exploitation model of the semiconductor device is presented, which is based on radiation and reliability models. Furthermore, it was shown that the exploitation model should take into account complex and combine influence of various ionizing irradiation types and operation factors. The algorithm of developing the exploitation model of the semiconductor devices is proposed. The possibility of creating the radiation model of Schottky barrier diode, Schottky field-effect transistor and Gunn diode is shown based on the available experimental data. The basic exploitation model of IR-LEDs based upon double AlGaAs heterostructures is represented. The practical application of the exploitation models will allow to output the electronic products with guaranteed operational properties.

  16. Antecedents and effects of individual absorptive capacity : a micro-foundational perspective on open innovation

    NARCIS (Netherlands)

    Lowik, Sandor; Kraaijenbrink, Jeroen; Groen, Aard J.

    2017-01-01

    Purpose - The paper aims to understand how individuals differ in individual absorptive capacity - their ability to recognize, assimilate, transform and exploit external knowledge. These individual absorptive capacities are a key knowledge management building block for an organization's open

  17. One unit-cell seed layer induced epitaxial growth of heavily nitrogen doped anatase TiO{sub 2} films

    Energy Technology Data Exchange (ETDEWEB)

    Chen, T L; Hirose, Y; Hitosugi, T; Hasegawa, T [Kanagawa Academy of Science and Technology (KAST), Kawasaki 213-0012 (Japan)], E-mail: chen@ksp.or.jp

    2008-03-21

    We present a novel way to obtain heavily nitrogen doped anatase TiO{sub 2} films by using a solid-state nitrogen source. Epitaxial growth of the films was realized by introducing one unit-cell seed layer, which was indicated by reflection high-energy electron diffraction as intensity oscillation. Results of x-ray diffraction and x-ray photoelectron spectroscopy confirmed that the films were in the anatase phase heavily doped with nitrogen of {approx}15 at%. The films obtained exhibited considerable narrowing of the optical bandgap, resulting in an enhancement of absorption in the visible-light region. (fast track communication)

  18. High-temperature ferromagnetism in heavily Fe-doped ferromagnetic semiconductor (Ga,Fe)Sb

    International Nuclear Information System (INIS)

    Tu, Nguyen Thanh; Hai, Pham Nam; Anh, Le Duc; Tanaka, Masaaki

    2016-01-01

    We show high-temperature ferromagnetism in heavily Fe-doped ferromagnetic semiconductor (Ga_1_−_x,Fe_x)Sb (x = 23% and 25%) thin films grown by low-temperature molecular beam epitaxy. Magnetic circular dichroism spectroscopy and anomalous Hall effect measurements indicate intrinsic ferromagnetism of these samples. The Curie temperature reaches 300 K and 340 K for x = 23% and 25%, respectively, which are the highest values reported so far in intrinsic III-V ferromagnetic semiconductors.

  19. Einstein's photoemission emission from heavily-doped quantized structures

    CERN Document Server

    Ghatak, Kamakhya Prasad

    2015-01-01

    This monograph solely investigates the Einstein's Photoemission(EP) from Heavily Doped(HD) Quantized Structures on the basis of newly formulated electron dispersion laws. The materials considered are quantized structures of HD non-linear optical, III-V, II-VI, Ge, Te, Platinum Antimonide, stressed materials, GaP, Gallium Antimonide, II-V, Bismuth Telluride together with various types of HD superlattices and their Quantized counterparts respectively. The EP in HD opto-electronic materials and their nanostructures is studied in the presence of strong light waves and intense electric fields  that control the studies of such quantum effect devices. The suggestions for the experimental determinations of different important physical quantities in HD 2D and 3D materials  and the importance of measurement of band gap in HD optoelectronic materials under intense built-in electric field in nano devices and strong external photo excitation (for measuring   physical properties in the presence of intense light waves w...

  20. Controlling open quantum systems: Tools, achievements, and limitations

    OpenAIRE

    Koch, Christiane P.

    2016-01-01

    The advent of quantum devices, which exploit the two essential elements of quantum physics, coherence and entanglement, has sparked renewed interest in the control of open quantum systems. Successful implementations face the challenge to preserve the relevant nonclassical features at the level of device operation. A major obstacle is decoherence which is caused by interaction with the environment. Optimal control theory is a tool that can be used to identify control strategies in the presence...

  1. Antecedents and effects of individual absorptive capacity : A micro-foundational perspective on open innovation

    NARCIS (Netherlands)

    Löwik, Sandor; Kraaijenbrink, Jeroen; Groen, Aard

    2017-01-01

    Purpose The paper aims to understand how individuals differ in individual absorptive capacity – their ability to recognize, assimilate, transform and exploit external knowledge. These individual absorptive capacities are a key knowledge management building block for an organization’s open innovation

  2. Packaging of Sin Goods - Commitment or Exploitation?

    DEFF Research Database (Denmark)

    Nafziger, Julia

    to such self-control problems, and possibly exploit them, by offering different package sizes. In a competitive market, either one or three (small, medium and large) packages are offered. In contrast to common intuition, the large, and not the small package is a commitment device. The latter serves to exploit...

  3. Transformation of standardized clinical models based on OWL technologies: from CEM to OpenEHR archetypes.

    Science.gov (United States)

    Legaz-García, María del Carmen; Menárguez-Tortosa, Marcos; Fernández-Breis, Jesualdo Tomás; Chute, Christopher G; Tao, Cui

    2015-05-01

    The semantic interoperability of electronic healthcare records (EHRs) systems is a major challenge in the medical informatics area. International initiatives pursue the use of semantically interoperable clinical models, and ontologies have frequently been used in semantic interoperability efforts. The objective of this paper is to propose a generic, ontology-based, flexible approach for supporting the automatic transformation of clinical models, which is illustrated for the transformation of Clinical Element Models (CEMs) into openEHR archetypes. Our transformation method exploits the fact that the information models of the most relevant EHR specifications are available in the Web Ontology Language (OWL). The transformation approach is based on defining mappings between those ontological structures. We propose a way in which CEM entities can be transformed into openEHR by using transformation templates and OWL as common representation formalism. The transformation architecture exploits the reasoning and inferencing capabilities of OWL technologies. We have devised a generic, flexible approach for the transformation of clinical models, implemented for the unidirectional transformation from CEM to openEHR, a series of reusable transformation templates, a proof-of-concept implementation, and a set of openEHR archetypes that validate the methodological approach. We have been able to transform CEM into archetypes in an automatic, flexible, reusable transformation approach that could be extended to other clinical model specifications. We exploit the potential of OWL technologies for supporting the transformation process. We believe that our approach could be useful for international efforts in the area of semantic interoperability of EHR systems. © The Author 2015. Published by Oxford University Press on behalf of the American Medical Informatics Association. All rights reserved. For Permissions, please email: journals.permissions@oup.com.

  4. OPEN INNOVATION – THE GOOD, THE BAD, THE UNCERTAINTIES

    Directory of Open Access Journals (Sweden)

    Eliza Laura CORAS

    2014-06-01

    Full Text Available Given the limited amount of research written about the open innovation practices of companies located in Romania, we consider of high weight the need to stress on the benefits, the barriers and the drawbacks entailed by open innovation projects.. What allures firms to embrace open innovation is their resource deficiency, insufficient abilities to explore and exploit technology, knowledge gaps and financial constraints. The extensive literature written on open innovation subjects highlights the motives, the benefits and the barriers these but the studies focusing on the risks of open partnerships are scarce. This paper draws on theoretical literature and contemporary media accounts, building the argument for a significant impact of open innovation to the current economic background. This paper both explores the motives of firms embarking in collaborative relationships, but also the diversity of risks entailed, raising awareness of this framework of uncertainties. Within the study, our work highlights that open innovation in is impeded by risks related to technology, market place, collaboration among partners, financial sources availability, clients needs, workforce, knowledge and intellectual property rights. By undertaking this study we aim to contribute to the scarce literature on open innovation risks and to shed light on the factors that a firm needs to approach in order to foster a culture for open innovation and, in the same time, to reduce the drawbacks of open innovation.

  5. Self-Assembled Formation of Well-Aligned Cu-Te Nano-Rods on Heavily Cu-Doped ZnTe Thin Films

    Science.gov (United States)

    Liang, Jing; Cheng, Man Kit; Lai, Ying Hoi; Wei, Guanglu; Yang, Sean Derman; Wang, Gan; Ho, Sut Kam; Tam, Kam Weng; Sou, Iam Keong

    2016-11-01

    Cu doping of ZnTe, which is an important semiconductor for various optoelectronic applications, has been successfully achieved previously by several techniques. However, besides its electrical transport characteristics, other physical and chemical properties of heavily Cu-doped ZnTe have not been reported. We found an interesting self-assembled formation of crystalline well-aligned Cu-Te nano-rods near the surface of heavily Cu-doped ZnTe thin films grown via the molecular beam epitaxy technique. A phenomenological growth model is presented based on the observed crystallographic morphology and measured chemical composition of the nano-rods using various imaging and chemical analysis techniques. When substitutional doping reaches its limit, the extra Cu atoms favor an up-migration toward the surface, leading to a one-dimensional surface modulation and formation of Cu-Te nano-rods, which explain unusual observations on the reflection high energy electron diffraction patterns and apparent resistivity of these thin films. This study provides an insight into some unexpected chemical reactions involved in the heavily Cu-doped ZnTe thin films, which may be applied to other material systems that contain a dopant having strong reactivity with the host matrix.

  6. High-temperature ferromagnetism in heavily Fe-doped ferromagnetic semiconductor (Ga,Fe)Sb

    Energy Technology Data Exchange (ETDEWEB)

    Tu, Nguyen Thanh [Department of Electrical Engineering and Information Systems, The University of Tokyo, 7-3-1 Hongo, Bunkyo, Tokyo 113-8656 (Japan); Department of Physics, Ho Chi Minh City University of Pedagogy, 280, An Duong Vuong Street, District 5, Ho Chi Minh City 748242 (Viet Nam); Hai, Pham Nam [Department of Electrical Engineering and Information Systems, The University of Tokyo, 7-3-1 Hongo, Bunkyo, Tokyo 113-8656 (Japan); Department of Physical Electronics, Tokyo Institute of Technology, 2-12-1 Ookayama, Meguro, Tokyo 152-0033 (Japan); Center for Spintronics Research Network (CSRN), The University of Tokyo, 7-3-1 Hongo, Bunkyo-ku, Tokyo 113-8656 (Japan); Anh, Le Duc [Department of Electrical Engineering and Information Systems, The University of Tokyo, 7-3-1 Hongo, Bunkyo, Tokyo 113-8656 (Japan); Tanaka, Masaaki [Department of Electrical Engineering and Information Systems, The University of Tokyo, 7-3-1 Hongo, Bunkyo, Tokyo 113-8656 (Japan); Center for Spintronics Research Network (CSRN), The University of Tokyo, 7-3-1 Hongo, Bunkyo-ku, Tokyo 113-8656 (Japan)

    2016-05-09

    We show high-temperature ferromagnetism in heavily Fe-doped ferromagnetic semiconductor (Ga{sub 1−x},Fe{sub x})Sb (x = 23% and 25%) thin films grown by low-temperature molecular beam epitaxy. Magnetic circular dichroism spectroscopy and anomalous Hall effect measurements indicate intrinsic ferromagnetism of these samples. The Curie temperature reaches 300 K and 340 K for x = 23% and 25%, respectively, which are the highest values reported so far in intrinsic III-V ferromagnetic semiconductors.

  7. A Theory of Exploitative Child Labor

    OpenAIRE

    Carol Ann Rogers; Kenneth A. Swinnerton

    2003-01-01

    Child labor laws should aim to protect children who work, instead of trying to remove children from work. In this paper, we identify an instance when the risk of exploitation lowers the expected bene…t of child labor to the child,and therefore suppresses child labor force participation. Targeted legal intervention that lowers or removes the risk of exploitation raises child participation in the labor market, child welfare, and overall societal welfare. Targeting on child labor more broadly ma...

  8. Rationalising predictors of child sexual exploitation and sex-trading.

    Science.gov (United States)

    Klatt, Thimna; Cavner, Della; Egan, Vincent

    2014-02-01

    Although there is evidence for specific risk factors leading to child sexual exploitation and prostitution, these influences overlap and have rarely been examined concurrently. The present study examined case files for 175 young persons who attended a voluntary organization in Leicester, United Kingdom, which supports people who are sexually exploited or at risk of sexual exploitation. Based on the case files, the presence or absence of known risk factors for becoming a sex worker was coded. Data were analyzed using t-test, logistic regression, and smallest space analysis. Users of the voluntary organization's services who had been sexually exploited exhibited a significantly greater number of risk factors than service users who had not been victims of sexual exploitation. The logistic regression produced a significant model fit. However, of the 14 potential predictors--many of which were associated with each other--only four variables significantly predicted actual sexual exploitation: running away, poverty, drug and/or alcohol use, and having friends or family members in prostitution. Surprisingly, running away was found to significantly decrease the odds of becoming involved in sexual exploitation. Smallest space analysis of the data revealed 5 clusters of risk factors. Two of the clusters, which reflected a desperation and need construct and immature or out-of-control lifestyles, were significantly associated with sexual exploitation. Our research suggests that some risk factors (e.g. physical and emotional abuse, early delinquency, and homelessness) for becoming involved in sexual exploitation are common but are part of the problematic milieu of the individuals affected and not directly associated with sex trading itself. Our results also indicate that it is important to engage with the families and associates of young persons at risk of becoming (or remaining) a sex worker if one wants to reduce the numbers of persons who engage in this activity. Copyright

  9. Becoming a Heavily Tattooed Young Body: From a Bodily Experience to a Body Project

    Science.gov (United States)

    Ferreira, Vitor Sérgio

    2014-01-01

    Why some young people start to tattoo their bodies? And why some of them keep going on with this practice, until having all body tattooed? What doing so means to them? These are some of the questions that underlie a qualitative research project carried out in Portugal on heavily tattooed young people. In this article, the author discusses their…

  10. Shale gas exploitation: Status, problems and prospect

    Directory of Open Access Journals (Sweden)

    Shiqian Wang

    2018-02-01

    Full Text Available Over the past five years, great progress has been made in shale gas exploitation, which has become the most driving force for global gas output growth. Hydrocarbon extraction from shale helps drive the USA on the road to energy independence. Besides, shale oil & gas production has been kept in a sustained growth by continuous improvement in drilling efficiency and well productivity in the case of tumbling oil prices and rig counts. Shale gas reserves and production have been in a rapid growth in China owing to the Lower Paleozoic Wufeng and Longmaxi shale gas exploitation in the Sichuan Basin, which has become an important sector for the future increment of gas reserves and output in China. However, substantial progress has been made neither in non-marine shale gas exploitation as previously expected nor in the broad complicated tectonic areas in South China for which a considerable investment was made. Analysis of the basic situation and issues in domestic shale gas development shows that shale gas exploitation prospects are constrained by many problems in terms of resources endowment, horizontal well fracturing technology, etc. especially in non-marine shale deposits and complicated tectonic areas in South China where hot shales are widely distributed but geological structures are found severely deformed and over matured. Discussion on the prospects shows that the sustained and steady growth in shale gas reserves and production capacity in the coming years lies in the discovery and supersession of new shale plays in addition to Wufeng and Longmaxi shale plays, and that a technological breakthrough in ultra-high-pressure and ultra-deep (over 3500 m buried in the Sichuan Basin marine shale gas exploitation is the key and hope. Keywords: Shale gas, Exploitation, Marine facies, Hot shale, Resource endowment, Sichuan Basin, South China, Complicated tectonic area, Gas play

  11. Total exploitation of an ornamental granite quarry

    Directory of Open Access Journals (Sweden)

    Taboada, J.

    2005-09-01

    Full Text Available In this paper we propose a methodology to estimate the recovery percentage for each of the products which can be obtained from the exploitation of an ornamental granite quarry: block, semiblock, masonry-transverse stone, and the smaller materials that can be used to obtain construction aggregates. This methodology ensures that quarry exploitation is exhaustive, thereby minimising the production of spoils and the consequent negative impact on the environment. The analysis is based on a detailed and exhaustive compilation of discontinuity data from the research fronts, which are then interpreted statistically and projected over the three weakness planes that are a particular feature of ornamental granite deposits. Using this information, and bearing in mind the minimum commercially viable sizes for each kind of granite, the corresponding recovery rates are calculated for each material in each plane. The results are then integrated using spatial techniques, and the result is an evaluation of quarry contents with a view to total exploitation. This methodology was applied to a quarry in the opening phase in order to carry out an a priori assessment of the economic feasibility of the quarry.

    En este trabajo se propone una metodología para estimar el porcentaje de recuperación de cada uno de los productos que se pueden obtener en la explotación de una cantera de granito ornamental: bloque, semibloque, manpostería y per piaños, y material restante destinado a la obtención de áridos. De esta manera se logra un aprovechamiento integral de la cantera, evitándose la generación de estériles y el subsiguiente impacto ambiental producido por éstos. La metodología de análisis se basa en la recopilación detallada y exhaustiva de datos de discontinuidades en los frentes de investigación, que se interpretan estadísticamente y se proyectan sobre los tres planos de debilidad propios del granito ornamental. Con esta información, y las

  12. A Monstrous Alliance: Open Architecture and Common Space

    Directory of Open Access Journals (Sweden)

    Gökhan Kodalak

    2015-06-01

    Full Text Available The contemporary built environment is absorbed by a dualist spatial organisation model divided between public and private space. Within this restrictive grammar, public space, despite its democratic promise, is heavily indoctrinated and anesthetised under the hegemony of regulatory apparatuses and control mechanisms, whereas private space has catalysed, if not directly engendered, prevalent spatial problems, such as ever-increasing slums, discriminatory gentrification and ecological catastrophes, despite its self-approving assurance. Underneath this dysfunctional couple lies common space, a third category that constitutes the shared spatial commonwealth of our entire natural and cultural milieu.The multitude, as an emerging body of self-organising political and spatial actors, has already started to unearth the potential of common space, actualising emergent and interactive spatial configurations all around the world. In this new, self-organisational model, architects do not become obsolete; rather, they leave behind their conventional roles as submissive experts and cosmetic speculators. By becoming anomalous architects, they affirm and augment the opening of spatial and architectural milieus to a myriad of new possibilities.This article theorises the possibility of a monstrous alliance between anomalous architects and the multitude, between open architectures and common space. Two specific case studies accompany these theoretical frameworks: the Gezi Event (Istanbul, 2013 demonstrates the actual emancipation of common space through the self-organising activity of the multitude, while Open-Cube (Antalya, 2013 attests to an early open architecture experiment based on the potentiating activity of the anomalous architect. 

  13. The possibilities of exploitation of Serbian thermomineral waters

    International Nuclear Information System (INIS)

    Jovanovic, L.

    2002-01-01

    Global ecological problem of petrol resources deficit caused an intensive search of alternative energy sources. Deficit of conventional energy fluids in Yugoslavia requires serious efforts to create a program of alternative energy sources exploitation. Geothermal energy represents an important energetic source for the countries with poor energy resources. Geothermal energy can become the basis for economic development. At present these geothermal resources are not being exploited in Yugoslavia. The possibilities of effective exploitation of thermal and thermomineral water resources in Yugoslavia are presented in this paper

  14. Thermal Property Engineering: Exploiting the Properties of Ceramic Nanocomposites

    Science.gov (United States)

    2018-03-01

    ARL-TR-8308 ● MAR 2018 US Army Research Laboratory Thermal Property Engineering : Exploiting the Properties of Ceramic...return it to the originator. ARL-TR-8308 ● MAR 2018 US Army Research Laboratory Thermal Property Engineering : Exploiting the...2015 – Dec 31 2017 4. TITLE AND SUBTITLE Thermal Property Engineering : Exploiting the Properties of Ceramic Nanocomposites 5a. CONTRACT NUMBER 5b

  15. Cytogenetic abnormalities of the descendants of permanent residents of heavily contaminated East Kazakhstan.

    Science.gov (United States)

    Chaizhunusova, Nailya; Madiyeva, Madina; Tanaka, Kimio; Hoshi, Masaharu; Kawano, Noriyuki; Noso, Yoshihiro; Takeichi, Nobuo; Rakhypbekov, Tolebay; Urazalina, Nailya; Dovgal, Galina; Rymbaeva, Tamara; Tokanova, Sholpan; Beisengazina, Meruert; Kembayeva, Kulypash; Inoue, Ken

    2017-11-01

    More than 400 nuclear explosion tests were conducted at the Semipalatinsk Nuclear Test Site (SNTS) and significant radioactive substances were released. The long-term consequences of the activities at the SNTS and the appearance of any hereditary effects remain insufficiently studied about 25 years after the test site was closed. The population living in villages near the SNTS are considered to have been heavily exposed to external and internal radiation. This study aims to perform an assessment and comprehensive cytogenetic analysis of the inhabitants living near the SNTS, and their first-(F1) and second-(F2) generation children. Residents of the East Kazakhstan region living in the area covered by the former SNTS were included in the study. To evaluate the hereditary effects of nuclear testing, comprehensive chromosome analyses were performed in lymphocytes using conventional Giemsa and fluorescent in situ hybridization methods in 115 F1 and F2 descendants in the villages of Dolon and Sarzhal, which were heavily contaminated. The parents of the subjects had permanently lived in the villages. A higher number of stable-type chromosome aberrations such as translocations was found in these residents than in 80 residents of the control area, Kokpecty, which indicates the possibility that radiation had biological effects on the exposed subjects.

  16. Rethinking exploitation: a process-centered account.

    Science.gov (United States)

    Jansen, Lynn A; Wall, Steven

    2013-12-01

    Exploitation has become an important topic in recent discussions of biomedical and research ethics. This is due in no small measure to the influence of Alan Wertheimer's path-breaking work on the subject. This paper presents some objections to Wertheimer's account of the concept. The objections attempt to show that his account places too much emphasis on outcome-based considerations and too little on process-based considerations. Building on these objections, the paper develops an alternative process-centered account of the concept. This alternative account of exploitation takes as its point of departure the broadly Kantian notion that it is wrong to use another as an instrument for the advancement of one's own ends. It sharpens this slippery notion and adds a number of refinements to it. The paper concludes by arguing that process-centered accounts of exploitation better illuminate the ethical challenges posed by research on human subjects than outcome-centered accounts.

  17. Radionuclides in the environment: Risks and opportunities

    International Nuclear Information System (INIS)

    Elzerman, A.W.

    1993-01-01

    Environmental chemistry plays a critical role in the open-quotes nuclear ageclose quotes. It makes a vital contribution to understanding of the sources, fate and effects of radionuclides in the environment, both man-made and natural. Risk assessment of radionuclides in the environment relies heavily on the tools of environmental chemistry. On the other hand, radionuclides provide unique opportunities to exploit in environmental chemistry investigations due to their well-defined sources, traceability in environmental processes, analytical sensitivities, and open-quotes built-inclose quotes radioactive decay open-quotes clocksclose quotes. In some cases naturally present radionuclides are utilized, while in others tracers are deliberately added or have already been added by the nuclear fuel cycle or nuclear testing. Several examples in each of these categories are discussed to spotlight the current status of environmental chemistry and radionuclides in the environment as an example application

  18. OpenDolphin: presentation models for compelling user interfaces

    CERN Multimedia

    CERN. Geneva

    2014-01-01

    Shared applications run on the server. They still need a display, though, be it on the web or on the desktop. OpenDolphin introduces a shared presentation model to clearly differentiate between "what" to display and "how" to display. The "what" is managed on the server and is independent of the UI technology whereas the "how" can fully exploit the UI capabilities like the ubiquity of the web or the power of the desktop in terms of interactivity, animations, effects, 3D worlds, and local devices. If you run a server-centric architecture and still seek to provide the best possible user experience, then this talk is for you. About the speaker Dierk König (JavaOne Rock Star) works as a fellow for Canoo Engineering AG, Basel, Switzerland. He is a committer to many open-source projects including OpenDolphin, Groovy, Grails, GPars and GroovyFX. He is lead author of the "Groovy in Action" book, which is among ...

  19. Rapid enhancement of nodal quasiparticle mass with heavily underdoping in Bi2212

    Science.gov (United States)

    Anzai, Hiroaki; Arita, Masashi; Namatame, Hirofumi; Taniguchi, Masaki; Ishikado, Motoyuki; Fujita, Kazuhiro; Ishida, Shigeyuki; Uchida, Shin-ichi; Ino, Akihiro

    2018-05-01

    We report substantial advance of our low-energy angle-resolved photoemission study of nodal quasiparticles in Bi2Sr2CaCu2O8+δ. The new data cover the samples from underdoped down to heavily underdoped levels. We also present the nodal Fermi velocities that determined by using an excitation-photon energy of hν = 7.0 eV over a wide doping range. The consistency between the results with hν = 8.1 and 7.0 eV allows us to rule out the effect of photoemission matrix elements. In comparison with the data previously reported, the nodal effective mass increases by a factor of ∼ 1.5 in going from optimally doped to heavily underdoped levels. We find a rapid enhancement of the nodal quasiparticle mass at low doping levels near the superconductor-to-insulator transition. The effective coupling spectrum, λ (ω) , is extracted directly from the energy derivatives of the quasiparticle dispersion and scattering rate, as a causal function of the mass enhancement factor. A steplike increase in Reλ (ω) around ∼ 65 meV is demonstrated clearly by the Kramers-Kronig transform of Imλ (ω) . To extract the low-energy renormalization effect, we calculated a simple model for the electron-boson interaction. This model reveals that the contribution of the renormalization at | ω | ≤ 15 meV to the quasiparticle mass is larger than that around 65 meV in underdoped samples.

  20. The Theory of Exploitation as the Unequal Exchange of Labour

    OpenAIRE

    Veneziani, Roberto; Yoshihara, Naoki

    2016-01-01

    This paper analyses the normative and positive foundations of the theory of exploitation as the unequal exchange of labour (UEL). The key intuitions behind all of the main approaches to UEL exploitation are explicitly analysed as a series of formal claims in a general economic environment. It is then argued that these intuitions can be captured by one fundamental axiom - called Labour Exploitation - which defines the basic domain of all UEL exploitation forms and identifies the formal and the...

  1. The theory of exploitation as the unequal exchange of labour

    OpenAIRE

    Veneziani, Roberto; Yoshihara, Naoki

    2017-01-01

    This paper analyses the normative and positive foundations of the theory of exploitation as the unequal exchange of labour (UEL). The key intuitions behind all of the main approaches to UEL exploitation are explicitly analysed as a series of formal claims in a general economic environment. It is then argued that these intuitions can be captured by one fundamental axiom - called Labour Exploitation - which defines the basic domain of all UEL exploitation forms and identifies the formal and the...

  2. Fishery Development and Exploitation in South East Australia

    Directory of Open Access Journals (Sweden)

    Camilla Novaglio

    2018-04-01

    Full Text Available Understanding the full extent of past ecological changes in human-influenced marine systems is needed to inform present management policies, but is often hampered by the scarcity of information about exploitation practices and population status over the entire history of fishing. The history of commercial fishing in South East Australia is relatively recent and thus easier to document. Our aim is to reconstruct such history and to use this information to understand general patterns and consequences of fishing exploitation. Intense exploitation of marine resources arrived in South East Australia with European colonization in the early 1800s, and unregulated sealing, whaling and oyster dredging resulted in the first documented significant impact on local marine populations. Exploitation extended to demersal resources in 1915 when the trawl fishery developed. Between the early 1800s and the 1980s, some of the exploited stocks collapsed, but fishing moved further offshore and in deeper waters as technology improved and new resources became available or were discovered. This phase of fisheries expansion masked the unsustainable nature of some fishing industries, such as trawling and whaling, and postponed the need for management regulations. From the 1990s onward, an increasing awareness of the depleted nature of some fisheries led to the establishment of management strategies aiming at a more sustainable exploitation of target stocks and, from the mid-2000s onwards, management strategies were revised and improved to better address the effect of fishing on multiple components of marine ecosystems. This led to the recovery of some depleted populations and to increased habitat protection. The relatively short history of fishing exploitation and the small scale of the fishing industry in South East Australia played a significant role in limiting the magnitude of fishing impacts on local populations and helped to achieve recoveries when fisheries

  3. From Exploitation to Industry: Definitions, Risks, and Consequences of Domestic Sexual Exploitation and Sex Work Among Women and Girls.

    Science.gov (United States)

    Gerassi, Lara

    In the last 15 years, terms such as prostitution, sex trafficking, sexual exploitation, modern-day slavery, and sex work have elicited much confusion and debate as to their definitions. Consequently several challenges have emerged for both law enforcement in the prosecution of criminals and practitioners in service provision. This article reviews the state of the literature with regard to domestic, sexual exploitation among women and girls in the United States and seeks to (1) provide definitions and describe the complexity of all terms relating to domestic sexual exploitation of women and girls in the United States, (2) explore available national prevalence data according to the definitions provided, and (3) review the evidence of mental health, social, and structural risk factors at the micro-, mezzo-, and macrolevels.

  4. An accurate measurement of the baryonic Tully-Fisher relation with heavily gas-dominated ALFALFA galaxies

    NARCIS (Netherlands)

    Papastergis, E.; Adams, E. A. K.; van der Hulst, J. M.

    2016-01-01

    We use a sample of 97 galaxies selected from the Arecibo legacy fast ALFA (ALFALFA) 21 cm survey to make an accurate measurement of the baryonic Tully-Fisher relation (BTFR). These galaxies are specifically selected to be heavily gas-dominated (Mgas/M∗ ≳ 2.7) and to be oriented edge-on. The former

  5. Text mining and visualization case studies using open-source tools

    CERN Document Server

    Chisholm, Andrew

    2016-01-01

    Text Mining and Visualization: Case Studies Using Open-Source Tools provides an introduction to text mining using some of the most popular and powerful open-source tools: KNIME, RapidMiner, Weka, R, and Python. The contributors-all highly experienced with text mining and open-source software-explain how text data are gathered and processed from a wide variety of sources, including books, server access logs, websites, social media sites, and message boards. Each chapter presents a case study that you can follow as part of a step-by-step, reproducible example. You can also easily apply and extend the techniques to other problems. All the examples are available on a supplementary website. The book shows you how to exploit your text data, offering successful application examples and blueprints for you to tackle your text mining tasks and benefit from open and freely available tools. It gets you up to date on the latest and most powerful tools, the data mining process, and specific text mining activities.

  6. The ESA Geohazard Exploitation Platform

    Science.gov (United States)

    Bally, Philippe; Laur, Henri; Mathieu, Pierre-Philippe; Pinto, Salvatore

    2015-04-01

    Earthquakes represent one of the world's most significant hazards in terms both of loss of life and damages. In the first decade of the 21st century, earthquakes accounted for 60 percent of fatalities from natural disasters, according to the United Nations International Strategy for Disaster Reduction (UNISDR). To support mitigation activities designed to assess and reduce risks and improve response in emergency situations, satellite EO can be used to provide a broad range of geo-information services. This includes for instance crustal block boundary mapping to better characterize active faults, strain rate mapping to assess how rapidly faults are deforming, soil vulnerability mapping to help estimate how the soil is behaving in reaction to seismic phenomena, geo-information to assess the extent and intensity of the earthquake impact on man-made structures and formulate assumptions on the evolution of the seismic sequence, i.e. where local aftershocks or future main shocks (on nearby faults) are most likely to occur. In May 2012, the European Space Agency and the GEO Secretariat convened the International Forum on Satellite EO for Geohazards now known as the Santorini Conference. The event was the continuation of a series of international workshops such as those organized by the Geohazards Theme of the Integrated Global Observing Strategy Partnership. In Santorini the seismic community has set out a vision of the EO contribution to an operational global seismic risk program, which lead to the Geohazard Supersites and Natural Laboratories (GSNL) initiative. The initial contribution of ESA to suuport the GSNL was the first Supersites Exploitation Platform (SSEP) system in the framework of Grid Processing On Demand (GPOD), now followed by the Geohazard Exploitation Platform (GEP). In this presentation, we will describe the contribution of the GEP for exploiting satellite EO for geohazard risk assessment. It is supporting the GEO Supersites and has been further

  7. Oil exploitation and the environmental Kuznets curve

    International Nuclear Information System (INIS)

    Esmaeili, Abdoulkarim; Abdollahzadeh, Negar

    2009-01-01

    This study refers to a panel estimation of an environmental Kuznets curve (EKC) for oil to determine the factors most affecting oil exploitation in 38 oil-producing countries during 1990-2000. Control variables such as oil reserves, oil price, population, political rights, and the Gini index were used to determine its contribution to the main EKC model. The empirical results fully support the existence of an EKC for oil exploitation. Furthermore, the result indicates that the proved oil reserves has a significant and positive role in oil production, but oil price and population do not significantly affect crude oil production. Also, increased freedoms and a better income distribution will reduce the rate of oil exploitation. Thus, policies aiming at enhancing democratic society and better income distribution would be more compatible with sustainability. (author)

  8. Oil exploitation and the environmental Kuznets curve

    Energy Technology Data Exchange (ETDEWEB)

    Esmaeili, Abdoulkarim; Abdollahzadeh, Negar [Department of Agricultural Economics, College of Agriculture, Shiraz University, Shiraz, Fars (Iran)

    2009-01-15

    This study refers to a panel estimation of an environmental Kuznets curve (EKC) for oil to determine the factors most affecting oil exploitation in 38 oil-producing countries during 1990-2000. Control variables such as oil reserves, oil price, population, political rights, and the Gini index were used to determine its contribution to the main EKC model. The empirical results fully support the existence of an EKC for oil exploitation. Furthermore, the result indicates that the proved oil reserves has a significant and positive role in oil production, but oil price and population do not significantly affect crude oil production. Also, increased freedoms and a better income distribution will reduce the rate of oil exploitation. Thus, policies aiming at enhancing democratic society and better income distribution would be more compatible with sustainability. (author)

  9. Economic value of ecological information in ecosystem-based natural resource management depends on exploitation history.

    Science.gov (United States)

    Essington, Timothy E; Sanchirico, James N; Baskett, Marissa L

    2018-02-13

    Ecosystem approaches to natural resource management are seen as a way to provide better outcomes for ecosystems and for people, yet the nature and strength of interactions among ecosystem components is usually unknown. Here we characterize the economic benefits of ecological knowledge through a simple model of fisheries that target a predator (piscivore) and its prey. We solve for the management (harvest) trajectory that maximizes net present value (NPV) for different ecological interactions and initial conditions that represent different levels of exploitation history. Optimal management trajectories generally approached similar harvest levels, but the pathways toward those levels varied considerably by ecological scenario. Application of the wrong harvest trajectory, which would happen if one type of ecological interaction were assumed but in fact another were occurring, generally led to only modest reductions in NPV. However, the risks were not equal across fleets: risks of incurring large losses of NPV and missing management targets were much higher in the fishery targeting piscivores, especially when piscivores were heavily depleted. Our findings suggest that the ecosystem approach might provide the greatest benefits when used to identify system states where management performs poorly with imperfect knowledge of system linkages so that management strategies can be adopted to avoid those states. Copyright © 2018 the Author(s). Published by PNAS.

  10. Security option file - Exploitation (DOS-Expl)

    International Nuclear Information System (INIS)

    2016-01-01

    This document aims at presenting functions performed by Cigeo during its exploitation phase, its main technical and security options which are envisaged with respect to different types of internal or external risks, and a first assessment of its impact on mankind and on the environment during its exploitation in normal operation as well as in incidental or accidental situations. A first volume addresses security principles, approach and management in relationship with the legal and regulatory framework. The second volume presents input data related to waste parcels and used for the installation sizing and operation, the main site characteristics, the main technical options regarding structures and equipment, and the main options regarding exploitation (parcel management, organisational and human aspects, and effluent management). The third volume describes how parcel are processed from their arrival to their setting in storage compartment, an inventory of internal and external risks, and a first assessment of consequences of scenarios on mankind and on the environment. The fourth volume presents options and operations which are envisaged regarding Cigeo closure, and inventory of associated risks

  11. Assessment of Sub-Micron Particles by Exploiting Charge Differences with Dielectrophoresis

    Directory of Open Access Journals (Sweden)

    Maria F. Romero-Creel

    2017-08-01

    Full Text Available The analysis, separation, and enrichment of submicron particles are critical steps in many applications, ranging from bio-sensing to disease diagnostics. Microfluidic electrokinetic techniques, such as dielectrophoresis (DEP have proved to be excellent platforms for assessment of submicron particles. DEP is the motion of polarizable particles under the presence of a non-uniform electric field. In this work, the polarization and dielectrophoretic behavior of polystyrene particles with diameters ranging for 100 nm to 1 μm were studied employing microchannels for insulator based DEP (iDEP and low frequency (<1000 Hz AC and DC electric potentials. In particular, the effects of particle surface charge, in terms of magnitude and type of functionalization, were examined. It was found that the magnitude of particle surface charge has a significant impact on the polarization and dielectrophoretic response of the particles, allowing for successful particle assessment. Traditionally, charge differences are exploited employing electrophoretic techniques and particle separation is achieved by differential migration. The present study demonstrates that differences in the particle’s surface charge can also be exploited by means of iDEP; and that distinct types of nanoparticles can be identified by their polarization and dielectrophoretic behavior. These findings open the possibility for iDEP to be employed as a technique for the analysis of submicron biological particles, where subtle differences in surface charge could allow for rapid particle identification and separation.

  12. From Exploitation to Industry: Definitions, Risks, and Consequences of Domestic Sexual Exploitation and Sex Work Among Women and Girls

    Science.gov (United States)

    Gerassi, Lara

    2015-01-01

    In the last 15 years, terms such as prostitution, sex trafficking, sexual exploitation, modern-day slavery, and sex work have elicited much confusion and debate as to their definitions. Consequently several challenges have emerged for both law enforcement in the prosecution of criminals and practitioners in service provision. This article reviews the state of the literature with regard to domestic, sexual exploitation among women and girls in the United States and seeks to (1) provide definitions and describe the complexity of all terms relating to domestic sexual exploitation of women and girls in the United States, (2) explore available national prevalence data according to the definitions provided, and (3) review the evidence of mental health, social, and structural risk factors at the micro-, mezzo-, and macrolevels. PMID:26726289

  13. Early Sexual Exploitation as an Influence in Prostitution.

    Science.gov (United States)

    Silbert, Mimi H.; Pines, Ayala M.

    1983-01-01

    Surveyed 200 female street prostitutes to determine whether they were sexually exploited during childhood. Results showed 60 percent of the subjects were sexually exploited. The few girls who discussed their abuse with others were met with shame and most often inaction. Only 10 percent were abused by strangers. (JAC)

  14. Enabling Campus Grids with Open Science Grid Technology

    International Nuclear Information System (INIS)

    Weitzel, Derek; Fraser, Dan; Pordes, Ruth; Bockelman, Brian; Swanson, David

    2011-01-01

    The Open Science Grid is a recognized key component of the US national cyber-infrastructure enabling scientific discovery through advanced high throughput computing. The principles and techniques that underlie the Open Science Grid can also be applied to Campus Grids since many of the requirements are the same, even if the implementation technologies differ. We find five requirements for a campus grid: trust relationships, job submission, resource independence, accounting, and data management. The Holland Computing Center's campus grid at the University of Nebraska-Lincoln was designed to fulfill the requirements of a campus grid. A bridging daemon was designed to bring non-Condor clusters into a grid managed by Condor. Condor features which make it possible to bridge Condor sites into a multi-campus grid have been exploited at the Holland Computing Center as well.

  15. Dissemination and Exploitation: Project Goals beyond Science

    Science.gov (United States)

    Hamann, Kristin; Reitz, Anja

    2017-04-01

    Dissemination and Exploitation are essential parts of public funded projects. In Horizon 2020 a plan for the exploitation and dissemination of results (PEDR) is a requirement. The plan should contain a clear vision on the objectives of the project in relation to actions for dissemination and potential exploitation of the project results. The actions follow the basic idea to spread the knowledge and results gathered within the project and face the challenge of how to bring the results into potentially relevant policy circle and how they impact the market. The plan follows the purpose to assess the impact of the project and to address various target groups who are interested in the project results. Simply put, dissemination concentrates on the transfer of knowledge and exploitation on the commercialization of the project. Beyond the question of the measurability of project`s impact, strategies within science marketing can serve purposes beyond internal and external communication. Accordingly, project managers are facing the challenge to implement a dissemination and exploitation strategy that ideally supports the identification of all partners with the project and matches the current discourse of the project`s content within the society, politics and economy. A consolidated plan might unite all projects partners under a central idea and supports the identification with the project beyond the individual research questions. Which applications, strategies and methods can be used to bring forward a PEDR that accompanies a project successfully and allows a comprehensive assessment of the project afterwards? Which hurdles might project managers experience in the dissemination process and which tasks should be fulfilled by the project manager?

  16. [Ecotourism exploitation model in Bita Lake Natural Reserve of Yunnan].

    Science.gov (United States)

    Yang, G; Wang, Y; Zhong, L

    2000-12-01

    Bita lake provincial natural reserve is located in Shangri-La region of North-western Yunnan, and was set as a demonstrating area for ecotourism exploitation in 1998. After a year's exploitation construction and half a year's operation as a branch of the 99' Kunming International Horticulture Exposition to accept tourists, it was proved that the ecotourism demonstrating area attained four integrated functions of ecotourism, i.e., tourism, protection, poverty clearing and environment education. Five exploitation and management models including function zoned exploitation model, featured tourism communication model signs system designing model, local Tibetan family reception model and environmental monitoring model, were also successful, which were demonstrated and spreaded to the whole province. Bita lake provincial natural reserve could be a good sample for the ecotourism exploitation natural reserves of the whole country.

  17. AFM of metallic nano-particles and nano-structures in heavily irradiated NaCl

    OpenAIRE

    Gaynutdinov, R; Vainshtein, DI; Hak, SJ; Tolstikhina, A; Den Hartog, HW

    2003-01-01

    AFM investigations are reported for heavily, electron irradiated NaCl crystals in ultra high vacuum (UHV) in the non-contact mode-with an UHV AFM/STM Omicron system. To avoid chemical reactions between the radiolytic Na and oxygen and water, the irradiated samples were cleaved and prepared for the experiments in UHV At the surface of freshly cleaved samples, we have observed sodium nano-precipitates with shapes, which depend on the irradiation dose and the volume fraction of the radiolytic Na...

  18. Stored energy and annealing behavior of heavily deformed aluminium

    DEFF Research Database (Denmark)

    Kamikawa, Naoya; Huang, Xiaoxu; Kondo, Yuka

    2012-01-01

    It has been demonstrated in previous work that a two-step annealing treatment, including a low-temperature, long-time annealing and a subsequent high-temperature annealing, is a promising route to control the microstructure of a heavily deformed metal. In the present study, structural parameters...... are quantified such as boundary spacing, misorientation angle and dislocation density for 99.99% aluminium deformed by accumulative roll-bonding to a strain of 4.8. Two different annealing processes have been applied; (i) one-step annealing for 0.5 h at 100-400°C and (ii) two-step annealing for 6 h at 175°C...... followed by 0.5 h annealing at 200-600°C, where the former treatment leads to discontinuous recrystallization and the latter to uniform structural coarsening. This behavior has been analyzed in terms of the relative change during annealing of energy stored as elastic energy in the dislocation structure...

  19. An Exploratory Account of Incentives for Underexploitation in an Open Innovation Environment

    DEFF Research Database (Denmark)

    Piirainen, Kalle; Raivio, Tuomas; Lähteenmäki-smith, Kaisa

    2014-01-01

    This paper presents an empirical account of incentives for underexploiting intellectual property in an open innovation setting. In this exploratory empirical account the phenomenon is observed in a research, development and innovation program where participants are required to share intellectual...... such an event is not only costly in terms of time and resources, but can in fact render IPR effectively worthless in terms of commercial exploitation and block innovation. This finding is pertinent to policy makers designing research, development and innovation instruments, as well as for managers who need...... to make choices how to implement open practices in innovation....

  20. Exploitation program of ''Adamow'' quarry up to 2015

    International Nuclear Information System (INIS)

    Hadlaw, A.

    1994-01-01

    The brown coal deposits exploited by the quarry ''Adamow'' located in Central Poland are shortly described and the prognosis of their exploitation up to 2015 is given. The basis data on the perspective deposits in the quarry's area are also presented. All deposits are shown on the map. 3 ills, 2 tabs

  1. Quantification of exploitable shallow geothermal energy by using Borehole Heat Exchanger coupled Ground Source Heat Pump systems

    International Nuclear Information System (INIS)

    Hein, Philipp; Zhu, Ke; Bucher, Anke; Kolditz, Olaf; Pang, Zhonghe; Shao, Haibing

    2016-01-01

    Highlights: • The amount of technically exploitable shallow geothermal energy was quantified. • Therefore, a comprehensive numerical borehole heat exchanger model was employed. • The concept of equivalent temperature drop is introduced. • For one BHE, an equivalent temperature drop of 1.8–2.8 °C over 30 years is realistic • The average extractable energy amount evaluates to be 3.5–5.4 kW h m"−"2 a"−"1. - Abstract: In previous studies, the amount of exploitable shallow geothermal energy was estimated by assuming a uniform temperature drop of 2–6 °C in the aquifer. In this work, a more comprehensive numerical model has been employed to evaluate the available amount of shallow geothermal energy by using Borehole Heat Exchanger coupled Ground Source Heat Pump systems. Numerical experiments have been performed by simulating the long-term evolution of the subsurface temperature field, which is subject to the operation of borehole heat exchangers and varying parameters like subsurface thermal conductivity and groundwater flow velocity. The concept of equivalent temperature drop is proposed as an auxiliary quantity for the subsurface. With the help of this parameter, a procedure has been established to quantify the amount of shallow geothermal potential. Following this approach, a realistic equivalent temperature reduction is found to be from −1.8 to −4.4 °C in the subsurface over a period of 30 years. This can be translated to an annual extractable geothermal energy value in a unit surface area, and it ranges from 3.5 to 8.6 kW h m"−"2 a"−"1. The exact value is site specific and heavily depends on the soil thermal conductivity, groundwater velocity, and borehole arrangement.

  2. zero day exploits and national readiness for cyber-warfare

    African Journals Online (AJOL)

    HOD

    A zero day vulnerability is an unknown exploit that divulges security flaws in software before such a flaw is publicly ... Keywords: exploits, zero day, vulnerability, cyberspace, cyber-warfare. 1. ..... industries and companies across the globe. The.

  3. In situ observation of triple junction motion during recovery of heavily deformed aluminum

    DEFF Research Database (Denmark)

    Yu, Tianbo; Hughes, Darcy A.; Hansen, Niels

    2015-01-01

    -junctions are pinned by deformation-induced interconnecting and lamellar boundaries, which slow down the recovery process and lead to a stop-go migration pattern. This pinning mechanism stabilizes the deformation microstructure, i.e. the structure is stabilized by balancing the driving and pinning forces controlling......Microstructural evolution during in situ annealing of heavily cold-rolled aluminum has been studied by transmission electron microscopy, confirming that an important recovery mechanism is migration of triple junctions formed by three lamellar boundaries (Y-junctions). The migrating Y...

  4. Nice Guys Finish Last: Are People with Higher Tax Morale Taxed more Heavily?

    OpenAIRE

    Philipp Doerrenberg; Denvil Duncan; Clemens Fuest; Andreas Peichl

    2012-01-01

    This paper is the first to provide evidence of efficient taxation of groups with heterogeneous levels of 'tax morale'. We set up an optimal income tax model where high tax morale implies a high subjective cost of evading taxes. The model predicts that 'nice guys finish last': groups with higher tax morale will be taxed more heavily, simply because taxing them is less costly. Based on unique cross-country micro data and an IV approach to rule out reverse causality, we find empirical support fo...

  5. From Exploitation to Industry: Definitions, Risks, and Consequences of Domestic Sexual Exploitation and Sex Work Among Women and Girls

    OpenAIRE

    Gerassi, Lara

    2015-01-01

    In the last 15 years, terms such as prostitution, sex trafficking, sexual exploitation, modern-day slavery, and sex work have elicited much confusion and debate as to their definitions. Consequently several challenges have emerged for both law enforcement in the prosecution of criminals and practitioners in service provision. This article reviews the state of the literature with regard to domestic, sexual exploitation among women and girls in the United States and seeks to (1) provide definit...

  6. Teotihuacan, tepeapulco, and obsidian exploitation.

    Science.gov (United States)

    Charlton, T H

    1978-06-16

    Current cultural ecological models of the development of civilization in central Mexico emphasize the role of subsistence production techniques and organization. The recent use of established and productive archeological surface survey techniques along natural corridors of communication between favorable niches for cultural development within the Central Mexican symbiotic region resulted in the location of sites that indicate an early development of a decentralized resource exploitation, manufacturing, and exchange network. The association of the development of this system with Teotihuacán indicates the importance such nonsubsistence production and exchange had in the evolution of this first central Mexican civilization. The later expansion of Teotihuacán into more distant areas of Mesoamerica was based on this resource exploitation model. Later civilizations centered at Tula and Tenochtitlán also used such a model in their expansion.

  7. Aspects économiques de l'exploitation des resources halieutiques ...

    African Journals Online (AJOL)

    Aspects économiques de l'exploitation des resources halieutiques des petits barrages du Nord de la Côte d' lvoire : Economic aspects of the exploitation of halieutic resources of petits barrages inland waters in the north of Côte d'lvoire.

  8. Data Curation for the Exploitation of Large Earth Observation Products Databases - The MEA system

    Science.gov (United States)

    Mantovani, Simone; Natali, Stefano; Barboni, Damiano; Cavicchi, Mario; Della Vecchia, Andrea

    2014-05-01

    National Space Agencies under the umbrella of the European Space Agency are performing a strong activity to handle and provide solutions to Big Data and related knowledge (metadata, software tools and services) management and exploitation. The continuously increasing amount of long-term and of historic data in EO facilities in the form of online datasets and archives, the incoming satellite observation platforms that will generate an impressive amount of new data and the new EU approach on the data distribution policy make necessary to address technologies for the long-term management of these data sets, including their consolidation, preservation, distribution, continuation and curation across multiple missions. The management of long EO data time series of continuing or historic missions - with more than 20 years of data available already today - requires technical solutions and technologies which differ considerably from the ones exploited by existing systems. Several tools, both open source and commercial, are already providing technologies to handle data and metadata preparation, access and visualization via OGC standard interfaces. This study aims at describing the Multi-sensor Evolution Analysis (MEA) system and the Data Curation concept as approached and implemented within the ASIM and EarthServer projects, funded by the European Space Agency and the European Commission, respectively.

  9. Enabling campus grids with open science grid technology

    Energy Technology Data Exchange (ETDEWEB)

    Weitzel, Derek [Nebraska U.; Bockelman, Brian [Nebraska U.; Swanson, David [Nebraska U.; Fraser, Dan [Argonne; Pordes, Ruth [Fermilab

    2011-01-01

    The Open Science Grid is a recognized key component of the US national cyber-infrastructure enabling scientific discovery through advanced high throughput computing. The principles and techniques that underlie the Open Science Grid can also be applied to Campus Grids since many of the requirements are the same, even if the implementation technologies differ. We find five requirements for a campus grid: trust relationships, job submission, resource independence, accounting, and data management. The Holland Computing Center's campus grid at the University of Nebraska-Lincoln was designed to fulfill the requirements of a campus grid. A bridging daemon was designed to bring non-Condor clusters into a grid managed by Condor. Condor features which make it possible to bridge Condor sites into a multi-campus grid have been exploited at the Holland Computing Center as well.

  10. Information source exploitation/exploration and NPD decision-making

    DEFF Research Database (Denmark)

    Jespersen, Kristina Risom

    different Scandinavian companies. Data was analyzed using hierarchical regression models across decision criteria dimensions and NPD stages as well as analyzing the combination of selected information sources. Rather than forwarding one optimal search behavior for the entire NPD process, we find optimal...... information search behavior at either end of the exploitation/exploration continuum. Additionally, we find that overexploitation and overexploration is caused by managerial bias. This creates managerial misbehavior at gate decision-points of the NPD process.......The purpose of this study is to examine how the exploration/exploitation continuum is applied by decision-makers in new product gate decision-making. Specifically, we analyze at gate decision-points how the evaluation of a new product project is affected by the information source exploitation...

  11. Exploiting opportunities at all cost? Entrepreneurial intent and externalities

    NARCIS (Netherlands)

    Urbig, D.; Weitzel, G.U.; Rosenkranz, S.; van Witteloostuijn, A.

    2011-01-01

    they exploit welfare-enhancing opportunities as it is assumed in several normative models? Do we need to prevent potential entrepreneurs from being destructive or are there intrinsic limits to harm others? We experimentally investigate how people with different entrepreneurial intent exploit risky

  12. A Two-Level Task Scheduler on Multiple DSP System for OpenCL

    Directory of Open Access Journals (Sweden)

    Li Tian

    2014-04-01

    Full Text Available This paper addresses the problem that multiple DSP system does not support OpenCL programming. With the compiler, runtime, and the kernel scheduler proposed, an OpenCL application becomes portable not only between multiple CPU and GPU, but also between embedded multiple DSP systems. Firstly, the LLVM compiler was imported for source-to-source translation in which the translated source was supported by CCS. Secondly, two-level schedulers were proposed to support efficient OpenCL kernel execution. The DSP/BIOS is used to schedule system level tasks such as interrupts and drivers; however, the synchronization mechanism resulted in heavy overhead during task switching. So we designed an efficient second level scheduler especially for OpenCL kernel work-item scheduling. The context switch process utilizes the 8 functional units and cross path links which was superior to DSP/BIOS in the aspect of task switching. Finally, dynamic loading and software managed CACHE were redesigned for OpenCL running on multiple DSP system. We evaluated the performance using some common OpenCL kernels from NVIDIA, AMD, NAS, and Parboil benchmarks. Experimental results show that the DSP OpenCL can efficiently exploit the computing resource of multiple cores.

  13. More than just openness: developing and validating a measure of targeted parent-child communication about alcohol.

    Science.gov (United States)

    Miller-Day, Michelle; Kam, Jennifer A

    2010-06-01

    Research addressing parent-child communication on the topic of alcohol use relies heavily on assessing frequency of discussions and general assessments of openness in parent-child communication, ignoring the complexity of this communication phenomenon. This study adds to the literature by articulating a conceptualization and developing a measurement of parent-child communication-targeted parent-child communication about alcohol-and comparing the efficacy of targeted parent-child communication about alcohol in predicting positive expectancies of alcohol use and recent alcohol use. The predictive power of general openness in parent-child communication and frequency of communication about alcohol also were assessed. Students in fifth and sixth grade (N = 1,407) from 29 public schools completed surveys. Targeted parent-child communication about alcohol was negatively associated with both outcomes. Frequency and general openness were only negatively associated with positive expectancies regarding alcohol. Implications of these findings for the etiology and prevention of substance use are discussed.

  14. From open source communications to knowledge

    Science.gov (United States)

    Preece, Alun; Roberts, Colin; Rogers, David; Webberley, Will; Innes, Martin; Braines, Dave

    2016-05-01

    Rapid processing and exploitation of open source information, including social media sources, in order to shorten decision-making cycles, has emerged as an important issue in intelligence analysis in recent years. Through a series of case studies and natural experiments, focussed primarily upon policing and counter-terrorism scenarios, we have developed an approach to information foraging and framing to inform decision making, drawing upon open source intelligence, in particular Twitter, due to its real-time focus and frequent use as a carrier for links to other media. Our work uses a combination of natural language (NL) and controlled natural language (CNL) processing to support information collection from human sensors, linking and schematising of collected information, and the framing of situational pictures. We illustrate the approach through a series of vignettes, highlighting (1) how relatively lightweight and reusable knowledge models (schemas) can rapidly be developed to add context to collected social media data, (2) how information from open sources can be combined with reports from trusted observers, for corroboration or to identify con icting information; and (3) how the approach supports users operating at or near the tactical edge, to rapidly task information collection and inform decision-making. The approach is supported by bespoke software tools for social media analytics and knowledge management.

  15. Exploitation and Utilization of Oilfield Geothermal Resources in China

    Directory of Open Access Journals (Sweden)

    Shejiao Wang

    2016-09-01

    Full Text Available Geothermal energy is a clean, green renewable resource, which can be utilized for power generation, heating, cooling, and could effectively replace oil, gas, and coal. In recent years, oil companies have put more efforts into exploiting and utilizing geothermal energy with advanced technologies for heat-tracing oil gathering and transportation, central heating, etc., which has not only reduced resource waste, but also improved large-scale and industrial resource utilization levels, and has achieved remarkable economic and social benefits. Based on the analysis of oilfield geothermal energy development status, resource potential, and exploitation and utilization modes, the advantages and disadvantages of harnessing oilfield geothermal resource have been discussed. Oilfield geothermal energy exploitation and utilization have advantages in resources, technical personnel, technology, and a large number of abandoned wells that could be reconstructed and utilized. Due to the high heat demand in oilfields, geothermal energy exploitation and utilization can effectively replace oil, gas, coal, and other fossil fuels, and has bright prospects. The key factors limiting oilfield geothermal energy exploitation and utilization are also pointed out in this paper, including immature technologies, lack of overall planning, lack of standards in resource assessment, and economic assessment, lack of incentive policies, etc.

  16. Network exploitation using WAMI tracks

    Science.gov (United States)

    Rimey, Ray; Record, Jim; Keefe, Dan; Kennedy, Levi; Cramer, Chris

    2011-06-01

    Creating and exploiting network models from wide area motion imagery (WAMI) is an important task for intelligence analysis. Tracks of entities observed moving in the WAMI sensor data are extracted, then large numbers of tracks are studied over long time intervals to determine specific locations that are visited (e.g., buildings in an urban environment), what locations are related to other locations, and the function of each location. This paper describes several parts of the network detection/exploitation problem, and summarizes a solution technique for each: (a) Detecting nodes; (b) Detecting links between known nodes; (c) Node attributes to characterize a node; (d) Link attributes to characterize each link; (e) Link structure inferred from node attributes and vice versa; and (f) Decomposing a detected network into smaller networks. Experimental results are presented for each solution technique, and those are used to discuss issues for each problem part and its solution technique.

  17. Web accessibility and open source software.

    Science.gov (United States)

    Obrenović, Zeljko

    2009-07-01

    A Web browser provides a uniform user interface to different types of information. Making this interface universally accessible and more interactive is a long-term goal still far from being achieved. Universally accessible browsers require novel interaction modalities and additional functionalities, for which existing browsers tend to provide only partial solutions. Although functionality for Web accessibility can be found as open source and free software components, their reuse and integration is complex because they were developed in diverse implementation environments, following standards and conventions incompatible with the Web. To address these problems, we have started several activities that aim at exploiting the potential of open-source software for Web accessibility. The first of these activities is the development of Adaptable Multi-Interface COmmunicator (AMICO):WEB, an infrastructure that facilitates efficient reuse and integration of open source software components into the Web environment. The main contribution of AMICO:WEB is in enabling the syntactic and semantic interoperability between Web extension mechanisms and a variety of integration mechanisms used by open source and free software components. Its design is based on our experiences in solving practical problems where we have used open source components to improve accessibility of rich media Web applications. The second of our activities involves improving education, where we have used our platform to teach students how to build advanced accessibility solutions from diverse open-source software. We are also partially involved in the recently started Eclipse projects called Accessibility Tools Framework (ACTF), the aim of which is development of extensible infrastructure, upon which developers can build a variety of utilities that help to evaluate and enhance the accessibility of applications and content for people with disabilities. In this article we briefly report on these activities.

  18. Nanostructured Basaltfiberconcrete Exploitational Characteristics

    Science.gov (United States)

    Saraykina, K. A.; Shamanov, V. A.

    2017-11-01

    The article demonstrates that the mass use of basalt fiber concrete (BFC) is constrained by insufficient study of their durability and serviceability in a variety of environments. This research is aimed at the study of the basalt fiber corrosion processes in the cement stone of BFC, the control of the new products structure formation in order to protect the reinforcing fiber from alkaline destruction and thereby improve the exploitational characteristics of the composite. The research result revealed that the modification of basaltfiber concrete by the dispersion of MWNTs contributes to the directional formation of new products in the cement matrix. The HAM additive in basaltfiberconcrete provides for the binding of portlandite to low-basic calcium hydroaluminosilicates, thus reducing the aggressive effect of the cement environment on the reinforcing fibers properties. The complex modification of BFC with nanostructured additives provides for an increase in its durability and exploitational properties (strength, frost resistance and water resistance) due to basalt fiber protection from alkali corrosion on account of the compacting of the contact zone “basalt fiber - cement stone” and designing of the new products structure and morphology of cement matrix over the fiber surface.

  19. The nature of the torus in the heavily obscured AGN Markarian 3: an X-ray study

    DEFF Research Database (Denmark)

    Guainazzi, M.; Risaliti, G.; Awaki, H.

    2016-01-01

    In this paper, we report the results of an X-ray monitoring campaign on the heavily obscured Seyfert galaxy, Markarian 3, carried out between the fall of 2014 and the spring of 2015 with NuSTAR, Suzaku and XMM–Newton. The hard X-ray spectrum of Markarian 3 is variable on all the time-scales probe...

  20. On species preservation and Non-Cooperative Exploiters

    DEFF Research Database (Denmark)

    Kronbak, Lone Grønbæk; Lindroos, Marko

    cases where several non-cooperative exploiters are involved in mixed fisheries. This paper is targeting biodiversity preservation by setting up a two species model with the aim of ensuring both species survive harvesting of exploiters adapting a non-cooperative behaviour. The model starts out as a multi......-species model without biological dependency and is then modified to include also biological dependency. We contribute to the literature by analytically finding the limits on the number of players preserving both species including the conditions to be satisfied. For visual purposes we simulate a two species...

  1. Exploração e manejo do cipó-titica (Heteropsis spp. / Exploitation and management of the vine Heteropsis spp.

    Directory of Open Access Journals (Sweden)

    Carlos César Durigan

    2012-04-01

    Full Text Available ResumoAs espécies hemiepífitas do gênero Heteropsis produzem raízes aéreas que são conhecidas na Amazônia brasileira como cipó-titica e titicão ou cipó timbó-açu, sendo fonte produtora de fibra de alto valor comercial, principalmente na fabricação de artesanatos e móveis. Essa matéria-prima é intensamente explorada de forma insustentável, tendo grande redução da disponibilidade desse recurso florestal, devido à diminuição ou extinção regional das plantas de cipó provocadas pelo inadequado manejo exploratório. Assim, alguns governos estaduais regulamentaram a conduta de manejo e exploração de cipós produtores de fibra, visando a sua manutenção e regeneração de suas raízes aéreas. Nesse sentido, o presente trabalho buscou, na literatura geral e científica, as informações sobre o marco legal da exploração e o plano de manejo, a ecologia das espécies, as etapas ligadas ao manejo florestal, inventário, intensidade e ciclo de corte bem como os procedimentos de coleta e beneficiamento dessas plantas, que são conhecimentos atualmente consolidados com normatização em poucos estados da Amazônia. Apesar disso, as áreas que foram intensamente exploradas se fazem necessário o desenvolvimento da produção sustentável com novos estudos, visando recuperação dessas populações por meio de técnicas de multiplicação vegetativa, plantio e nutrição vegetal, agregando-os ao manejo ecológico dos indivíduos remanescentes na floresta.AbstractThe hemiepiphytes species of the genus Heteropsis produces aerial roots that are known in the Brazilian Amazon as “cipó-titica and titicão or timbó-açu, and are a source of fiber of considerable commercial value used primarily to manufacture handicrafts and furniture. This raw material has been heavily exploited and mismanaged. As the consequent depletion and regional extinction of the plant vines has greatly reduced its availability likely a forest resource. This

  2. Astronomy for Astronomical Numbers with Massive Open Online Classes

    Science.gov (United States)

    Impey, Chris David; Wenger, Matthew; Buxner, Sanlyn; Formanek, Martin

    2017-01-01

    Massive Open Online Classes (MOOCs) have shown their ability to reach missions of adults across the world with science content. We have been experimenting with pedagogy in two MOOCs, provided through Udemy and Coursera, that have reached over 80,000 people. Although the completion rate is low, just under 10%, the cumulative outreach impact of nearly half a million hours of astronomy video watched is substantial. A similar fraction of learners is heavily engaged and participate in online discussions, live question and answer sessions, and social media connected to the class. MOOCs are valuable for testing pedagogy that might later be employed in online for-credit classes, with the caveat that the motivations and modes of engagement of free-choice learners can differ from those of college students.

  3. Trolling may intensify exploitation in crappie fisheries

    Science.gov (United States)

    Meals, K. O.; Dunn, A. W.; Miranda, Leandro E.

    2012-01-01

    In some parts of the USA, anglers targeting crappies Pomoxis spp. are transitioning from mostly stationary angling with a single pole around submerged structures to using multiple poles while drifting with the wind or under power. This shift in fishing methods could result in a change in catch efficiency, possibly increasing exploitation rates to levels that would be of concern to managers. We studied the catch statistics of anglers fishing while trolling with multiple poles (trollers) and those fishing with single poles (polers) in Mississippi reservoirs. Specifically, we tested whether (1) various catch statistics differed between trollers and polers, (2) catch rates of trollers were related to the number of poles fished, and (3) trollers could raise exploitation rates to potentially unsustainable levels. Results showed that participation in the crappie fisheries was about equally split between polers and trollers. In spring, 90% of crappie anglers were polers; in summer, 85% of crappie anglers were trollers. The size of harvested crappies was similar for the two angler groups, but the catch per hour was almost three times higher for trollers than for polers. Catch rates by trollers were directly correlated to the number of poles fished, although the relationship flattened as the number of poles increased. The average harvest rate for one troller fishing with three poles was similar to the harvest rate obtained by one poler. Simulations predicted that at the existing mix of about 50% polers and 50% trollers and with no restrictions on the number of poles used by trollers, exploitation of crappies is about 1.3 times higher than that in a polers-only fishery; under a scenario in which 100% of crappie anglers were trollers, exploitation was forecasted to increase to about 1.7 times the polers-only rate. The efficiency of trolling for crappies should be of concern to fishery managers because crappie fisheries are mostly consumptive and may increase exploitation

  4. Open Data nella Pubblica Amministrazione italiana: l’esperienza del Comune di Firenze

    Directory of Open Access Journals (Sweden)

    Giovanni Menduni

    2013-01-01

    Full Text Available The City of Florence, Italy, has been carrying out a large data integration and consolidation process since 2003, that was even more improved and targeted to an open and federated approach during 2009. Results of such a process are now being exploited in several current hot eGovernment fields, among which business intelligence, and, more recently, the open data movement. During the year 2011, the City of Florence lead an internal structured assessment process in which each department named an open data referee, and was called to analyse which available public datastores were eligible to be opened up in a suitable website section. The first Open Data section of the City of Florence website was published in October 2011, to which followed the publication of RDF scheme, and SPARQL endpoint for the three above datasets. In February 2012, a brand-new specific open data portal was published, whose main sections were the dataset catalogue, the "Open data for all" section, with human-readable data visualisations, the Linked Data section, and the GeoPortal section, giving access to geospatial data through a standard catalogue and a portal which are based on the open source GeoNetwork and GeoServer projects.

  5. GPU acceleration for digitally reconstructed radiographs using bindless texture objects and CUDA/OpenGL interoperability.

    Science.gov (United States)

    Abdellah, Marwan; Eldeib, Ayman; Owis, Mohamed I

    2015-01-01

    This paper features an advanced implementation of the X-ray rendering algorithm that harnesses the giant computing power of the current commodity graphics processors to accelerate the generation of high resolution digitally reconstructed radiographs (DRRs). The presented pipeline exploits the latest features of NVIDIA Graphics Processing Unit (GPU) architectures, mainly bindless texture objects and dynamic parallelism. The rendering throughput is substantially improved by exploiting the interoperability mechanisms between CUDA and OpenGL. The benchmarks of our optimized rendering pipeline reflect its capability of generating DRRs with resolutions of 2048(2) and 4096(2) at interactive and semi interactive frame-rates using an NVIDIA GeForce 970 GTX device.

  6. Models of Social Exploitation with Special Emphasis on Slovenc Traffic Economics

    Directory of Open Access Journals (Sweden)

    Iztok Ostan

    2005-01-01

    Full Text Available In order to decipher the organisational behaviour operatingin the transport sector of the economy it is necessary to discoverthe prevalent patterns of social exploitation at work. PreliminaJyresults of a study of experienced irregular traffic studentsshow that, according to them there is no significant differencein Slovenia between exploitation in traffic and other sectors.Thus, general models of exploitation could be used to explainthe behaviour in the traffic sector. Empirical research amongSlovene students showed that according to their statements inthe 90s the managerial and capitalistic types of exploitation prevailedin Slovenia over non-exploitative types of economic behaviour.It also showed that statements of students do not differmuch from those of the general public regarding this question,nor from the statements of irregular students with extensivework experience. It was also found that there were no substantialdifferences between the statements of Italian and Slovenestudents regarding the type of exploitation operative in theircountries. Students of traffic are basically of the same opinionregarding this topic as students in general, though slightly morecritical, especially towards business managers and politicians.

  7. Near-Field Imaging of Free Carriers in ZnO Nanowires with a Scanning Probe Tip Made of Heavily Doped Germanium

    Science.gov (United States)

    Sakat, Emilie; Giliberti, Valeria; Bollani, Monica; Notargiacomo, Andrea; Pea, Marialilia; Finazzi, Marco; Pellegrini, Giovanni; Hugonin, Jean-Paul; Weber-Bargioni, Alexander; Melli, Mauro; Sassolini, Simone; Cabrini, Stefano; Biagioni, Paolo; Ortolani, Michele; Baldassarre, Leonetta

    2017-11-01

    A novel scanning probe tip made of heavily doped semiconductor is fabricated and used instead of standard gold-coated tips in infrared scattering-type near-field microscopy. Midinfrared near-field microscopy experiments are conducted on ZnO nanowires with a lateral resolution better than 100 nm, using tips made of heavily electron-doped germanium with a plasma frequency in the midinfrared (plasma wavelength of 9.5 μ m ). Nanowires embedded in a dielectric matrix are imaged at two wavelengths, 11.3 and 8.0 μ m , above and below the plasma wavelength of the tips. An opposite sign of the imaging contrasts between the nanowire and the dielectric matrix is observed at the two infrared wavelengths, indicating a clear role of the free-electron plasma in the heavily doped germanium tip in building the imaging contrast. Electromagnetic simulations with a multispherical dipole model accounting for the finite size of the tip are well consistent with the experiments. By comparison of the simulated and measured imaging contrasts, an estimate for the local free-carrier density in the investigated ZnO nanowires in the low 1019 cm-3 range is retrieved. The results are benchmarked against the scattering intensity and phase maps obtained on the same sample with a gold-coated probe tip in pseudoheterodyne detection mode.

  8. EU Enlargement: Migration flows from Central and Eastern Europe into the Nordic countries - exploiting a natural experiment

    DEFF Research Database (Denmark)

    Pytlikova, Mariola; Pedersen, Peder J.

    We look at migration flows from 8 Central and Eastern European Countries (CEECs) to 5 Nordic countries over the years 1985 - 2005 and we can exploit a natural experiment that arose from the fact that while Sweden opened its labour market from the day one of the 2004 EU enlargement, the other Nordic...... countries chose a transition period in relation to the "new" EU members. We employ a differences-in-differences estimator in our analysis. The results show that the estimated effect of the opening of Swedish labour market in 2004 on migration is insignificantly different from zero. Further, we...... are interested in the overall effect of the "EU entry" on migration. Therefore we look at migration flows from CEECs during the first round EU enlargement towards CEECs in 2004 and compare them with migration flows from Bulgaria and Romania. We again used a DD estimator in our analysis. The estimated effect...

  9. The ESA Scientific Exploitation of Operational Missions element

    Science.gov (United States)

    Desnos, Yves-Louis; Regner, Peter; Zehner, Claus; Engdahl, Marcus; Benveniste, Jerome; Delwart, Steven; Gascon, Ferran; Mathieu, Pierre-Philippe; Bojkov, Bojan; Koetz, Benjamin; Arino, Olivier; Donlon, Craig; Davidson, Malcolm; Goryl, Philippe; Foumelis, Michael

    2014-05-01

    The objectives of the ESA Scientific Exploitation of Operational Missions (SEOM) programme element are • to federate, support and expand the research community • to strengthen the leadership of European EO research community • to enable the science community to address new scientific research As a preparation for the SEOM element a series of international science users consultation has been organized by ESA in 2012 and 2013 In particular the ESA Living Planet Symposium was successfully organized in Edinburgh September 2013 and involving 1700 participants from 60 countries. The science users recommendations have been gathered and form the basis for the 2014 SEOM work plan approved by ESA member states. The SEOM element is organized along the following action lines: 1. Developing open-source, multi-mission, scientific toolboxes : the new toolboxes for Sentinel 1/2/3 and 5P will be introduced 2. Research and development studies: the first SEOM studies are being launched such as the INSARAP studies for Sentinel 1 interferometry in orbit demonstration , the IAS study to generate an improved spectroscopic database of the trace gas species CH4, H2O, and CO in the 2.3 μm region and SO2 in the UV region for Sentinel 5 P. In addition larger Sentinels for science call will be tendered in 2014 covering grouped studies for Sentinel 1 Land , Sentinel 1 Ocean , Sentinel 2 Land, Sentinel 3 SAR Altimetry ,Sentinel 3 Ocean color, Sentinel 3 Land and Sentinels Synergy . 3. Science users consultation : the Sentinel 2 for Science workshop is planned from 20 to 22 may 2014 at ESRIN to prepare for scientific exploitation of the Sentinel-2 mission (http://seom.esa.int/S2forScience2014 ) . In addition the FRINGE workshop focusing on scientific explotation of Sentinel1 using SAR interferometry is planned to be held at ESA ESRIN in Q2 2015 4. Training the next generation of European EO scientists on the scientific exploitation of Sentinels data: the Advanced Training course Land

  10. Peat exploitation - Environment. Effects and measures

    International Nuclear Information System (INIS)

    Stenbeck, G.

    1996-01-01

    This report gives a detailed description of the influence of peat exploitation on the land-, water- and atmospheric environments. Proposals for mitigatory measures to minimize damage to the environment are also given

  11. Exploiting Data Sparsity for Large-Scale Matrix Computations

    KAUST Repository

    Akbudak, Kadir

    2018-02-24

    Exploiting data sparsity in dense matrices is an algorithmic bridge between architectures that are increasingly memory-austere on a per-core basis and extreme-scale applications. The Hierarchical matrix Computations on Manycore Architectures (HiCMA) library tackles this challenging problem by achieving significant reductions in time to solution and memory footprint, while preserving a specified accuracy requirement of the application. HiCMA provides a high-performance implementation on distributed-memory systems of one of the most widely used matrix factorization in large-scale scientific applications, i.e., the Cholesky factorization. It employs the tile low-rank data format to compress the dense data-sparse off-diagonal tiles of the matrix. It then decomposes the matrix computations into interdependent tasks and relies on the dynamic runtime system StarPU for asynchronous out-of-order scheduling, while allowing high user-productivity. Performance comparisons and memory footprint on matrix dimensions up to eleven million show a performance gain and memory saving of more than an order of magnitude for both metrics on thousands of cores, against state-of-the-art open-source and vendor optimized numerical libraries. This represents an important milestone in enabling large-scale matrix computations toward solving big data problems in geospatial statistics for climate/weather forecasting applications.

  12. Exploiting Data Sparsity for Large-Scale Matrix Computations

    KAUST Repository

    Akbudak, Kadir; Ltaief, Hatem; Mikhalev, Aleksandr; Charara, Ali; Keyes, David E.

    2018-01-01

    Exploiting data sparsity in dense matrices is an algorithmic bridge between architectures that are increasingly memory-austere on a per-core basis and extreme-scale applications. The Hierarchical matrix Computations on Manycore Architectures (HiCMA) library tackles this challenging problem by achieving significant reductions in time to solution and memory footprint, while preserving a specified accuracy requirement of the application. HiCMA provides a high-performance implementation on distributed-memory systems of one of the most widely used matrix factorization in large-scale scientific applications, i.e., the Cholesky factorization. It employs the tile low-rank data format to compress the dense data-sparse off-diagonal tiles of the matrix. It then decomposes the matrix computations into interdependent tasks and relies on the dynamic runtime system StarPU for asynchronous out-of-order scheduling, while allowing high user-productivity. Performance comparisons and memory footprint on matrix dimensions up to eleven million show a performance gain and memory saving of more than an order of magnitude for both metrics on thousands of cores, against state-of-the-art open-source and vendor optimized numerical libraries. This represents an important milestone in enabling large-scale matrix computations toward solving big data problems in geospatial statistics for climate/weather forecasting applications.

  13. 'Not all that burns is wood'. A social perspective on fuel exploitation and use during the Indus urban period (2600-1900 BC).

    Science.gov (United States)

    Lancelotti, Carla

    2018-01-01

    Ancient civilisations depended heavily on natural fuel resources for a wide array of activities, and this had an impact on such resources that can be traced in the archaeological record. At its urban apex, the populations of the Indus Civilisation (2600-1900 BC) produced a wide range of objects and crafts, several of which involved highly specialised pyrotechnology. In the wake of increasing aridity and a period of weakened monsoon rainfall that affected South Asia from 2100 BC, these activities potentially put pressure on the natural resource base that may have had to be counterbalanced by differentiation in fuel use. The combined analysis of archaeobotanical and geoarchaeological remains from four Indus urban phase archaeological sites, has enable an assessment of the mechanisms through which people exploited wood, and diversified their fuel resources to adapt to the arid to semi-arid environments in which they lived. The combined use of local wood species with alternative fuels, such as dung and crop-processing leftovers, are evidence for resilient socio-ecological practices during the 700 years of Indus urbanism and perhaps beyond.

  14. Landscape management on post-exploitation land using the example of the Silesian region, Poland

    Directory of Open Access Journals (Sweden)

    Myga-Piątek Urszula

    2014-03-01

    Full Text Available More and more often, post-mining and post-exploitation areas, which have been heavily transformed by man’s economic activities, are no longer a danger to the environment, but they enhance the monotonous urban-industrial landscape of a particular region and are instead its identifying value. Activities regarding the planning of landscape development are very difficult. This paper emphasizes some of the problems that result from legal barriers with regard to the concept of the more diversified management of post-mining areas as substantial forms of the landscape. In the process of the complex shaping of the natural environment in reclamation actions regarding post-mining areas geographers, biologists and architects have a large role to play.. Due to the fact that landscape management falls within the scope of interest and competencies of many stakeholders, such as: government, regional and self-government institutions, nature, monument and state forest protection authorities as well as the scientific community from various disciplines, it is very difficult to reach a consensus in this matter and to develop uniform operating procedures. The landscape management problems on postindustrial areas have been illustrated through the example of the region of Silesia. The cultural landscape of the region has been intensively developed in the last thousand years, but signs of human impact are much older, dating back to the pre-historical and early Medieval periods. The Silesia region is currently undergoing a major spatial reconstruction.

  15. Insertion of a pentacene layer into the gold/poly(methyl methacrylate)/heavily doped p-type Si/indium device leading to the modulation of resistive switching characteristics

    Science.gov (United States)

    Hung, Cheng-Chun; Lin, Yow-Jon

    2018-01-01

    In order to get a physical insight into the pentacene interlayer-modulated resistive switching (RS) characteristics, the Au/pentacene/poly(methyl methacrylate) (PMMA)/heavily doped p-type Si (p+-Si)/In and Au/PMMA/p+-Si/In devices are fabricated and the device performance is provided. The Au/pentacene/PMMA/p+-Si/In device shows RS behavior, whereas the Au/PMMA/p+-Si/In device exhibits the set/reset-free hysteresis current-voltage characteristics. The insertion of a pentacene layer is a noticeable contribution to the RS characteristic. This is because of the occurrence of carrier accumulation/depletion in the pentacene interlayer. The transition from carrier depletion to carrier accumulation (carrier accumulation to carrier depletion) in pentacene occurring under negative (positive) voltage induces the process of set (reset). The switching conduction mechanism is primarily described as space charge limited conduction according to the electrical transport properties measurement. The concept of a pentacene/PMMA heterostructure opens a promising direction for organic memory devices.

  16. Exploiting multi-scale parallelism for large scale numerical modelling of laser wakefield accelerators

    International Nuclear Information System (INIS)

    Fonseca, R A; Vieira, J; Silva, L O; Fiuza, F; Davidson, A; Tsung, F S; Mori, W B

    2013-01-01

    A new generation of laser wakefield accelerators (LWFA), supported by the extreme accelerating fields generated in the interaction of PW-Class lasers and underdense targets, promises the production of high quality electron beams in short distances for multiple applications. Achieving this goal will rely heavily on numerical modelling to further understand the underlying physics and identify optimal regimes, but large scale modelling of these scenarios is computationally heavy and requires the efficient use of state-of-the-art petascale supercomputing systems. We discuss the main difficulties involved in running these simulations and the new developments implemented in the OSIRIS framework to address these issues, ranging from multi-dimensional dynamic load balancing and hybrid distributed/shared memory parallelism to the vectorization of the PIC algorithm. We present the results of the OASCR Joule Metric program on the issue of large scale modelling of LWFA, demonstrating speedups of over 1 order of magnitude on the same hardware. Finally, scalability to over ∼10 6 cores and sustained performance over ∼2 P Flops is demonstrated, opening the way for large scale modelling of LWFA scenarios. (paper)

  17. Measurement of surface recombination velocity on heavily doped indium phosphide

    International Nuclear Information System (INIS)

    Jenkins, P.; Ghalla-Goradia, M.; Faur, M.; Bailey, S.

    1990-01-01

    The controversy surrounding the published low values of surface recombination velocity (SRV) in n-InP, solidified in recent years when modeling of existing n/p InP solar cells revealed that the front surface SRV had to be higher than 1 x 10 6 cm/sec in order to justify the poor blue response that is characteristic of all n/p InP solar cells. In this paper, SRV on heavily doped (>10 18 cm -3 )n-type and p-type InP is measured as a function of surface treatment. For the limited range of substrates and surface treatments studied, SRV and surface stability depend strongly on the surface treatment. SRVs of ∼10 5 cm/sec in both p-type and n-type InP are obtainable, but in n-type the low SRV surfaces were unstable, and the only stable surfaces on n-type had SRVs of >10 6 cm/sec

  18. Heavily-doped 2D-quantized structures and the Einstein relation

    CERN Document Server

    Ghatak, Kamakhya P

    2015-01-01

    This book presents the Einstein Relation(ER) in two-dimensional (2-D) Heavily Doped(HD) Quantized Structures. The materials considered are quantized structures of HD non-linear optical, III-V, II-VI, Ge, Te, Platinum Antimonide, stressed materials, GaP, Gallium Antimonide, II-V, Bismuth Telluride together with various types of HD superlattices and their Quantized counterparts respectively. The ER in HD opto-electronic materials and their nanostructures is studied in the presence of strong light waves and intense electric fields on the basis of newly formulated electron dispersion laws that control the studies of such quantum effect devices. The suggestion for the experimental determination of HD 2D and 3D ERs and the importance of measurement of band gap in HD optoelectronic materials under intense built-in electric field in nanodevices and strong external photo excitation (for measuring photon induced physical properties) are also discussed in this context. The influence of crossed electric and quantizing ma...

  19. Rational Exploitation and Utilizing of Groundwater in Jiangsu Coastal Area

    Science.gov (United States)

    Kang, B.; Lin, X.

    2017-12-01

    Jiangsu coastal area is located in the southeast coast of China, where is a new industrial base and an important coastal and Land Resources Development Zone of China. In the areas with strong human exploitation activities, regional groundwater evolution is obviously affected by human activities. In order to solve the environmental geological problems caused by groundwater exploitation fundamentally, we must find out the forming conditions of regional groundwater hydrodynamic field, and the impact of human activities on groundwater hydrodynamic field evolution and hydrogeochemical evolition. Based on these results, scientific management and reasonable exploitation of the regional groundwater resources can be provided for the utilization. Taking the coastal area of Jiangsu as the research area, we investigate and analyze of the regional hydrogeological conditions. The numerical simulation model of groundwater flow was established according to the water power, chemical and isotopic methods, the conditions of water flow and the influence of hydrodynamic field on the water chemical field. We predict the evolution of regional groundwater dynamics under the influence of human activities and climate change and evaluate the influence of groundwater dynamic field evolution on the environmental geological problems caused by groundwater exploitation under various conditions. We get the following conclusions: Three groundwater exploitation optimal schemes were established. The groundwater salinization was taken as the primary control condition. The substitution model was proposed to model groundwater exploitation and water level changes by BP network method.Then genetic algorithm was used to solve the optimization solution. Three groundwater exploitation optimal schemes were submit to local water resource management. The first sheme was used to solve the groundwater salinization problem. The second sheme focused on dual water supply. The third sheme concerned on emergency water

  20. Colloquium: Non-Markovian dynamics in open quantum systems

    Science.gov (United States)

    Breuer, Heinz-Peter; Laine, Elsi-Mari; Piilo, Jyrki; Vacchini, Bassano

    2016-04-01

    The dynamical behavior of open quantum systems plays a key role in many applications of quantum mechanics, examples ranging from fundamental problems, such as the environment-induced decay of quantum coherence and relaxation in many-body systems, to applications in condensed matter theory, quantum transport, quantum chemistry, and quantum information. In close analogy to a classical Markovian stochastic process, the interaction of an open quantum system with a noisy environment is often modeled phenomenologically by means of a dynamical semigroup with a corresponding time-independent generator in Lindblad form, which describes a memoryless dynamics of the open system typically leading to an irreversible loss of characteristic quantum features. However, in many applications open systems exhibit pronounced memory effects and a revival of genuine quantum properties such as quantum coherence, correlations, and entanglement. Here recent theoretical results on the rich non-Markovian quantum dynamics of open systems are discussed, paying particular attention to the rigorous mathematical definition, to the physical interpretation and classification, as well as to the quantification of quantum memory effects. The general theory is illustrated by a series of physical examples. The analysis reveals that memory effects of the open system dynamics reflect characteristic features of the environment which opens a new perspective for applications, namely, to exploit a small open system as a quantum probe signifying nontrivial features of the environment it is interacting with. This Colloquium further explores the various physical sources of non-Markovian quantum dynamics, such as structured environmental spectral densities, nonlocal correlations between environmental degrees of freedom, and correlations in the initial system-environment state, in addition to developing schemes for their local detection. Recent experiments addressing the detection, quantification, and control of

  1. Retrieving the Green’s function in an open system by cross correlation : A comparison of approaches (L)

    NARCIS (Netherlands)

    Wapenaar, C.P.A.; Fokkema, J.; Snieder, R.

    2005-01-01

    We compare two approaches for deriving the fact that the Green’s function in an arbitrary inhomogeneous open system can be obtained by cross correlating recordings of the wave field at two positions. One approach is based on physical arguments, exploiting the principle of time-reversal invariance of

  2. Efficient Programming for Multicore Processor Heterogeneity: OpenMP versus OmpSs

    OpenAIRE

    Butko , Anastasiia; Bruguier , Florent; Gamatié , Abdoulaye; Sassatelli , Gilles

    2017-01-01

    International audience; ARM single-ISA heterogeneous multicore processors combine high-performance big cores with power-efficient small cores. They aim at achieving a suitable balance between performance and energy. How- ever, a main challenge is to program such architectures so as to efficiently exploit their features. In this paper, we study the impact on performance and energy trade-offs of single-ISA architecture according to OpenMP 3.0 and the OmpSs programming models. We consider differ...

  3. GEMINI/GeMS Observations Unveil the Structure of the Heavily Obscured Globular Cluster Liller 1.

    Science.gov (United States)

    Saracino, S.; Dalessandro, E.; Ferraro, F. R.; Lanzoni, B.; Geisler, D.; Mauro, F.; Villanova, S.; Moni Bidin, C.; Miocchi, P.; Massari, D.

    2015-06-01

    By exploiting the exceptional high-resolution capabilities of the near-IR camera GSAOI combined with the Gemini Multi-Conjugate Adaptive System at the GEMINI South Telescope, we investigated the structural and physical properties of the heavily obscured globular cluster Liller 1 in the Galactic bulge. We have obtained the deepest and most accurate color-magnitude diagram published so far for this cluster, reaching {{K}s}˜ 19 (below the main-sequence turnoff level). We used these data to redetermine the center of gravity of the system, finding that it is located about 2.″2 southeast from the literature value. We also built new star density and surface brightness profiles for the cluster and rederived its main structural and physical parameters (scale radii, concentration parameter, central mass density, total mass). We find that Liller 1 is significantly less concentrated (concentration parameter c=1.74) and less extended (tidal radius {{r}t}=298\\prime\\prime and core radius {{r}c}=5\\buildrel{\\prime\\prime}\\over{.} 39) than previously thought. By using these newly determined structural parameters, we estimated the mass of Liller 1 to be {{M}tot}=2.3+0.3-0.1× {{10}6} {{M}⊙ } ({{M}tot}=1.5+0.2-0.1× {{10}6} {{M}⊙ } for a Kroupa initial mass function), which is comparable to that of the most massive clusters in the Galaxy (ω Centari and Terzan 5). Also, Liller 1 has the second-highest collision rate (after Terzan 5) among all star clusters in the Galaxy, thus confirming that it is an ideal environment for the formation of collisional objects (such as millisecond pulsars). Based on observations obtained at the Gemini Observatory, which is operated by the Association of Universities for Research in Astronomy, Inc., under a cooperative agreement with the NSF on behalf of the Gemini partnership: the National Science Foundation (United States), the National Research Council (Canada), CONICYT (Chile), the Australian Research Council (Australia), Ministério da

  4. Elder Financial Exploitation: Implications for Future Policy and Research in Elder Mistreatment

    Directory of Open Access Journals (Sweden)

    Price, Thomas

    2011-07-01

    Full Text Available Recent advances in the understanding of elder mistreatment have demonstrated that financial exploitation tends to be one of the most common forms of mistreatment affecting older populations. Agencies such as the World Bank and World Health Organization show significant concern regarding financial exploitation and its connection to physical and emotional injury to victims. The World Bank uses the term “financial violence” as a means of generally describing the harm caused to an individual as a result of financial exploitation or abuse. The proportion of financial exploitation in relation to other forms of elder mistreatment is defined in our research. We discuss the potential impact of elder financial exploitation on victims as well as explore the implications for future research and policy development focused on financial aspects of elder mistreatment and call for further study in the concept of financial exploitation as a violent act. [West J Emerg Med. 2011;12(3:354-356.

  5. Exploitation of commercial remote sensing images: reality ignored?

    Science.gov (United States)

    Allen, Paul C.

    1999-12-01

    The remote sensing market is on the verge of being awash in commercial high-resolution images. Market estimates are based on the growing numbers of planned commercial remote sensing electro-optical, radar, and hyperspectral satellites and aircraft. EarthWatch, Space Imaging, SPOT, and RDL among others are all working towards launch and service of one to five meter panchromatic or radar-imaging satellites. Additionally, new advances in digital air surveillance and reconnaissance systems, both manned and unmanned, are also expected to expand the geospatial customer base. Regardless of platform, image type, or location, each system promises images with some combination of increased resolution, greater spectral coverage, reduced turn-around time (request-to- delivery), and/or reduced image cost. For the most part, however, market estimates for these new sources focus on the raw digital images (from collection to the ground station) while ignoring the requirements for a processing and exploitation infrastructure comprised of exploitation tools, exploitation training, library systems, and image management systems. From this it would appear the commercial imaging community has failed to learn the hard lessons of national government experience choosing instead to ignore reality and replicate the bias of collection over processing and exploitation. While this trend may be not impact the small quantity users that exist today it will certainly adversely affect the mid- to large-sized users of the future.

  6. Exploiting Earth observation data pools for urban analysis: the TEP URBAN project

    Science.gov (United States)

    Heldens, W.; Esch, T.; Asamer, H.; Boettcher, M.; Brito, F.; Hirner, A.; Marconcini, M.; Mathot, E.; Metz, A.; Permana, H.; Zeidler, J.; Balhar, J.; Soukop, T.; Stankek, F.

    2017-10-01

    Large amounts of Earth observation (EO) data have been collected to date, to increase even more rapidly with the upcoming Sentinel data. All this data contains unprecedented information, yet it is hard to retrieve, especially for nonremote sensing specialists. As we live in an urban era, with more than 50% of the world population living in cities, urban studies can especially benefit from the EO data. Information is needed for sustainable development of cities, for the understanding of urban growth patterns or for studying the threats of natural hazards or climate change. Bridging this gap between the technology-driven EO sector and the information needs of environmental science, planning, and policy is the driver behind the TEP-Urban project. Modern information technology functionalities and services are tested and implemented in the Urban Thematic Exploitation Platform (U-TEP). The platform enables interested users to easily exploit and generate thematic information on the status and development of the environment based on EO data and technologies. The beta version of the web platform contains value added basic earth observation data, global thematic data sets, and tools to derive user specific indicators and metrics. The code is open source and the architecture of the platform allows adding of new data sets and tools. These functionalities and concepts support the four basic use scenarios of the U-TEP platform: explore existing thematic content; task individual on-demand analyses; develop, deploy and offer your own content or application; and, learn more about innovative data sets and methods.

  7. Exploitation of cloud computing in management of construction projects in Slovakia

    Directory of Open Access Journals (Sweden)

    Mandičák Tomáš

    2016-12-01

    Full Text Available The issue of cloud computing is a highly topical issue. Cloud computing represents a new model for information technology (IT services based on the exploitation of Web (it represents a cloud and other application platforms, as well as software as a service. In general, the exploitation of cloud computing in construction project management has several advantages, as demonstrated by several research reports. Currently, research quantifying the exploitation of cloud computing in the Slovak construction industry has not yet been carried out. The article discusses the issue of exploitation of cloud computing in construction project management in Slovakia. The main objective of the research is to confirm whether factors such as size of construction enterprise, owner of construction enterprise and participant of construction project have any impact on the exploitation level of cloud computing in construction project management. It includes confirmation of differences in use between different participants of the construction project or between construction enterprises broken down by size and shareholders.

  8. Challenges in authorization of exploration and exploitation of radioactive minerals in Slovakia

    International Nuclear Information System (INIS)

    Janova, V.; Turner, M.

    2014-01-01

    their own expense. Opening, preparation, mining, processing, refining of minerals and liquidation of tailings have to be based on a technology that is in accordance with the principle of sustainable development, with requirements for protection of the environment and the best available technologies. The proposed technologies have to be agreed by the Ministry of Environment. However, a license application could be refused, if the applicant does not submit a favourable opinion of the municipality, favourable opinions of the neighbouring villages and a favourable opinion of the self governing region. These provisions were introduced by the representatives of non-profit organizations and at present they represent a challenge for the authorities and exploration and exploitation activities of radioactive minerals as well. (author)

  9. Sexual exploitation and labor during adolescence: A case study

    Directory of Open Access Journals (Sweden)

    Luciana Dutra-Thomé

    2011-09-01

    Full Text Available The present article focused on the perception of sexual exploitation as a job, using a single case study design. The aim of the study was to investigate the case of a 14 year-old girl, involved in commercial sexual exploitation, who considered this situation as her labor activity. A content analysis showed protective and risk factors as categories, especially related to her labor activities. The girl perceived the sexual exploitation activity as a job that provided autonomy, subsistence, and survival. The study revealed that the negative effects of working during adolescence may bring consequences to health and development. Youth work may be defined as a risk factor, especially when the labour conditions are not adequate and protected.

  10. Spatializing Open Data for the Assessment and the Improvement of Territorial and Social Cohesion

    Science.gov (United States)

    Scorza, F.; Las Casas, G. B.; Murgante, B.

    2016-09-01

    An integrated place-based approach for the improvement of territorial and social cohesion is the new instance for planning disciplines, coming from EU New Cohesion Policies. This paper considers the territorial impact assessment of regional development policies as a precondition in order to develop balanced and effective operative programs at national and regional levels. The contribution of `open data' appears to be mature in order to support this application and in this paper we present a spatial analysis technique for the evaluation of EU funds effects at territorial level, starting from open data by Open Cohesion. The application is focused on internal areas of Basilicata Region: Agri river Valley. A complex contest, where environmental and agricultural traditional vocations conflict with a recent development of oil extraction industries. Conclusions concern further applications and perspectives to improve and support regional development planning considering the exploitation of open data sources and spatial analysis.

  11. Automated UAV-based video exploitation using service oriented architecture framework

    Science.gov (United States)

    Se, Stephen; Nadeau, Christian; Wood, Scott

    2011-05-01

    Airborne surveillance and reconnaissance are essential for successful military missions. Such capabilities are critical for troop protection, situational awareness, mission planning, damage assessment, and others. Unmanned Aerial Vehicles (UAVs) gather huge amounts of video data but it is extremely labour-intensive for operators to analyze hours and hours of received data. At MDA, we have developed a suite of tools that can process the UAV video data automatically, including mosaicking, change detection and 3D reconstruction, which have been integrated within a standard GIS framework. In addition, the mosaicking and 3D reconstruction tools have also been integrated in a Service Oriented Architecture (SOA) framework. The Visualization and Exploitation Workstation (VIEW) integrates 2D and 3D visualization, processing, and analysis capabilities developed for UAV video exploitation. Visualization capabilities are supported through a thick-client Graphical User Interface (GUI), which allows visualization of 2D imagery, video, and 3D models. The GUI interacts with the VIEW server, which provides video mosaicking and 3D reconstruction exploitation services through the SOA framework. The SOA framework allows multiple users to perform video exploitation by running a GUI client on the operator's computer and invoking the video exploitation functionalities residing on the server. This allows the exploitation services to be upgraded easily and allows the intensive video processing to run on powerful workstations. MDA provides UAV services to the Canadian and Australian forces in Afghanistan with the Heron, a Medium Altitude Long Endurance (MALE) UAV system. On-going flight operations service provides important intelligence, surveillance, and reconnaissance information to commanders and front-line soldiers.

  12. Prospects of geothermal resource exploitation

    International Nuclear Information System (INIS)

    Bourrelier, P.H.; Cornet, F.; Fouillac, C.

    1994-01-01

    The use of geothermal energy to generate electricity has only occurred during the past 50 years by drilling wells in aquifers close to magmas and producing either dry steam or hot water. The world's production of electricity from geothermal energy is over 6000 MWe and is still growing. The direct use of geothermal energy for major urban communities has been developed recently by exploitation of aquifers in sedimentary basins under large towns. Scaling up the extraction of heat implies the exploitation of larger and better located fields requiring an appropriate method of extraction; the objective of present attempts in USA, Japan and Europe is to create heat exchangers by the circulation of water between several deep wells. Two field categories are considered: the extension of classical geothermal fields beyond the aquifer areas, and areas favoured by both a high geothermal gradient, fractures inducing a natural permeability at large scale, and good commercial prospects (such as in the Rhenan Graben). Hot dry rocks concept has gained a large interest. 1 fig., 5 tabs., 11 refs

  13. The Gaia-ESO Survey: open clusters in Gaia-DR1 . A way forward to stellar age calibration

    Science.gov (United States)

    Randich, S.; Tognelli, E.; Jackson, R.; Jeffries, R. D.; Degl'Innocenti, S.; Pancino, E.; Re Fiorentin, P.; Spagna, A.; Sacco, G.; Bragaglia, A.; Magrini, L.; Prada Moroni, P. G.; Alfaro, E.; Franciosini, E.; Morbidelli, L.; Roccatagliata, V.; Bouy, H.; Bravi, L.; Jiménez-Esteban, F. M.; Jordi, C.; Zari, E.; Tautvaišiene, G.; Drazdauskas, A.; Mikolaitis, S.; Gilmore, G.; Feltzing, S.; Vallenari, A.; Bensby, T.; Koposov, S.; Korn, A.; Lanzafame, A.; Smiljanic, R.; Bayo, A.; Carraro, G.; Costado, M. T.; Heiter, U.; Hourihane, A.; Jofré, P.; Lewis, J.; Monaco, L.; Prisinzano, L.; Sbordone, L.; Sousa, S. G.; Worley, C. C.; Zaggia, S.

    2018-05-01

    Context. Determination and calibration of the ages of stars, which heavily rely on stellar evolutionary models, are very challenging, while representing a crucial aspect in many astrophysical areas. Aims: We describe the methodologies that, taking advantage of Gaia-DR1 and the Gaia-ESO Survey data, enable the comparison of observed open star cluster sequences with stellar evolutionary models. The final, long-term goal is the exploitation of open clusters as age calibrators. Methods: We perform a homogeneous analysis of eight open clusters using the Gaia-DR1 TGAS catalogue for bright members and information from the Gaia-ESO Survey for fainter stars. Cluster membership probabilities for the Gaia-ESO Survey targets are derived based on several spectroscopic tracers. The Gaia-ESO Survey also provides the cluster chemical composition. We obtain cluster parallaxes using two methods. The first one relies on the astrometric selection of a sample of bona fide members, while the other one fits the parallax distribution of a larger sample of TGAS sources. Ages and reddening values are recovered through a Bayesian analysis using the 2MASS magnitudes and three sets of standard models. Lithium depletion boundary (LDB) ages are also determined using literature observations and the same models employed for the Bayesian analysis. Results: For all but one cluster, parallaxes derived by us agree with those presented in Gaia Collaboration (2017, A&A, 601, A19), while a discrepancy is found for NGC 2516; we provide evidence supporting our own determination. Inferred cluster ages are robust against models and are generally consistent with literature values. Conclusions: The systematic parallax errors inherent in the Gaia DR1 data presently limit the precision of our results. Nevertheless, we have been able to place these eight clusters onto the same age scale for the first time, with good agreement between isochronal and LDB ages where there is overlap. Our approach appears promising

  14. Malware Sandbox Analysis for Secure Observation of Vulnerability Exploitation

    Science.gov (United States)

    Yoshioka, Katsunari; Inoue, Daisuke; Eto, Masashi; Hoshizawa, Yuji; Nogawa, Hiroki; Nakao, Koji

    Exploiting vulnerabilities of remote systems is one of the fundamental behaviors of malware that determines their potential hazards. Understanding what kind of propagation tactics each malware uses is essential in incident response because such information directly links with countermeasures such as writing a signature for IDS. Although recently malware sandbox analysis has been studied intensively, little work is done on securely observing the vulnerability exploitation by malware. In this paper, we propose a novel sandbox analysis method for securely observing malware's vulnerability exploitation in a totally isolated environment. In our sandbox, we prepare two victim hosts. We first execute the sample malware on one of these hosts and then let it attack the other host which is running multiple vulnerable services. As a simple realization of the proposed method, we have implemented a sandbox using Nepenthes, a low-interaction honeypot, as the second victim. Because Nepenthes can emulate a variety of vulnerable services, we can efficiently observe the propagation of sample malware. In the experiments, among 382 samples whose scan capabilities are confirmed, 381 samples successfully started exploiting vulnerabilities of the second victim. This indicates the certain level of feasibility of the proposed method.

  15. The open data imperative

    Directory of Open Access Journals (Sweden)

    Professor Geoffrey Boulton

    2014-07-01

    Full Text Available The information revolution of recent decades is a world historical event that is changing the lives of individuals, societies and economies and with major implications for science, research and learning. It offers profound opportunities to explore phenomena that were hitherto beyond our power to resolve, and at the same time is undermining the process whereby concurrent publication of scientific concept and evidence (data permitted scrutiny, replication and refutation and that has been the bedrock of scientific progress and of ‘self-correction’ since the inception of the first scientific journals in the 17th century. Open publication, release and sharing of data are vital habits that need to be redefined and redeveloped for the modern age by the research community if it is to exploit technological opportunities, maintain self-correction and maximize the contribution of research to human understanding and welfare.

  16. Earthquake response of heavily damaged historical masonry mosques after restoration

    Science.gov (United States)

    Altunışık, Ahmet Can; Fuat Genç, Ali

    2017-10-01

    Restoration works have been accelerated substantially in Turkey in the last decade. Many historical buildings, mosques, minaret, bridges, towers and structures have been restored. With these restorations an important issue arises, namely how restoration work affects the structure. For this reason, we aimed to investigate the restoration effect on the earthquake response of a historical masonry mosque considering the openings on the masonry dome. For this purpose, we used the Hüsrev Pasha Mosque, which is located in the Ortakapı district in the old city of Van, Turkey. The region of Van is in an active seismic zone; therefore, earthquake analyses were performed in this study. Firstly a finite element model of the mosque was constructed considering the restoration drawings and 16 window openings on the dome. Then model was constructed with eight window openings. Structural analyses were performed under dead load and earthquake load, and the mode superposition method was used in analyses. Maximum displacements, maximum-minimum principal stresses and shear stresses are given with contours diagrams. The results are analyzed according to Turkish Earthquake Code (TEC, 2007) and compared between 8 and 16 window openings cases. The results show that reduction of the window openings affected the structural behavior of the mosque positively.

  17. Anomalous transmission through heavily doped conducting polymer films with periodic subwavelength hole array

    Science.gov (United States)

    Matsui, Tatsunosuke; Vardeny, Z. Valy; Agrawal, Amit; Nahata, Ajay; Menon, Reghu

    2006-08-01

    We observed resonantly enhanced (or anomalous transmission) terahertz transmission through two-dimensional (2D) periodic arrays of subwavelength apertures with various periodicities fabricated on metallic organic conducting polymer films of polypyrrole heavily doped with PF 6 molecules [PPy(PF6)]. The anomalous transmission spectra are in good agreement with a model involving surface plasmon polariton excitations on the film surfaces. We also found that the resonantly enhanced transmission peaks are broader in the exotic metallic PPy(PF6) films compared to those formed in 2D aperture array in regular metallic films such as silver, indicating that the surface plasmon polaritons on the PPy(PF6) film surfaces have higher attenuation.

  18. Final Report, “Exploiting Global View for Resilience”

    Energy Technology Data Exchange (ETDEWEB)

    Chien, Andrew [Univ. of Chicago, IL (United States)

    2017-03-29

    Final technical report for the "Exploiting Global View for Resilience" project. The GVR project aims to create a new approach to portable, resilient applications. The GVR approach builds on a global view data model,, adding versioning (multi-version), user control of timing and rate (multi-stream), and flexible cross layer error signalling and recovery. With a versioned array as a portable abstraction, GVR enables application programmers to exploit deep scientific and application code insights to manage resilience (and its overhead) in a flexible, portable fashion.

  19. How Less Alienation Creates More Exploitation? Audience Labour on Social Network Sites.

    Directory of Open Access Journals (Sweden)

    Eran Fisher

    2012-05-01

    Full Text Available Abstract: The notion of audience labour has been an important contribution to Marxist political economy of the media. It revised the traditional political economy analysis, which focused on media ownership, by suggesting that media was also a site of production, constituting particular relations of production. Such analysis highlighted the active role of audience in the creation of media value as both commodities and workers, thus pointing to audience exploitation. Recently, in light of paradigmatic transformations in the media environment – particularly the emergence of Web 2.0 and social network sites – there has been a renewed interest in such analysis, and a reexamination of audience exploitation. Focusing on Facebook as a case-study, this article examines audience labour on social network sites along two Marxist themes – exploitation and alienation. It argues for a historical shift in the link between exploitation and alienation of audience labour, concurrent with the shift from mass media to social media. In the mass media, the capacity for exploitation of audience labour was quite limited while the alienation that such work created was high. In contrast, social media allows for the expansion and intensification of exploitation. Simultaneously, audience labour on social media – because it involves communication and sociability – also ameliorates alienation by allowing self-expression, authenticity, and relations with others. Moreover, the article argues that the political economy of social network sites is founded on a dialectical link between exploitation and alienation: in order to be de-alienated, Facebook users must communicate and socialize, thus exacerbating their exploitation. And vice-versa, in order for Facebook to exploit the work of its users, it must contribute to their de-alienation.

  20. The relationship between action anticipation and emotion recognition in athletes of open skill sports.

    Science.gov (United States)

    Shih, Yu-Ling; Lin, Chia-Yen

    2016-08-01

    Action anticipation plays an important role in the successful performance of open skill sports, such as ball and combat sports. Evidence has shown that elite athletes of open sports excel in action anticipation. Most studies have targeted ball sports and agreed that information on body mechanics is one of the key determinants for successful action anticipation in open sports. However, less is known about combat sports, and whether facial emotions have an influence on athletes' action anticipation skill. It has been suggested that the understanding of intention in combat sports relies heavily on emotional context. Based on this suggestion, the present study compared the action anticipation performances of taekwondo athletes, weightlifting athletes, and non-athletes and then correlated these with their performances of emotion recognition. This study primarily found that accurate action anticipation does not necessarily rely on the dynamic information of movement, and that action anticipation performance is correlated with that of emotion recognition in taekwondo athletes, but not in weightlifting athletes. Our results suggest that the recognition of facial emotions plays a role in the action prediction in such combat sports as taekwondo.

  1. Boys are not exempt: Sexual exploitation of adolescents in sub-Saharan Africa.

    Science.gov (United States)

    Adjei, Jones K; Saewyc, Elizabeth M

    2017-03-01

    Research on youth sexual exploitation in Africa has largely neglected the experiences of exploited boys. To date, much of the research in sub-Saharan Africa continues to consider boys mainly as exploiters but not as exploited. Using the only publicly available population-based surveys from the National Survey of Adolescents, conducted in four sub-Saharan African countries - Burkina Faso, Ghana, Malawi, and Uganda-we assessed factors associated with transactional sexual behaviour among never-married adolescent boys and girls. We also examined whether boys' reported sexual exploitation was linked to similar risky sexual behaviours as has been noted among girls in sub-Saharan Africa. Results from our analyses indicated that even though adolescent girls have a somewhat higher likelihood of reporting sexual abuse and exploitation, the odds of trading sex were significantly elevated for previously traumatized boys (that is those with a history of sexual and physical abuse) but not for their female counterparts. Just like adolescent girls, transactional sexual behaviour was associated with the risk of having concurrent multiple sexual partners for boys. These findings support the reality of boys' sexual exploitation within the African context, and further highlight the importance of including males in general and boys in particular in population-based studies on sexual health, risk, and protective factors in the sub-Saharan African region. Understanding the factors linked to sexual exploitation for both boys and girls will help in developing policies and programs that could improve the overall sexual and reproductive health outcomes among adolescents and youth in sub-Saharan Africa. Copyright © 2017 Elsevier Ltd. All rights reserved.

  2. A Descriptive Study on Sexually Exploited Children in Residential Treatment

    Science.gov (United States)

    Twill, Sarah E.; Green, Denise M.; Traylor, Amy

    2010-01-01

    Sexual exploitation and prostitution of children and adolescents is a multibillion dollar industry in the United States (Estes and Weiner in "Medical, legal & social science aspects of child sexual exploitation: A comprehensive review of pornography, prostitution, and internet crimes, vol I," G.W. Medical Publishing, Inc, St Louis,…

  3. Very heavily electron-doped CrSi2 as a high-performance high-temperature thermoelectric material

    International Nuclear Information System (INIS)

    Parker, David; Singh, David J

    2012-01-01

    We analyze the thermoelectric behavior, using first principles and Boltzmann transport calculations, of very heavily electron-doped CrSi 2 and find that at temperatures of 900-1250 K and electron dopings of 1-4 × 10 21 cm -3 , thermopowers as large in magnitude as 200 μV K -1 may be found. Such high thermopowers at such high carrier concentrations are extremely rare, and suggest that excellent thermoelectric performance may be found in these ranges of temperature and doping. (paper)

  4. Ethics of using language editing services in an era of digital communication and heavily multi-authored papers.

    Science.gov (United States)

    Lozano, George A

    2014-06-01

    Scientists of many countries in which English is not the primary language routinely use a variety of manuscript preparation, correction or editing services, a practice that is openly endorsed by many journals and scientific institutions. These services vary tremendously in their scope; at one end there is simple proof-reading, and at the other extreme there is in-depth and extensive peer-reviewing, proposal preparation, statistical analyses, re-writing and co-writing. In this paper, the various types of service are reviewed, along with authorship guidelines, and the question is raised of whether the high-end services surpass most guidelines' criteria for authorship. Three other factors are considered. First, the ease of collaboration possible in the internet era allows multiple iterations between the author(s) and the "editing service", so essentially, papers can be co-written. Second, "editing services" often offer subject-specific experts who comment not only on the language, but interpret and improve scientific content. Third, the trend towards heavily multi-authored papers implies that the threshold necessary to earn authorship is declining. The inevitable conclusion is that at some point the contributions by "editing services" should be deemed sufficient to warrant authorship. Trying to enforce any guidelines would likely be futile, but nevertheless, it might be time to revisit the ethics of using some of the high-end "editing services". In an increasingly international job market, awareness of this problem might prove increasingly important in authorship disputes, the allocation of research grants, and hiring decisions.

  5. Sustainable exploitation and management of aquatic resources

    DEFF Research Database (Denmark)

    Neuenfeldt, Stefan; Köster, Fritz

    2014-01-01

    DTU Aqua conducts research, provides advice,educates at university level and contributes toinnovation in sustainable exploitation andmanagement of aquatic resources. The vision of DTUAqua is to enable ecologically and economicallysustainable exploitation of aquatic resourcesapplying an integrated...... management. Marineecosystems aims at understanding the mechanisms that govern the interaction between individuals,species and populations in an ecosystem enabling us to determine the stability and flexibility of theecosystem.Marine living resources looks at the sustainable utilization of fish and shellfish...... stocks.Ecosystem effects expands from the ecosystem approach to fisheries management to an integratedapproach where other human activities are taken into consideration. Fisheries management developsmethods, models and tools for predicting and evaluating the effects of management measures andregulations...

  6. Imouraren mining exploitation : Complementary studies Synthetic report Volum B - Mines

    International Nuclear Information System (INIS)

    1980-01-01

    The object of the current study is to determine the main technical characteristics of the reference project of a mine that can supply the necessary ore quantity at a production of 3000 tonnes uranium per year, along 10 years. The project is one of the possible solutions for exploiting the mine. The current study permits to establish : investment and functioning cost estimation, overall project of the mining exploitation program, necessary strength estimation, average ore grades evaluation and variations of these grades, utilities needs, production vizing program, main exploitation methods and necessary materials. Reference project study of the mine serves as base to the economics studies and studies optimization [fr

  7. Exploitative and hierarchical antagonism in a cooperative bacterium.

    Directory of Open Access Journals (Sweden)

    Francesca Fiegna

    2005-11-01

    Full Text Available Social organisms that cooperate with some members of their own species, such as close relatives, may fail to cooperate with other genotypes of the same species. Such noncooperation may take the form of outright antagonism or social exploitation. Myxococcus xanthus is a highly social prokaryote that cooperatively develops into spore-bearing, multicellular fruiting bodies in response to starvation. Here we have characterized the nature of social interactions among nine developmentally proficient strains of M. xanthus isolated from spatially distant locations. Strains were competed against one another in all possible pairwise combinations during starvation-induced development. In most pairings, at least one competitor exhibited strong antagonism toward its partner and a majority of mixes showed bidirectional antagonism that decreased total spore production, even to the point of driving whole populations to extinction. Differential response to mixing was the primary determinant of competitive superiority rather than the sporulation efficiencies of unmixed populations. In some competitive pairings, the dominant partner sporulated more efficiently in mixed populations than in clonal isolation. This finding represents a novel form of exploitation in bacteria carried out by socially competent genotypes and is the first documentation of social exploitation among natural bacterial isolates. Patterns of antagonistic superiority among these strains form a highly linear dominance hierarchy. At least some competition pairs construct chimeric, rather than segregated, fruiting bodies. The cooperative prokaryote M. xanthus has diverged into a large number of distinct social types that cooperate with clone-mates but exhibit intense antagonism toward distinct social types of the same species. Most lengthy migration events in nature may thus result in strong antagonism between migratory and resident populations, and this antagonism may have large effects on local

  8. Evaluation of the use of polymer modified bitumen in the production of high modulus asphalt for heavily-trafficked roads

    CSIR Research Space (South Africa)

    Komba, Julius J

    2015-05-01

    Full Text Available Enrobé à Module Élevé (EME) technology, a High Modulus Asphalt (HiMA), has been introduced to South Africa to provide an optimum solution for the design and construction of heavily trafficked roads. Implementation of EME technology in South Africa...

  9. Factors for Consideration in an Open-Flame Test for Assessing Fire Blocking Performance of Barrier Fabrics

    Directory of Open Access Journals (Sweden)

    Shonali Nazaré

    2016-09-01

    Full Text Available The main objective of the work reported here is to assess factors that could affect the outcome of a proposed open flame test for barrier fabrics (BF-open flame test. The BF-open flame test characterizes barrier effectiveness by monitoring the ignition of a flexible polyurethane foam (FPUF layer placed in contact with the upper side of the barrier fabric, exposed to a burner flame from below. Particular attention is given to the factors that influence the ignitibility of the FPUF, including thermal resistance, permeability, and structural integrity of the barrier fabrics (BFs. A number of barrier fabrics, displaying a wide range of the properties, are tested with the BF-open flame test. Visual observations of the FPUF burning behavior and BF char patterns, in addition to heat flux measurements on the unexposed side of the barrier fabrics, are used to assess the protective performance of the BF specimen under the open flame test conditions. The temperature and heat transfer measurements on the unexposed side of the BF and subsequent ranking of BFs for their thermal protective performance suggest that the BF-open flame test does not differentiate barrier fabrics based on their heat transfer properties. A similar conclusion is reached with regard to BF permeability characterized at room temperature. However, the outcome of this BF-open flame test is found to be heavily influenced by the structural integrity of thermally degraded BF. The BF-open flame test, in its current form, only ignited FPUF when structural failure of the barrier was observed.

  10. Taking Open Innovation to the Molecular Level - Strengths and Limitations.

    Science.gov (United States)

    Zdrazil, Barbara; Blomberg, Niklas; Ecker, Gerhard F

    2012-08-01

    The ever-growing availability of large-scale open data and its maturation is having a significant impact on industrial drug-discovery, as well as on academic and non-profit research. As industry is changing to an 'open innovation' business concept, precompetitive initiatives and strong public-private partnerships including academic research cooperation partners are gaining more and more importance. Now, the bioinformatics and cheminformatics communities are seeking for web tools which allow the integration of this large volume of life science datasets available in the public domain. Such a data exploitation tool would ideally be able to answer complex biological questions by formulating only one search query. In this short review/perspective, we outline the use of semantic web approaches for data and knowledge integration. Further, we discuss strengths and current limitations of public available data retrieval tools and integrated platforms.

  11. Performance Tuning of x86 OpenMP Codes with MAQAO

    Science.gov (United States)

    Barthou, Denis; Charif Rubial, Andres; Jalby, William; Koliai, Souad; Valensi, Cédric

    Failing to find the best optimization sequence for a given application code can lead to compiler generated codes with poor performances or inappropriate code. It is necessary to analyze performances from the assembly generated code to improve over the compilation process. This paper presents a tool for the performance analysis of multithreaded codes (OpenMP programs support at the moment). MAQAO relies on static performance evaluation to identify compiler optimizations and assess performance of loops. It exploits static binary rewriting for reading and instrumenting object files or executables. Static binary instrumentation allows the insertion of probes at instruction level. Memory accesses can be captured to help tune the code, but such traces require to be compressed. MAQAO can analyze the results and provide hints for tuning the code. We show on some examples how this can help users improve their OpenMP applications.

  12. OpenAPC. Open-Access-Publikationskosten als Open Data

    OpenAIRE

    Tullney, Marco

    2015-01-01

    Präsentationsfolien zum Vortrag „OpenAPC. Open-Access-Publikationskosten als Open Data“ in der Session „Ausgestaltung eines wissenschaftsadäquaten APC-Marktes: Grundsätze, Finanzierungsansätze und Management“ der Open-Access-Tage 2015 in Zürich (https://www.open-access.net/community/open-access-tage/open-access-tage-2015-zuerich/programm/#c1974)

  13. Observational tests of open strings in braneworld scenarios

    International Nuclear Information System (INIS)

    Freese, Katherine; Lewis, Matthew J.; Schaar, Jan Pieter van der

    2003-01-01

    We consider some consequences of describing the gauge and matter degrees of freedom in our universe by open strings, as suggested by the braneworld scenario. We focus on changes in causal structure described by the open string metric and investigate their observational implications. The causal structure is described not by the usual metric g μν , but instead by the open string metric, that incorporates the electromagnetic background and the NS-NS two-form, G μν = g μν -(2 π α') 2 (F 2 ) μν. The speed of light on the brane is now slower when propagating along directions transverse to electromagnetic fields or NS-NS two-forms, so that Lorentz invariance is explicitly broken. We describe experiments designed to detect the predicted variations in the open string causal structure on the brane: interferometric laboratory based experiments, experiments exploiting astrophysical electromagnetic fields, and experiments that rely on modification to special relativity. We show that current technology cannot probe beyond open string lengths of 10 -13 cm, corresponding to MeV string scales. We also point out that in a braneworld scenario, constraints on large scale electromagnetic fields together with a modest phenomenological bound on the NS-NS two-form naturally lead to a bound on the scale of canonical noncommutativity that is two orders of magnitude below the string length. We show that theoretical constraints on the NS-NS two-form bound the scale of noncommutativity to be well below the Planck length, (vertical barθvertical bar max )(1/2) -35 cm x (TeV/stringscale) 2 . (author)

  14. High-resolution heavily T2-weighted magnetic resonance imaging for evaluation of the pituitary stalk in children with ectopic neurohypophysis

    Energy Technology Data Exchange (ETDEWEB)

    Sanharawi, Imane El; Tzarouchi, Loukia [Hopital Robert Debre, APHP, Service de Radiologie Pediatrique, Paris (France); Cardoen, Liesbeth [Hopital Robert Debre, APHP, Service de Radiologie Pediatrique, Paris (France); Universite Paris Diderot, Paris (France); Martinerie, Laetitia; Leger, Juliane; Carel, Jean-Claude [Universite Paris Diderot, Paris (France); Inserm U1141, DHU PROTECT, Paris (France); Hopital Robert Debre, APHP, Service d' Endocrinologie Pediatrique, Paris (France); Elmaleh-Berges, Monique [Hopital Robert Debre, APHP, Service de Radiologie Pediatrique, Paris (France); Inserm U1141, DHU PROTECT, Paris (France); Alison, Marianne [Hopital Robert Debre, APHP, Service de Radiologie Pediatrique, Paris (France); Universite Paris Diderot, Paris (France); Inserm U1141, DHU PROTECT, Paris (France)

    2017-05-15

    In anterior pituitary deficiency, patients with non visible pituitary stalk have more often multiple deficiencies and persistent deficiency than patients with visible pituitary stalk. To compare the diagnostic value of a high-resolution heavily T2-weighted sequence to 1.5-mm-thick unenhanced and contrast-enhanced sagittal T1-weighted sequences to assess the presence of the pituitary stalk in children with ectopic posterior pituitary gland. We retrospectively evaluated the MRI data of 14 children diagnosed with ectopic posterior pituitary gland between 2010 and 2014. We evaluated the presence of a pituitary stalk using a sagittal high-resolution heavily T2-weighted sequence and a 1.5-mm sagittal T1-weighted turbo spin-echo sequence before and after contrast medium administration. A pituitary stalk was present on at least one of the sequences in 10 of the 14 children (71%). T2-weighted sequence depicted the pituitary stalk in all 10 children, whereas the 1.5-mm-thick T1-weighted sequence depicted 2/10 (20%) before contrast injection and 8/10 (80%) after contrast injection (P=0.007). Compared with 1.5-mm-thick contrast-enhanced T1-weighted sequences, high-resolution heavily T2-weighted sequence demonstrates better sensitivity in detecting the pituitary stalk in children with ectopic posterior pituitary gland, suggesting that contrast injection is unnecessary to assess the presence of a pituitary stalk in this setting. (orig.)

  15. High-resolution heavily T2-weighted magnetic resonance imaging for evaluation of the pituitary stalk in children with ectopic neurohypophysis.

    Science.gov (United States)

    El Sanharawi, Imane; Tzarouchi, Loukia; Cardoen, Liesbeth; Martinerie, Laetitia; Leger, Juliane; Carel, Jean-Claude; Elmaleh-Berges, Monique; Alison, Marianne

    2017-05-01

    In anterior pituitary deficiency, patients with non visible pituitary stalk have more often multiple deficiencies and persistent deficiency than patients with visible pituitary stalk. To compare the diagnostic value of a high-resolution heavily T2-weighted sequence to 1.5-mm-thick unenhanced and contrast-enhanced sagittal T1-weighted sequences to assess the presence of the pituitary stalk in children with ectopic posterior pituitary gland. We retrospectively evaluated the MRI data of 14 children diagnosed with ectopic posterior pituitary gland between 2010 and 2014. We evaluated the presence of a pituitary stalk using a sagittal high-resolution heavily T2-weighted sequence and a 1.5-mm sagittal T1-weighted turbo spin-echo sequence before and after contrast medium administration. A pituitary stalk was present on at least one of the sequences in 10 of the 14 children (71%). T2-weighted sequence depicted the pituitary stalk in all 10 children, whereas the 1.5-mm-thick T1-weighted sequence depicted 2/10 (20%) before contrast injection and 8/10 (80%) after contrast injection (P=0.007). Compared with 1.5-mm-thick contrast-enhanced T1-weighted sequences, high-resolution heavily T2-weighted sequence demonstrates better sensitivity in detecting the pituitary stalk in children with ectopic posterior pituitary gland, suggesting that contrast injection is unnecessary to assess the presence of a pituitary stalk in this setting.

  16. Benchmarking and Evaluating Unified Memory for OpenMP GPU Offloading

    Energy Technology Data Exchange (ETDEWEB)

    Mishra, Alok [Stony Brook Univ., Stony Brook, NY (United States); Li, Lingda [Brookhaven National Lab. (BNL), Upton, NY (United States); Kong, Martin [Brookhaven National Lab. (BNL), Upton, NY (United States); Finkel, Hal [Argonne National Lab. (ANL), Argonne, IL (United States); Chapman, Barbara [Stony Brook Univ., Stony Brook, NY (United States); Brookhaven National Lab. (BNL), Upton, NY (United States)

    2017-01-01

    Here, the latest OpenMP standard offers automatic device offloading capabilities which facilitate GPU programming. Despite this, there remain many challenges. One of these is the unified memory feature introduced in recent GPUs. GPUs in current and future HPC systems have enhanced support for unified memory space. In such systems, CPU and GPU can access each other's memory transparently, that is, the data movement is managed automatically by the underlying system software and hardware. Memory over subscription is also possible in these systems. However, there is a significant lack of knowledge about how this mechanism will perform, and how programmers should use it. We have modified several benchmarks codes, in the Rodinia benchmark suite, to study the behavior of OpenMP accelerator extensions and have used them to explore the impact of unified memory in an OpenMP context. We moreover modified the open source LLVM compiler to allow OpenMP programs to exploit unified memory. The results of our evaluation reveal that, while the performance of unified memory is comparable with that of normal GPU offloading for benchmarks with little data reuse, it suffers from significant overhead when GPU memory is over subcribed for benchmarks with large amount of data reuse. Based on these results, we provide several guidelines for programmers to achieve better performance with unified memory.

  17. Ecophysiological characterization of early successional biological soil crusts in heavily human-impacted areas

    Science.gov (United States)

    Szyja, Michelle; Büdel, Burkhard; Colesie, Claudia

    2018-04-01

    Ecophysiological characterizations of photoautotrophic communities are not only necessary to identify the response of carbon fixation related to different climatic factors, but also to evaluate risks connected to changing environments. In biological soil crusts (BSCs), the description of ecophysiological features is difficult, due to the high variability in taxonomic composition and variable methodologies applied. Especially for BSCs in early successional stages, the available datasets are rare or focused on individual constituents, although these crusts may represent the only photoautotrophic component in many heavily disturbed ruderal areas, such as parking lots or building areas with increasing surface area worldwide. We analyzed the response of photosynthesis and respiration to changing BSC water contents (WCs), temperature and light in two early successional BSCs. We investigated whether the response of these parameters was different between intact BSC and the isolated dominating components. BSCs dominated by the cyanobacterium Nostoc commune and dominated by the green alga Zygogonium ericetorum were examined. A major divergence between the two BSCs was their absolute carbon fixation rate on a chlorophyll basis, which was significantly higher for the cyanobacterial crust. Nevertheless, independent of species composition, both crust types and their isolated organisms had convergent features such as high light acclimatization and a minor and very late-occurring depression in carbon uptake at water suprasaturation. This particular setup of ecophysiological features may enable these communities to cope with a high variety of climatic stresses and may therefore be a reason for their success in heavily disturbed areas with ongoing human impact. However, the shape of the response was different for intact BSC compared to separated organisms, especially in absolute net photosynthesis (NP) rates. This emphasizes the importance of measuring intact BSCs under natural

  18. [Impacts of hydroelectric cascade exploitation on river ecosystem and landscape: a review].

    Science.gov (United States)

    Yang, Kun; Deng, Xi; Li, Xue-Ling; Wen, Ping

    2011-05-01

    Hydroelectric cascade exploitation, one of the major ways for exploiting water resources and developing hydropower, not only satisfies the needs of various national economic sectors, but also promotes the socio-economic sustainable development of river basin. unavoidable anthropogenic impacts on the entire basin ecosystem. Based on the process of hydroelectric cascade exploitation and the ecological characteristics of river basins, this paper reviewed the major impacts of hydroelectric cascade exploitation on dam-area ecosystems, river reservoirs micro-climate, riparian ecosystems, river aquatic ecosystems, wetlands, and river landscapes. Some prospects for future research were offered, e.g., strengthening the research of chain reactions and cumulative effects of ecological factors affected by hydroelectric cascade exploitation, intensifying the study of positive and negative ecological effects under the dam networks and their joint operations, and improving the research of successional development and stability of basin ecosystems at different temporal and spatial scales.

  19. Quantitative Microstructural Characterization of Thick Aluminum Plates Heavily Deformed Using Equal Channel Angular Extrusion

    DEFF Research Database (Denmark)

    Mishin, Oleg; Segal, V.M.; Ferrasse, S.

    2012-01-01

    A detailed quantitative analysis of the microstructure has been performed in three orthogonal planes of 15-mm-thick aluminum plates heavily deformed via two equal channel angular extrusion (ECAE) routes. One route was a conventional route A with no rotation between passes. Another route involved...... sequential 90 deg rotations about the normal direction (ND) between passes. The microstructure in the center of these plates, and especially the extent of microstructural heterogeneity, has been characterized quantitatively and compared with that in bar samples extruded via either route A or route Bc with 90...... Bc. © The Minerals, Metals & Materials Society and ASM International 2012...

  20. Features of the band structure and conduction mechanisms of n-HfNiSn heavily doped with Y

    Energy Technology Data Exchange (ETDEWEB)

    Romaka, V. A., E-mail: vromaka@polynet.lviv.ua [National Academy of Sciences of Ukraine, Pidstryhach Institute for Applied Problems of Mechanics and Mathematics (Ukraine); Rogl, P. [Universitet Wien, Institut für Physikalische Chemie (Austria); Romaka, V. V. [National University “Lvivska Politechnika” (Ukraine); Kaczorowski, D. [Polish Academy of Sciences, Institute of Low Temperature and Structure Research (Poland); Krayovskyy, V. Ya. [National University “Lvivska Politechnika” (Ukraine); Stadnyk, Yu. V.; Horyn, A. M. [Ivan Franko Lviv National University (Ukraine)

    2017-02-15

    The crystalline and electronic structures, energy, kinetic, and magnetic characteristics of n-HfNiSn semiconductor heavily doped with Y acceptor impurity are studied in the ranges: T = 80–400 K, N{sub A}{sup Y} ≈ 1.9 × 10{sup 20}–5.7 × 10{sup 21} cm{sup –3} (x = 0.01–0.30), and H ≤ 10 kG. The nature of the mechanism of structural defect generation is determined, which leads to a change in the band gap and the degree of semiconductor compensation, the essence of which is the simultaneous reduction and elimination of structural donor-type defects as a result of the displacement of ~1% of Ni atoms from the Hf (4a) site, and the generation of structural acceptor-type defects by substituting Hf atoms with Y atoms at the 4a site. The results of calculations of the electronic structure of Hf{sub 1–x}Y{sub x}NiSn are in agreement with the experimental data. The discussion is performed within the Shklovskii–Efros model of a heavily doped and compensated semiconductor.

  1. The exploitation of living resources in the Dutch Wadden Sea : a historical overview

    NARCIS (Netherlands)

    Wolff, W J

    An overview, based on written sources and personal observations, is presented of exploitation of living resources in and around the Dutch Wadden Sea during the past few centuries. It is concluded that before about 1900 exploitation was almost unrestricted. Exploitation of plants has been documented

  2. Open Standards, Open Source, and Open Innovation: Harnessing the Benefits of Openness

    Science.gov (United States)

    Committee for Economic Development, 2006

    2006-01-01

    Digitization of information and the Internet have profoundly expanded the capacity for openness. This report details the benefits of openness in three areas--open standards, open-source software, and open innovation--and examines the major issues in the debate over whether openness should be encouraged or not. The report explains each of these…

  3. PROBA-V Mission Exploitation Platform

    Directory of Open Access Journals (Sweden)

    Erwin Goor

    2016-07-01

    Full Text Available As an extension of the PROBA-Vegetation (PROBA-V user segment, the European Space Agency (ESA, de Vlaamse Instelling voor Technologisch Onderzoek (VITO, and partners TRASYS and Spacebel developed an operational Mission Exploitation Platform (MEP to drastically improve the exploitation of the PROBA-V Earth Observation (EO data archive, the archive from the historical SPOT-VEGETATION mission, and derived products by researchers, service providers, and thematic users. The analysis of the time series of data (petabyte range is addressed, as well as the large scale on-demand processing of the complete archive, including near real-time data. The platform consists of a private cloud environment, a Hadoop-based processing environment and a data manager. Several applications are released to the users, e.g., a full resolution viewing service, a time series viewer, pre-defined on-demand processing chains, and virtual machines with powerful tools and access to the data. After an initial release in January 2016 a research platform was deployed gradually, allowing users to design, debug, and test applications on the platform. From the PROBA-V MEP, access to, e.g., Sentinel-2 and Sentinel-3 data will be addressed as well.

  4. CryoSat Mission over the Ocean: A Review of Product Validations, Evolutions and Scientific Exploitation

    Science.gov (United States)

    Bouffard, J.; Abdalla, S.; Bojkov, B.; Calafat, F. M.; Cipollini, P.; Féménias, P.; Leuliette, E. W.; Naeije, M.; Parrinello, T.; Schrama, E. J. O.; Snaith, H. M.; Urien, S.

    2015-12-01

    The main objective of this paper is to present the status of the CryoSat (CS) Mission over the ocean. Launched in 2010, the polar-orbiting CS was primarily developed to measure the changes in the thickness of polar sea ice and the elevation of the ice sheets. Going beyond its ice-monitoring objective, CS is also a valuable source of data for the oceanographic community. The satellite's radar altimeter can indeed measure high resolution Sea-Level Height (SSH), Significant Wave Height (SWH), and Wind Speed (WS) from the open-ocean to the coast. To enable their full scientific and operational exploitation, the CS ocean products continuously evolve and need to be thoroughly validated via science-oriented diagnostics based on in situ data, models and other satellite missions. In support to ESA, the CS ocean validation team (NOCS, ECMWF and TU Delft/DEOS) conjointly conduct these analysis for both the near real time and offline products for the SSH, the SWH, and the WS parameters. The SSH is validated at the coast against sea level measured by a set of carefully selected tide gauges, HF radars and with the help of tools from the Radar Altimetry Database System (RADS). In the open ocean, the SSH is compared globally with the steric heights derived from ARGO temperature and salinity profiles. Near real time WS and SWH are monitored and validated against the corresponding parameters from ECMWF Integrated Forecast System (IFS), the Wavewatch III model, in-situ buoy and platform instruments as well as from other altimetric missions (Jason2 and Saral/AltiKa). Numerical experiments with CS SWH data assimilation have been recently conducted, showing positive impact on ECMWF model analysis and forecasts and leading to the operational assimilation of CS SWH in IFS. Based on the outcomes from these analysis and the scientific exploitations of CS over the ocean, ESA intends to upgrade the CryoSat Ocean processing chain for 2016.

  5. The implementation of the Open Access paradigm to the EC-FP7 MED-SUV (Mediterranean Supersite Volcanoes) project

    Science.gov (United States)

    Puglisi, Giuseppe; Brito, Fabrice; Caumont, Hervé; D'Auria, Luca; Fernandez, José; Mazzetti, Paolo; Mathieu, Pierre Philippe; Nativi, Stefano; Papeschi, Fabrizio; Pepe, Antonio; Reitano, Danilo; Sangianantoni, Agata; Scarpato, Giovanni; Spampinato, Letizia

    2016-04-01

    The overall goal of the EC-FP7 Mediterranean Supersite Volcanoes (MED-SUV) project is to apply the rationale of the Supersites GEO initiative to Campi Flegrei/Vesuvius and Mt. Etna to reduce the volcanic risk, by improving the understanding of the underlying geophysical processes, through the integration and sharing of the in-situ and Earth Observation (EO) data sets and the implementation of new instruments and monitoring systems. The project involves 24 EU and no-EU partners, including research and academic institutions, space agencies and SMEs. In this framework, the application of the Open Access paradigm has offered the opportunity to study and apply practical solutions concerning the data management (i.e. data polices, foreground exploitation and sustainability), intellectual property rights (i.e., ownership, licences, agreements) and technical issues (i.e., design and implementation of an interoperability e-infrastructure, access systems, etc.). This contribution presents pro and cons encountered in the project, as well as the main outcomes of the implementation of the Open Access to the Italian Supersites. This experience will be exploited in the building of international research infrastructures, such as EPOS, and the outcomes of the project will contribute to foster the Open Access to the research data in a wide context, as the GEO-GEOSS framework.

  6. Simultaneous rota-stenting and transcatheter aortic valve implantation for patients with heavily calcified coronary stenosis and aortic stenosis

    Directory of Open Access Journals (Sweden)

    Yung-Tsai Lee

    2016-09-01

    Full Text Available Given that coronary artery disease (CAD in octogenarians undergoing transcatheter aortic valve implantation (TAVI often presents with more complex lesions and extensive calcification, rotational atherectomy (RA may be needed in some cases before stenting. However, data regarding the feasibility and safety of simultaneous RA during TAVI using the Medtronic CoreValve (MCV; Medtronic, Minneapolis, MN, USA system are lacking. Three out of 107 (2.8% patients (2 females, average age 85.6 years, mean aortic valve area 0.5 cm2, mean left ventricular ejection fraction 39%, mean Logistic EuroScore 70%, with complex, heavily calcified coronary stenosis, and severe valvular aortic stenosis (AS were treated with TAVI and RA due to high surgical risk. After balloon valvuloplasty, all coronary lesions were successfully treated with RA and stenting, immediately followed by transfemoral TAVI with a self-expandable MCV. Our data suggested that in the very elderly patients with severe and heavily calcified CAD and AS who were turned down for cardiac surgery, RA and stenting followed by TAVI may be performed successfully in a combined, single-stage procedure.

  7. Risk assessment by dynamic representation of vulnerability, exploitation, and impact

    Science.gov (United States)

    Cam, Hasan

    2015-05-01

    Assessing and quantifying cyber risk accurately in real-time is essential to providing security and mission assurance in any system and network. This paper presents a modeling and dynamic analysis approach to assessing cyber risk of a network in real-time by representing dynamically its vulnerabilities, exploitations, and impact using integrated Bayesian network and Markov models. Given the set of vulnerabilities detected by a vulnerability scanner in a network, this paper addresses how its risk can be assessed by estimating in real-time the exploit likelihood and impact of vulnerability exploitation on the network, based on real-time observations and measurements over the network. The dynamic representation of the network in terms of its vulnerabilities, sensor measurements, and observations is constructed dynamically using the integrated Bayesian network and Markov models. The transition rates of outgoing and incoming links of states in hidden Markov models are used in determining exploit likelihood and impact of attacks, whereas emission rates help quantify the attack states of vulnerabilities. Simulation results show the quantification and evolving risk scores over time for individual and aggregated vulnerabilities of a network.

  8. Three-phase multilevel inverter configuration for open-winding high power application

    DEFF Research Database (Denmark)

    Sanjeevikumar, Padmanaban; Blaabjerg, Frede; Wheeler, Patrick William

    2015-01-01

    This paper work exploits a new dual open-winding three-phase multilevel inverter configuration suitable for high power medium-voltage applications. Modular structure comprised of standard three-phase voltage source inverter (VSI) along with one additional bi-directional semiconductor device (MOSFET...... for implementation purpose. Proposed dual-inverter configuration generates multilevel outputs with benefit includes reduced THD and dv/dt in comparison to other dual-inverter topologies. Complete model of the multilevel ac drive is developed with simple MSCFM modulation in Matlab/PLECs numerical software...

  9. Operation of a semiconductor opening switch at ultrahigh current densities

    International Nuclear Information System (INIS)

    Lyubutin, S. K.; Rukin, S. N.; Slovikovsky, B. G.; Tsyranov, S. N.

    2012-01-01

    The operation of a semiconductor opening switch (SOS diode) at cutoff current densities of tens of kA/cm 2 is studied. In experiments, the maximum reverse current density reached 43 kA/cm 2 for ∼40 ns. Experimental data on SOS diodes with a p + -p-n-n + structure and a p-n junction depth from 145 to 180 μm are presented. The dynamics of electron-hole plasma in the diode at pumping and current cutoff stages is studied by numerical simulation methods. It is shown that current cutoff is associated with the formation of an electric field region in a thin (∼45 μm) layer of the structure’s heavily doped p-region, in which the acceptor concentration exceeds 10 16 cm −3 , and the current cutoff process depends weakly on the p-n junction depth.

  10. Panel discussion on exploitation of geothermal resources in thermal zones

    Energy Technology Data Exchange (ETDEWEB)

    Viramonte, J G; Mange, J; Stefani, G

    1978-03-01

    The topics discussed include the major known geothermal resources, varying ways of exploiting geothermal resources, technical and economic difficulties in the exploitation, the place of geothermal energy in the total energy policy of a given country, advanced exploration techniques, and indications of needed areas of study. The panelists represented most of the South American countries, Mexico, and Italy. (JSR)

  11. Fast Response, Open-Celled Porous, Shape Memory Effect Actuators with Integrated Attachments

    Science.gov (United States)

    Jardine, Andrew Peter (Inventor)

    2015-01-01

    This invention relates to the exploitation of porous foam articles exhibiting the Shape Memory Effect as actuators. Each foam article is composed of a plurality of geometric shapes, such that some geometric shapes can fit snugly into or around rigid mating connectors that attach the Shape Memory foam article intimately into the load path between a static structure and a moveable structure. The foam is open-celled, composed of a plurality of interconnected struts whose mean diameter can vary from approximately 50 to 500 microns. Gases and fluids flowing through the foam transfer heat rapidly with the struts, providing rapid Shape Memory Effect transformations. Embodiments of porous foam articles as torsional actuators and approximately planar structures are disposed. Simple, integral connection systems exploiting the ability to supply large loads to a structure, and that can also supply hot and cold gases and fluids to effect rapid actuation are also disposed.

  12. Local Perspectives on Environmental Insecurity and Its Influence on Illegal Biodiversity Exploitation.

    Directory of Open Access Journals (Sweden)

    Meredith L Gore

    Full Text Available Environmental insecurity is a source and outcome of biodiversity declines and social conflict. One challenge to scaling insecurity reduction policies is that empirical evidence about local attitudes is overwhelmingly missing. We set three objectives: determine how local people rank risk associated with different sources of environmental insecurity; assess perceptions of environmental insecurity, biodiversity exploitation, myths of nature and risk management preferences; and explore relationships between perceptions and biodiversity exploitation. We conducted interviews (N = 88 with residents of Madagascar's Torotorofotsy Protected Area, 2014. Risk perceptions had a moderate effect on perceptions of environmental insecurity. We found no effects of environmental insecurity on biodiversity exploitation. Results offer one if not the first exploration of local perceptions of illegal biodiversity exploitation and environmental security. Local people's perception of risk seriousness associated with illegal biodiversity exploitation such as lemur hunting (low overall may not reflect perceptions of policy-makers (considered to be high. Discord is a key entry point for attention.

  13. An Exploitability Analysis Technique for Binary Vulnerability Based on Automatic Exception Suppression

    Directory of Open Access Journals (Sweden)

    Zhiyuan Jiang

    2018-01-01

    Full Text Available To quickly verify and fix vulnerabilities, it is necessary to judge the exploitability of the massive crash generated by the automated vulnerability mining tool. While the current manual analysis of the crash process is inefficient and time-consuming, the existing automated tools can only handle execute exceptions and some write exceptions but cannot handle common read exceptions. To address this problem, we propose a method of determining the exploitability based on the exception type suppression. This method enables the program to continue to execute until an exploitable exception is triggered. The method performs a symbolic replay of the crash sample, constructing and reusing data gadget, to bypass the complex exception, thereby improving the efficiency and accuracy of vulnerability exploitability analysis. The testing of typical CGC/RHG binary software shows that this method can automatically convert a crash that cannot be judged by existing analysis tools into a different crash type and judge the exploitability successfully.

  14. The ALARA project of the EDF nuclear park exploitation

    International Nuclear Information System (INIS)

    Potoczek, J.

    1998-01-01

    To bring the exploitation of the nuclear park of EDF at the level of the best exploiters in the world in matter of collective and individual dosimetry, the ALARA principle coordinates numerous actions: to associate the temporary societies, to define common language, methods and tools for the whole park to organize a level effect in this area, to optimize the maintenance that is expansive in radiation doses, to make the different levels of management responsible on dosimetric stakes, to reduce the singular sources of exposure, to assure the organisation and exploitation of the experience back in this field and adapt consequently the system of information. The results are cheerful and the objectives for 2000 are: less than 1.2 h.Sv by year and by reactor, no intervener whom annual radiation dose is upper than 20 mSv (out of exceptional case). (N.C.)

  15. Induction hardening of tool steel for heavily loaded aircraft engine components

    Directory of Open Access Journals (Sweden)

    Rokicki P.

    2017-03-01

    Full Text Available Induction hardening is an innovative process allowing modification of the materials surface with more effective, cheaper and more reproducible way to compare with conventional hardening methods used in the aerospace industry. Unfortunately, high requirements and strict regulation concerning this branch of the industry force deep research allowing to obtain results that would be used for numerical modelling of the process. Only by this way one is able to start the industrial application of the process. The main scope of presented paper are results concerning investigation of microstructure evolution of tool steel after single-frequency induction hardening process. The specimens that aim in representing final industrial products (as heavily loaded gears, were heat- -treated with induction method and subjected to metallographic preparation, after which complex microstructure investigation was performed. The results obtained within the research will be a basis for numerical modelling of the process of induction hardening with potential to be introduced for the aviation industrial components.

  16. Opening remarks; special session 4. Burning issues and smoke screens: heat and light in southern forests

    Science.gov (United States)

    Peter J. Roussopoulos

    1998-01-01

    In Roussopoulos’ opening remarks he included nine assertions about southern forests: 1) that their characteristics are unique; 2) that they recovered from abusive agricultural practices and exploitive forest extraction in the 19th and early 20th centuries; 3) that they are brand new; 4) that social forces driving change will intensify at all scales; 5) that the...

  17. Due diligence in the open-access explosion era: choosing a reputable journal for publication.

    Science.gov (United States)

    Masten, Yondell; Ashcraft, Alyce

    2017-11-15

    Faculty are required to publish. Naïve and "in-a-hurry-to-publish" authors seek to publish in journals where manuscripts are rapidly accepted. Others may innocently submit to one of an increasing number of questionable/predatory journals, where predatory is defined as practices of publishing journals for exploitation of author-pays, open-access publication model by charging authors publication fees for publisher profit without provision of expected services (expert peer review, editing, archiving, and indexing published manuscripts) and promising almost instant publication. Authors may intentionally submit manuscripts to predatory journals for rapid publication without concern for journal quality. A brief summary of the open access "movement," suggestions for selecting reputable open access journals, and suggestion for avoiding predatory publishers/journals are described. The purpose is to alert junior and seasoned faculty about predatory publishers included among available open access journal listings. Brief review of open access publication, predatory/questionable journal characteristics, suggestions for selecting reputable open access journals and avoiding predatory publishers/journals are described. Time is required for intentionally performing due diligence in open access journal selection, based on publisher/journal quality, prior to manuscript submission or authors must be able to successfully withdraw manuscripts when submission to a questionable or predatory journal is discovered. © FEMS 2017.

  18. An economic comparison of the commercial and recreational ...

    African Journals Online (AJOL)

    The most important Namibian linefish species, the silver kob Argyrosomus inodorus, is currently heavily exploited, and in order to ensure its survival catch restrictions are being introduced. However, kob are exploited both by recreational anglers and by commercial vessels, and it is important to examine the economics of ...

  19. The concept of exploitation in international human trafficking law

    OpenAIRE

    von der Pütten, Tuija Kaarina

    2017-01-01

    Human trafficking is commonly known as a criminal practice that takes place in the framework of sex trade: women and children are trafficked within a state, or from one state to another, for the purpose of sexual exploitation. Similarly, the early 20th century international conventions aimed to tackle ‘white slave traffic’, trafficking of women and children for sexual exploitation. However, it is misleading to see trafficking only within this context. People are trafficked so that they can be...

  20. A streamlined DNA tool for global identification of heavily exploited coastal shark species (genus Rhizoprionodon.

    Directory of Open Access Journals (Sweden)

    Danillo Pinhal

    Full Text Available Obtaining accurate species-specific landings data is an essential step toward achieving sustainable shark fisheries. Globally distributed sharpnose sharks (genus Rhizoprionodon exhibit life-history characteristics (rapid growth, early maturity, annual reproduction that suggests that they could be fished in a sustainable manner assuming an investment in monitoring, assessment and careful management. However, obtaining species-specific landings data for sharpnose sharks is problematic because they are morphologically very similar to one another. Moreover, sharpnose sharks may also be confused with other small sharks (either small species or juveniles of large species once they are processed (i.e., the head and fins are removed. Here we present a highly streamlined molecular genetics approach based on seven species-specific PCR primers in a multiplex format that can simultaneously discriminate body parts from the seven described sharpnose shark species commonly occurring in coastal fisheries worldwide. The species-specific primers are based on nucleotide sequence differences among species in the nuclear ribosomal internal transcribed spacer 2 locus (ITS2. This approach also distinguishes sharpnose sharks from a wide range of other sharks (52 species and can therefore assist in the regulation of coastal shark fisheries around the world.

  1. Assessing uncertainty and risk in exploited marine populations

    International Nuclear Information System (INIS)

    Fogarty, M.J.; Mayo, R.K.; O'Brien, L.; Serchuk, F.M.; Rosenberg, A.A.

    1996-01-01

    The assessment and management of exploited fish and invertebrate populations is subject to several types of uncertainty. This uncertainty translates into risk to the population in the development and implementation of fishery management advice. Here, we define risk as the probability that exploitation rates will exceed a threshold level where long term sustainability of the stock is threatened. We distinguish among several sources of error or uncertainty due to (a) stochasticity in demographic rates and processes, particularly in survival rates during the early fife stages; (b) measurement error resulting from sampling variation in the determination of population parameters or in model estimation; and (c) the lack of complete information on population and ecosystem dynamics. The first represents a form of aleatory uncertainty while the latter two factors represent forms of epistemic uncertainty. To illustrate these points, we evaluate the recent status of the Georges Bank cod stock in a risk assessment framework. Short term stochastic projections are made accounting for uncertainty in population size and for random variability in the number of young surviving to enter the fishery. We show that recent declines in this cod stock can be attributed to exploitation rates that have substantially exceeded sustainable levels

  2. Commercial sexual exploitation and sex trafficking of adolescents.

    Science.gov (United States)

    Chung, Richard J; English, Abigail

    2015-08-01

    This review describes the current state of commercial sexual exploitation and sex trafficking of adolescents in the United States and globally, the legal and health implications of this severe form of abuse, and the roles that pediatric and adolescent healthcare providers can play in addressing this issue. Although this form of exploitation and abuse is shrouded in secrecy, pediatric and adolescent healthcare providers are well positioned to respond when it arises. However, awareness and understanding of the issue are generally lacking among healthcare professionals, currently limiting their effectiveness in combating this problem. Although the empirical evidence base available to guide clinical care of victims of trafficking remains limited given the secretive nature of the abuse, important contributions to the multidisciplinary literature on this issue have been made in recent years, including the Institute of Medicine's landmark report in the United States. Commercial sexual exploitation and sex trafficking of adolescents represent a human rights tragedy that remains inadequately addressed. As preeminent advocates for the health and well-being of adolescents, pediatric and adolescent healthcare providers can play a crucial role in advancing efforts not only to intervene but also to prevent further victimization of vulnerable youth.

  3. Characteristics of Polybrominated Diphenyl Ethers Released from Thermal Treatment and Open Burning of E-Waste.

    Science.gov (United States)

    Li, Ting-Yu; Zhou, Jun-Feng; Wu, Chen-Chou; Bao, Lian-Jun; Shi, Lei; Zeng, Eddy Y

    2018-04-17

    Primitive processing of e-waste potentially releases abundant organic contaminants to the environment, but the magnitudes and mechanisms remain to be adequately addressed. We conducted thermal treatment and open burning of typical e-wastes, that is, plastics and printed circuit boards. Emission factors of the sum of 39 polybrominated diphenyl ethers (∑ 39 PBDE) were 817-1.60 × 10 5 ng g -1 in thermal treatment and nondetected-9.14 × 10 4 ng g -1 , in open burning. Airborne particles (87%) were the main carriers of PBDEs, followed by residual ashes (13%) and gaseous constituents (0.3%), in thermal treatment, while they were 30%, 43% and 27% in open burning. The output-input mass ratios of ∑ 39 PBDE were 0.12-3.76 in thermal treatment and 0-0.16 in open burning. All PBDEs were largely affiliated with fine particles, with geometric mean diameters at 0.61-0.83 μm in thermal degradation and 0.57-1.16 μm in open burning from plastic casings, and 0.44-0.56 and nondetected- 0.55 μm, from printed circuit boards. Evaporation and reabsorption may be the main emission mechanisms for lightly brominated BDEs, but heavily brominated BDEs tend to affiliate with particles from heating or combustion. The different size distributions of particulate PBDEs in emission sources and adjacent air implicated a noteworthy redisposition process during atmospheric dispersal.

  4. Exploitation of linkage learning in evolutionary algorithms

    CERN Document Server

    Chen, Ying-ping

    2010-01-01

    The exploitation of linkage learning is enhancing the performance of evolutionary algorithms. This monograph examines recent progress in linkage learning, with a series of focused technical chapters that cover developments and trends in the field.

  5. Structural coarsening during annealing of an aluminum plate heavily deformed using ECAE

    DEFF Research Database (Denmark)

    Mishin, Oleg V.; Zhang, Yubin; Godfrey, A.

    2015-01-01

    The microstructure and softening behaviour have been investigated in an aluminum plate heavily deformed by equal channel angular extrusion and subsequently annealed at 170 °C. It is found that at this temperature the microstructure evolves by coarsening with no apparent signs of recrystallization...... even after 2 h of annealing. Both coarsening and softening are rapid within first 10 minutes of annealing followed by a slower evolution with increasing annealing duration. Evidence of triple junction (TJ) motion during coarsening is obtained by inspecting the microstructure in one region using...... the electron backscatter diffraction technique both before and after annealing for 10 minutes. The fraction of fast-migrating TJs is found to strongly depend of the type of boundaries composing a junction. The greatest fraction of fast-migrating TJs is in the group, where all boundaries forming a junction...

  6. Annexe 3. Constitution d'une exploitation à Homs

    OpenAIRE

    2015-01-01

    ‘Abd al-Laṭīf, né en 1925, est jardinier à Horns. Il exploite avec son fils aîné et l'aide de deux de ses petits-fils un jardin de quelques 35 dunum (3,5 hectares) situé dans le zūr al-Ǧdīdeh, secteur central de la zone agricole. Cette grande exploitation, constituée de plusieurs parcelles ayant différents statuts, est en partie le produit d'une histoire familiale dont je voudrais présenter ici brièvement les principaux aspects. Figure 50 – Alliances matrimoniales entre la lignée de ‘Abbās e...

  7. Open Data for Research and Strategic Monitoring in the Pharmaceutical and Biotech Industry

    Directory of Open Access Journals (Sweden)

    Baldissera Giovani

    2017-04-01

    Full Text Available Open data is considered the new oil. As oil can be used to produce fertilisers, pesticides, lubricants, plastics and many other derivatives, so data is considered the commodity to use and re-use to create value. The number of initiatives supporting free access to data has increased in the last years and open data is becoming the norm in the public sector; the approach empowers stakeholders and nurtures the economy. Even if at early stage, private companies also are adapting to the open data market. A survey was conducted to which thirteen companies of different size (from micro enterprises to world-leading pharmas in the pharmaceutical and biotech sector and representing four business models archetypes of companies exploiting open data (aggregators, developers, enrichers and enablers participated. The information collected provides a snapshot of the use of open data by the pharmaceutical and biotech industry in 2015–2016. The companies interviewed use open data to complement proprietary data for research purposes, to implement licensing-in/licensing-out strategies, to map partnerships and connections among players or to identify key expertise and hire staff. Pharmaceutical and biotech companies have made of the protection of knowledge a dogma at the foundation of their business models, but using and contributing to the open data movement may change their approach to intellectual property and innovation.

  8. Backward diodes using heavily Mg-doped GaN growth by ammonia molecular-beam epitaxy

    Science.gov (United States)

    Okumura, Hironori; Martin, Denis; Malinverni, Marco; Grandjean, Nicolas

    2016-02-01

    We grew heavily Mg-doped GaN using ammonia molecular-beam epitaxy. The use of low growth temperature (740 °C) allows decreasing the incorporation of donor-like defects (p-type doping compensation. As a result, a net acceptor concentration of 7 × 1019 cm-3 was achieved, and the hole concentration measured by Hall effect was as high as 2 × 1019 cm-3 at room temperature. Using such a high Mg doping level, we fabricated GaN backward diodes without polarization-assisted tunneling. The backward diodes exhibited a tunneling-current density of 225 A/cm2 at a reverse bias of -1 V at room temperature.

  9. The Nature of the Torus in the Heavily Obscured AGN Markarian 3: an X-Ray Study

    Science.gov (United States)

    Guainazzi, M.; Risaliti, G.; Awaki, H.; Arevalo, P.; Bauer, F. E.; Bianchi, S.; Boggs, S.E; Brandt, W. N.; Brightman, M.; Christensen, F. E.; hide

    2016-01-01

    In this paper, we report the results of an X-ray monitoring campaign on the heavily obscured Seyfert galaxy, Markarian 3, carried out between the fall of 2014 and the spring of 2015 with NuSTAR, Suzaku and XMMNewton. The hard X-ray spectrum of Markarian 3 is variable on all the time-scales probed by our campaign, down to a few days. The observed continuum variability is due to an intrinsically variable primary continuum seen in transmission through a large, but still Compton-thin column density (N(sub H) approx. 0.8-1.1 x 10(exp 24)/sq cm). If arranged in a spherical-toroidal geometry, the Compton scattering matter has an opening angle approx. 66deg, and is seen at a grazing angle through its upper rim (inclination angle approx. 70deg). We report a possible occultation event during the 2014 campaign. If the torus is constituted by a system of clouds sharing the same column density, this event allows us to constrain their number (17 +/- 5) and individual column density, [approx. (4.9 +/- 1.5) x 10(exp 22)/ sq cm]. The comparison of IR and X-ray spectroscopic results with state-of-the art torus models suggests that at least two-thirds of the X-ray obscuring gas volume might be located within the dust sublimation radius. We report also the discovery of an ionized absorber, characterized by variable resonant absorption lines due to He- and H-like iron. This discovery lends support to the idea that moderate column density absorbers could be due to clouds evaporated at the outer surface of the torus, possibly accelerated by the radiation pressure due to the central AGN emission leaking through the patchy absorber.

  10. SEXUAL EXPLOITATION AND ABUSE BY UN PEACEKEEPERS ...

    African Journals Online (AJOL)

    Allaiac

    from sexual exploitation and sexual abuse (ST/SGB/2003/13) (UN, Secretary .... In addition, in most situations, UN personnel have enjoyed immunity from local .... 9 Official UN statistics show a higher incidence of allegations reported against.

  11. Development of Mixed Mode MPI / OpenMP Applications

    Directory of Open Access Journals (Sweden)

    Lorna Smith

    2001-01-01

    Full Text Available MPI / OpenMP mixed mode codes could potentially offer the most effective parallelisation strategy for an SMP cluster, as well as allowing the different characteristics of both paradigms to be exploited to give the best performance on a single SMP. This paper discusses the implementation, development and performance of mixed mode MPI / OpenMP applications. The results demonstrate that this style of programming will not always be the most effective mechanism on SMP systems and cannot be regarded as the ideal programming model for all codes. In some situations, however, significant benefit may be obtained from a mixed mode implementation. For example, benefit may be obtained if the parallel (MPI code suffers from: poor scaling with MPI processes due to load imbalance or too fine a grain problem size, memory limitations due to the use of a replicated data strategy, or a restriction on the number of MPI processes combinations. In addition, if the system has a poorly optimised or limited scaling MPI implementation then a mixed mode code may increase the code performance.

  12. Olfactory source localization in the open field using one or both nostrils.

    Science.gov (United States)

    Welge-Lussen, A; Looser, G L; Westermann, B; Hummel, T

    2014-03-01

    This study aims to examine humans ́ abilities to localize odorants within the open field. Young participants were tested on a localization task using a relatively selective olfactory stimulus (2-phenylethyl-alcohol, PEA) and cineol, an odorant with a strong trigeminal component. Participants were blindfolded and had to localize an odorant source at 2 m distance (far-field condition) and a 0.4 m distance (near-field condition) with either two nostrils open or only one open nostril. For the odorant with trigeminal properties, the number of correct trials did not differ when one or both nostrils were used, while more PEA localization trials were correctly completed with both rather than one nostril. In the near-field condition, correct localization was possible in 72-80% of the trials, irrespective of the odorant and the number of nostrils used. Localization accuracy, measured as spatial deviation from the olfactory source, was significantly higher in the near-field compared to the far-field condition, but independent of the odorant being localized. Odorant localization within the open field is difficult, but possible. In contrast to the general view, humans seem to be able to exploit the two-nostril advantage with increasing task difficulty.

  13. The exploitation of swamp plants for dewatering liquid sewage sludge

    Directory of Open Access Journals (Sweden)

    Jiří Šálek

    2006-01-01

    Full Text Available The operators of little rural wastewater treatment plants have been interested in economic exploitation of sewage sludge in local conditions. The chance is searching simply and natural ways of processing and exploitation stabilized sewage sludge in agriculture. Manure substrate have been obtained by composting waterless sewage sludge including rest plant biomass after closing 6–8 years period of filling liquid sewage sludge to the basin. Main attention was focused on exploitation of swamp plants for dewatering liquid sewage sludge and determination of influence sewage sludge on plants, intensity and course of evapotranspiration and design and setting of drying beds. On the base of determined ability of swamp plants evapotranspiration were edited suggestion solutions of design and operation sludge bed facilities in the conditions of small rural wastewater treatment plant.

  14. Cultural Work as a Site of Struggle: Freelancers and Exploitation

    Directory of Open Access Journals (Sweden)

    Nicole S. Cohen

    2012-05-01

    Full Text Available This paper argues that Marxist political economy is a useful framework for understanding contemporary conditions of cultural work. Drawing on Karl Marx’s foundational concepts, labour process theory, and a case study of freelance writers, I argue that the debate over autonomy and control in cultural work ignores exploitation in labour-capital relationships, which is a crucial process shaping cultural work. To demonstrate the benefits of this approach, I discuss two methods media firms use to extract surplus value from freelance writers: exploitation of unpaid labour time and exploitation of intellectual property through aggressive copyright regimes. I argue that a Marxist perspective can uncover the dynamics that are transforming cultural industries and workers’ experiences. From this perspective, cultural work is understood as a site of struggle.

  15. Financial Exploitation Is Associated With Structural and Functional Brain Differences in Healthy Older Adults.

    Science.gov (United States)

    Spreng, R Nathan; Cassidy, Benjamin N; Darboh, Bri S; DuPre, Elizabeth; Lockrow, Amber W; Setton, Roni; Turner, Gary R

    2017-10-01

    Age-related brain changes leading to altered socioemotional functioning may increase vulnerability to financial exploitation. If confirmed, this would suggest a novel mechanism leading to heightened financial exploitation risk in older adults. Development of predictive neural markers could facilitate increased vigilance and prevention. In this preliminary study, we sought to identify structural and functional brain differences associated with financial exploitation in older adults. Financially exploited older adults (n = 13, 7 female) and a matched cohort of older adults who had been exposed to, but avoided, a potentially exploitative situation (n = 13, 7 female) were evaluated. Using magnetic resonance imaging, we examined cortical thickness and resting state functional connectivity. Behavioral data were collected using standardized cognitive assessments, self-report measures of mood and social functioning. The exploited group showed cortical thinning in anterior insula and posterior superior temporal cortices, regions associated with processing affective and social information, respectively. Functional connectivity encompassing these regions, within default and salience networks, was reduced, while between network connectivity was increased. Self-reported anger and hostility was higher for the exploited group. We observed financial exploitation associated with brain differences in regions involved in socioemotional functioning. These exploratory and preliminary findings suggest that alterations in brain regions implicated in socioemotional functioning may be a marker of financial exploitation risk. Large-scale, prospective studies are necessary to validate this neural mechanism, and develop predictive markers for use in clinical practice. © The Author 2017. Published by Oxford University Press on behalf of The Gerontological Society of America.

  16. Availability Control for Means of Transport in Decisive Semi-Markov Models of Exploitation Process

    Science.gov (United States)

    Migawa, Klaudiusz

    2012-12-01

    The issues presented in this research paper refer to problems connected with the control process for exploitation implemented in the complex systems of exploitation for technical objects. The article presents the description of the method concerning the control availability for technical objects (means of transport) on the basis of the mathematical model of the exploitation process with the implementation of the decisive processes by semi-Markov. The presented method means focused on the preparing the decisive for the exploitation process for technical objects (semi-Markov model) and after that specifying the best control strategy (optimal strategy) from among possible decisive variants in accordance with the approved criterion (criteria) of the activity evaluation of the system of exploitation for technical objects. In the presented method specifying the optimal strategy for control availability in the technical objects means a choice of a sequence of control decisions made in individual states of modelled exploitation process for which the function being a criterion of evaluation reaches the extreme value. In order to choose the optimal control strategy the implementation of the genetic algorithm was chosen. The opinions were presented on the example of the exploitation process of the means of transport implemented in the real system of the bus municipal transport. The model of the exploitation process for the means of transports was prepared on the basis of the results implemented in the real transport system. The mathematical model of the exploitation process was built taking into consideration the fact that the model of the process constitutes the homogenous semi-Markov process.

  17. Geographical aspects of exploitation of nuclear energy in Europe

    International Nuclear Information System (INIS)

    Kurucova, S.

    2007-05-01

    The topic of exploitation of nuclear energy is becoming increasingly actual in the present time in connection with frequently discussed question of 'renaissance of nuclear energetics'. The work is aimed at research of geographical aspects of exploitation of nuclear energy for military and civil purposes on the territory of Europe. The base of work represents the analysis of theoretical aspects of research of energy, mainly of nuclear energy. The work examines the historical development of exploitation of nuclear energy since its discovery, through development of military nuclear industry in Europe, big attention is paid to spreading of nuclear energetics on the territory of Europe from its beginnings up to the present time. The main part of the work represents the analysis of the present situation of exploitation of nuclear energy for civil purposes in Europe. The attention is paid to so-called nuclear fuel cycle as complex chain of several reciprocally interconnected operations of nuclear fuel treatment. The monitoring of spatial relations among individual countries within their nuclear fuel cycles is emphasised. The analysis of historical development and of the present state of nuclear energetics finished up in the outline of the perspectives of its further development in Europe. The analysis of the tendencies of evolution of world energetic economy mentions on the trend of growth of energy consumption in the world and Europe, as well as on the important position of nuclear energy in the structure of energy sources. Summary in English language is included. (author)

  18. INFLUENCE OF THE TECTONIC FABRIC ON THE OPEN PIT DESING IN THE ¨ZAPREŠIČKI IVANEC¨ NEAR ZAGREB DOLOMITE QUARRY

    Directory of Open Access Journals (Sweden)

    Karlo Braun

    1989-12-01

    Full Text Available In the »Zaprešički Ivanec« dolomite open pit near Zagreb, exploitation is carried out according to data obtained by analysis of the tectonic fabric of the rock massif, by measurement of the longitudinal seismic waves velocity, and effects of the seismic waves provoked blasting. In this article the fundamental data obtained by structural analysis and measurements with their influence on the pit design and the optimization of blasting conditions, are reviewed. Results of the longtime exploitation verify such complex aproach to deposit work-out (the paper is published in Croatian.

  19. Exploiting HRM in support of lean manufacturing

    DEFF Research Database (Denmark)

    Jørgensen, Frances; Matthiesen, Rikke

    The purpose of this paper is to investigate the ways in HRM practices are-and could potentially be-exploited to support lean manufacturing in practice. First, a review of the pertinent literature regarding HRM, SHRM, and lean manufacturing is presented to provide an understanding of the mechanisms...... by which HRM practices could, theoretically, be used to support a lean implementation. Data presented in the paper are derived from 1) a longitudinal case study on lean implementation and 2) from managers currently involved with lean manufacturing in a second company. The relevant literature and the data...... depicting the potential role in supporting HRM/lean integrated practices. The analysis of the model with respect to the theoretical background emphasizes a number of areas in which HRM could be more fully exploited in order to more successfully support lean implementation, for example, by stressing HRM...

  20. SEXUAL EXPLOITATION OF CHILDREN IN THE TOURISM – THE DARK SIDE OF TOURISM

    Directory of Open Access Journals (Sweden)

    Janez Mekinc

    2015-05-01

    Full Text Available The underlying causes of sexual exploitation and prostitution are poverty, inequality between women and men, high population growth and rural - urban migration. Victims are, predominantly, women and children with lower socio-economic status. One particular form of sexual exploitation is child sex tourism. This ruthless exploitation of children can be found throughout the world, predominantly in the third world and developing countries. Children, mainly between the ages of 6 to 14 years, are trapped in a vicious battle between large impoverished families who are dependent on their support, and a society that ruthlessly exploits them. In line with the trend in increasing child exploitation, there is, also, increasing exploitation of children for the purposes of child sex tourism. Based on the analysis of forms, reasons, impacts, consequences and trends of child sex tourism, it has been possible to develop from these findings some necessary measures to prevent this practice from occurring. Analysis of the phenomenon of child sex tourism has highlighted some fundamental conditions for preventing it becoming a social phenomenon. These include the strict implementation of laws against child labour and the political will to enforce them.

  1. The ANTOSTRAT legacy: Science collaboration and international transparency in potential marine mineral resource exploitation of Antarctica

    Science.gov (United States)

    Cooper, Alan; Barker, Peter; Barrett, Peter; Behrendt, John; Brancolini, Giuliano; Childs, Jonathan R.; Escutia, Carlota; Jokat, Wilfried; Kristoffersen, Yngve; Leitchenkov, German; Stagg, Howard; Tanahashi, Manabu; Wardell, Nigel; Webb, Peter

    2009-01-01

    The Antarctic Offshore Stratigraphy project (ANTOSTRAT; 1989–2002) was an extremely successful collaboration in international marine geological science that also lifted the perceived “veil of secrecy” from studies of potential exploitation of Antarctic marine mineral resources. The project laid the groundwork for circum-Antarctic seismic, drilling, and rock coring programs designed to decipher Antarctica’s tectonic, stratigraphic, and climate histories. In 2002, ANTOSTRAT evolved into the equally successful and currently active Antarctic Climate Evolution research program. The need for, and evolution of, ANTOSTRAT was based on two simple tenets within SCAR and the Antarctic Treaty: international science collaboration and open access to data. The ANTOSTRAT project may be a helpful analog for other regions of strong international science and geopolitical interests, such as the Arctic. This is the ANTOSTRAT story.

  2. Exploitation of Factory Workers: A Study of Union Dicon Salt, Lagos ...

    African Journals Online (AJOL)

    The study examined labour exploitation in Nigeria with particular reference to Union Dicon Salt Plc., Lagos. The review of literature points to the fact that exploitation of the factory workers in the long run leads to strained relationships between management and staff. The situation becomes conflictual to the extent that both ...

  3. Economic factors of vulnerability trade and exploitation

    NARCIS (Netherlands)

    Allodi, L.

    2017-01-01

    Cybercrime markets support the development and diffusion of new attack technologies, vulnerability exploits, and malware. Whereas the revenue streams of cyber attackers have been studied multiple times in the literature, no quantitative account currently exists on the economics of attack acquisition

  4. Thermal conductivity of high-porosity heavily doped biomorphic silicon carbide prepared from sapele wood biocarbon

    Science.gov (United States)

    Parfen'eva, L. S.; Orlova, T. S.; Smirnov, B. I.; Smirnov, I. A.; Misiorek, H.; Mucha, J.; Jezowski, A.; Cabezas-Rodriguez, R.; Ramirez-Rico, J.

    2012-08-01

    The electrical resistivity and thermal conductivity of high-porosity (˜52 vol %, channel-type pores) bio-SiC samples prepared from sapele wood biocarbon templates have been measured in the temperature range 5-300 K. An analysis has been made of the obtained results in comparison with the data for bio-SiC samples based on beech and eucalyptus, as well as for polycrystalline β-SiC. The conclusion has been drawn that the electrical resistivity and thermal conductivity of bio-SiC samples based on natural wood are typical of heavily doped polycrystalline β-SiC.

  5. Thermal exploitation of shallow aquifers. Guide for the preparation of preliminary studies of technical feasibility

    International Nuclear Information System (INIS)

    Ausseur, J.Y.; Sauty, J.P.

    1982-08-01

    This report presents the main devices aimed at exploiting surface aquifers. After an introduction to the different systems of thermal exploitation of aquifers (generalities, very low energy geothermal, sensitive heat storage, interest of thermal exploitation of aquifers, indication of possible systems), this report presents the different possible systems and analyses their characteristics and performance. These systems are: direct exploitation of groundwater bodies at their natural temperature by heat sink and with release in surface networks or by geothermal dipole, or exploitation with artificial thermal refill. Thus the report addresses the single sink device with or without storage, heat pumps on dipole in surface groundwater bodies or very low temperature geothermal, the scanning dipole system, and the dipole system with hot sink and cold sink. It discusses the choice and sizing of the exploitation system. An appendix reports a feasibility preliminary study of nine cases of thermal exploitation of surface aquifers by double drills

  6. Spin relaxation through lateral spin transport in heavily doped n -type silicon

    Science.gov (United States)

    Ishikawa, M.; Oka, T.; Fujita, Y.; Sugiyama, H.; Saito, Y.; Hamaya, K.

    2017-03-01

    We experimentally study temperature-dependent spin relaxation including lateral spin diffusion in heavily doped n -type silicon (n+-Si ) layers by measuring nonlocal magnetoresistance in small-sized CoFe/MgO/Si lateral spin-valve (LSV) devices. Even at room temperature, we observe large spin signals, 50-fold the magnitude of those in previous works on n+-Si . By measuring spin signals in LSVs with various center-to-center distances between contacts, we reliably evaluate the temperature-dependent spin diffusion length (λSi) and spin lifetime (τSi). We find that the temperature dependence of τSi is affected by that of the diffusion constant in the n+-Si layers, meaning that it is important to understand the temperature dependence of the channel mobility. A possible origin of the temperature dependence of τSi is discussed in terms of the recent theories by Dery and co-workers.

  7. Chromosome aberrations of bone marrow cells in heavily exposed atomic bomb survivors

    International Nuclear Information System (INIS)

    Tanaka, Kimio; Kamada, Nanao; Kuramoto, Atsushi; Ohkita, Takeshi

    1986-01-01

    Seven hundred and ten bone marrow cells from 13 A-bomb survivors, who were heavily exposed to atomic radiation, were examined using chromosome banding method. An average frequency of chromosome aberrations was 17 %. The most common structural abnormality was translocation (47 %), followed by complex aberrations involving three or more chromosomes (32 %). These abnormalities were frequently seen in A-bomb survivors exposed to estimated doses of 3.5 - 4.0 Gy. Eighty two percent of the structural aberrations were stable. Diploid cells were seen in 0.4 % and tetraploid cells were seen in 0.7 %. The frequency of breakpoint sites was high in chromosomes 1 and 17; while it was low in chromosomes 3, 6, 9, and 11. Abnormal clones were seen in one of the 13 survivors. Chromosome aberrations common to the bone marrow cells and peripheral lymphocytes were not seen in the same individual. (Namekawa, K.)

  8. Ultrasonic imaging of material flaws exploiting multipath information

    Science.gov (United States)

    Shen, Xizhong; Zhang, Yimin D.; Demirli, Ramazan; Amin, Moeness G.

    2011-05-01

    In this paper, we consider ultrasonic imaging for the visualization of flaws in a material. Ultrasonic imaging is a powerful nondestructive testing (NDT) tool which assesses material conditions via the detection, localization, and classification of flaws inside a structure. Multipath exploitations provide extended virtual array apertures and, in turn, enhance imaging capability beyond the limitation of traditional multisensor approaches. We utilize reflections of ultrasonic signals which occur when encountering different media and interior discontinuities. The waveforms observed at the physical as well as virtual sensors yield additional measurements corresponding to different aspect angles. Exploitation of multipath information addresses unique issues observed in ultrasonic imaging. (1) Utilization of physical and virtual sensors significantly extends the array aperture for image enhancement. (2) Multipath signals extend the angle of view of the narrow beamwidth of the ultrasound transducers, allowing improved visibility and array design flexibility. (3) Ultrasonic signals experience difficulty in penetrating a flaw, thus the aspect angle of the observation is limited unless access to other sides is available. The significant extension of the aperture makes it possible to yield flaw observation from multiple aspect angles. We show that data fusion of physical and virtual sensor data significantly improves the detection and localization performance. The effectiveness of the proposed multipath exploitation approach is demonstrated through experimental studies.

  9. Natural mortality estimation and rational exploitation of purpleback flying squid Sthenoteuthis oualaniensis in the southern South China Sea

    Science.gov (United States)

    Wang, Xuehui; Qiu, Yongsong; Zhang, Peng; Du, Feiyan

    2017-07-01

    Based on the biological data of purpleback flying squid ( Sthenoteuthis oualaniensis) collected by light falling-net in the southern South China Sea (SCS) during September to October 2012 and March to April 2013, growth and mortality of `Medium' and `Dwarf' forms of squid are derived using the Powell-Wetherall, ELEFAN methods and length-converted catch curves (FiSAT package). Given a lack of commercial exploitation, we assume total mortality to be due entirely to natural mortality. We estimate these squid have fast growth, with growth coefficients ( k) ranging from 1.42 to 2.39, and high natural mortality ( M), with estimates ranging from 1.61 to 2.92. To sustainably exploit these squid stocks, yield per recruitment based on growth and natural mortality was determined using the Beverton-Holt dynamic pool model. We demonstrate squid stocks could sustain high fishing mortality and low ages at first capture, with an optimal fishing mortality >3.0, with the optimal age at first capture increased to 0.4-0.6 years when fishing mortality approached optimal levels. On the basis of our analyses and estimates of stock biomass, we believe considerable potential exists to expand the squid fishery into the open SCS, relieving fishing pressure on coastal waters.

  10. Sexual slavery without borders: trafficking for commercial sexual exploitation in India

    Science.gov (United States)

    Joffres, Christine; Mills, Edward; Joffres, Michel; Khanna, Tinku; Walia, Harleen; Grund, Darrin

    2008-01-01

    Trafficking in women and children is a gross violation of human rights. However, this does not prevent an estimated 800 000 women and children to be trafficked each year across international borders. Eighty per cent of trafficked persons end in forced sex work. India has been identified as one of the Asian countries where trafficking for commercial sexual exploitation has reached alarming levels. While there is a considerable amount of internal trafficking from one state to another or within states, India has also emerged as a international supplier of trafficked women and children to the Gulf States and South East Asia, as well as a destination country for women and girls trafficked for commercial sexual exploitation from Nepal and Bangladesh. Trafficking for commercial sexual exploitation is a highly profitable and low risk business that preys on particularly vulnerable populations. This paper presents an overview of the trafficking of women and girls for sexual exploitation (CSE) in India; identifies the health impacts of CSE; and suggest strategies to respond to trafficking and related issues. PMID:18817576

  11. Sexual slavery without borders: trafficking for commercial sexual exploitation in India.

    Science.gov (United States)

    Joffres, Christine; Mills, Edward; Joffres, Michel; Khanna, Tinku; Walia, Harleen; Grund, Darrin

    2008-09-25

    Trafficking in women and children is a gross violation of human rights. However, this does not prevent an estimated 800 000 women and children to be trafficked each year across international borders. Eighty per cent of trafficked persons end in forced sex work. India has been identified as one of the Asian countries where trafficking for commercial sexual exploitation has reached alarming levels. While there is a considerable amount of internal trafficking from one state to another or within states, India has also emerged as a international supplier of trafficked women and children to the Gulf States and South East Asia, as well as a destination country for women and girls trafficked for commercial sexual exploitation from Nepal and Bangladesh. Trafficking for commercial sexual exploitation is a highly profitable and low risk business that preys on particularly vulnerable populations. This paper presents an overview of the trafficking of women and girls for sexual exploitation (CSE) in India; identifies the health impacts of CSE; and suggest strategies to respond to trafficking and related issues.

  12. Piloting the older adult financial exploitation measure in adult safeguarding services.

    Science.gov (United States)

    Phelan, A; Fealy, G; Downes, C

    Financial abuse is arguably the most complex form of elder abuse as it may occur remote to the older person and it is impacted by issues such as cultural values, perpetrator intent and family expectations. Financial abuse may not be recognised by either the older person or the perpetrator, thus, its prevention, early identification and amelioration are important. The (Irish) National Centre for the Protection of Older People undertook a study to determine the appropriateness of the Older Adult Financial Exploitation Measure for use by the national safeguarding older person services. Findings from a small pilot study involving 16 safeguarding staff's use of the Older Adult Financial Exploitation Measure with 52 community dwelling older people referred to their service demonstrate a higher suspicion of financial abuse as well as identifying multiple instances of possible financial exploitation in a single individual. Thus, the Older Adult Financial Exploitation Measure is considered appropriate to assist safeguarding personnel's assessment of older people related to a suspicion of financial abuse. Copyright © 2017 Elsevier B.V. All rights reserved.

  13. Algorithms exploiting ultrasonic sensors for subject classification

    Science.gov (United States)

    Desai, Sachi; Quoraishee, Shafik

    2009-09-01

    Proposed here is a series of techniques exploiting micro-Doppler ultrasonic sensors capable of characterizing various detected mammalian targets based on their physiological movements captured a series of robust features. Employed is a combination of unique and conventional digital signal processing techniques arranged in such a manner they become capable of classifying a series of walkers. These processes for feature extraction develops a robust feature space capable of providing discrimination of various movements generated from bipeds and quadrupeds and further subdivided into large or small. These movements can be exploited to provide specific information of a given signature dividing it in a series of subset signatures exploiting wavelets to generate start/stop times. After viewing a series spectrograms of the signature we are able to see distinct differences and utilizing kurtosis, we generate an envelope detector capable of isolating each of the corresponding step cycles generated during a walk. The walk cycle is defined as one complete sequence of walking/running from the foot pushing off the ground and concluding when returning to the ground. This time information segments the events that are readily seen in the spectrogram but obstructed in the temporal domain into individual walk sequences. This walking sequence is then subsequently translated into a three dimensional waterfall plot defining the expected energy value associated with the motion at particular instance of time and frequency. The value is capable of being repeatable for each particular class and employable to discriminate the events. Highly reliable classification is realized exploiting a classifier trained on a candidate sample space derived from the associated gyrations created by motion from actors of interest. The classifier developed herein provides a capability to classify events as an adult humans, children humans, horses, and dogs at potentially high rates based on the tested sample

  14. Exploiting indigenous knowledge in the environmental conservation ...

    African Journals Online (AJOL)

    ... of agriculture and reared livestock (especially goats). Over several years, they developed sustainable and effective exploitation mechanisms of the existing biodiversity resources to satisfy their individual needs and those of their societies in general. Journal of Language, Technology and Entrepreneurship in Africa Vol.

  15. Managerial attention to exploitation versus exploration : Toward a dynamic perspective on ambidexterity

    NARCIS (Netherlands)

    Walrave, B.; Romme, A.G.L.; van Oorschot, K.E.; Langerak, F.

    2017-01-01

    Managerial attention to exploitation and exploration has a strong influence on organizational performance. However, there is hardly any knowledge about whether senior managers need to adjust their distribution of attention to exploitation and exploration in response to major changes in demand

  16. Defects in heavily phosphorus-doped Si epitaxial films probed by monoenergetic positron beams

    International Nuclear Information System (INIS)

    Uedono, Akira; Tanigawa, Shoichiro; Suzuki, Ryoichi; Ohgaki, Hideaki; Mikado, Tomohisa.

    1994-01-01

    Vacancy-type defects in heavily phosphorus-doped Si epitaxial films were probed by monoenergetic positron beams. Doppler broadening profiles of the annihilation radiation and lifetime spectra of positrons were measured for the epitaxial films grown on the Si substrates by plasma chemical vapor deposition. For the as-deposited film, divacancy-phosphorus complexes were found with high concentration. After 600degC annealing, vacancy clusters were formed near the Si/Si interface, while no drastic change in the depth distribution of the divacancy-phosphorus complexes was observed. By 900degC annealing, the vacancy clusters were annealed out; however, the average number of phosphorus atoms coupled with divacancies increased. The relationship between the vacancy-type defects probed by the positron annihilation technique and the carrier concentration was confirmed. (author)

  17. Defects in heavily phosphorus-doped Si epitaxial films probed by monoenergetic positron beams

    Energy Technology Data Exchange (ETDEWEB)

    Uedono, Akira; Tanigawa, Shoichiro [Tsukuba Univ., Ibaraki (Japan). Inst. of Materials Science; Suzuki, Ryoichi; Ohgaki, Hideaki; Mikado, Tomohisa

    1994-11-01

    Vacancy-type defects in heavily phosphorus-doped Si epitaxial films were probed by monoenergetic positron beams. Doppler broadening profiles of the annihilation radiation and lifetime spectra of positrons were measured for the epitaxial films grown on the Si substrates by plasma chemical vapor deposition. For the as-deposited film, divacancy-phosphorus complexes were found with high concentration. After 600degC annealing, vacancy clusters were formed near the Si/Si interface, while no drastic change in the depth distribution of the divacancy-phosphorus complexes was observed. By 900degC annealing, the vacancy clusters were annealed out; however, the average number of phosphorus atoms coupled with divacancies increased. The relationship between the vacancy-type defects probed by the positron annihilation technique and the carrier concentration was confirmed. (author).

  18. Simulation of Heavily Irradiated Silicon Pixel Sensors and Comparison with Test Beam Measurements

    CERN Document Server

    Chiochia, Vincenzo; Bortoletto, Daniela; Cremaldi, Lucien; Cucciarelli, Susanna; Dorokhov, Andrei; Hoermann, Christoph; Kim, Dongwook; Konecki, Marcin; Kotlinski, Danek; Prokofiev, Kirill; Regenfus, Christian; Rohe, Tilman; Sanders, David A.; Son, Seunghee; Speer, Thomas; Chiochia, Vincenzo; Swartz, Morris; Bortoletto, Daniela; Cremaldi, Lucien; Cucciarelli, Susanna; Dorokhov, Andrei; Hoermann, Christoph; Kim, Dongwook; Konecki, Marcin; Kotlinski, Danek; Prokofiev, Kirill; Regenfus, Christian; Rohe, Tilman; Sanders, David A.; Son, Seunghee; Speer, Thomas

    2004-01-01

    Charge collection measurements performed on heavily irradiated p-spray DOFZ pixel sensors with a grazing angle hadron beam provide a sensitive determination of the electric field within the detectors. The data are compared with a complete charge transport simulation of the sensor which includes signal trapping and charge induction effects. A linearly varying electric field based upon the standard picture of a constant type-inverted effective doping density is inconsistent with the data. A two-trap double junction model implemented in the ISE TCAD software can be tuned to produce a doubly-peaked electric field which describes the data reasonably well. The modeled field differs somewhat from previous determinations based upon the transient current technique. The model can also account for the level of charge trapping observed in the data.

  19. Water Exploitation and Its Outcomes Caused by Capitalism as Reflected on Gore Verbinski's Rango Movie

    OpenAIRE

    SETIAWAN, DANIEL NUGRAHA

    2014-01-01

    Nugraha Setiawan, Daniel. 2014. Water Exploitation and Its Outcome Caused byCapitalism as Reflected on Gore Verbinski's Rango Movie. Study Program ofEnglish, Universitas Brawijaya.Supervisor: Yusri Fajar, Co-supervisor: Melania Shinta Harendika.Keywords: water exploitation, environment, capitalism, Rango movie. Water exploitation threats ecosystem and causes a great damage to environment. One of the causes of the water exploitation is capitalism. The movie entitled Rango reveals some causes a...

  20. Boldness predicts an individual's position along an exploration-exploitation foraging trade-off.

    Science.gov (United States)

    Patrick, Samantha C; Pinaud, David; Weimerskirch, Henri

    2017-09-01

    Individuals do not have complete information about the environment and therefore they face a trade-off between gathering information (exploration) and gathering resources (exploitation). Studies have shown individual differences in components of this trade-off but how stable these strategies are in a population and the intrinsic drivers of these differences is not well understood. Top marine predators are expected to experience a particularly strong trade-off as many species have large foraging ranges and their prey often have a patchy distribution. This environment leads these species to exhibit pronounced exploration and exploitation phases but differences between individuals are poorly resolved. Personality differences are known to be important in foraging behaviour but also in the trade-off between exploration and exploitation. Here we test whether personality predicts an individual exploration-exploitation strategy using wide ranging wandering albatrosses (Diomedea exulans) as a model system. Using GPS tracking data from 276 wandering albatrosses, we extract foraging parameters indicative of exploration (searching) and exploitation (foraging) and show that foraging effort, time in patch and size of patch are strongly correlated, demonstrating these are indicative of an exploration-exploitation (EE) strategy. Furthermore, we show these are consistent within individuals and appear stable in the population, with no reproductive advantage. The searching and foraging behaviour of bolder birds placed them towards the exploration end of the trade-off, whereas shy birds showed greater exploitation. This result provides a mechanism through which individual foraging strategies may emerge. Age and sex affected components of the trade-off, but not the trade-off itself, suggesting these factors may drive behavioural compensation to maintain resource acquisition and this was supported by the evidence that there were no fitness consequence of any EE trait nor the trade

  1. Exploiting citation contexts for physics retrieval

    DEFF Research Database (Denmark)

    Dabrowska, Anna; Larsen, Birger

    2015-01-01

    The text surrounding citations within scientific papers may contain terms that usefully describe cited documents and can benefit retrieval. We present a preliminary study that investigates appending ci- tation contexts from citing documents to cited documents in the iSearch test collection. We ex...... in a large collection of physics papers, paving the way for future research that exploits citation contexts for retrieval....

  2. Normative Beliefs about Aggression as a Mediator of Narcissistic Exploitativeness and Cyberbullying

    Science.gov (United States)

    Ang, Rebecca P.; Tan, Kit-Aun; Mansor, Abu Talib

    2011-01-01

    The current study examined normative beliefs about aggression as a mediator between narcissistic exploitativeness and cyberbullying using two Asian adolescent samples from Singapore and Malaysia. Narcissistic exploitativeness was significantly and positively associated with cyberbullying and normative beliefs about aggression and normative beliefs…

  3. SEXUAL EXPLOITATION OF CHILDREN IN THE TOURISM – THE DARK SIDE OF TOURISM

    OpenAIRE

    Janez Mekinc; Katarina Music

    2015-01-01

    The underlying causes of sexual exploitation and prostitution are poverty, inequality between women and men, high population growth and rural - urban migration. Victims are, predominantly, women and children with lower socio-economic status. One particular form of sexual exploitation is child sex tourism. This ruthless exploitation of children can be found throughout the world, predominantly in the third world and developing countries. Children, mainly between the ages of 6 to 14 years, are t...

  4. The nature of the torus in the heavily obscured AGN Markarian 3: an X-ray study

    OpenAIRE

    Guainazzi, M.; Risaliti, G.; Awaki, H.; Arevalo, P.; Bauer, F. E.; Bianchi, S.; Boggs, S. E.; Brandt, W. N.; Brightman, M.; Christensen, Finn Erland; Craig, W. W.; Forster, K.; Hailey, C. J.; Harrison, F.; Koss, M.

    2016-01-01

    In this paper, we report the results of an X-ray monitoring campaign on the heavily obscured Seyfert galaxy, Markarian 3, carried out between the fall of 2014 and the spring of 2015 with NuSTAR, Suzaku and XMM–Newton. The hard X-ray spectrum of Markarian 3 is variable on all the time-scales probed by our campaign, down to a few days. The observed continuum variability is due to an intrinsically variable primary continuum seen in transmission through a large, but still Compton-thin column dens...

  5. Escaping from the exploitation trap by shaping the digital future

    OpenAIRE

    Füzes, Péter; Gódor, Zoltán; Szabó, Zsolt Roland

    2017-01-01

    Even Fortune 500 firms can disappear quickly, because many of them falls into an exploitation trap. Examples show that certain organizations – that manifest ambidextrous features – can avoid the exploitation trap. But, how can they do it? Authors tracked the digital transformation of a Fortune 500 company in order to understand the strategic and organizational challenges and solutions to become resilient and prosperous. A cutting edge example is shown in the paper about how an industry leader...

  6. High Thermoelectric Performance by Convergence of Bands in IV-VI Semiconductors, Heavily Doped PbTe, and Alloys/Nanocomposites

    Science.gov (United States)

    Snyder, G. Jeffrey (Inventor); Pei, Yanzhong (Inventor)

    2015-01-01

    The present invention teaches an effective mechanism for enhancing thermoelectric performance through additional conductive bands. Using heavily doped p-PbTe materials as an example, a quantitative explanation is disclosed, as to why and how these additional bands affect the figure of merit. A high zT of approaching 2 at high temperatures makes these simple, likely more stable (than nanostructured materials) and Tl-free materials excellent for thermoelectric applications.

  7. On Setting Day-Ahead Equity Trading Risk Limits: VaR Prediction at Market Close or Open?

    Directory of Open Access Journals (Sweden)

    Ana-Maria Fuertes

    2016-09-01

    Full Text Available This paper investigates the information content of the ex post overnight return for one-day-ahead equity Value-at-Risk (VaR forecasting. To do so, we deploy a univariate VaR modeling approach that constructs the forecast at market open and, accordingly, exploits the available overnight close-to-open price variation. The benchmark is the bivariate VaR modeling approach proposed by Ahoniemi et al. that constructs the forecast at the market close instead and, accordingly, it models separately the daytime and overnight return processes and their covariance. For a small cap portfolio, the bivariate VaR approach affords superior predictive ability than the ex post overnight VaR approach whereas for a large cap portfolio the results are reversed. The contrast indicates that price discovery at the market open is less efficient for small capitalization, thinly traded stocks.

  8. Open Source, Open Access, Open Review, Open Data. Initiativen zu mehr Offenheit in der digitalen Welt

    OpenAIRE

    Herb, Ulrich

    2011-01-01

    The article discusses the principles of openess, open access and open availability of information based on the examples of open access to scientific information, open government data, open geographical data and open source software.

  9. An Open Data Platform in the framework of the EGI-LifeWatch Competence Center

    Science.gov (United States)

    Aguilar Gómez, Fernando; de Lucas, Jesús Marco; Yaiza Rodríguez Marrero, Ana

    2016-04-01

    The working pilot of an Open Data Platform supporting the full data cycle in research is presented. It aims to preserve knowledge explicitly, starting with the description of the Case Studies, and integrating data and software management and preservation on equal basis. The uninterrupted support in the chain starts at the data acquisition level and covers up to the support for reuse and publication in an open framework, providing integrity and provenance controls. The Lifewatch Open Science Framework is a pilot web portal developed in collaboration with different commercial companies that tries to enrich and integrate different data lifecycle-related tools in order to address the management of the different steps: data planning, gathering, storing, curation, preservation, sharing, discovering, etc. To achieve this goal, the platform includes the following features: -Data Management Planning. Tool to set up an structure of the data, including what data will be generated, how it will be exploited, re-used, curated, preserved, etc. It has a semantic approach: includes reference to ontologies in order to express what data will be gathered. -Close to instrumentation. The portal includes a distributed storage system that can be used both for storing data from instruments and output data from analysis. All that data can be shared -Analysis. Resources from EGI Federated Cloud are accessible within the portal, so that users can exploit computing resources to perform analysis and other processes, including workflows. -Preservation. Data can be preserved in different systems and DOIs can be minted not only for datasets but also for software, DMPs, etc. The presentation will show the different components of the framework as well as how it can be extrapolated to other communities.

  10. Impact socio-environnemental de l'exploitation du sable marin sur le ...

    African Journals Online (AJOL)

    En effet, l'exploitation du sable marin dans cette contrée s'est ouverte et évolue du fait de l'urbanisation galopante de la Commune liée à l'érection des ... In addition, the uncontrolled exploitation increased coastal erosion and does little to improve the conditions of economic and social life of the people who indulge ...

  11. Openly Published Environmental Sensing (OPEnS) | Advancing Open-Source Research, Instrumentation, and Dissemination

    Science.gov (United States)

    Udell, C.; Selker, J. S.

    2017-12-01

    The increasing availability and functionality of Open-Source software and hardware along with 3D printing, low-cost electronics, and proliferation of open-access resources for learning rapid prototyping are contributing to fundamental transformations and new technologies in environmental sensing. These tools invite reevaluation of time-tested methodologies and devices toward more efficient, reusable, and inexpensive alternatives. Building upon Open-Source design facilitates community engagement and invites a Do-It-Together (DIT) collaborative framework for research where solutions to complex problems may be crowd-sourced. However, barriers persist that prevent researchers from taking advantage of the capabilities afforded by open-source software, hardware, and rapid prototyping. Some of these include: requisite technical skillsets, knowledge of equipment capabilities, identifying inexpensive sources for materials, money, space, and time. A university MAKER space staffed by engineering students to assist researchers is one proposed solution to overcome many of these obstacles. This presentation investigates the unique capabilities the USDA-funded Openly Published Environmental Sensing (OPEnS) Lab affords researchers, within Oregon State and internationally, and the unique functions these types of initiatives support at the intersection of MAKER spaces, Open-Source academic research, and open-access dissemination.

  12. Uncovering Indicators of Commercial Sexual Exploitation.

    Science.gov (United States)

    Bounds, Dawn; Delaney, Kathleen R; Julion, Wrenetha; Breitenstein, Susan

    2017-07-01

    It is estimated that annually 100,000 to 300,000 youth are at risk for sex trafficking; a commercial sex act induced by force, fraud, or coercion, or any such act where the person induced to perform such an act is younger than 18 years of age. Increasingly, such transactions are occurring online via Internet-based sites that serve the commercial sex industry. Commercial sex transactions involving trafficking are illegal; thus, Internet discussions between those involved must be veiled. Even so, transactions around sex trafficking do occur. Within these transactions are innuendos that provide one avenue for detecting potential activity. The purpose of this study is to identify linguistic indicators of potential commercial sexual exploitation within the online comments of men posted on an Internet site. Six hundred sixty-six posts from five Midwest cities and 363 unique members were analyzed via content analysis. Three main indicators were found: the presence of youth or desire for youthfulness, presence of pimps, and awareness of vulnerability. These findings begin a much-needed dialogue on uncovering online risks of commercial sexual exploitation and support the need for further research on Internet indicators of sex trafficking.

  13. Growth, Mortality and Exploitation Rates of Sarotherodon ...

    African Journals Online (AJOL)

    Evans

    ABSTRACT. Sarotherodon melanotheron population of Dominli Lagoon in the Western Region of Ghana was studied for its growth and mortality parameters as well as exploitation rate. The study generally aimed at providing basic information necessary for the assessment and management of the fish stock in the lagoon.

  14. The exploitation of "Exploitation" in the tenofovir prep trial in Cameroon: Lessons learned from media coverage of an HIV prevention trial.

    Science.gov (United States)

    Mack, Natasha; Robinson, Elizabeth T; MacQueen, Kathleen M; Moffett, Jill; Johnson, Laura M

    2010-06-01

    media coverage influences how clinical trials are perceived internationally and in communities where trials occur, affecting recruitment, retention, and political support for research. We conducted a discourse analysis of news coverage from 2004-2005 of a trial in Cameroon on oral PrEP for HIV prevention, to identify messages, communication techniques, and sources of messages that were amplified via media. We identified two parallel discourses: one on ethical concerns about the Cameroon trial, and a second, more general "science exploitation" discourse concerned with the potential for trials with vulnerable participant populations to be conducted unethically, benefiting only wealthy populations. Researchers should overtly address exploitation as an integral, ongoing component of research, particularly where historical or cultural conditions set the stage for controversy to emerge.

  15. The exploration-exploitation dilemma: a multidisciplinary framework.

    Directory of Open Access Journals (Sweden)

    Oded Berger-Tal

    Full Text Available The trade-off between the need to obtain new knowledge and the need to use that knowledge to improve performance is one of the most basic trade-offs in nature, and optimal performance usually requires some balance between exploratory and exploitative behaviors. Researchers in many disciplines have been searching for the optimal solution to this dilemma. Here we present a novel model in which the exploration strategy itself is dynamic and varies with time in order to optimize a definite goal, such as the acquisition of energy, money, or prestige. Our model produced four very distinct phases: Knowledge establishment, Knowledge accumulation, Knowledge maintenance, and Knowledge exploitation, giving rise to a multidisciplinary framework that applies equally to humans, animals, and organizations. The framework can be used to explain a multitude of phenomena in various disciplines, such as the movement of animals in novel landscapes, the most efficient resource allocation for a start-up company, or the effects of old age on knowledge acquisition in humans.

  16. Exploiting Quantum Resonance to Solve Combinatorial Problems

    Science.gov (United States)

    Zak, Michail; Fijany, Amir

    2006-01-01

    Quantum resonance would be exploited in a proposed quantum-computing approach to the solution of combinatorial optimization problems. In quantum computing in general, one takes advantage of the fact that an algorithm cannot be decoupled from the physical effects available to implement it. Prior approaches to quantum computing have involved exploitation of only a subset of known quantum physical effects, notably including parallelism and entanglement, but not including resonance. In the proposed approach, one would utilize the combinatorial properties of tensor-product decomposability of unitary evolution of many-particle quantum systems for physically simulating solutions to NP-complete problems (a class of problems that are intractable with respect to classical methods of computation). In this approach, reinforcement and selection of a desired solution would be executed by means of quantum resonance. Classes of NP-complete problems that are important in practice and could be solved by the proposed approach include planning, scheduling, search, and optimal design.

  17. Legal Approaches to Combating the Exploitation of Third-Country National Seasonal Workers

    NARCIS (Netherlands)

    Rijken, Conny

    2015-01-01

    The Directive on Seasonal workers is aimed at combating exploitative practices vis-a-vis seasonal workers from outside the EU. After a thorough analysis of the conditions under which practices can be qualified as exploitative, this article assesses the extent to which the directive is equipped to

  18. Exploiting the opportunities of Internet and multi-channel pricing : An exploratory research

    NARCIS (Netherlands)

    Sotgiu, Francesca; Ancarani, Fabio

    2004-01-01

    Smart firms are not worried about the impact of the Internet on pricing, but realise that they have the unique opportunity to exploit new options and improve their marketing performance. Multi-channel pricing is one of the most interesting opportunities firms can exploit in the digital economy.

  19. Residual coal exploitation and its impact on sustainable development of the coal industry in China

    International Nuclear Information System (INIS)

    Zhang, Yujiang; Feng, Guorui; Zhang, Min; Ren, Hongrui; Bai, Jinwen; Guo, Yuxia; Jiang, Haina; Kang, Lixun

    2016-01-01

    Although China owns large coal reserves, it now faces the problem of depletion of its coal resources in advance. The coal-based energy mix in China will not change in the short term, and a means of delaying the coal resources depletion is therefore urgently required. The residual coal was exploited first with a lower recovery percentage and was evaluated as commercially valuable damaged coal. This approach is in comparison to past evaluations when the residual coal was allocated as exploitation losses. Coal recovery rates, the calculation method of residual coal reserves and statistics of its mines in China were given. On this basis, a discussion concerning the impacts on the delay of China's coal depletion, development of coal exploitation and sustainable developments, as well as technologies and relevant policies, were presented. It is considered that the exploitation of residual coal can effectively delay China's coal depletion, inhibit the construction of new mines, redress the imbalance between supply and demand of coal in eastern China, improve the mining area environment and guarantee social stability. The Chinese government supports the exploitation technologies of residual coal. Hence, exploiting residual coal is of considerable importance in sustainable development of the coal industry in China. - Highlights: •Pay attention to residual coal under changing energy-mix environment in China. •Estimate residual coal reserves and investigate its exploitation mines. •Discuss impacts of residual coal exploitation on delay of coal depletion in China. •Discuss impacts on coal mining industry and residual coal exploitation technology. •Give corresponding policy prescriptions.

  20. Combined effects of global climate change and regional ecosystem drivers on an exploited marine food web

    DEFF Research Database (Denmark)

    Niiranen, S.; Yletyinen, J.; Tomczak, M.T.

    2013-01-01

    approach to project how the interaction of climate, nutrient loads, and cod fishing may affect the future of the open Central Baltic Sea food web. Regionally downscaled global climate scenarios were, in combination with three nutrient load scenarios, used to drive an ensemble of three regional...... biogeochemical models (BGMs). An Ecopath with Ecosim food web model was then forced with the BGM results from different nutrient-climate scenarios in combination with two different cod fishing scenarios. The results showed that regional management is likely to play a major role in determining the future......Changes in climate, in combination with intensive exploitation of marine resources, have caused large-scale reorganizations in many of the world's marine ecosystems during the past decades. The Baltic Sea in Northern Europe is one of the systems most affected. In addition to being exposed...

  1. Heavily doped n-type a-IGZO by F plasma treatment and its thermal stability up to 600 °C

    Science.gov (United States)

    Um, Jae Gwang; Jang, Jin

    2018-04-01

    We report the electrical properties and thermal stability of heavily doped, amorphous indium-gallium-zinc-oxide (a-IGZO) treated with fluorine (F) plasma. When the F doping concentration in a-IGZO is 17.51 × 1021/cm-3, the a-IGZO exhibits a carrier concentration of 6 × 1019 cm-3, a resistivity of 3 × 10-3 Ω cm, and a Hall mobility of 20 cm2/V s. This indicates that F is a suitable n-type dopant in a-IGZO. The similarity of the ionic radius of F to that of oxygen (O) allows substitutional doping by replacing O with F or the occupation of the oxygen vacancy (VO) site by F and consequent reduction in defect density. The semiconducting property of a-IGZO can change into metallic behavior by F doping. The defect passivation by F incorporation is confirmed by the XPS depth profile, which reveals the significant reduction in the VO concentration due to the formation of In-F bonds. The heavily doped a-IGZO exhibits thermally stable conductivity up to 600 °C annealing and thus can be widely used for the ohmic contact of a-IGZO devices.

  2. Child Exploitation: Some Pieces of the Puzzle.

    Science.gov (United States)

    Rohlader, Dorothy

    The report addresses the status in North Carolina and in the nation of child exploitation. Legislative and judicial backgrounds of child pornography and child prostitution are reviewed, and difficulties in obtaining statistical data are noted. Law enforcement issues in pornography are cited, and suggestions for further legislation regarding child…

  3. Fishing elevates variability in the abundance of exploited species.

    Science.gov (United States)

    Hsieh, Chih-Hao; Reiss, Christian S; Hunter, John R; Beddington, John R; May, Robert M; Sugihara, George

    2006-10-19

    The separation of the effects of environmental variability from the impacts of fishing has been elusive, but is essential for sound fisheries management. We distinguish environmental effects from fishing effects by comparing the temporal variability of exploited versus unexploited fish stocks living in the same environments. Using the unique suite of 50-year-long larval fish surveys from the California Cooperative Oceanic Fisheries Investigations we analyse fishing as a treatment effect in a long-term ecological experiment. Here we present evidence from the marine environment that exploited species exhibit higher temporal variability in abundance than unexploited species. This remains true after accounting for life-history effects, abundance, ecological traits and phylogeny. The increased variability of exploited populations is probably caused by fishery-induced truncation of the age structure, which reduces the capacity of populations to buffer environmental events. Therefore, to avoid collapse, fisheries must be managed not only to sustain the total viable biomass but also to prevent the significant truncation of age structure. The double jeopardy of fishing to potentially deplete stock sizes and, more immediately, to amplify the peaks and valleys of population variability, calls for a precautionary management approach.

  4. Predominance of heavily calcified coccolithophores at low CaCO3 saturation during winter in the Bay of Biscay

    OpenAIRE

    Smith, Helen E. K.; Tyrrell, Toby; Charalampopoulou, Anastasia; Dumousseaud, Cynthia; Legge, Oliver J.; Birchenough, Sarah; Pettit, Laura R.; Garley, Rebecca; Hartman, Sue E.; Hartman, Mark C.; Sagoo, Navjit; Daniels, Chris J.; Achterberg, Eric P.; Hydes, David J.

    2012-01-01

    Coccolithophores are an important component of the Earth system, and, as calcifiers, their possible susceptibility to ocean acidification is of major concern. Laboratory studies at enhanced pCO2 levels have produced divergent results without overall consensus. However, it has been predicted from these studies that, although calcification may not be depressed in all species, acidification will produce “a transition in dominance from more to less heavily calcified coccolithophores” [Ridgwell A,...

  5. Open access, open education resources and open data in Uganda ...

    African Journals Online (AJOL)

    As a follow up to OpenCon 2014, International Federation of Medical Students' Associations (IFMSA) students organized a 3 day workshop Open Access, Open Education Resources and Open Data in Kampala from 15-18 December 2014. One of the aims of the workshop was to engage the Open Access movement in ...

  6. Administrative, institutional and legislative issues on agricultural waste exploitation in Turkey

    International Nuclear Information System (INIS)

    Kaya, Durmus; Baban, Ahmet; Dikec, Stephanie; Canka Kilic, Fatma

    2008-01-01

    In this study, the influence of non-technical issues on the exploitation of agricultural waste in Turkey was investigated in accordance with the work program requirements for the project entitled ''Exploitation of Agricultural Waste in Turkey'' under the EU Life Third Countries Program. The study has been organized and presented according to the following four phases: (i) study of existing Turkish legislation and the administrative and institutional framework, (ii) review and analysis of the EU policy and legislation relevant to agricultural waste, including identification of potential market instruments, (iii) identification of barriers to the promotion of agricultural waste exploitation in Turkey, and (iv) Identification of gaps and formulation of recommendations. An ultimate objective of this study is to transfer the European experience and practices relative to the overall framework of managing agricultural waste. (author)

  7. Exploiting Thread Parallelism for Ocean Modeling on Cray XC Supercomputers

    Energy Technology Data Exchange (ETDEWEB)

    Sarje, Abhinav [Lawrence Berkeley National Lab. (LBNL), Berkeley, CA (United States); Jacobsen, Douglas W. [Los Alamos National Lab. (LANL), Los Alamos, NM (United States); Williams, Samuel W. [Lawrence Berkeley National Lab. (LBNL), Berkeley, CA (United States); Ringler, Todd [Los Alamos National Lab. (LANL), Los Alamos, NM (United States); Oliker, Leonid [Lawrence Berkeley National Lab. (LBNL), Berkeley, CA (United States)

    2016-05-01

    The incorporation of increasing core counts in modern processors used to build state-of-the-art supercomputers is driving application development towards exploitation of thread parallelism, in addition to distributed memory parallelism, with the goal of delivering efficient high-performance codes. In this work we describe the exploitation of threading and our experiences with it with respect to a real-world ocean modeling application code, MPAS-Ocean. We present detailed performance analysis and comparisons of various approaches and configurations for threading on the Cray XC series supercomputers.

  8. Influence of quantum confinement on the carrier contribution to the elastic constants in quantum confined heavily doped non-linear optical and optoelectronic materials: simplified theory and the suggestion for experimental determination

    International Nuclear Information System (INIS)

    Baruah, D; Choudhury, S; Singh, K M; Ghatak, K P

    2007-01-01

    In this paper we study the carrier contribution to elastic constants in quantum confined heavily doped non-linear optical compounds on the basis of a newly formulated electron dispersion law taking into account the anisotropies of the effective electron masses and spin orbit splitting constants together with the proper inclusion of the crystal field splitting in the Hamiltonian within the framework of k.p formalism. All the results of heavily doped three, and two models of Kane for heavily doped III-V materials form special cases of our generalized analysis. It has been found, taking different heavily doped quantum confined materials that, the carrier contribution to the elastic constants increases with increase in electron statistics and decrease in film thickness in ladder like manners for all types of quantum confinements with different numerical values which are totally dependent on the energy band constants. The said contribution is greatest in quantum dots and least in quantum wells together with the fact the heavy doping enhances the said contributions for all types of quantum confined materials. We have suggested an experimental method of determining the carrier contribution to the elastic constants in nanostructured materials having arbitrary band structures

  9. The Alignment System of the ATLAS Muon End-Cap Spectrometer

    CERN Document Server

    Schricker, Alexander

    2002-01-01

    The Large Hadron Collider at CERN will offer an unparalleled opportunity to probe fundamental physics at an energy scale well beyond that reached by current experiments. The ATLAS detector is being designed to fully exploit the potential of the LHC for revealing new aspects of the fundamental structure of nature. The muon spectrometer itself must measure with a momentum resolution of s10% for muons with a transverse momentum of pT =1TeV, to fully exploit the advantages offered by the open superconducting air core muon toroid magnet system. At this level of momentum resolution the muon spectrometer relies heavily on the ability to master the alignment of the large muon chambers spaced far apart. The overall contribution of the alignment to the total sagitta error must be less than 30 μm r.m.s. In order to meet the stringent alignment requirements the positions of the muon chambers are constantly monitored with optical alignment technologies. The end-caps of this spectrometer are therefore embedded in an align...

  10. Leveraging Open Standards and Technologies to Enhance Community Access to Earth Science Lidar Data

    Science.gov (United States)

    Crosby, C. J.; Nandigam, V.; Krishnan, S.; Cowart, C.; Baru, C.; Arrowsmith, R.

    2011-12-01

    Lidar (Light Detection and Ranging) data, collected from space, airborne and terrestrial platforms, have emerged as an invaluable tool for a variety of Earth science applications ranging from ice sheet monitoring to modeling of earth surface processes. However, lidar present a unique suite of challenges from the perspective of building cyberinfrastructure systems that enable the scientific community to access these valuable research datasets. Lidar data are typically characterized by millions to billions of individual measurements of x,y,z position plus attributes; these "raw" data are also often accompanied by derived raster products and are frequently terabytes in size. As a relatively new and rapidly evolving data collection technology, relevant open data standards and software projects are immature compared to those for other remote sensing platforms. The NSF-funded OpenTopography Facility project has developed an online lidar data access and processing system that co-locates data with on-demand processing tools to enable users to access both raw point cloud data as well as custom derived products and visualizations. OpenTopography is built on a Service Oriented Architecture (SOA) in which applications and data resources are deployed as standards compliant (XML and SOAP) Web services with the open source Opal Toolkit. To develop the underlying applications for data access, filtering and conversion, and various processing tasks, OpenTopography has heavily leveraged existing open source software efforts for both lidar and raster data. Operating on the de facto LAS binary point cloud format (maintained by ASPRS), open source libLAS and LASlib libraries provide OpenTopography data ingestion, query and translation capabilities. Similarly, raster data manipulation is performed through a suite of services built on the Geospatial Data Abstraction Library (GDAL). OpenTopography has also developed our own algorithm for high-performance gridding of lidar point cloud data

  11. On the dynamics of exploited fish populations

    National Research Council Canada - National Science Library

    Beverton, R. J. H; Holt, Sidney J

    1993-01-01

    ...-brooding cichlids, and viviparity in many sharks and toothcarps. Moreover, fish are of considerable importance to the survival of the human species in the form of nutritious, delicious and diverse food. Rational exploitation and management of our global stocks of fishes must rely upon a detailed and precise insight of their biology. The...

  12. 25 CFR 20.516 - How are child abuse, neglect or exploitation cases to be handled?

    Science.gov (United States)

    2010-04-01

    ... 25 Indians 1 2010-04-01 2010-04-01 false How are child abuse, neglect or exploitation cases to be... FINANCIAL ASSISTANCE AND SOCIAL SERVICES PROGRAMS Child Assistance Foster Care § 20.516 How are child abuse, neglect or exploitation cases to be handled? Reported child abuse, neglect or exploitation cases and the...

  13. Understanding and Making Use of Academic Authors’ Open Access Rights

    Directory of Open Access Journals (Sweden)

    David Hansen

    2012-09-01

    Full Text Available INTRODUCTION Authors of academic works do not take full advantage of the self-archiving rights that they retain in their publications, though research shows that many academic authors are well-aligned (at least in principle with open access (OA principles. This article explains how institutionally-assisted self-archiving in open access repositories can effectively take advantage of retained rights and highlights at least one method of facilitating this process through automated means. METHODS To understand the scope of author-retained rights (including the right to purchase hybrid or other open access options at some sample universities, author-rights data through the SHERPA/RoMEO API was combined with individual article citations (from Thomson Reuters' Web of Science for works published over a one-year period (2011 and authored by individuals affiliated with five major U.S. research universities. RESULTS Authors retain significant rights in the articles that they create. Of the 29,322 unique articles authored over the one year period at the five universities, 28.83 percent could be archived in final PDF form and 87.95 percent could be archived as the post-print version. Nearly 43.47 percent also provided authors the choice of purchasing a hybrid paid open access option. DISCUSSION A significant percentage of current published output could be archived with little or no author intervention. With prior approval through an open access policy or otherwise, article manuscripts or final PDFs can be obtained and archived by library staff, and hybrid paid-OA options could be negotiated and exploited by library administrators. CONCLUSION Although mandates, legislation, and other policy tools may be useful to promote open access, many institutions already have the ability to increase the percentage of accessible works by taking advantage of retained author rights and hybrid OA options.

  14. Administrative, institutional and legislative issues on agricultural waste exploitation in Turkey

    Energy Technology Data Exchange (ETDEWEB)

    Kaya, Durmus; Baban, Ahmet; Dikec, Stephanie [TUBITAK MRC Chemistry and Enviorenment Institute, P.O. Box 21, 41470 Gebze-Kocaeli (Turkey); Canka Kilic, Fatma [Kocaeli University, KMYO, Department of Air Conditioning and Refrigeration, Kullar/Kocaeli (Turkey)

    2008-02-15

    In this study, the influence of non-technical issues on the exploitation of agricultural waste in Turkey was investigated in accordance with the work program requirements for the project entitled ''Exploitation of Agricultural Waste in Turkey'' under the EU Life Third Countries Program. The study has been organized and presented according to the following four phases: (i) study of existing Turkish legislation and the administrative and institutional framework, (ii) review and analysis of the EU policy and legislation relevant to agricultural waste, including identification of potential market instruments, (iii) identification of barriers to the promotion of agricultural waste exploitation in Turkey, and (iv) Identification of gaps and formulation of recommendations. An ultimate objective of this study is to transfer the European experience and practices relative to the overall framework of managing agricultural waste. (author)

  15. Environmental Impacts of Sand Exploitation. Analysis of Sand Market

    Directory of Open Access Journals (Sweden)

    Marius Dan Gavriletea

    2017-06-01

    Full Text Available Sand is an indispensable natural resource for any society. Despite society’s increasing dependence on sand, there are major challenges that this industry needs to deal with: limited sand resources, illegal mining, and environmental impact of sand mining. The purpose of this paper is twofold: to present an overview of the sand market, highlighting the main trends and actors for production, export and import, and to review the main environmental impacts associated with sand exploitation process. Based on these findings, we recommend different measures to be followed to reduce negative impacts. Sand mining should be done in a way that limits environmental damage during exploitation and restores the land after mining operations are completed.

  16. Uncertainty avoidance and the exploration-exploitation trade-off

    NARCIS (Netherlands)

    Broekhuizen, Thijs; Giarratana, Marco S.; Torres, Anna

    2017-01-01

    Purpose - This study aims to investigate how a firm's uncertainty avoidance - as indicated by the headquarters' national culture - impacts firm performance by affecting exploratory (product innovation) and exploitative (brand trademark protection) activities. It aims to show that firms characterized

  17. Un premier service mobile en Égypte qui relie les petits exploitants ...

    International Development Research Centre (IDRC) Digital Library (Canada)

    Un premier service mobile en Égypte qui relie les petits exploitants aux acheteurs. Un homme qui parle sur un téléphone mobile. Les petits exploitants agricoles dominent l'agriculture égyptienne, mais leur manque de connaissances en matière de commercialisation et de compétences techniques, ainsi qu'une mauvaise ...

  18. Human trafficking and exploitation: A global health concern.

    Science.gov (United States)

    Zimmerman, Cathy; Kiss, Ligia

    2017-11-01

    In this collection review, Cathy Zimmerman and colleague introduce the PLOS Medicine Collection on Human Trafficking, Exploitation and Health, laying out the magnitude of the global trafficking problem and offering a public health policy framework to guide responses to trafficking.

  19. TIME-SERIES SPECTROSCOPY OF TWO CANDIDATE DOUBLE DEGENERATES IN THE OPEN CLUSTER NGC 6633

    Energy Technology Data Exchange (ETDEWEB)

    Williams, Kurtis A.; Chakraborty, Subho [Department of Physics and Astrophysics, Texas A and M University-Commerce, P.O. Box 3011, Commerce, TX, 75429 (United States); Serna-Grey, Donald [Department of Astronomy, University of Washington, Box 351580, Seattle, WA, 98195 (United States); Gianninas, A.; Canton, Paul A., E-mail: Kurtis.Williams@tamuc.edu [Homer L. Dodge Department of Physics and Astronomy, University of Oklahoma, 440 W. Brooks St., Norman, OK, 73019 (United States)

    2015-12-15

    SNe Ia are heavily used tools in precision cosmology, yet we still are not certain what the progenitor systems are. General plausibility arguments suggest there is potential for identifying double degenerate SN Ia progenitors in intermediate-age open star clusters. We present time-resolved high-resolution spectroscopy of two white dwarfs (WDs) in the field of the open cluster NGC 6633 that had previously been identified as candidate double degenerates in the cluster. However, three hours of continuous observations of each candidate failed to detect any significant radial velocity variations at the ≳10 km s{sup −1} level, making it highly unlikely that either WD is a double degenerate that will merge within a Hubble Time. The WD LAWDS NGC 6633 4 has a radial velocity inconsistent with cluster membership at the 2.5σ level, while the radial velocity of LAWDS NGC 6633 7 is consistent with cluster membership. We conservatively conclude that LAWDS 7 is a viable massive double degenerate candidate, though unlikely to be a Type Ia progenitor. Astrometric data from GAIA will likely be needed to determine if either WD is truly a cluster member.

  20. Online Open Circuit Fault Diagnosis for Rail Transit Traction Converter Based on Object-Oriented Colored Petri Net Topology Reasoning

    Directory of Open Access Journals (Sweden)

    Lei Wang

    2016-01-01

    Full Text Available For online open circuit fault diagnosis of the traction converter in rail transit vehicles, conventional approaches depend heavily on component parameters and circuit layouts. For better universality and less parameter sensitivity during the diagnosis, this paper proposes a novel topology analysis approach to diagnose switching device open circuit failures. During the diagnosis, the topology is analyzed with fault reasoning mechanism, which is based on object-oriented Petri net (OOCPN. The OOCPN model takes in digitalized current inputs as fault signatures, and dynamical transitions between discrete switching states of a circuit with broken device are symbolized with the dynamical transitions of colored tokens in OOCPN. Such transitions simulate natural reasoning process of an expert’s brain during diagnosis. The dependence on component parameters and on circuit layouts is finally eliminated by such circuit topology reasoning process. In the last part, the proposed online reasoning and diagnosis process is exemplified with the case of a certain switching device failure in the power circuit of traction converter.

  1. Open life science research, open software and the open century

    Directory of Open Access Journals (Sweden)

    Youhua Chen

    2015-05-01

    Full Text Available At the age of knowledge explosion and mass scientific information, I highlighted the importance of conducting open science in life and medical researches through the extensive usage of open software and documents. The proposal of conducting open science is to reduce the limited repeatability of researches in life science. I outlined the essential steps for conducting open life science and the necessary standards for creating, reusing and reproducing open materials. Different Creative Commons licenses were presented and compared of their usage scope and restriction. As a conclusion, I argued that open materials should be widely adopted in doing life and medical researches.

  2. Environmental Data Store: A Web-Based System Providing Management and Exploitation for Multi-Data-Type Environmental Data

    Science.gov (United States)

    Ji, P.; Piasecki, M.

    2012-12-01

    With the rapid growth in data volumes, data diversity and data demands from multi-disciplinary research effort, data management and exploitation are increasingly facing significant challenges for environmental scientific community. We describe Environmental data store (EDS), a system we are developing that is a web-based system following an open source implementation to manage and exploit multi-data-type environmental data. EDS provides repository services for the six fundamental data types, which meet the demands of multi-disciplinary environmental research. These data types are: a) Time Series Data, b) GeoSpatial data, c) Digital Data, d) Ex-Situ Sampling data, e) Modeling Data, f) Raster Data. Through data portal, EDS allows for efficient consuming these six types of data placed in data pool, which is made up of different data nodes corresponding to different data types, including iRODS, ODM, THREADS, ESSDB, GeoServer, etc.. EDS data portal offers unified submission interface for the above different data types; provides fully integrated, scalable search across content from the above different data systems; also features mapping, analysis, exporting and visualization, through integration with other software. EDS uses a number of developed systems, follows widely used data standards, and highlights the thematic, semantic, and syntactic support on the submission and search, in order to advance multi-disciplinary environmental research. This system will be installed and develop at the CrossRoads initiative at the City College of New York.

  3. Research on Factors Affecting the Optimal Exploitation of Natural Gas Resources in China

    Directory of Open Access Journals (Sweden)

    Jianzhong Xiao

    2016-05-01

    Full Text Available This paper develops an optimizing model for the long-term exploitation of limited natural gas reserves in China. In addition to describing the life cycle characteristics of natural gas production and introducing the inter-temporal allocation theory, this paper builds the optimal exploitation model of natural gas resources within a gas field in the Ordos Basin as an example to analyze its exploitation scale and how influence factors, such as recovery rate, discount rate and the gas well exhausting cycle, affect the optimal exploration path of this gas field. We determine that an increase in the discount rate stimulates investors to invest more aggressively in natural gas exploitation in the early period due to the lower discounted value, thereby increasing the pace of the exploitation of natural gas and the exhaustion of gas fields. A higher recoverable factor implies more recoverable reserves and greater potential of increasing the output of gas fields. The exhaustion rate of gas wells affects the capability of converting capacity to output. When exhaustion occurs quickly in gas wells, the output will likely increase in the output rising period, and the output will likely decrease at a faster rate in the output reduction period. Price reform affects the economic recoverable reserves of gas fields.

  4. Pollination with heavily irradiated pollen in Nicotiana: induced parthenogenesis and embryological study

    International Nuclear Information System (INIS)

    Musial, K.; Przywara, L.

    1999-01-01

    Nicotiana crosses were pollinated in situ and in vitro with heavily irradiated pollen (500, 700, 1000 Gy) to induce parthenogenesis and to study the development of embryo and endosperm. Haploids were obtained after in situ pollination only; however, parthenogenetic proembryos occurred also after in vitro pollination. It was demonstrated that ovule culture following pollination offers a better chance to produce haploids than undisturbed pollination does. Pollination with irradiated pollen (PwIP) stron gly decreased the number of endosperm cells and the size of embryo sacs, and it affected the development of embryos; no significant differences between applied irradiation doses were found. Ovules with endosperm only, embryo only, and with both embryo and endosperm were observed. The most frequent were the ovules with endosperm only, the rarest with embryo only. A small amount of storage products occurred in the endosperm cells. The diploid chromosome number counted in the endosperm produced after PwIP points to their origin without fertilization. An interesting phenomenon observed after PwIP was vigorous growth of endothelium. (author)

  5. Understanding and Responding to the Needs of Commercially Sexually Exploited Youth: Recommendations for the Mental Health Provider.

    Science.gov (United States)

    Ijadi-Maghsoodi, Roya; Cook, Mekeila; Barnert, Elizabeth S; Gaboian, Shushanik; Bath, Eraka

    2016-01-01

    Mental health providers are frequently at the forefront of addressing the multifaceted needs of commercially sexually exploited youth. This article provides an overview of the definition of commercial sexual exploitation of children and relevant legislation including the shift toward decriminalization of commercially sexually exploited youth. To provide clinicians with tools needed to deliver competent care to this population, a review of risk factors for commercial sexual exploitation of children and the role of the clinician in identification, assessment, and treatment of commercially sexually exploited youth are discussed. Published by Elsevier Inc.

  6. NuSTAR J033202-2746.8: direct constraints on the Compton reflection in a heavily obscured quasar at z ≈ 2

    DEFF Research Database (Denmark)

    Del Moro, A.; Mullaney, J. R.; Alexander, D. M.

    2014-01-01

    We report Nuclear Spectroscopic Telescope Array (NuSTAR) observations of NuSTAR J033202-2746.8, a heavily obscured, radio-loud quasar detected in the Extended Chandra Deep Field-South, the deepest layer of the NuSTAR extragalactic survey (∼400 ks, at its deepest). NuSTAR J033202-2746.8 is reliably......-2746.8, indicating that this source is a heavily obscured quasar (NH = 5.6+−0.80.9 × 1023 cm−2) with luminosity L10-40 keV ≈ 6.4 × 1044 erg s−1. Although existing optical and near-infrared (near-IR) data, as well as follow-up spectroscopy with the Keck and VLT telescopes, failed to provide a secure redshift......-Newton data alone. The measured reflection fraction is higher than the R∼0 typically observed in bright radio-loud quasars such as NuSTAR J033202-2746.8, which has L1.4 GHz≈1027 W Hz−1. Constraining the spectral shape of active galactic nuclei (AGNs), including bright quasars, is very important...

  7. Human trafficking for labour exploitation: Interpreting the crime

    NARCIS (Netherlands)

    Coster van Voorhout, J.E.B.

    2007-01-01

    The definition of human trafficking for labour exploitation, as follows from the European Council Framework Decision, proves to be unclear. Literal interpretation does not suffice, because it does not clarify all elements of what is deemed to be criminal behaviour, and hermeneutical interpretation

  8. Indicators of Nuclear safety and exploitation in ANAV

    International Nuclear Information System (INIS)

    Quintana Prieto, M.; Jorda Alcove, M.

    2013-01-01

    The use of indicators by ANAV plants, aims to be a tool to facilitate the assessment of the behaviour of the plants nuclear over a specific time period. The following are and are they explain those related to Nuclear safety and exploitation.

  9. Human trafficking and exploitation: A global health concern.

    Directory of Open Access Journals (Sweden)

    Cathy Zimmerman

    2017-11-01

    Full Text Available In this collection review, Cathy Zimmerman and colleague introduce the PLOS Medicine Collection on Human Trafficking, Exploitation and Health, laying out the magnitude of the global trafficking problem and offering a public health policy framework to guide responses to trafficking.

  10. Weak openness and almost openness

    Directory of Open Access Journals (Sweden)

    David A. Rose

    1984-01-01

    Full Text Available Weak openness and almost openness for arbitrary functions between topological spaces are defined as duals to the weak continuity of Levine and the almost continuity of Husain respectively. Independence of these two openness conditions is noted and comparison is made between these and the almost openness of Singal and Singal. Some results dual to those known for weak continuity and almost continuity are obtained. Nearly almost openness is defined and used to obtain an improved link from weak continuity to almost continuity.

  11. Relationship between levels of serum creatinine and perirenal hyperintensity on heavily T2-weighted MR images

    Energy Technology Data Exchange (ETDEWEB)

    Erden, Ayse, E-mail: ayse.erden@medicine.ankara.edu.tr [Ankara University, School of Medicine, Department of Radiology, Talatpasa Bulvari, Sihhiye, 06100 Ankara (Turkey); Sahin, Burcu Savran, E-mail: bsavrans@hotmail.com [Ankara University, School of Medicine, Department of Radiology, Talatpasa Bulvari, Sihhiye, 06100 Ankara (Turkey); Orgodol, Horolsuren, E-mail: hoogii99@yahoo.com [Ankara University, School of Medicine, Department of Radiology, Talatpasa Bulvari, Sihhiye, 06100 Ankara (Turkey); Erden, Ilhan, E-mail: erden@medicine.ankara.edu.tr [Ankara University, School of Medicine, Department of Radiology, Talatpasa Bulvari, Sihhiye, 06100 Ankara (Turkey); Biyikli, Zeynep, E-mail: zeynep.biyikli@gmail.com [Ankara University, School of Medicine, Department of Biostatistics, Talatpasa Bulvari, Sihhiye, 06100 Ankara (Turkey)

    2011-11-15

    Objective: To determine the frequency of perirenal hyperintensity on heavily T2-weighted images and to evaluate its relationship with serum creatinine levels. Subjects and methods: Axial and coronal single-shot fast spin-echo images which have been originally obtained for MR cholangiopancreatography in 150 subjects were examined by two observers individually for the presence of perirenal hyperintensity. The morphologic properties of perirenal hyperintensity (peripheral rim-like, discontinuous, polar) were recorded. Chi square test was used to test whether the frequencies of bilateral perirenal hyperintensity differ significantly in subjects with high serum creatinine levels and those with normal creatinine levels. This test was also used to compare the frequencies of perirenal hyperintensity in patients with and without renal cysts and in patients with and without corticomedullary differentiation. A p value of less than 0.05 was considered to be statistically significant. Results: The perirenal hyperintensity was identified in 40 of 150 cases (26.6%) on heavily T2-weighted image. Serum creatinine levels were high in 18 of 150 cases (12%). The perirenal hyperintensity was present in 11 of 18 subjects (61%) with high serum creatinine levels and 26 of 132 subjects (19.7%) with normal creatinine levels. The difference of rates in two groups was statistically significant. Odds ratio was 6407 (95% confidence interval 2264-18,129). The frequency of perirenal hyperintensity was also significantly higher in subjects with renal cyst or cysts in whom serum creatinine levels were normal (p < 0.05) (37.5% vs. 11.8%). Conclusion: Perirenal hyperintensities are more frequent in patients with high serum creatinine levels. They are also more common in patients with simple renal cysts.

  12. Relationship between levels of serum creatinine and perirenal hyperintensity on heavily T2-weighted MR images

    International Nuclear Information System (INIS)

    Erden, Ayse; Sahin, Burcu Savran; Orgodol, Horolsuren; Erden, Ilhan; Biyikli, Zeynep

    2011-01-01

    Objective: To determine the frequency of perirenal hyperintensity on heavily T2-weighted images and to evaluate its relationship with serum creatinine levels. Subjects and methods: Axial and coronal single-shot fast spin-echo images which have been originally obtained for MR cholangiopancreatography in 150 subjects were examined by two observers individually for the presence of perirenal hyperintensity. The morphologic properties of perirenal hyperintensity (peripheral rim-like, discontinuous, polar) were recorded. Chi square test was used to test whether the frequencies of bilateral perirenal hyperintensity differ significantly in subjects with high serum creatinine levels and those with normal creatinine levels. This test was also used to compare the frequencies of perirenal hyperintensity in patients with and without renal cysts and in patients with and without corticomedullary differentiation. A p value of less than 0.05 was considered to be statistically significant. Results: The perirenal hyperintensity was identified in 40 of 150 cases (26.6%) on heavily T2-weighted image. Serum creatinine levels were high in 18 of 150 cases (12%). The perirenal hyperintensity was present in 11 of 18 subjects (61%) with high serum creatinine levels and 26 of 132 subjects (19.7%) with normal creatinine levels. The difference of rates in two groups was statistically significant. Odds ratio was 6407 (95% confidence interval 2264-18,129). The frequency of perirenal hyperintensity was also significantly higher in subjects with renal cyst or cysts in whom serum creatinine levels were normal (p < 0.05) (37.5% vs. 11.8%). Conclusion: Perirenal hyperintensities are more frequent in patients with high serum creatinine levels. They are also more common in patients with simple renal cysts.

  13. From Closed to Open Innovation in Emerging Economies: Evidence from the Chemical Industry in Brazil

    Directory of Open Access Journals (Sweden)

    Elisa Thomas

    2018-03-01

    Full Text Available In this article, we examine how firms in an emerging economy perform research and development (R&D activities in regards to the concept of open innovation. Most literature on open innovation shows multinational knowledge-intensive firms with well-established R&D processes mainly in developed countries. Searching for management contributions for firms in emerging economies, we qualitatively analyzed two chemical firms in Southern Brazil that have different profiles and are representative samples of typical firms in the region. Our results show that firms did not fully exploit the potential benefits brought by open innovation, even when complete opening was not the main goal. The firms were similar concerning interactions with partners and stages where relationships occur. The generation of ideas was an open activity performed both by firms and by clients, and interactions with universities were getting stronger. On the other hand, intellectual property has not been used as means of profiting from innovation activities. Our main finding refers to the internal mediation of relationships with partners. R&D teams rarely contact external organizations directly; instead, they leave such interactions to other departments within their firms. Relationships with clients are mediated through technical and commercial departments, and interactions with suppliers are intermediated by the supply staff.

  14. Human collective intelligence under dual exploration-exploitation dilemmas.

    Directory of Open Access Journals (Sweden)

    Wataru Toyokawa

    Full Text Available The exploration-exploitation dilemma is a recurrent adaptive problem for humans as well as non-human animals. Given a fixed time/energy budget, every individual faces a fundamental trade-off between exploring for better resources and exploiting known resources to optimize overall performance under uncertainty. Colonies of eusocial insects are known to solve this dilemma successfully via evolved coordination mechanisms that function at the collective level. For humans and other non-eusocial species, however, this dilemma operates within individuals as well as between individuals, because group members may be motivated to take excessive advantage of others' exploratory findings through social learning. Thus, even though social learning can reduce collective exploration costs, the emergence of disproportionate "information scroungers" may severely undermine its potential benefits. We investigated experimentally whether social learning opportunities might improve the performance of human participants working on a "multi-armed bandit" problem in groups, where they could learn about each other's past choice behaviors. Results showed that, even though information scroungers emerged frequently in groups, social learning opportunities reduced total group exploration time while increasing harvesting from better options, and consequentially improved collective performance. Surprisingly, enriching social information by allowing participants to observe others' evaluations of chosen options (e.g., Amazon's 5-star rating system in addition to choice-frequency information had a detrimental impact on performance compared to the simpler situation with only the choice-frequency information. These results indicate that humans groups can handle the fundamental "dual exploration-exploitation dilemmas" successfully, and that social learning about simple choice-frequencies can help produce collective intelligence.

  15. Evaluating Maximum Wind Energy Exploitation in Active Distribution Networks

    DEFF Research Database (Denmark)

    Siano, Pierluigi; Chen, Peiyuan; Chen, Zhe

    2010-01-01

    The increased spreading of distributed and renewable generation requires moving towards active management of distribution networks. In this paper, in order to evaluate maximum wind energy exploitation in active distribution networks, a method based on a multi-period optimal power flow (OPF......) analysis is proposed. Active network management schemes such as coordinated voltage control, energy curtailment and power factor control are integrated in the method in order to investigate their impacts on the maximization of wind energy exploitation. Some case studies, using real data from a Danish...... distribution system, confirmed the effectiveness of the proposed method in evaluating the optimal applications of active management schemes to increase wind energy harvesting without costly network reinforcement for the connection of wind generation....

  16. Resonantly-enhanced transmission through a periodic array of subwavelength apertures in heavily-doped conducting polymer films

    Science.gov (United States)

    Matsui, Tatsunosuke; Vardeny, Z. Valy; Agrawal, Amit; Nahata, Ajay; Menon, Reghu

    2006-02-01

    We observed resonantly-enhanced terahertz transmission through two-dimensional (2D) periodic arrays of subwavelength apertures with various periodicities fabricated on metallic organic conducting polymer films of polypyrrole heavily doped with PF6 molecules [PPy(PF6)]. The "anomalous transmission" spectra are in good agreement with a model involving surface plasmon polariton excitations on the film surfaces. We also found that the `anomalous transmission' peaks are broader in the exotic metallic PPy (PF6) films compared to those formed in 2D aperture array in regular metallic films such as silver, showing that the surface plasmon polaritons on the PPy (PF6) film surfaces have higher attenuation.

  17. Open Education and the Open Science Economy

    Science.gov (United States)

    Peters, Michael A.

    2009-01-01

    Openness as a complex code word for a variety of digital trends and movements has emerged as an alternative mode of "social production" based on the growing and overlapping complexities of open source, open access, open archiving, open publishing, and open science. This paper argues that the openness movement with its reinforcing structure of…

  18. Wideband Low Noise Amplifiers Exploiting Thermal Noise Cancellation

    NARCIS (Netherlands)

    Bruccoleri, F.; Klumperink, Eric A.M.; Nauta, Bram

    2005-01-01

    Low Noise Amplifiers (LNAs) are commonly used to amplify signals that are too weak for direct processing for example in radio or cable receivers. Traditionally, low noise amplifiers are implemented via tuned amplifiers, exploiting inductors and capacitors in resonating LC-circuits. This can render

  19. Electrothermal Feedback and Absorption-Induced Open-Circuit-Voltage Turnover in Solar Cells

    Science.gov (United States)

    Ullbrich, Sascha; Fischer, Axel; Tang, Zheng; Ávila, Jorge; Bolink, Henk J.; Reineke, Sebastian; Vandewal, Koen

    2018-05-01

    Solar panels easily heat up upon intense solar radiation due to excess energy dissipation of the absorbed photons or by nonradiative recombination of charge carriers. Still, photoinduced self-heating is often ignored when characterizing lab-sized samples. For light-intensity-dependent measurements of the open-circuit voltage (Suns-VO C ), allowing us to characterize the recombination mechanism, sample heating is often not considered, although almost 100% of the absorbed energy is converted into heat. Here, we show that the frequently observed stagnation or even decrease in VOC at increasingly high light intensities can be explained by considering an effective electrothermal feedback between the recombination current and the open-circuit voltage. Our analytical model fully explains the experimental data for various solar-cell technologies, comprising conventional inorganic semiconductors as well as organic and perovskite materials. Furthermore, the model can be exploited to determine the ideality factor, the effective gap, and the temperature rise from a single Suns-VOC measurement at ambient conditions.

  20. Exploitative Learning by Exporting

    DEFF Research Database (Denmark)

    Golovko, Elena; Lopes Bento, Cindy; Sofka, Wolfgang

    Decisions on entering foreign markets are among the most challenging but also potentially rewarding strategy choices managers can make. In this study, we examine the effect of export entry on the firm investment decisions in two activities associated with learning about new technologies...... and learning about new markets ? R&D investments and marketing investments, in search of novel insights into the content and process underlying learning by exporting. We draw from organizational learning theory for predicting changes in both R&D and marketing investment patterns that accompany firm entry......, it is predominantly the marketing-related investment decisions associated with starting to export that lead to increases in firm productivity. We conclude that learning-by-exporting might be more properly characterized as ?learning about and exploiting new markets? rather than ?learning about new technologies...

  1. Exploiting a natural auxotrophy for genetic selection.

    Science.gov (United States)

    Ramage, Elizabeth; Gallagher, Larry; Manoil, Colin

    2012-08-01

    We exploited the natural histidine auxotrophy of Francisella species to develop hisD (encodes histidinol dehydrogenase) as a positive selection marker. A shuttle plasmid (pBR103) carrying Escherichia coli hisD and designed for cloning of PCR fragments replicated in both attenuated and highly virulent Francisella strains. During this work, we formulated a simplified defined growth medium for Francisella novicida.

  2. Assessment of the potential for exploitation of the remaining reserves of coal in Poland

    International Nuclear Information System (INIS)

    Wodarski, K.; Bijanska, J.

    2014-01-01

    In mining areas belonging to the Polish mining companies, there is a significant amount of coal, contained in remaining reserves, that have not been exploited so far. For years, the mines have been evaluating the possibility of its exploitation, since it would expand its resource base and would extend its useful life. In addition, exploitation of the remaining reserves can minimize stress concentration zones in the soil, the rebel y improving conditions for maintenance of excavations and limiting the risk of shock rock. (Author)

  3. Potentially exploitable supercritical geothermal resources in the ductile crust

    Science.gov (United States)

    Watanabe, Noriaki; Numakura, Tatsuya; Sakaguchi, Kiyotoshi; Saishu, Hanae; Okamoto, Atsushi; Ingebritsen, Steven E.; Tsuchiya, Noriyoshi

    2017-01-01

    The hypothesis that the brittle–ductile transition (BDT) drastically reduces permeability implies that potentially exploitable geothermal resources (permeability >10−16 m2) consisting of supercritical water could occur only in rocks with unusually high transition temperatures such as basalt. However, tensile fracturing is possible even in ductile rocks, and some permeability–depth relations proposed for the continental crust show no drastic permeability reduction at the BDT. Here we present experimental results suggesting that the BDT is not the first-order control on rock permeability, and that potentially exploitable resources may occur in rocks with much lower BDT temperatures, such as the granitic rocks that comprise the bulk of the continental crust. We find that permeability behaviour for fractured granite samples at 350–500 °C under effective confining stress is characterized by a transition from a weakly stress-dependent and reversible behaviour to a strongly stress-dependent and irreversible behaviour at a specific, temperature-dependent effective confining stress level. This transition is induced by onset of plastic normal deformation of the fracture surface (elastic–plastic transition) and, importantly, causes no ‘jump’ in the permeability. Empirical equations for this permeability behaviour suggest that potentially exploitable resources exceeding 450 °C may form at depths of 2–6 km even in the nominally ductile crust.

  4. Features for Exploiting Black-Box Optimization Problem Structure

    DEFF Research Database (Denmark)

    Tierney, Kevin; Malitsky, Yuri; Abell, Tinus

    2013-01-01

    landscape of BBO problems and show how an algorithm portfolio approach can exploit these general, problem indepen- dent features and outperform the utilization of any single minimization search strategy. We test our methodology on data from the GECCO Workshop on BBO Benchmarking 2012, which contains 21...

  5. AN AMELIORATED DETECTION STATISTICS FOR ADAPTIVE MASK MEDIAN FILTRATION OF HEAVILY NOISED DIGITAL IMAGES

    Directory of Open Access Journals (Sweden)

    Geeta Hanji

    2016-11-01

    Full Text Available Noise reduction is an important area of research in image processing applications. The performance of the digital image noise filtering method primarily depends upon the accuracy of noise detection scheme. This paper presents an effective detector based, adaptive mask, median filtration of heavily noised digital images affected with fixed value (or salt and pepper impulse noise. The proposed filter presents a novel approach; an ameliorated Rank Ordered Absolute Deviation (ROAD statistics to judge whether the input pixel is noised or noise free. If a pixel is detected as corrupted, it is subjected to adaptive mask median filtration; otherwise, it is kept unchanged. Extensive experimental results and comparative performance evaluations demonstrate that the proposed filter outperforms the existing decision type, median based filters with powerful noise detectors in terms of objective performance measures and visual retrieviation accuracy.

  6. Relativistic quantum metrology: exploiting relativity to improve quantum measurement technologies.

    Science.gov (United States)

    Ahmadi, Mehdi; Bruschi, David Edward; Sabín, Carlos; Adesso, Gerardo; Fuentes, Ivette

    2014-05-22

    We present a framework for relativistic quantum metrology that is useful for both Earth-based and space-based technologies. Quantum metrology has been so far successfully applied to design precision instruments such as clocks and sensors which outperform classical devices by exploiting quantum properties. There are advanced plans to implement these and other quantum technologies in space, for instance Space-QUEST and Space Optical Clock projects intend to implement quantum communications and quantum clocks at regimes where relativity starts to kick in. However, typical setups do not take into account the effects of relativity on quantum properties. To include and exploit these effects, we introduce techniques for the application of metrology to quantum field theory. Quantum field theory properly incorporates quantum theory and relativity, in particular, at regimes where space-based experiments take place. This framework allows for high precision estimation of parameters that appear in quantum field theory including proper times and accelerations. Indeed, the techniques can be applied to develop a novel generation of relativistic quantum technologies for gravimeters, clocks and sensors. As an example, we present a high precision device which in principle improves the state-of-the-art in quantum accelerometers by exploiting relativistic effects.

  7. Exploitation of puddles for breakthroughs in claustrum research

    Directory of Open Access Journals (Sweden)

    John Irwin Johnson

    2014-05-01

    Full Text Available Since its first identification as a thin strip of gray matter enclosed between stretches of neighboring fiber bundles, the claustrum has been considered impossible to study by many modern techniques that need a certain roominess of tissue for their application. The claustrum was known as the front wall, vormauren in German from 1822, and is still called avant-mur in French. We here propose a means for breaking into and through this wall, by utilizing the instances where the claustral tissue itself has broken free into more spacious dimensions. This has occurred several times in the evolution of modern mammals, and all that needs be done is to exploit these natural expansions in order to take advantage of a great panoply of technological advances now at our disposal. So here we review the kinds of breakout puddles that await productive exploitation, to bring our knowledge of structure and function up to the level enjoyed for other more accessible regions of the brain..

  8. Expelling Slavery from the Nation: Representations of labour exploitation in Australia’s supply chain

    Directory of Open Access Journals (Sweden)

    Anna Szörényi

    2016-09-01

    Full Text Available On 4 May 2015, the Australian national broadcaster’s current affairs programme Four Corners aired an episode titled ‘Slaving Away: The dirty secrets behind Australia’s fresh food’, that provided revelations of labour exploitation of migrant workers on working holiday visas. The government reacted swiftly to these allegations with an ‘operation’ ostensibly designed to stop the exploitation. In reports of Operation Cloudburst, however, there was a shift in the media’s definition of the problem: worker exploitation became visa violations and newspapers shortly reported the resulting action taken: the ‘illegal workers’ in Australia’s food industry had been arrested. This paper tracks the competing discursive and visual representations of this case that ultimately made questions of labour rights become questions of immigration, making it plausible and acceptable that concern over exploitation of workers should be addressed by deportation of ‘illegal immigrants’. Such discursive slippage is enabled by cultural amnesia over Australia’s history of exploitation of racialised and migrant labourers, which allows ‘slavery’ to be represented as a ‘foreign’ problem that can be expelled in defence of the purity of the national domestic space.

  9. Preliminary studies of dry rock geothermal exploitation in south west England

    Energy Technology Data Exchange (ETDEWEB)

    Batchelor, A. S.; Pearson, C. M.

    1978-07-01

    A research program to develop a method to exploit the heat usually found in mines in the Cornwall area is described. Temperature gradients range from 27 to 34/sup 0/C/Km with a mean of 29.8/sup 0/C/Km. The exploitable area is defined and methods of creating an artificial geothermal field or artificial reservoir are described. Tests to determine fractures in rocks including gamma-gamma logging, tv camera, caliper, and 3-D sonic are described as are pumping tests. 15 references, 3 figures.

  10. Influence of Machine Exploitation Effectiveness on Furniture Production Quality Level

    Directory of Open Access Journals (Sweden)

    Stasiak-Betlejewska Renata

    2015-12-01

    Full Text Available One of the most important factors determining the company‘s capacity to produce high quality products is the level of machinery operation effectiveness. Companies having modern machinery are characterized by high productivity. To obtain a high quality product, the equipment should be properly used, without any failure, which contributes significantly to the exploitation level increase. The modernity level and the exploitation effectiveness level for chosen machine producing furniture components in relation to the product quality level were analysed in the paper. As a result of the research findings analysis, proposals for corrective actions with regard to machinery maintenance and production processes were presented.

  11. A Case Study of How Organisational Members do Affect the Balancing of Exploitation and Exploration

    DEFF Research Database (Denmark)

    Andreassen, Mads R.

    2008-01-01

    study using semi-structured interviews and observation techniques this paper explores exploitation and exploration in a Danish industrial manufacture. Findings suggest that conditions affecting the balance between exploitation and exploration activities would depend on how an organisational member......Combing operations between the main parties in integration of new products, efficiently, are in practice for most organisations a challenging task demanding strong organisational capabilities, and in accordance to literature, achieving a successfully combination would be possible through...... an organisation's ability to establish dual capabilities in terms of exploitation and exploration (March, 1991). Few studies, however, suggest a classification of which organisational conditions would support a balance allowing exploitation and exploration operating side by side. Based on a single indept case...

  12. Nowcasting influenza outbreaks using open-source media report.

    Energy Technology Data Exchange (ETDEWEB)

    Ray, Jaideep; Brownstein, John S. [Boston Children%3CU%2B2019%3Es Hospital, Boston, MA

    2013-02-01

    We construct and verify a statistical method to nowcast influenza activity from a time-series of the frequency of reports concerning influenza related topics. Such reports are published electronically by both public health organizations as well as newspapers/media sources, and thus can be harvested easily via web crawlers. Since media reports are timely, whereas reports from public health organization are delayed by at least two weeks, using timely, open-source data to compensate for the lag in %E2%80%9Cofficial%E2%80%9D reports can be useful. We use morbidity data from networks of sentinel physicians (both the Center of Disease Control's ILINet and France's Sentinelles network) as the gold standard of influenza-like illness (ILI) activity. The time-series of media reports is obtained from HealthMap (http://healthmap.org). We find that the time-series of media reports shows some correlation ( 0.5) with ILI activity; further, this can be leveraged into an autoregressive moving average model with exogenous inputs (ARMAX model) to nowcast ILI activity. We find that the ARMAX models have more predictive skill compared to autoregressive (AR) models fitted to ILI data i.e., it is possible to exploit the information content in the open-source data. We also find that when the open-source data are non-informative, the ARMAX models reproduce the performance of AR models. The statistical models are tested on data from the 2009 swine-flu outbreak as well as the mild 2011-2012 influenza season in the U.S.A.

  13. Exploitation study of the ore-body ''Tigre III''. Open-cut design and study of high-recovery underground mining method for the Tigre III ore-body

    International Nuclear Information System (INIS)

    Baluszka, J.C.

    1980-01-01

    The paper first carries out an analysis for the purpose of determining the limiting sterile/ore ratio for open-cut and underground mining in the specific filling case of Tigre III. In this connection it considers a high-recovery method of underground mining (involving the use of cemented hydropneumatic chambers), a general mine plan covering access, transport, ventilation and removal of ore as well as auxiliary services relating to the Tigre III ore body as a whole. The costs of this method of mining are determined for purposes of comparison with the open-cut method. Similarly, the limiting sterile/ore ratio is taken as the basis for an analysis of different types of pit and a design suited to the limiting ratio is adopted. As a final solution the paper favours a method which combines open-cut and underground mining. It proposes the use of the open-cut method up to the limiting ratio (in accordance with the pit design chosen) and of underground method (by the filling chamber method) for the rest of the area. (author)

  14. Clonal variation in survival and growth of hybrid poplar and willow in an in situ trial on soils heavily contaminated with petroleum hydrocarbons

    Science.gov (United States)

    Ronald S., Jr. Zalesny; Edmund O. Bauer; Richard B. Hall; Jill A. Zalesny; Joshua Kunzman; Chris J. Rog; Don E. Riemenschneider

    2005-01-01

    Species and hybrids between species belonging to the genera Populus (poplar) and Salix (willow) have been used successfully for phytoremediation of contaminated soils. Our objectives were to: 1) evaluate the potential for establishing genotypes of poplar and willow on soils heavily contaminated with petroleum hydrocarbons and 2)...

  15. Describing Data Format Exploits Using Bitstream Segment Graphs

    NARCIS (Netherlands)

    Hartle, Michael; Schumann, Daniel; Botchak, Arsene; Tews, Erik; Mühlhäuser, Max

    2008-01-01

    Exploits based on data processing bugs are delivered through crafted data that seems to follow a data format, yet is altered in some way to trigger a specific bug during processing, eg. in order to execute contained malicious code. Decomposing crafted data according to the purported data format and

  16. Assisting children born of sexual exploitation and abuse

    Directory of Open Access Journals (Sweden)

    Lauren Rumble

    2007-01-01

    Full Text Available The UN Secretary-General has issued a strategy tosupport victims of sexual exploitation and abuse by UNstaff. It includes a controversial proposal to introduceDNA sampling for all UN staff. Unless this suggestionis adopted, an important opportunity to implementa truly survivor-centred approach may be lost.

  17. Exploiting Inhibitory Siglecs to Combat Food Allergies

    Science.gov (United States)

    2017-10-01

    AWARD NUMBER: W81XWH-16-1-0302 TITLE: Exploiting Inhibitory Siglecs to Combat Food Allergies PRINCIPAL INVESTIGATOR: Michael Kulis, Ph.D...CONTRACTING ORGANIZATION: University of North Carolina at Chapel Hill Chapel Hill, NC 27599 REPORT DATES: October 2017 TYPE OF REPORT: Annual PREPARED FOR...Department of Defense, Washington Headquarters Services , Directorate for Information Operations and Reports (0704-0188), 1215 Jefferson Davis Highway, Suite

  18. Low-Level Exploitation Mitigation by Diverse Microservices

    OpenAIRE

    Otterstad , Christian; Yarygina , Tetiana

    2017-01-01

    Part 2: Microservices and Containers; International audience; This paper discusses a combination of isolatable microservices and software diversity as a mitigation technique against low-level exploitation; the effectiveness and benefits of such an architecture are substantiated. We argue that the core security benefit of microservices with diversity is increased control flow isolation. Additionally, a new microservices mitigation technique leveraging a security monitor service is introduced t...

  19. Exploring Open-Ended Design Space of Mechatronic Systems

    DEFF Research Database (Denmark)

    Fan, Zhun; Wang, J.; Goodman, E.

    2004-01-01

    To realize design automation of mechatronic systems, there are two major issues to be dealt with: open-topology generation of mechatronic systems and simulation or analysis of those models. For the first issue, we exploit the strong topology exploration capability of genetic programming to create...... and evolve structures representing mechatronic systems. With the help of ERCs (ephemeral random constants) in genetic programming, we can also evolve the sizing of mechatronic system components along with the structures. The second issue, simulation and analysis of those system models, is made more complex...... when they represent mixed-energy-domain systems. We take advantage of bond graphs as a tool for multi- or mixed-domain modeling and simulation of mechatronic systems. Because there are many considerations in mechatronic system design that are not completely captured by a bond graph, we would like...

  20. Forced Flexibility and Exploitation: Experiences of Migrant Workers in the Cleaning Industry

    Directory of Open Access Journals (Sweden)

    Natalia Ollus

    2016-03-01

    Full Text Available Globalization has resulted in structural changes in the labor markets over the last decades. These changes have weakened some of the economic and social dimensions of work. At the same time, migration and especially labor migration have increased on the global level. This article looks at the situation of migrant workers in the cleaning industry in Finland. It is based on interviews with migrant workers who have experienced labor exploitation in the cleaning industry, representatives of cleaning industry employers, and representatives of labor unions. The primary aim is to give voice to the migrant workers themselves and to analyze how they experience their work and their position in working life. The findings suggest that there is a risk that migrant workers in the cleaning sector experience various forms of exploitation. This article argues that the demand and need for (employee flexibility may turn into forced flexibility that exploits the powerless and vulnerable migrant workers who have few other options than to agree to work on poor terms. The article suggests that the structural reasons that make the exploitation of migrant labor possible should be identified and addressed in order to prevent misuse of any workers, especially migrants.

  1. Precarious Working Conditions and Exploitation of Workers in the Nigerian Informal Economy

    Directory of Open Access Journals (Sweden)

    Akeem Ayofe Akinwale

    2014-06-01

    Full Text Available Situations in the informal economy expose workers to dangers without opportunity for hazard pay, thereby reflecting exploitation. Based on the Marxist theory of conflict, this paper examines the extent of precarious working conditions and exploitation of workers in the Nigerian informal economy. A total of 500 respondents randomly selected from various informal economy organizations participated in the survey conducted in Lagos State, Nigeria. The findings revealed that most of the respondents (76.4% had worked for up to five years consecutively, followed by a few (18%, who had worked for up to ten years consecutively. Their monthly income ranged from 10,000 naira ($60 to 80,000 naira ($485. Their mean monthly income was 30,000 naira ($182. Most of them (73.5% worked for 10 to 12 hours daily, while 26.5% worked for seven to nine hours daily. The experience of low pay with relatively long daily working hours shows the extent of exploitation in the Nigerian informal economy. Several background characteristics, such as gender, age, level of education, and marital status influenced the workers’ experience of precarious working conditions and exploitation. Therefore, there is an urgent need for a progressive workplace policy that can ensure decent work and adequate protection for workers in the Nigerian informal economy.

  2. The surge of predatory open-access in neurosciences and neurology.

    Science.gov (United States)

    Manca, Andrea; Martinez, Gianluca; Cugusi, Lucia; Dragone, Daniele; Dvir, Zeevi; Deriu, Franca

    2017-06-14

    Predatory open access is a controversial publishing business model that exploits the open-access system by charging publication fees in the absence of transparent editorial services. The credibility of academic publishing is now seriously threatened by predatory journals, whose articles are accorded real citations and thus contaminate the genuine scientific records of legitimate journals. This is of particular concern for public health since clinical practice relies on the findings generated by scholarly articles. Aim of this study was to compile a list of predatory journals targeting the neurosciences and neurology disciplines and to analyze the magnitude and geographical distribution of the phenomenon in these fields. Eighty-seven predatory journals operate in neurosciences and 101 in neurology, for a total of 2404 and 3134 articles issued, respectively. Publication fees range 521-637 USD, much less than those charged by genuine open-access journals. The country of origin of 26.0-37.0% of the publishers was impossible to determine due to poor websites or provision of vague or non-credible locations. Of the rest 35.3-42.0% reported their headquarters in the USA, 19.0-39.2% in India, 3.0-9.8% in other countries. Although calling themselves "open-access", none of the journals retrieved was listed in the Directory of Open Access Journals. However, 14.9-24.7% of them were found to be indexed in PubMed and PubMed Central, which raises concerns on the criteria for inclusion of journals and publishers imposed by these popular databases. Scholars in the neurosciences are advised to use all the available tools to recognize predatory practices and avoid the downsides of predatory journals. Copyright © 2017 IBRO. Published by Elsevier Ltd. All rights reserved.

  3. Liposomal cancer therapy: exploiting tumor characteristics

    DEFF Research Database (Denmark)

    Kaasgaard, Thomas; Andresen, Thomas Lars

    2010-01-01

    an overview of current strategies for improving the different stages of liposomal cancer therapy, which involve transporting drug-loaded liposomes through the bloodstream, increasing tumor accumulation, and improving drug release and cancer cell uptake after accumulation at the tumor target site. What...... the reader will gain: The review focuses on strategies that exploit characteristic features of solid tumors, such as abnormal vasculature, overexpression of receptors and enzymes, as well as acidic and thiolytic characteristics of the tumor microenvironment. Take home message: It is concluded that the design...

  4. Changes to the structure of the hydrographic network within the Silesia-Cracow area of zinc and lead exploitation

    Directory of Open Access Journals (Sweden)

    Pradela Alicja

    2017-06-01

    Full Text Available The traditions related to mining activities in the Silesia-Cracow area go back to the 11th century when lead, silver, and iron ores were exploited from open pit mines. For centuries, the growth in ore exploitation was an incentive for the development of other industries (hard coal mining, steelmaking. This, in consequence, resulted in progressive urbanization. The areas analyzed are of highly transformed character, mainly because of mining activities. These changes are especially seen in relation to the aquatic environment since this component is exposed to heavy modifications due to the mining processes. Hence the study was carried out in order to determine the quantitative changes in the surface hydrographic network. It was found, that of the 62 main watercourses (existing during the whole analyzed period 25 changed only slightly in terms of their length, 20 shortened by a few hundred meters and 17 lengthened. In the case of the aggregated length of the tributaries, the value increased for the 41 main watercourses, for 10 of them it was constant and was reduced slightly for a further 11. The areas where the length of the watercourses increased and the drainage density grew were found to be as well those where the total area of wetlands decreased. The element of the hydrographic network which was affected by the most changes was the water bodies. During the analyzed period of over 200 years, their number increased from 154 to 1413.

  5. 75 FR 40838 - Establishment of the Advisory Board on Elder Abuse, Neglect, and Exploitation

    Science.gov (United States)

    2010-07-14

    ... DEPARTMENT OF HEALTH AND HUMAN SERVICES Establishment of the Advisory Board on Elder Abuse...: Notice. Authority: The Advisory Board on Elder Abuse, Neglect, and Exploitation is authorized under... Services announces establishment of the Advisory Board on Elder Abuse, Neglect, and Exploitation, as...

  6. Balancing the Budget through Social Exploitation: Why Hard Times Are Even Harder for Some.

    Science.gov (United States)

    Tropman, John; Nicklett, Emily

    2012-01-01

    In all societies needs and wants regularly exceed resources. Thus societies are always in deficit; demand always exceeds supply and "balancing the budget" is a constant social problem. To make matters somewhat worse, research suggests that need- and want-fulfillment tends to further stimulate the cycle of wantseeking rather than satiating desire. Societies use various resource-allocation mechanisms, including price, to cope with gaps between wants and resources. Social exploitation is a second mechanism, securing labor from population segments that can be coerced or convinced to perform necessary work for free or at below-market compensation. Using practical examples, this article develops a theoretical framework for understanding social exploitation. It then offers case examples of how different segments of the population emerge as exploited groups in the United States, due to changes in social policies. These exploitative processes have been exacerbated and accelerated by the economic downturn that began in 2007.

  7. A model for describing the eutrophication in a heavily regulated coastal lagoon. Application to the Albufera of Valencia (Spain).

    Science.gov (United States)

    del Barrio Fernández, Pilar; Gómez, Andrés García; Alba, Javier García; Díaz, César Álvarez; Revilla Cortezón, José Antonio

    2012-12-15

    A simplified two-dimensional eutrophication model was developed to simulate temporal and spatial variations of chlorophyll-a in heavily regulated coastal lagoons. This model considers the hydrodynamics of the whole study area, the regulated connexion of the lagoon with the sea, the variability of the input and output nutrient loads, the flux from the sediments to the water column, the phytoplankton growth and mortality kinetics, and the zooplankton grazing. The model was calibrated and validated by applying it to the Albufera of Valencia, a hypertrophic system whose connection to the sea is strongly regulated by a system of sluice-gates. The calibration and validation results presented a significant agreement between the model and the data obtained in several surveys. The accuracy was evaluated using a quantitative analysis, in which the average uncertainty of the model prediction was less than 6%. The results confirmed an expected phytoplankton bloom in April and October, achieving mean maximum values around 250 μg l(-1) of chlorophyll-a. A mass balance revealed that the eutrophication process is magnified by the input loads of nutrients, mainly from the sediments, as well as by the limited connection of the lagoon with the sea. This study has shown that the developed model is an efficient tool to manage the eutrophication problem in heavily regulated coastal lagoons. Copyright © 2012 Elsevier Ltd. All rights reserved.

  8. The Role of External Knowledge Sources and Organizational Design in the Process of Opportunity Exploitation

    DEFF Research Database (Denmark)

    Foss, Nicolai Juul; Lyngsie, Jacob; A. Zahra, Shaker

    involving 536 Danish firms shows that the use of external knowledge sources is positively associated with opportunity exploitation, but the strength of this association is significantly influenced by organizational designs that enable the firm to access external knowledge during the process of exploiting......Research highlights the role of external knowledge sources in the recognition of strategic opportunities, but is less forthcoming with respect to the role of such sources during the process of exploiting or realizing opportunities. We build on the knowledge-based view to propose that realizing...... opportunities often involves significant interactions with external knowledge sources. Organizational design can facilitate a firm’s interactions with these sources, while achieving coordination among organizational members engaged in opportunity exploitation. Our analysis of a double-respondent survey...

  9. The Role of External Knowledge Sources and Organizational Design in the Process of Opportunity Exploitation

    DEFF Research Database (Denmark)

    Foss, Nicolai Juul; Lyngsie, Jacob; Zahra, Shaker A.

    2013-01-01

    involving 536 Danish firms shows that the use of external knowledge sources is positively associated with opportunity exploitation, but the strength of this association is significantly influenced by organizational designs that enable the firm to access external knowledge during the process of exploiting......Research highlights the role of external knowledge sources in the recognition of strategic opportunities but is less forthcoming with respect to the role of such sources during the process of exploiting or realizing opportunities. We build on the knowledge-based view to propose that realizing...... opportunities often involves significant interactions with external knowledge sources. Organizational design can facilitate a firm's interactions with these sources, while achieving coordination among organizational members engaged in opportunity exploitation. Our analysis of a double-respondent survey...

  10. OpenCL-based vicinity computation for 3D multiresolution mesh compression

    Science.gov (United States)

    Hachicha, Soumaya; Elkefi, Akram; Ben Amar, Chokri

    2017-03-01

    3D multiresolution mesh compression systems are still widely addressed in many domains. These systems are more and more requiring volumetric data to be processed in real-time. Therefore, the performance is becoming constrained by material resources usage and an overall reduction in the computational time. In this paper, our contribution entirely lies on computing, in real-time, triangles neighborhood of 3D progressive meshes for a robust compression algorithm based on the scan-based wavelet transform(WT) technique. The originality of this latter algorithm is to compute the WT with minimum memory usage by processing data as they are acquired. However, with large data, this technique is considered poor in term of computational complexity. For that, this work exploits the GPU to accelerate the computation using OpenCL as a heterogeneous programming language. Experiments demonstrate that, aside from the portability across various platforms and the flexibility guaranteed by the OpenCL-based implementation, this method can improve performance gain in speedup factor of 5 compared to the sequential CPU implementation.

  11. Environmental compatibility investigation of the Garzweiler II open cast mine project

    International Nuclear Information System (INIS)

    Oster, A.; Gaertner, D.

    1994-01-01

    Based on an EEC directive, the law on the investigation of ecological compatibility came into force in 1990. With the application of these European directives in national law, investigations to determine the ecological compatibility must now be carried out for projects to exploit brown coal. In this connection and in conjunction with the licensing procedure for Garzweiler II, Rheinbraun in 1992 for the first time compiled data on the investigations carried out to determine the ecological compatibility of an open cast mine. The data on these investigations include information on the necessity of the open cast mine and on alternative projects that have been examined, as well as a description of the project in question as regards its nature and extent. As far as the legally specified protected objects are concerned, i.e. people, water, air, nature (animals and plants, soil, climate and landscape) as well as cultural and other material objects, itemized data are furnished on the development and effects of the project and on countermeasures and the planned traffic and transport concept. (orig.) [de

  12. Root Exploit Detection and Features Optimization: Mobile Device and Blockchain Based Medical Data Management.

    Science.gov (United States)

    Firdaus, Ahmad; Anuar, Nor Badrul; Razak, Mohd Faizal Ab; Hashem, Ibrahim Abaker Targio; Bachok, Syafiq; Sangaiah, Arun Kumar

    2018-05-04

    The increasing demand for Android mobile devices and blockchain has motivated malware creators to develop mobile malware to compromise the blockchain. Although the blockchain is secure, attackers have managed to gain access into the blockchain as legal users, thereby comprising important and crucial information. Examples of mobile malware include root exploit, botnets, and Trojans and root exploit is one of the most dangerous malware. It compromises the operating system kernel in order to gain root privileges which are then used by attackers to bypass the security mechanisms, to gain complete control of the operating system, to install other possible types of malware to the devices, and finally, to steal victims' private keys linked to the blockchain. For the purpose of maximizing the security of the blockchain-based medical data management (BMDM), it is crucial to investigate the novel features and approaches contained in root exploit malware. This study proposes to use the bio-inspired method of practical swarm optimization (PSO) which automatically select the exclusive features that contain the novel android debug bridge (ADB). This study also adopts boosting (adaboost, realadaboost, logitboost, and multiboost) to enhance the machine learning prediction that detects unknown root exploit, and scrutinized three categories of features including (1) system command, (2) directory path and (3) code-based. The evaluation gathered from this study suggests a marked accuracy value of 93% with Logitboost in the simulation. Logitboost also helped to predicted all the root exploit samples in our developed system, the root exploit detection system (RODS).

  13. Open hardware for open science

    CERN Multimedia

    CERN Bulletin

    2011-01-01

    Inspired by the open source software movement, the Open Hardware Repository was created to enable hardware developers to share the results of their R&D activities. The recently published CERN Open Hardware Licence offers the legal framework to support this knowledge and technology exchange.   Two years ago, a group of electronics designers led by Javier Serrano, a CERN engineer, working in experimental physics laboratories created the Open Hardware Repository (OHR). This project was initiated in order to facilitate the exchange of hardware designs across the community in line with the ideals of “open science”. The main objectives include avoiding duplication of effort by sharing results across different teams that might be working on the same need. “For hardware developers, the advantages of open hardware are numerous. For example, it is a great learning tool for technologies some developers would not otherwise master, and it avoids unnecessary work if someone ha...

  14. Efforts to Overcome Child Commercial Sexual Exploitation Victims in City Tourism Area, Manado

    Directory of Open Access Journals (Sweden)

    Rahmat Hidayat

    2017-09-01

    Full Text Available The tourism sector has a significant contribution to the economy of Manado City, North Sulawesi Province. However, on the other hand, it has a negative effect on the increase in the number of child commercial sexual exploitation victims and makes children into commercial sex workers. Despite not effective, the Local Government of Manado City, North Sulawesi Province, has made efforts to cope with the child commercial sexual exploitation victims. In connection with the case, this study is designed to analyze the causes of ineffectiveness of Local Government efforts in tackling child commercial sexual exploitation victims. The study was conducted in tourism area of Manado City, North Sulawesi Province. The informants involved in this study were divided into two types: experts and non-experts. The informants were determined by using Opportunistic Sampling, and the sampling is using Snowball Sampling. The results of the study showed that the development of tourism sector has negative effect on children in the communities. Efforts made to cope with child commercial sexual exploitation victims by the local government and relevant parties have not been effective due to limited allocation of budgets and skilled, quality human resources, the lack of harmonious understanding between police with judges and public prosecutors as law apparatus, supervision, and protection of victims in solving the cases of child commercial sexual exploitation victims, the implementation of action committee’s duties and responsibility have been not effect, the number of obstacles facing them.

  15. Open access, open education resources and open data in Uganda.

    Science.gov (United States)

    Salvo, Ivana Di; Mwoka, Meggie; Kwaga, Teddy; Rukundo, Priscilla Aceng; Ernest, Dennis Ssesanga; Osaheni, Louis Aikoriogie; John, Kasibante; Shafik, Kasirye; de Sousa, Agostinho Moreira

    2015-01-01

    As a follow up to OpenCon 2014, International Federation of Medical Students' Associations (IFMSA) students organized a 3 day workshop Open Access, Open Education Resources and Open Data in Kampala from 15-18 December 2014. One of the aims of the workshop was to engage the Open Access movement in Uganda which encompasses the scientific community, librarians, academia, researchers and students. The IFMSA students held the workshop with the support of: Consortium for Uganda University Libraries (CUUL), The Right to Research Coalition, Electronic Information for Libraries (EIFL), Makerere University, International Health Sciences University (IHSU), Pan African Medical Journal (PAMJ) and the Centre for Health Human Rights and Development (CEHURD). All these organizations are based or have offices in Kampala. The event culminated in a meeting with the Science and Technology Committee of Parliament of Uganda in order to receive the support of the Ugandan Members of Parliament and to make a concrete change for Open Access in the country.

  16. Exploiting Social Media Sensor Networks through Novel Data Fusion Techniques

    Energy Technology Data Exchange (ETDEWEB)

    Kouri, Tina [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States)

    2017-11-01

    Unprecedented amounts of data are continuously being generated by sensors (“hard” data) and by humans (“soft” data), and this data needs to be exploited to its full potential. The first step in exploiting this data is determine how the hard and soft data are related to each other. In this project we fuse hard and soft data, using the attributes of each (e.g., time and space), to gain more information about interesting events. Next, we attempt to use social networking textual data to predict the present (i.e., predict that an interesting event is occurring and details about the event) using data mining, machine learning, natural language processing, and text analysis techniques.

  17. Stereoselective, nitro-Mannich/lactamisation cascades for the direct synthesis of heavily decorated 5-nitropiperidin-2-ones and related heterocycles

    Directory of Open Access Journals (Sweden)

    Pavol Jakubec

    2012-04-01

    Full Text Available A versatile nitro-Mannich/lactamisation cascade for the direct stereoselective synthesis of heavily decorated 5-nitropiperidin-2-ones and related heterocycles has been developed. A highly enantioenriched substituted 5-nitropiperidin-2-one was synthesised in a four component one-pot reaction combining an enantioselective organocatalytic Michael addition with the diastereoselective nitro-Mannich/lactamisation cascade. Protodenitration and chemoselective reductive manipulation of the heterocycles was used to install contiguous and fully substituted stereocentres in the synthesis of substituted piperidines.

  18. The effect of irradiation temperature on the optical attenuation recovery in heavily Ge-doped single mode silica core fibers

    International Nuclear Information System (INIS)

    Bertolotti, M.; Mabrouk, M.A.; Ferrari, A.; Serra, A.; Viezzoli, G.

    1992-01-01

    The behaviour under irradiation of a single mode fiber heavily doped with germanium has been investigated at 0.85 μm and 1.3 μm under different irradiation temperatures in the range from -65degC to 60degC. The time behaviour of the recovery of the induced attenuation has been described using empirical equations, for different temperatures. An nth order kinetics seems appropriate to describe the results and the order of kinetics has been determined at different temperatures. (orig.)

  19. Dandruff: The most commercially exploited skin disease

    Directory of Open Access Journals (Sweden)

    Ranganathan S

    2010-01-01

    Full Text Available The article discuss in detail about the prevalence, pathophysiology, clinical manifestations of dandruff including the etio-pathology. The article also discusses in detail about various treatment methods available for dandruff. The status of dandruff being amphibious - a disease/disorder, and relatively less medical intervention is sought after for the treatment, dandruff is the most commercially exploited skin and scalp disorder/disease by personal care industries.

  20. Exploiting thesauri knowledge in medical guideline formalization

    OpenAIRE

    Serban, R.C.; ten Teije, A.C.M.

    2009-01-01

    Objectives: As in software product lifecycle, the effort spent in maintaining medical knowl edge in guidelines can be reduced, if modularization, formalization and tracking of domain knowledge are employed across the guideline development phases. Methods: We propose to exploit and combine knowledge templates with medical background knowledge from existing thesauri in order to produce reusable building blocks used in guideline development. These tem- plates enable easier guideline formalizatio...

  1. Exploitation Strategies in Social Parasites of Fungus Growing Ants

    DEFF Research Database (Denmark)

    Clement, Janni Dolby

    One of the most remarkable and complex parasitic interactions is social parasitism, where a parasite exploits a complete society, rather than an individual organism. By integrating into a society the parasite gains protection against predators and diseases, and can redirect resources from the host...... to increase its own fitness. The host will use a sophisticated recognition system in order to accept nestmates and expel intruders from their societies. However this defence barrier can be overcome by parasites. Among the most specialized social parasites are the inquilines that exploit social insect colonies...... to this are Acromyrmex insinuator and Acromyrmex ameliae, parasites of fungus-growing ants. By still producing a worker caste both species offers a rare opportunity to study adaptive features in parasite worker behaviour. Furthermore can closely related inquiline-host combinations give us an insight in the trade...

  2. Launch prices for new pharmaceuticals in the heavily regulated and subsidized Spanish market, 1995-2007.

    Science.gov (United States)

    Puig-Junoy, Jaume; López-Valcárcel, Beatriz González

    2014-06-01

    This paper provides empirical evidence on the explanatory factors affecting introductory prices of new pharmaceuticals in a heavily regulated and highly subsidized market. We collect a data set consisting of all new chemical entities launched in Spain between 1997 and 2005, and model launch prices following an extended version of previous economic models. We found that, unlike in the US and Sweden, therapeutically "innovative" products are not overpriced relative to "imitative" ones after having controlled for other factors. Price setting is mainly used as a mechanism to adjust for inflation independently of the degree of innovation. The drugs that enter through the centralized EMA approval procedure are overpriced, which may be a consequence of market globalization and international price setting. Copyright © 2014 Elsevier Ireland Ltd. All rights reserved.

  3. Exploiting serological data to understand the epidemiology of foot ...

    African Journals Online (AJOL)

    Exploiting serological data to understand the epidemiology of foot-and-mouth disease virus serotypes circulating in Libya. Ibrahim Eldaghayes, Abdunaser Dayhum, Abdulwahab Kammon, Monier Sharif, Giancarlo Ferrari, Christianus Bartels, Keith Sumption, Donald P. King, Santina Grazioli, Emiliana Brocchi ...

  4. Open Content in Open Context

    Science.gov (United States)

    Kansa, Sarah Whitcher; Kansa, Eric C.

    2007-01-01

    This article presents the challenges and rewards of sharing research content through a discussion of Open Context, a new open access data publication system for field sciences and museum collections. Open Context is the first data repository of its kind, allowing self-publication of research data, community commentary through tagging, and clear…

  5. Exploiting social evolution in biofilms

    DEFF Research Database (Denmark)

    Boyle, Kerry E; Heilmann, Silja; van Ditmarsch, Dave

    2013-01-01

    Bacteria are highly social organisms that communicate via signaling molecules, move collectively over surfaces and make biofilm communities. Nonetheless, our main line of defense against pathogenic bacteria consists of antibiotics-drugs that target individual-level traits of bacterial cells...... and thus, regrettably, select for resistance against their own action. A possible solution lies in targeting the mechanisms by which bacteria interact with each other within biofilms. The emerging field of microbial social evolution combines molecular microbiology with evolutionary theory to dissect...... the molecular mechanisms and the evolutionary pressures underpinning bacterial sociality. This exciting new research can ultimately lead to new therapies against biofilm infections that exploit evolutionary cheating or the trade-off between biofilm formation and dispersal....

  6. Openness, Web 2.0 Technology, and Open Science

    Science.gov (United States)

    Peters, Michael A.

    2010-01-01

    Open science is a term that is being used in the literature to designate a form of science based on open source models or that utilizes principles of open access, open archiving and open publishing to promote scientific communication. Open science increasingly also refers to open governance and more democratized engagement and control of science…

  7. Exploitation of pocket gophers and their food caches by grizzly bears

    Science.gov (United States)

    Mattson, D.J.

    2004-01-01

    I investigated the exploitation of pocket gophers (Thomomys talpoides) by grizzly bears (Ursus arctos horribilis) in the Yellowstone region of the United States with the use of data collected during a study of radiomarked bears in 1977-1992. My analysis focused on the importance of pocket gophers as a source of energy and nutrients, effects of weather and site features, and importance of pocket gophers to grizzly bears in the western contiguous United States prior to historical extirpations. Pocket gophers and their food caches were infrequent in grizzly bear feces, although foraging for pocket gophers accounted for about 20-25% of all grizzly bear feeding activity during April and May. Compared with roots individually excavated by bears, pocket gopher food caches were less digestible but more easily dug out. Exploitation of gopher food caches by grizzly bears was highly sensitive to site and weather conditions and peaked during and shortly after snowmelt. This peak coincided with maximum success by bears in finding pocket gopher food caches. Exploitation was most frequent and extensive on gently sloping nonforested sites with abundant spring beauty (Claytonia lanceolata) and yampah (Perdieridia gairdneri). Pocket gophers are rare in forests, and spring beauty and yampah roots are known to be important foods of both grizzly bears and burrowing rodents. Although grizzly bears commonly exploit pocket gophers only in the Yellowstone region, this behavior was probably widespread in mountainous areas of the western contiguous United States prior to extirpations of grizzly bears within the last 150 years.

  8. Examples of Sentinel-2A Mission Exploitation Results

    Science.gov (United States)

    Koetz, Benjamin; Hoersch, Bianca; Gascon, Ferran; Desnos, Yves-Louis; Seifert, Frank Martin; Paganini, Marc; Ramoino, Fabrizio; Arino, Olivier

    2017-04-01

    The Sentinel-2 Copernicus mission will bring significant breakthrough in the exploitation of space borne optical data. Sentinel-2 time series will transform land cover, agriculture, forestry, in-land water and costal EO applications from mapping to monitoring, from snapshot to time series data analysis, from image-based to pixel-based processing. The 5-days temporal revisiting of the Sentinel-2 satellites, when both units will be operated together, will usher us in a new era for time series analysis at high spatial resolutions (HR) of 10-20 meters. The monitoring of seasonal variations and processes in phenology and hydrology are examples of the many R&D areas to be studied. The mission's large swath and systematic acquisitions will further support unprecedented coverage at the national scale addressing information requirements of national to regional policies. Within ESA programs, such as the Data User Element (DUE), Scientific Exploitation of Operational Missions (SEOM) and Climate Change Initiative (CCI), several R&D activities are preparing the exploitation of the Sentinel-2 mission towards reliable measurements and monitoring of e.g. Essential Climate Variables and indicators for the Sustainable Development Goals. Early Sentinel-2 results will be presented related to a range of applications and scientific domains such as agricultural monitoring at national scale (DUE Sen2Agri), wetland extent and condition over African Ramsar sites (DUE GlobWetland-Africa), land cover mapping for climate change (CCI Land Cover), national land monitoring (Cadaster-Env), forest degradation (DUE ForMoSa), urban mapping (DUE EO4Urban), in-land water quality (DUE SPONGE), map of Mediterranean aquaculture (DUE SMART) and coral reef habitat mapping (SEOM S2-4Sci Coral). The above-mentioned activities are only a few examples from the very active international land imaging community building on the long-term Landsat and Spot heritage and knowledge.

  9. FSH: fast spaced seed hashing exploiting adjacent hashes.

    Science.gov (United States)

    Girotto, Samuele; Comin, Matteo; Pizzi, Cinzia

    2018-01-01

    Patterns with wildcards in specified positions, namely spaced seeds , are increasingly used instead of k -mers in many bioinformatics applications that require indexing, querying and rapid similarity search, as they can provide better sensitivity. Many of these applications require to compute the hashing of each position in the input sequences with respect to the given spaced seed, or to multiple spaced seeds. While the hashing of k -mers can be rapidly computed by exploiting the large overlap between consecutive k -mers, spaced seeds hashing is usually computed from scratch for each position in the input sequence, thus resulting in slower processing. The method proposed in this paper, fast spaced-seed hashing (FSH), exploits the similarity of the hash values of spaced seeds computed at adjacent positions in the input sequence. In our experiments we compute the hash for each positions of metagenomics reads from several datasets, with respect to different spaced seeds. We also propose a generalized version of the algorithm for the simultaneous computation of multiple spaced seeds hashing. In the experiments, our algorithm can compute the hashing values of spaced seeds with a speedup, with respect to the traditional approach, between 1.6[Formula: see text] to 5.3[Formula: see text], depending on the structure of the spaced seed. Spaced seed hashing is a routine task for several bioinformatics application. FSH allows to perform this task efficiently and raise the question of whether other hashing can be exploited to further improve the speed up. This has the potential of major impact in the field, making spaced seed applications not only accurate, but also faster and more efficient. The software FSH is freely available for academic use at: https://bitbucket.org/samu661/fsh/overview.

  10. User-driven sampling strategies in image exploitation

    Science.gov (United States)

    Harvey, Neal; Porter, Reid

    2013-12-01

    Visual analytics and interactive machine learning both try to leverage the complementary strengths of humans and machines to solve complex data exploitation tasks. These fields overlap most significantly when training is involved: the visualization or machine learning tool improves over time by exploiting observations of the human-computer interaction. This paper focuses on one aspect of the human-computer interaction that we call user-driven sampling strategies. Unlike relevance feedback and active learning sampling strategies, where the computer selects which data to label at each iteration, we investigate situations where the user selects which data is to be labeled at each iteration. User-driven sampling strategies can emerge in many visual analytics applications but they have not been fully developed in machine learning. User-driven sampling strategies suggest new theoretical and practical research questions for both visualization science and machine learning. In this paper we identify and quantify the potential benefits of these strategies in a practical image analysis application. We find user-driven sampling strategies can sometimes provide significant performance gains by steering tools towards local minima that have lower error than tools trained with all of the data. In preliminary experiments we find these performance gains are particularly pronounced when the user is experienced with the tool and application domain.

  11. SmartR: an open-source platform for interactive visual analytics for translational research data.

    Science.gov (United States)

    Herzinger, Sascha; Gu, Wei; Satagopam, Venkata; Eifes, Serge; Rege, Kavita; Barbosa-Silva, Adriano; Schneider, Reinhard

    2017-07-15

    In translational research, efficient knowledge exchange between the different fields of expertise is crucial. An open platform that is capable of storing a multitude of data types such as clinical, pre-clinical or OMICS data combined with strong visual analytical capabilities will significantly accelerate the scientific progress by making data more accessible and hypothesis generation easier. The open data warehouse tranSMART is capable of storing a variety of data types and has a growing user community including both academic institutions and pharmaceutical companies. tranSMART, however, currently lacks interactive and dynamic visual analytics and does not permit any post-processing interaction or exploration. For this reason, we developed SmartR , a plugin for tranSMART, that equips the platform not only with several dynamic visual analytical workflows, but also provides its own framework for the addition of new custom workflows. Modern web technologies such as D3.js or AngularJS were used to build a set of standard visualizations that were heavily improved with dynamic elements. The source code is licensed under the Apache 2.0 License and is freely available on GitHub: https://github.com/transmart/SmartR . reinhard.schneider@uni.lu. Supplementary data are available at Bioinformatics online. © The Author(s) 2017. Published by Oxford University Press.

  12. Explore or Exploit? A Generic Model and an Exactly Solvable Case

    Science.gov (United States)

    Gueudré, Thomas; Dobrinevski, Alexander; Bouchaud, Jean-Philippe

    2014-02-01

    Finding a good compromise between the exploitation of known resources and the exploration of unknown, but potentially more profitable choices, is a general problem, which arises in many different scientific disciplines. We propose a stylized model for these exploration-exploitation situations, including population or economic growth, portfolio optimization, evolutionary dynamics, or the problem of optimal pinning of vortices or dislocations in disordered materials. We find the exact growth rate of this model for treelike geometries and prove the existence of an optimal migration rate in this case. Numerical simulations in the one-dimensional case confirm the generic existence of an optimum.

  13. Explore or exploit? A generic model and an exactly solvable case.

    Science.gov (United States)

    Gueudré, Thomas; Dobrinevski, Alexander; Bouchaud, Jean-Philippe

    2014-02-07

    Finding a good compromise between the exploitation of known resources and the exploration of unknown, but potentially more profitable choices, is a general problem, which arises in many different scientific disciplines. We propose a stylized model for these exploration-exploitation situations, including population or economic growth, portfolio optimization, evolutionary dynamics, or the problem of optimal pinning of vortices or dislocations in disordered materials. We find the exact growth rate of this model for treelike geometries and prove the existence of an optimal migration rate in this case. Numerical simulations in the one-dimensional case confirm the generic existence of an optimum.

  14. Atomic Energy Authority Bill (amendment on exploitation of results of research)

    International Nuclear Information System (INIS)

    Gray, J.H.N.; Stoddart, D.L.; Lloyd, R.G.

    1986-01-01

    This amendment arises from legal doubts about the extent of the UKAEA's present powers to exploit the results of its research. The new clause, which amends the Atomic Energy Authority Bill, allows that the Authority has power to exploit commercially by selling, licensing the use of, or otherwise dealing with any intellectual property (patents, trademarks, copyright, registered designs etc) resulting from research carried out by it, or on its behalf, or which is available because of exchange of results or collaboration with others. The 12 minute debate is reported verbatim. The amendment was agreed to. (U.K.)

  15. Conceptualizing child labour trafficking and exploitation: The case of Roma children in Montenegro

    Directory of Open Access Journals (Sweden)

    Arhin Antonela

    2012-01-01

    Full Text Available Trafficking of children for labour exploitation is a profit-oriented criminal activity by which children are recruited, transported, harboured or received for the purpose of labour exploitation irrespective of whether or not force, abduction, fraud or other means were used. This paper examines child labour trafficking in the context of human rights violations and as the worst form of child labour. In an attempt to situate the discourse of alleged labour exploitation and trafficking of Roma children in Montenegro, focusing in particular on instances of child begging, this paper offers an overview of the international legal framework as well as the Government of Montenegro’s policy framework relevant to this issue; an analysis of implicated historical, familial and cultural structures; and focuses on identifying root causes in terms of push-pull factors that are associated with enhancing children’s vulnerability and proneness to exploitation. Along with a set of recommendations, in closing, the paper calls for a more sophisticated analysis of child labour trafficking and, in the case of Roma children, a more nuanced understanding of historical and cultural pretexts against the backdrop of labour trafficking.

  16. Exploitation of Clustering Techniques in Transactional Healthcare Data

    Directory of Open Access Journals (Sweden)

    Naeem Ahmad Mahoto

    2014-03-01

    Full Text Available Healthcare service centres equipped with electronic health systems have improved their resources as well as treatment processes. The dynamic nature of healthcare data of each individual makes it complex and difficult for physicians to manually mediate them; therefore, automatic techniques are essential to manage the quality and standardization of treatment procedures. Exploratory data analysis, patternanalysis and grouping of data is managed using clustering techniques, which work as an unsupervised classification. A number of healthcare applications are developed that use several data mining techniques for classification, clustering and extracting useful information from healthcare data. The challenging issue in this domain is to select adequate data mining algorithm for optimal results. This paper exploits three different clustering algorithms: DBSCAN (Density-Based Clustering, agglomerative hierarchical and k-means in real transactional healthcare data of diabetic patients (taken as case study to analyse their performance in large and dispersed healthcare data. The best solution of cluster sets among the exploited algorithms is evaluated using clustering quality indexes and is selected to identify the possible subgroups of patients having similar treatment patterns

  17. Activity-based exploitation of Full Motion Video (FMV)

    Science.gov (United States)

    Kant, Shashi

    2012-06-01

    Video has been a game-changer in how US forces are able to find, track and defeat its adversaries. With millions of minutes of video being generated from an increasing number of sensor platforms, the DOD has stated that the rapid increase in video is overwhelming their analysts. The manpower required to view and garner useable information from the flood of video is unaffordable, especially in light of current fiscal restraints. "Search" within full-motion video has traditionally relied on human tagging of content, and video metadata, to provision filtering and locate segments of interest, in the context of analyst query. Our approach utilizes a novel machine-vision based approach to index FMV, using object recognition & tracking, events and activities detection. This approach enables FMV exploitation in real-time, as well as a forensic look-back within archives. This approach can help get the most information out of video sensor collection, help focus the attention of overburdened analysts form connections in activity over time and conserve national fiscal resources in exploiting FMV.

  18. Exploitation by Economic Necessity

    Directory of Open Access Journals (Sweden)

    Kristian F. Braekkan

    2015-10-01

    Full Text Available This study develops and tests a model that proposes economic necessity moderates the relationship between psychological contract violations (PCVs and organizational commitment and trust in the employing organization among non-unionized manufacturing workers (N = 226. Moderated regression analyses revealed that there was a significant interaction between PCV and economic necessity in predicting both outcomes. Specifically, the findings indicated that individuals experiencing high PCV and high economic necessity did not decrease their organizational commitment like their counterparts who endorsed lower economic necessity. They did, however, experience significantly decreased trust in their employer. The findings suggest that individuals who are forced to sell their labor power and obtain what they need through the market are more likely to continue to be exploited by their employer, as they have no other options than to continue the relationship. The importance of the findings is discussed, and recommendations for future research are provided.

  19. Énergie et environnement: l’exploitation des sables bitumineux en Alberta (Canada

    Directory of Open Access Journals (Sweden)

    Stéphane Héritier

    2007-09-01

    Full Text Available Découverts dans les années 1930, les secteurs de sables bitumineux (ou pétrolifères de l’Ouest canadien sont caractérisés par une intense exploitation, accélérée et stimulée depuis la décennie 1990, liée à l’explosion de la demande mondiale et aux prix élevés du baril de pétrole. Grâce à cette activité, l’Alberta est devenue l’une des provinces les plus dynamiques du Canada. L’exploitation, concédée à des entreprises pétrolières nationales et internationales, contribue à stimuler à la fois l’économie et la démographie de la province, où les revenus et les conditions économiques générales sont devenus particulièrement attractifs. Dans le même temps l’Alberta et le Canada se trouvent en situation délicate par rapport aux engagements internationaux, l’exploitation et la production du pétrole ayant des effets environnementaux importants tels que l’augmentation de la production de gaz à effets de serre, alors que les économies locales et régionales fondent leurs projets de croissance sur les revenus dégagés par cette exploitation.

  20. Ambidextrous Organizations: A Multiple-Level Study of Absorptive Capacity, Exploratory and Exploitative Innovation and Performance

    NARCIS (Netherlands)

    J.J.P. Jansen (Justin)

    2005-01-01

    textabstractBalancing and synchronizing exploration and exploitation is fundamental to the competitive success of firms in dynamic environments. Despite the importance of reconciling exploration and exploitation within organizations, however, relatively little empirical research has examined this

  1. Low-lying dipole strength of the open-shell nucleus 94Mo

    Science.gov (United States)

    Romig, C.; Beller, J.; Glorius, J.; Isaak, J.; Kelley, J. H.; Kwan, E.; Pietralla, N.; Ponomarev, V. Yu.; Sauerwein, A.; Savran, D.; Scheck, M.; Schnorrenberger, L.; Sonnabend, K.; Tonchev, A. P.; Tornow, W.; Weller, H. R.; Zilges, A.; Zweidinger, M.

    2013-10-01

    The low-lying dipole strength of the open-shell nucleus 94Mo was studied via the nuclear resonance fluorescence technique up to 8.7 MeV excitation energy at the bremsstrahlung facility at the Superconducting Darmstadt Electron Linear Accelerator (S-DALINAC), and with Compton backscattered photons at the High Intensity γ-ray Source (HIγS) facility. In total, 83 excited states were identified. Exploiting polarized quasi-monoenergetic photons at HIγS, parity quantum numbers were assigned to 41 states excited by dipole transitions. The electric dipole-strength distribution was determined up to 8.7 MeV and compared to microscopic calculations within the quasiparticle phonon model. Calculations and experimental data are in good agreement for the fragmentation, as well as for the integrated strength. The average decay pattern of the excited states was investigated exploiting the HIγS measurements at five energy settings. Mean branching ratios to the ground state and first excited 21+ state were extracted from the measurements with quasi-monoenergetic photons and compared to γ-cascade simulations within the statistical model. The experimentally deduced mean branching ratios exhibit a resonance-like maximum at 6.4 MeV which cannot be reproduced within the statistical model. This indicates a nonstatistical structure in the energy range between 5.5 and 7.5 MeV.

  2. Technology learning in a small open economy-The systems, modelling and exploiting the learning effect

    International Nuclear Information System (INIS)

    Martinsen, Thomas

    2011-01-01

    This paper reviews the characteristics of technology learning and discusses its application in energy system modelling in a global-local perspective. Its influence on the national energy system, exemplified by Norway, is investigated using a global and national Markal model. The dynamic nature of the learning system boundary and coupling between the national energy system and the global development and manufacturing system is elaborated. Some criteria important for modelling of spillover are suggested. Particularly, to ensure balance in global energy demand and supply and accurately reflect alternative global pathways spillover for all technologies as well as energy carrier cost/prices should be estimated under the same global scenario. The technology composition, CO 2 emissions and system cost in Norway up to 2050 exhibit sensitivity to spillover. Moreover, spillover may reduce both CO 2 emissions and total system cost. National energy system analysis of low carbon society should therefore consider technology development paths in global policy scenarios. Without the spillover from international deployment a domestic technology relies only on endogenous national learning. However, with high but realistic learning rates offshore floating wind may become cost-efficient even if initially deployed only in Norwegian niche markets. - Research highlights: → Spillover for all technologies should emanate from the same global scenario. → A global model is called for to estimate spillover.→ Spillover may reduce CO 2 emissions and the total system cost in a small open economy. → Off-shore floating wind may become cost-efficient in a national niche market.

  3. The origin of double peak electric field distribution in heavily irradiated silicon detectors

    CERN Document Server

    Eremin, V; Li, Z

    2002-01-01

    The first observation of double peak (DP) electric field distribution in heavily neutron irradiated (>10 sup 1 sup 4 n/cm sup 2) semiconductor detectors has been published about 6 yr ago. However, this effect was not quantitatively analyzed up to now. The explanation of the DP electric field distribution presented in this paper is based on the properties of radiation induced deep levels in silicon, which act as deep traps, and on the distribution of the thermally generated free carrier concentration in the detector bulk. In the frame of this model, the earlier published considerations on the so-called 'double junction (DJ) effect' are discussed as well. The comparison of the calculated electric field profiles at different temperatures with the experimental ones allows one to determine a set of deep levels. This set of deep levels, and their charge filling status are essential to the value and the distribution of space charge in the space charge region in the range of 305-240 K, which is actual temperature ran...

  4. Generating optimal control simulations of musculoskeletal movement using OpenSim and MATLAB.

    Science.gov (United States)

    Lee, Leng-Feng; Umberger, Brian R

    2016-01-01

    Computer modeling, simulation and optimization are powerful tools that have seen increased use in biomechanics research. Dynamic optimizations can be categorized as either data-tracking or predictive problems. The data-tracking approach has been used extensively to address human movement problems of clinical relevance. The predictive approach also holds great promise, but has seen limited use in clinical applications. Enhanced software tools would facilitate the application of predictive musculoskeletal simulations to clinically-relevant research. The open-source software OpenSim provides tools for generating tracking simulations but not predictive simulations. However, OpenSim includes an extensive application programming interface that permits extending its capabilities with scripting languages such as MATLAB. In the work presented here, we combine the computational tools provided by MATLAB with the musculoskeletal modeling capabilities of OpenSim to create a framework for generating predictive simulations of musculoskeletal movement based on direct collocation optimal control techniques. In many cases, the direct collocation approach can be used to solve optimal control problems considerably faster than traditional shooting methods. Cyclical and discrete movement problems were solved using a simple 1 degree of freedom musculoskeletal model and a model of the human lower limb, respectively. The problems could be solved in reasonable amounts of time (several seconds to 1-2 hours) using the open-source IPOPT solver. The problems could also be solved using the fmincon solver that is included with MATLAB, but the computation times were excessively long for all but the smallest of problems. The performance advantage for IPOPT was derived primarily by exploiting sparsity in the constraints Jacobian. The framework presented here provides a powerful and flexible approach for generating optimal control simulations of musculoskeletal movement using OpenSim and MATLAB. This

  5. Exploiting partial knowledge for efficient model analysis

    OpenAIRE

    Macedo, Nuno; Cunha, Alcino; Pessoa, Eduardo José Dias

    2017-01-01

    The advancement of constraint solvers and model checkers has enabled the effective analysis of high-level formal specification languages. However, these typically handle a specification in an opaque manner, amalgamating all its constraints in a single monolithic verification task, which often proves to be a performance bottleneck. This paper addresses this issue by proposing a solving strategy that exploits user-provided partial knowledge, namely by assigning symbolic bounds to the problem’s ...

  6. OpenAPS Data Commons on Open Humans

    OpenAIRE

    Lewis, Dana M.; Ball, Madeleine

    2017-01-01

    Poster describing OpenAPS, Open Humans, and joint work creating a data commons for OpenAPS data in the Open Humans platform. Presented at the 2017 Sage Assembly Bionetworks Assembly and recipient of a Young Innovator/Investigator award.

  7. Characteristics of thermal-mineral waters in Backa region (Vojvodina) and their exploitation in spa tourism

    Energy Technology Data Exchange (ETDEWEB)

    Kosic, Kristina; Pivac, Tatjana; Romelic, Jovan; Lazic, Lazar; Stojanovic, Vladimir [Faculty of Science, Department of Geography, Tourism and Hotel Management, University of Novi Sad, Trg Dositeja Obradovica 3, 21000 Novi Sad (RS)

    2011-01-15

    Hydropower, biomass, biogas, biofuels, wind power, solar energy and geothermal energy are the major resources to provide Backa region with most of its. Backa extends between 45 16' and 46 22' of the northern latitude and 18 36' and 20 37' of the eastern longitude. It occupies the north-eastern part of Vojvodina, i.e. the most north-western part of the Republic of Serbia. That is historical-geographic territory bordered on the Danube on its western and eastern side, the Tisa on its eastern side and with the state border towards Hungary on the north. In this paper, the focus will be on renewable sources, specifically geothermal energy in Backa region. The paper analyzes the characteristics of thermal-mineral waters in Backa, the condition and possibilities of their exploitation in spa tourism, and in other economic branches. The tradition of thermo-mineral waters exploitation in spas and public baths is rather long. Today, this type of thermo-mineral waters exploitation in Backa is the widest spread. Permanent, i.e. continuous exploiters of thermal-mineral waters in Backa are primarily balneal-rehabilitation centres and exploiters using the water for technological purposes. (author)

  8. Target Localization with a Single Antenna via Directional Multipath Exploitation

    Directory of Open Access Journals (Sweden)

    Ali H. Muqaibel

    2015-01-01

    Full Text Available Target localization in urban sensing can benefit from angle dependency of the pulse shape at a radar receiver antenna. We propose a localization approach that utilizes the embedded directivity in ultra-wideband (UWB antennas to estimate target positions. A single radar unit sensing operation of indoor targets surrounded by interior walls is considered, where interior wall multipaths are exploited to provide target cross-range. This exploitation assumes resolvability of the multipath components, which is made possible by the virtue of using UWB radar signals. The proposed approach is most attractive when only few multipaths are detectable due to propagation obstructions or owing to low signal-to-noise ratios. Both simulated and experimental data are used to demonstrate the effectiveness of the proposed approach.

  9. Analysis Of Damage Arising From Exploitation Of The Aircraft

    Directory of Open Access Journals (Sweden)

    Woźny Piotr

    2014-12-01

    Full Text Available During exploitation, due to a variety of reasons, aircrafts are damaged or suffer from different failures. In the process of operation, using appropriate methods of diagnosis, failure, damage, and relative deregulation of individual elements or units can be detected. For this purpose, one can apply a number of indirect diagnostic methods with the use of recorded diagnostic signals or a direct diagnosis with the use of non-destructive methods. The proper identification of the technical condition allows to determine the causes of irregularities and take actions aimed at preventing their occurrence. The article presents the types of exploitation damage of a multi-purpose aircraft. In addition, the criteria for the division of damage and research methods of the causes of damage are presented. Furthermore, an analysis of the scope of activities to be performed during the research of causes of damage to the aircraft is made.

  10. Host exploitation strategies of the social parasite Maculinea alcon

    DEFF Research Database (Denmark)

    Fürst, Matthias Alois

    as model systems. These enable the study of adaptations and counter-adaptations that might evolve in the arms-race between a parasite pursuing maximum gain and a host trying to avoid exploitation. One such system is the socially parasitic butterfly Maculinea alcon and its host the ant Myrmica rubra....... Throughout the first instars M. alcon lives on a specific food plant, however, in the last instar before pupation it develops into an obligate social parasite, posing a considerably cost to its host ant colony. I here focus on the different exploitation strategies of M. alcon throughout its lifecycle...... a fitness cost to infected host ant colonies, the host ants are expected to have developed defense mechanisms in response to the presence of the social parasite. I was able to demonstrate that the efficiency of ant colonies to defend themselves against intruders depends on a multitude of often correlated...

  11. As Good or Better than Commercial Textbooks: Students’ Perceptions and Outcomes from Using Open Digital and Open Print Textbooks

    Directory of Open Access Journals (Sweden)

    Rajiv S. Jhangiani

    2018-04-01

    Full Text Available The increase in the cost of college textbooks together with the proliferation of digital content and devices has inspired the development of open textbooks, open educational resources that are free, openly licensed, and often peer-reviewed. Although several published studies have investigated the impact of open textbook adoption on educational outcomes, none have separated the effects of textbook openness and format and only two have taken place in Canada (Hendricks, Reinsberg, & Rieger, 2017; Jhangiani & Jhangiani, 2017. This study investigates the perceptions, use, and course performance of Canadian post-secondary students assigned a commercial or open textbook in either print or digital format. Results show that students using the print format of the open textbook perceive its quality to be superior to the commercial textbook. Moreover, students assigned an open textbook in either format perform either no differently from or better than those assigned a commercial textbook. These results are consistent with the existing literature and support the conclusion that the cost savings to students associated with the adoption of open textbooks do not come at the expense of resource quality or student performance. L’augmentation du coût des manuels universitaires ainsi que la prolifération du contenu numérique et des appareils électroniques ont inspiré le développement de manuels ouverts, des ressources éducationnelles qui sont gratuites, dont les licences d’exploitation sont ouvertes et qui sont souvent évalués par les pairs. Bien que plusieurs études publiées aient étudié l’impact de l’adoption de manuels ouverts sur les résultats éducationnels, aucune n’a séparé les effets du caractère ouvert des manuels et du format et seulement deux études ont été menées au Canada (Hendricks, Reinsberg & Rieger, 2017; Jhangiani & Jhangiani, 2017. Cette étude examine les perceptions, l’emploi et les résultats des

  12. Hacking the Cell: Network Intrusion and Exploitation by Adenovirus E1A.

    Science.gov (United States)

    King, Cason R; Zhang, Ali; Tessier, Tanner M; Gameiro, Steven F; Mymryk, Joe S

    2018-05-01

    As obligate intracellular parasites, viruses are dependent on their infected hosts for survival. Consequently, viruses are under enormous selective pressure to utilize available cellular components and processes to their own advantage. As most, if not all, cellular activities are regulated at some level via protein interactions, host protein interaction networks are particularly vulnerable to viral exploitation. Indeed, viral proteins frequently target highly connected "hub" proteins to "hack" the cellular network, defining the molecular basis for viral control over the host. This widespread and successful strategy of network intrusion and exploitation has evolved convergently among numerous genetically distinct viruses as a result of the endless evolutionary arms race between pathogens and hosts. Here we examine the means by which a particularly well-connected viral hub protein, human adenovirus E1A, compromises and exploits the vulnerabilities of eukaryotic protein interaction networks. Importantly, these interactions identify critical regulatory hubs in the human proteome and help define the molecular basis of their function. Copyright © 2018 King et al.

  13. THE SCENIC VALUE OF ABANDONED MINING AREAS IN POLAND

    Directory of Open Access Journals (Sweden)

    URSZULA MYGA-PIĄTEK

    2008-12-01

    Full Text Available Abandoned Polish mining areas are commonly heavily transformed so that they endanger no longer the environment. A disadvantage is that the newly created areas commonly contribute to the monotonous urban-industrial landscape, rather than providing additional value. This is partly due to legislation that hampers a more diversified management of abandoned mining areas as potentially valuable landforms. One of the legal barriers that restricts the possibilities of making these areas more attractive, regards the utilization of remaining exploitation holes (i.e. land depressions of at least 2 m deep, formed as a result of open-pit mining of energy, chemical, building or metallurgical resources and waste heaps as important cultural and scenic elements. Such a new use of these old mininginduced phenomena is important if it is intended not only to involve the regional population in the process of exploring and exploiting the earth’s resources, but also to confront them with some negative consequences of these activities, including shaping the landscape in which these objects are situated. The current attitude towards a new architecture for abandoned mining areas should be reconsidered; particularly the present-day approach based on narrow specializations – for instance of experts in mineral exploitation, spatial planning or environmental protection – should be replaced by interdisciplinary action regarding shaping the landscape of abandoned mining areas.

  14. Sex trafficking and sexual exploitation in settings affected by armed conflicts in Africa, Asia and the Middle East: systematic review.

    Science.gov (United States)

    McAlpine, Alys; Hossain, Mazeda; Zimmerman, Cathy

    2016-12-28

    Sex trafficking and sexual exploitation has been widely reported, especially in conflict-affected settings, which appear to increase women's and children's vulnerabilities to these extreme abuses. We conducted a systematic search of ten databases and extensive grey literature to gather evidence of sex trafficking and sexual exploitation in conflict-affected settings. International definitions of "sexual exploitation" and "sex trafficking" set the indicator parameters. We focused on sexual exploitation in forms of early or forced marriage, forced combatant sexual exploitation and sexual slavery. We extracted prevalence measures, health outcomes and sexual exploitation terminology definitions. The review adhered to PRISMA guidelines and includes quality appraisal. The search identified 29 eligible papers with evidence of sex trafficking and sexual exploitation in armed conflict settings in twelve countries in Africa, Asia, and the Middle East. The evidence was limited and not generalizable, due to few prevalence estimates and inconsistent definitions of "sexual exploitation". The prevalence estimates available indicate that females were more likely than males to be victims of sexual exploitation in conflict settings. In some settings, as many as one in four forced marriages took place before the girls reached 18 years old. Findings suggest that the vast majority of former female combatants were sexually exploited during the conflict. These studies provided various indicators of sexual exploitation compatible to the United Nation's definition of sex trafficking, but only 2 studies identified the exploitation as trafficking. None of the studies solely aimed to measure the prevalence of sex trafficking or sexual exploitation. Similar descriptions of types of sexual exploitation and trafficking were found, but the inconsistent terminology or measurements inhibited a meta-analysis. Findings indicate there are various forms of human trafficking and sexual exploitation in

  15. NuSTAR and XMM-Newton observations of luminous, heavily obscured, WISE-selected quasars at z ∼ 2

    Energy Technology Data Exchange (ETDEWEB)

    Stern, D.; Eisenhardt, P. R. M. [Jet Propulsion Laboratory, California Institute of Technology, 4800 Oak Grove Drive, Mail Stop 169-221, Pasadena, CA 91109 (United States); Lansbury, G. B.; Alexander, D. M.; Del Moro, A.; Gandhi, P. [Department of Physics, University of Durham, South Road, Durham DH1 3LE (United Kingdom); Assef, R. J. [Núcleo de Astronomía de la Facultad de Ingeniería, Universidad Diego Portales, Av. Ejército Libertador 441, Santiago (Chile); Brandt, W. N.; Griffith, R. L. [Department of Astronomy and Astrophysics, The Pennsylvania State University, 525 Davey Lab, University Park, PA 16802 (United States); Ballantyne, D. R. [Center for Relativistic Astrophysics, School of Physics, Georgia Institute of Technology, Atlanta, GA 30332 (United States); Baloković, M.; Bridge, C. [Cahill Center for Astronomy and Astrophysics, California Institute of Technology, Pasadena, CA 91125 (United States); Bauer, F. E. [Instituto de Astrofísica, Facultad de Física, Pontificia Universidad Católica de Chile, 306, Santiago 22 (Chile); Benford, D. [NASA Goddard Space Flight Center, Greenbelt, MD 20771 (United States); Blain, A. [Physics and Astronomy, University of Leicester, 1 University Road, Leicester, LE1 7RH (United Kingdom); Boggs, S. E.; Craig, W. W. [Space Sciences Laboratory, University of California, Berkeley, 7 Gauss Way, Berkeley, CA 94720-7450 (United States); Brightman, M. [Max-Planck-Institut für extraterrestrische Physik, Giessenbachstrasse 1, D-85748, Garching bei München (Germany); Christensen, F. E. [Danish Technical University, DK-2800 Lyngby (Denmark); Comastri, A., E-mail: daniel.k.stern@jpl.nasa.gov [INAF Osservatorio Astronomico di Bologna, via Ranzani 1, I-40127, Bologna (Italy); and others

    2014-10-20

    We report on a NuSTAR and XMM-Newton program that has observed a sample of three extremely luminous, heavily obscured WISE-selected active galactic nuclei (AGNs) at z ∼ 2 across a broad X-ray band (0.1 – 79 keV). The parent sample, selected to be faint or undetected in the WISE 3.4 μm (W1) and 4.6 μm (W2) bands but bright at 12 μm (W3) and 22 μm (W4), are extremely rare, with only ∼1000 so-called 'W1W2-dropouts' across the extragalactic sky. Optical spectroscopy reveals typical redshifts of z ∼ 2 for this population, implying rest-frame mid-IR luminosities of νL {sub ν}(6 μm) ∼ 6 × 10{sup 46} erg s{sup –1} and bolometric luminosities that can exceed L {sub bol} ∼ 10{sup 14} L {sub ☉}. The corresponding intrinsic, unobscured hard X-ray luminosities are L(2-10 keV) ∼ 4 × 10{sup 45} erg s{sup –1} for typical quasar templates. These are among the most AGNs known, though the optical spectra rarely show evidence of a broad-line region and the selection criteria imply heavy obscuration even at rest-frame 1.5 μm. We designed our X-ray observations to obtain robust detections for gas column densities N {sub H} ≤ 10{sup 24} cm{sup –2}. In fact, the sources prove to be fainter than these predictions. Two of the sources were observed by both NuSTAR and XMM-Newton, with neither being detected by NuSTAR (f {sub 3-24} {sub keV} ≲ 10{sup –13} erg cm{sup –2} s{sup –1}), and one being faintly detected by XMM-Newton (f {sub 0.5-10} {sub keV} ∼ 5 × 10{sup –15} erg cm{sup –2} s{sup –1}). A third source was observed only with XMM-Newton, yielding a faint detection (f {sub 0.5-10} {sub keV} ∼ 7 × 10{sup –15} erg cm{sup –2} s{sup –1}). The X-ray data imply these sources are either X-ray weak, or are heavily obscured by column densities N {sub H} ≳ 10{sup 24} cm{sup –2}. The combined X-ray and mid-IR analysis seems to favor this second possibility, implying the sources are extremely obscured, consistent with Compton

  16. NuSTAR and XMM-Newton observations of luminous, heavily obscured, WISE-selected quasars at z ∼ 2

    International Nuclear Information System (INIS)

    Stern, D.; Eisenhardt, P. R. M.; Lansbury, G. B.; Alexander, D. M.; Del Moro, A.; Gandhi, P.; Assef, R. J.; Brandt, W. N.; Griffith, R. L.; Ballantyne, D. R.; Baloković, M.; Bridge, C.; Bauer, F. E.; Benford, D.; Blain, A.; Boggs, S. E.; Craig, W. W.; Brightman, M.; Christensen, F. E.; Comastri, A.

    2014-01-01

    We report on a NuSTAR and XMM-Newton program that has observed a sample of three extremely luminous, heavily obscured WISE-selected active galactic nuclei (AGNs) at z ∼ 2 across a broad X-ray band (0.1 – 79 keV). The parent sample, selected to be faint or undetected in the WISE 3.4 μm (W1) and 4.6 μm (W2) bands but bright at 12 μm (W3) and 22 μm (W4), are extremely rare, with only ∼1000 so-called 'W1W2-dropouts' across the extragalactic sky. Optical spectroscopy reveals typical redshifts of z ∼ 2 for this population, implying rest-frame mid-IR luminosities of νL ν (6 μm) ∼ 6 × 10 46 erg s –1 and bolometric luminosities that can exceed L bol ∼ 10 14 L ☉ . The corresponding intrinsic, unobscured hard X-ray luminosities are L(2-10 keV) ∼ 4 × 10 45 erg s –1 for typical quasar templates. These are among the most AGNs known, though the optical spectra rarely show evidence of a broad-line region and the selection criteria imply heavy obscuration even at rest-frame 1.5 μm. We designed our X-ray observations to obtain robust detections for gas column densities N H ≤ 10 24 cm –2 . In fact, the sources prove to be fainter than these predictions. Two of the sources were observed by both NuSTAR and XMM-Newton, with neither being detected by NuSTAR (f 3-24 keV ≲ 10 –13 erg cm –2 s –1 ), and one being faintly detected by XMM-Newton (f 0.5-10 keV ∼ 5 × 10 –15 erg cm –2 s –1 ). A third source was observed only with XMM-Newton, yielding a faint detection (f 0.5-10 keV ∼ 7 × 10 –15 erg cm –2 s –1 ). The X-ray data imply these sources are either X-ray weak, or are heavily obscured by column densities N H ≳ 10 24 cm –2 . The combined X-ray and mid-IR analysis seems to favor this second possibility, implying the sources are extremely obscured, consistent with Compton-thick, luminous quasars. The discovery of a significant population of heavily obscured, extremely luminous AGNs would not conform to the standard

  17. GeoPortale OpenData del Comune di Firenze: progettazione, implementazione e lessons learned

    Directory of Open Access Journals (Sweden)

    Enrico Castagnoli

    2012-06-01

    The township of Florence has been the first one in Italy to fully adhere to the OpenData initiative by releasing many of its own data through open and permissive licenses with the objective of increasing transparency of its procedure as well as to boost awareness and participation from the citizenship; last but not least the goal of supporting and encouraging developers’ creativity with creating innovative applications exploiting all the newly available data was also an important driver especially in these times of harsh economic conditions. The decision makers of the Florence SIT office, responsible for the creation of the infrastructure for supporting the OpenData initiative, have decided to enhance the existing, consolidated infrastructure using only Open Source software and therefore they decide to hire renowned GeoSpatial Open Source experts from the GeoSolutions Italian company to help them with the design and implementation as well as to ensure the presence of competent commercial support for the chosen solutions and to receive the necessary training on the job to guarantee the sustainability of the infrastructure in the long term. This article firstly introduce the existing situation at the time the design of the new infrastructure was started as well as the initial objectives. Afterwards we introduce and dissect the work performed to actually implement the changes to the infrastructure, providing detailed information on the building blocks employed as well as on the policies followed. Eventually, we introduce the next steps to be implemented for the infrastructure.

  18. Soft X-ray angle-resolved photoemission spectroscopy of heavily boron-doped superconducting diamond films

    Directory of Open Access Journals (Sweden)

    T. Yokoya, T. Nakamura, T. Matushita, T. Muro, H. Okazaki, M. Arita, K. Shimada, H. Namatame, M. Taniguchi, Y. Takano, M. Nagao, T. Takenouchi, H. Kawarada and T. Oguchi

    2006-01-01

    Full Text Available We have performed soft X-ray angle-resolved photoemission spectroscopy (SXARPES of microwave plasma-assisted chemical vapor deposition diamond films with different B concentrations in order to study the origin of the metallic behavior of superconducting diamond. SXARPES results clearly show valence band dispersions with a bandwidth of ~23 eV and with a top of the valence band at gamma point in the Brillouin zone, which are consistent with the calculated valence band dispersions of pure diamond. Boron concentration-dependent band dispersions near the Fermi level (EF exhibit a systematic shift of EF, indicating depopulation of electrons due to hole doping. These SXARPES results indicate that diamond bands retain for heavy boron doping and holes in the diamond band are responsible for the metallic states leading to superconductivity at low temperature. A high-resolution photoemission spectroscopy spectrum near EF of a heavily boron-doped diamond superconductor is also presented.

  19. Precise Th/U-dating of small and heavily coated samples of deep sea corals

    Science.gov (United States)

    Lomitschka, Michael; Mangini, Augusto

    1999-07-01

    Marine carbonate skeletons like deep-sea corals are frequently coated with iron and manganese oxides/hydroxides which adsorb additional thorium and uranium out of the sea water. A new cleaning procedure has been developed to reduce this contamination. In this further cleaning step a solution of Na 2EDTA (Na 2H 2T B) and ascorbic acid is used which composition is optimised especially for samples of 20 mg of weight. It was first tested on aliquots of a reef-building coral which had been artificially contaminated with powdered ferromanganese nodule. Applied on heavily contaminated deep-sea corals (scleractinia), it reduced excess 230Th by another order of magnitude in addition to usual cleaning procedures. The measurement of at least three fractions of different contamination, together with an additional standard correction for contaminated carbonates results in Th/U-ages corrected for the authigenic component. A good agreement between Th/U- and 14C-ages can be achieved even for extremely coated corals.

  20. Prospective high thermoelectric performance of the heavily p-doped half-Heusler compound CoVSn

    International Nuclear Information System (INIS)

    Shi, Hongliang; Ming, Wenmei; Parker, David S.; Du, Mao-Hua; Singh, David J.

    2017-01-01

    The electronic structure and transport properties of the half-Heusler compound CoVSn are studied in this paper systematically by combining first-principles electronic structure calculations and Boltzmann transport theory. The band structure at the valence-band edge is complex with multiple maxima derived from hybridized transition element d states. The result is a calculated thermopower larger than 200 μV /Κ within a wide range of doping concentrations and temperatures for heavily doped p-type CoVSn. The thermoelectric properties additionally benefit from the corrugated shapes of the hole pockets in our calculated isoenergy surfaces. Our calculated power factor S"2σ/τ (with respect to an average unknown scattering time) of CoVSn is comparable to that of FeNbSb. A smaller lattice thermal conductivity can be expected from the smaller group velocities of acoustical modes compared to FeNbSb. Finally, overall, good thermoelectric performance for CoVSn can be expected by considering the electronic transport and lattice thermal conductivity.

  1. Path-integral calculation of the density of states in heavily doped strongly compensated semiconductors in a magnetic field

    International Nuclear Information System (INIS)

    Koinov, Z.G.; Yanchev, I.Y.

    1981-09-01

    The density of states in heavily doped strongly compansated semiconductors in a strong magnetic field is calculated by using the path-integral method. The case is considered when correlation exists in the impurity positions owing to the Coulomb interactions between the charged donors and acceptors during the high-temperature preparation of the samples. The semiclassical formula is rederived and corrections to it due to the long-range character of the potential and its short-range fluctuations are obtained. The density of states in the tail is studied and analytical results are given in the classical and quantum cases. (author)

  2. Open innovation with an effective open innovation team.

    OpenAIRE

    Vanvoorden, Jonas

    2014-01-01

    This master's thesis explores how open innovation teams can successfully support open innovation inside of an organisation. Open innovation is a paradigm introduced by Henry Chesbrough (2003) a decade ago. It expands the innovation potential of organisations by opening them up to new ways of working with external partners. To implement open innovation, many companies rely on a small group of managers named open innovation teams. Although open innovation teams can potentially be vital for impl...

  3. From Open Source Software to Open Source Hardware

    OpenAIRE

    Viseur , Robert

    2012-01-01

    Part 2: Lightning Talks; International audience; The open source software principles progressively give rise to new initiatives for culture (free culture), data (open data) or hardware (open hardware). The open hardware is experiencing a significant growth but the business models and legal aspects are not well known. This paper is dedicated to the economics of open hardware. We define the open hardware concept and determine intellectual property tools we can apply to open hardware, with a str...

  4. The Open Form Inducer Approach for Structure-Based Drug Design.

    Directory of Open Access Journals (Sweden)

    Daniel Ken Inaoka

    Full Text Available Many open form (OF structures of drug targets were obtained a posteriori by analysis of co-crystals with inhibitors. Therefore, obtaining the OF structure of a drug target a priori will accelerate development of potent inhibitors. In addition to its small active site, Trypanosoma cruzi dihydroorotate dehydrogenase (TcDHODH is fully functional in its monomeric form, making drug design approaches targeting the active site and protein-protein interactions unrealistic. Therefore, a novel a priori approach was developed to determination the TcDHODH active site in OF. This approach consists of generating an "OF inducer" (predicted in silico to bind the target and cause steric repulsion with flexible regions proximal to the active site that force it open. We provide the first proof-of-concept of this approach by predicting and crystallizing TcDHODH in complex with an OF inducer, thereby obtaining the OF a priori with its subsequent use in designing potent and selective inhibitors. Fourteen co-crystal structures of TcDHODH with the designed inhibitors are presented herein. This approach has potential to encourage drug design against diseases where the molecular targets are such difficult proteins possessing small AS volume. This approach can be extended to study open/close conformation of proteins in general, the identification of allosteric pockets and inhibitors for other drug targets where conventional drug design approaches are not applicable, as well as the effective exploitation of the increasing number of protein structures deposited in Protein Data Bank.

  5. Heavily doped GaAs:Te layers grown by MOVPE using diisopropyl telluride as a source

    Energy Technology Data Exchange (ETDEWEB)

    Daniltsev, V. M.; Demidov, E. V.; Drozdov, M. N.; Drozdov, Yu. N., E-mail: drozdyu@ipmras.ru; Kraev, S. A.; Surovegina, E. A.; Shashkin, V. I.; Yunin, P. A. [Russian Academy of Sciences, Institute for Physics of Microstructures (Russian Federation)

    2016-11-15

    The capabilities of GaAs epitaxial layers extremely heavily doped with tellurium by metal-organic vapor-phase epitaxy using diisopropyl telluride as a source are studied. It is shown that tellurium incorporation into GaAs occurs to an atomic concentration of 10{sup 21} cm{sup –3} without appreciable diffusion and segregation effects. Good carrier concentrations (2 × 10{sup 19} cm{sup –3}) and specific contact resistances of non-alloyed ohmic contacts (1.7 × 10{sup –6} Ω cm{sup 2}) give grounds to use such layers to create non-alloyed ohmic contacts in electronic devices. A sharp decrease in the electrical activity of Te atoms, a decrease in the electron mobility, and an increase in the contact resistance at atomic concentrations above 2 × 10{sup 20} cm{sup –3} are detected.

  6. Amplifiers Exploiting Thermal Noise Canceling: A Review

    OpenAIRE

    Klumperink, Eric A.M.; Bruccoleri, Federico; Stroet, Peter; Nauta, Bram

    2004-01-01

    Wide-band LNAs suffer from a fundamental trade-off between noise figure NF and source impedance matching, which limits NF to values typically above 3dB. Recently, a feed-forward noise canceling technique has been proposed to break this trade-off. This paper reviews the principle of the technique and its key properties. Although the technique has been applied to wideband CMOS LNAs, it can just as well be implemented exploiting transconductance elements realized with oth...

  7. Guide d'exploitation des filières de traitement par boues activées

    OpenAIRE

    Boutin, C.; Caquel, O.; Dimastromatteo, N.,; Dumaine, J.,; Fernandes. G.,; Gervasi, C.; Parotin, S.; Prost Boucle, S.; Tscherter, C.

    2015-01-01

    / Ce guide, à destination des maîtres d'ouvrage et des exploitants, a pour objet de présenter de façon synthétique, les modalités d'exploitation courante d'une station d'épuration par boues activées de capacité < 600 kg DBO5/jour (soit 10 000 équivalents habitants (EH)), et dimensionnée dans le domaine de charge de l'aération prolongée (Cm < 0,1 kg DBO5 /kg MVS/jour). Conçu au fil de l'eau, il recense, tant pour la file eau que pour la file boues, l'ensemble des tâches d'exploitation courante...

  8. Sequential ambidexterity in practice : a longitudinal study on shifts from exploration to exploitation and reverse

    NARCIS (Netherlands)

    de Visser, Matthias; Faems, Dries; Visscher, Klaasjan; de Weerd-Nederhof, Petronella C.

    2017-01-01

    Many scholars have stressed the need for balancing exploitation with sufficient levels of exploration (Levinthal and March, 1993; March, 1991, 2006). Organizations that have a one-sided focus on exploitation by allocating resources to refinement of existing technologies rather than to developing new

  9. OPPL-Galaxy, a Galaxy tool for enhancing ontology exploitation as part of bioinformatics workflows

    Science.gov (United States)

    2013-01-01

    Background Biomedical ontologies are key elements for building up the Life Sciences Semantic Web. Reusing and building biomedical ontologies requires flexible and versatile tools to manipulate them efficiently, in particular for enriching their axiomatic content. The Ontology Pre Processor Language (OPPL) is an OWL-based language for automating the changes to be performed in an ontology. OPPL augments the ontologists’ toolbox by providing a more efficient, and less error-prone, mechanism for enriching a biomedical ontology than that obtained by a manual treatment. Results We present OPPL-Galaxy, a wrapper for using OPPL within Galaxy. The functionality delivered by OPPL (i.e. automated ontology manipulation) can be combined with the tools and workflows devised within the Galaxy framework, resulting in an enhancement of OPPL. Use cases are provided in order to demonstrate OPPL-Galaxy’s capability for enriching, modifying and querying biomedical ontologies. Conclusions Coupling OPPL-Galaxy with other bioinformatics tools of the Galaxy framework results in a system that is more than the sum of its parts. OPPL-Galaxy opens a new dimension of analyses and exploitation of biomedical ontologies, including automated reasoning, paving the way towards advanced biological data analyses. PMID:23286517

  10. Carrier compensation mechanism in heavily Nb-doped anatase Ti{sub 1-x}Nb{sub x}O{sub 2+{delta}} epitaxial thin films

    Energy Technology Data Exchange (ETDEWEB)

    Nogawa, H; Chikamatsu, A; Hirose, Y; Hasegawa, T [Department of Chemistry, University of Tokyo, Tokyo 113-0033 (Japan); Nakao, S [Kanagawa Academy of Science and Technology (KAST), Kawasaki 213-0012 (Japan); Kumigashira, H; Oshima, M, E-mail: chikamatsu@chem.s.u-tokyo.ac.jp [Department of Applied Chemistry, University of Tokyo, Tokyo 113-8656 (Japan)

    2011-09-14

    We investigated the electronic structures of anatase Ti{sub 1-x}Nb{sub x}O{sub 2+{delta}} (TNO) thin films as a function of Nb concentration x using photoemission spectroscopy (PES) measurements to elucidate the origin of the abrupt decrease in carrier activation in heavily Nb-doped regime. The existing intensity ratio of Nb{sup 5+} evaluated from Nb 3d core-level PES spectra maintained a constant value of {approx}0.8 at x = 0.06-0.3, implying that electron carriers generated by Nb doping are compensated by p-type defects. Ti 2p-3d and O1s-2p resonant PES measurements of x = 0.06-0.3 films revealed that the in-gap states positioned {approx}1 eV below the Fermi level (E{sub F}) have a mixed character of Ti 3d and O 2p orbitals, whereas the states at E{sub F} mainly have a Ti 3d nature. We proposed a carrier compensation mechanism that interstitial oxygen atoms strongly combined with surrounding Nb atoms kill conduction electrons in heavily Nb-doped anatase TiO{sub 2}.

  11. The detection of leakages in open reservoirs by the radioisotope sorption method

    International Nuclear Information System (INIS)

    Owczarczyk, A.; Wierzchnicki, R.; Urbanski, T.; Chmielewski, A.G.; Szpilowski, S.

    1992-01-01

    Location of leakages in large hydro-engineering plants and industrial water reservoirs is of great importance from view-point of both safety and economy of their exploitation. Large variety of water reservoirs encountered in hydro-engineering and industry calls for adaptation of investigation methods to their specific features. In the paper a number of methodological variants of known radiotracer technique developed at the INCT is presented. They are intended to detect and locate leakages in hydro-engineering reservoirs and dams as well as large open industrial tanks. The radioisotopes Au-198 and In-133 m being used for that purpose show excellent sorption characteristic on typical construction materials users to build such objects. (author). 8 refs, 8 figs

  12. Exploiting wild relatives of S. lycopersicum for quality traits

    NARCIS (Netherlands)

    Víquez Zamora, A.M.

    2015-01-01

    Exploiting wild relatives of S. lycopersicum for quality traits Ana Marcela Víquez Zamora Tomatoes are consumed worldwide and became a model for crop plant research. A part of the research aims at expanding genetic diversity in tomato; this can be done by incorporating

  13. Bats track and exploit changes in insect pest populations

    Science.gov (United States)

    The role of bats or any generalist predator in suppressing prey populations depends on the predator’s ability to exploit available prey in space and time. Using a qPCR faecal DNA assay, we document significant association between numbers of Brazilian free-tailed bats (Tadarida brasiliensis) consumin...

  14. The Potential Socio-economic Impacts of Gas Hydrate Exploitation

    Science.gov (United States)

    Riley, David; Schaafsma, Marije; Marin-Moreno, Héctor; Minshull, Tim A.

    2017-04-01

    Gas hydrate has garnered significant interest as a possible clean fossil fuel resource, especially in countries with limited energy supplies. Whilst the sector is still in its infancy, there has been escalating development towards commercial production. To the best of our knowledge it appears that, despite its potential, existing analyses of the social and economic impacts of hydrate exploitation have been very limited. Before any viable commercial production commences, the potential impacts across society must be considered. It is likely that such impact assessments will become a legislative requirement for hydrate exploitation, similar to their requirement in conventional oil and gas projects. Social impact analysis should guide hydrate development to have the highest possible net benefits to the human and natural environment. Without active commercial hydrate operations, potential socio-economic impacts can only be inferred from other fossil fuel resource focused communities, including those directly or indirectly affected by the oil and gas industry either in the vicinity of the well or further afield. This review attempts to highlight potential impacts by synthesising current literature, focusing on social impacts at the extraction stage of operation, over time. Using a DPSIR (Driving forces; Pressures; States; Impacts; Responses) framework, we focus on impacts upon: health and wellbeing, land use and access, services and infrastructure, population, employment opportunities, income and lifestyles. Human populations directly or indirectly related with fossil fuel extraction activities often show boom and bust dynamics, and so any impacts may be finite or change temporally. Therefore potential impacts have to be reassessed throughout the lifetime of the exploitation. Our review shows there are a wide range of possible positive and negative socio-economic impacts from hydrate development. Exploitation can bring jobs and infrastructure to remote areas, although

  15. Open circuit voltage durability study and model of catalyst coated membranes at different humidification levels

    Energy Technology Data Exchange (ETDEWEB)

    Kundu, Sumit; Fowler, Michael W.; Simon, Leonardo C. [Department of Chemical Engineering, University of Waterloo, 200 University Avenue West, Waterloo, Ontario (Canada); Abouatallah, Rami; Beydokhti, Natasha [Hydrogenics Corporation, 5985 McLaughlin Road, Mississauga, Ontario (Canada)

    2010-11-01

    Fuel cell material durability is an area of extensive research today. Chemical degradation of the ionomer membrane is one important degradation mechanism leading to overall failure of fuel cells. This study examined the effects of relative humidity on the chemical degradation of the membrane during open circuit voltage testing. Five Gore trademark PRIMEA {sup registered} series 5510 catalyst coated membranes were degraded at 100%, 75%, 50%, and 20% RH. Open circuit potential and cumulative fluoride release were monitored over time. Additionally scanning electron microscopy images were taken at end of the test. The results showed that with decreasing RH fluoride release rate increased as did performance degradation. This was attributed to an increase in gas crossover with a decrease in RH. Further, it is also shown that interruptions in testing may heavily influence cumulative fluoride release measurements where frequent stoppages in testing will cause fluoride release to be underestimated. SEM analysis shows that degradation occurred in the ionomer layer close to the cathode catalyst. A chemical degradation model of the ionomer membrane was used to model the results. The model was able to predict fluoride release trends, including the effects of interruptions, showing that changes in gas crossover with RH could explain the experimental results. (author)

  16. Effects of Sheet Resistance on mc-Si Selective Emitter Solar Cells Using Laser Opening and One-Step Diffusion

    Directory of Open Access Journals (Sweden)

    Sheng-Shih Wang

    2015-01-01

    Full Text Available In order to simplify process procedure and improve conversion efficiency (η, we present new steps of laser opening and one-step POCl3 diffusion to fabricate selective emitter (SE solar cells, in which heavily doped regions (HDR and lightly doped regions (LDR were formed simultaneously. For HDR, we divided six cells into two groups for POCl3 diffusion with sheet resistance (RS of 40 Ω/sq (for group A and 50 Ω/sq (for group B. The dry oxidation duration at a temperature of 850°C was 18, 25, and 35 min for the 3 different cells in each group. This created six SE samples with different RS pairings for the HDR and LDR. The optimal cell (sample SE2 with RS values of 40/81 Ω/Sq in HDR/LDR showed the best η of 16.20%, open circuit voltage (VOC of 612.52 mV, and fill factor (FF of 75.83%. The improvement ratios are 1.57% for η and 14.32% for external quantum efficiency (EQE as compared with those of the two-step diffusion process of our previous study. Moreover, the one-step laser opening process and omitting the step of removing the damage caused by laser ablation especially reduce chemistry pollution, thus showing ecofriendly process for use in industrial-scale production.

  17. Virtual Hubs for facilitating access to Open Data

    Science.gov (United States)

    Mazzetti, Paolo; Latre, Miguel Á.; Ernst, Julia; Brumana, Raffaella; Brauman, Stefan; Nativi, Stefano

    2015-04-01

    set of five Virtual Hubs (VHs) at national level in France, Germany, Italy, Poland, Spain and an additional one at the European level. VHs will be provided according to the cloud Software-as-a-Services model. The main expected impact of VHs is the creation of new business opportunities opening up access to Research Data and Public Sector Information. Therefore, ENERGIC-OD addresses not only end-users, who will have the opportunity to access the VH through a geo-portal, but also application developers who will be able to access VH functionalities through simple Application Programming Interfaces (API). ENERGIC-OD Consortium will develop ten different applications on top of the deployed VHs. They aim to demonstrate how VHs facilitate the development of new and multidisciplinary applications based on the full exploitation of (open) GI, hence stimulating innovation and business activities.

  18. An automated data exploitation system for airborne sensors

    Science.gov (United States)

    Chen, Hai-Wen; McGurr, Mike

    2014-06-01

    Advanced wide area persistent surveillance (WAPS) sensor systems on manned or unmanned airborne vehicles are essential for wide-area urban security monitoring in order to protect our people and our warfighter from terrorist attacks. Currently, human (imagery) analysts process huge data collections from full motion video (FMV) for data exploitation and analysis (real-time and forensic), providing slow and inaccurate results. An Automated Data Exploitation System (ADES) is urgently needed. In this paper, we present a recently developed ADES for airborne vehicles under heavy urban background clutter conditions. This system includes four processes: (1) fast image registration, stabilization, and mosaicking; (2) advanced non-linear morphological moving target detection; (3) robust multiple target (vehicles, dismounts, and human) tracking (up to 100 target tracks); and (4) moving or static target/object recognition (super-resolution). Test results with real FMV data indicate that our ADES can reliably detect, track, and recognize multiple vehicles under heavy urban background clutters. Furthermore, our example shows that ADES as a baseline platform can provide capability for vehicle abnormal behavior detection to help imagery analysts quickly trace down potential threats and crimes.

  19. From Open Source to Open Collaboration

    CERN Multimedia

    CERN. Geneva

    2015-01-01

    Open source is the right to modify, not the right to contribute. Are external contributions absent from your project? Have you ever thought about what is it like to be a new contributor on your project? I challenge you to transform your project from Open Source to an Open Collaboration.

  20. The age of exploration and exploitation: Younger-looking leaders endorsed for change and older-looking leaders endorsed for stability

    NARCIS (Netherlands)

    Spisak, B.R.; Grabo, A.E.; Arvey, R.D.; van Vugt, M.

    2014-01-01

    The current contribution extends theorizing on leadership and the exploration-exploitation dilemma using an evolutionary perspective. A theoretical connection is made between the exploration-exploitation dilemma and age-biased leadership preferences for exploratory change versus stable exploitation.