WorldWideScience

Sample records for hide processing system

  1. Short term preservation of hide using vacuum: influence on properties of hide and of processed leather.

    Science.gov (United States)

    Gudro, Ilze; Valeika, Virgilijus; Sirvaitytė, Justa

    2014-01-01

    The objective of this work was to investigate vacuum influence on hide preservation time and how it affects hide structure. It was established that vacuum prolongs the storage time without hide tissue putrefaction up to 21 days when the storage temperature is 4°C. The microorganisms act for all storage times, but the action is weak and has no observable influence on the quality of hide during the time period mentioned. The hide shrinkage temperature decrease is negligible, which shows that breaking of intermolecular bonds does not occur. Optical microscopy, infrared spectroscopy and differential scanning calorimetry also did not show any structural changes which can influence the quality of leather produced from such hide. The qualitative indexes of wet blue processed under laboratory conditions and of leather produced during industrial trials are presented. Indexes such as chromium compounds exhaustion, content of chromium in leather, content of soluble matter in dichloromethane, strength properties, and shrinkage temperature were determined. Properties of the leather produced from vacuumed hide under industrial conditions conformed to the requirements of shoe upper leather.

  2. HIDE working groups: synchrotron based system: summary

    International Nuclear Information System (INIS)

    Barton, M.Q.

    1978-01-01

    A brief overview is given of the work resulting from a one-week workshop on the use of synchrotrons in heavy ion fusion, i.e., a Heavy Ion Demonstration Experiment (HIDE). Topics discussed concerned the number of beams on target, space charge limitations, choice of ion charge state, and areas identified as needing further work

  3. 12th International Conference on Intelligent Information Hiding and Multimedia Signal Processing

    CERN Document Server

    Tsai, Pei-Wei; Huang, Hsiang-Cheh

    2017-01-01

    This volume of Smart Innovation, Systems and Technologies contains accepted papers presented in IIH-MSP-2016, the 12th International Conference on Intelligent Information Hiding and Multimedia Signal Processing. The conference this year was technically co-sponsored by Tainan Chapter of IEEE Signal Processing Society, Fujian University of Technology, Chaoyang University of Technology, Taiwan Association for Web Intelligence Consortium, Fujian Provincial Key Laboratory of Big Data Mining and Applications (Fujian University of Technology), and Harbin Institute of Technology Shenzhen Graduate School. IIH-MSP 2016 is held in 21-23, November, 2016 in Kaohsiung, Taiwan. The conference is an international forum for the researchers and professionals in all areas of information hiding and multimedia signal processing. .

  4. Steganographic optical image encryption system based on reversible data hiding and double random phase encoding

    Science.gov (United States)

    Chuang, Cheng-Hung; Chen, Yen-Lin

    2013-02-01

    This study presents a steganographic optical image encryption system based on reversible data hiding and double random phase encoding (DRPE) techniques. Conventional optical image encryption systems can securely transmit valuable images using an encryption method for possible application in optical transmission systems. The steganographic optical image encryption system based on the DRPE technique has been investigated to hide secret data in encrypted images. However, the DRPE techniques vulnerable to attacks and many of the data hiding methods in the DRPE system can distort the decrypted images. The proposed system, based on reversible data hiding, uses a JBIG2 compression scheme to achieve lossless decrypted image quality and perform a prior encryption process. Thus, the DRPE technique enables a more secured optical encryption process. The proposed method extracts and compresses the bit planes of the original image using the lossless JBIG2 technique. The secret data are embedded in the remaining storage space. The RSA algorithm can cipher the compressed binary bits and secret data for advanced security. Experimental results show that the proposed system achieves a high data embedding capacity and lossless reconstruction of the original images.

  5. HIDE & SEEK: End-to-end packages to simulate and process radio survey data

    Science.gov (United States)

    Akeret, J.; Seehars, S.; Chang, C.; Monstein, C.; Amara, A.; Refregier, A.

    2017-01-01

    As several large single-dish radio surveys begin operation within the coming decade, a wealth of radio data will become available and provide a new window to the Universe. In order to fully exploit the potential of these datasets, it is important to understand the systematic effects associated with the instrument and the analysis pipeline. A common approach to tackle this is to forward-model the entire system-from the hardware to the analysis of the data products. For this purpose, we introduce two newly developed, open-source Python packages: the HI Data Emulator (HIDE) and the Signal Extraction and Emission Kartographer (SEEK) for simulating and processing single-dish radio survey data. HIDE forward-models the process of collecting astronomical radio signals in a single-dish radio telescope instrument and outputs pixel-level time-ordered-data. SEEK processes the time-ordered-data, removes artifacts from Radio Frequency Interference (RFI), automatically applies flux calibration, and aims to recover the astronomical radio signal. The two packages can be used separately or together depending on the application. Their modular and flexible nature allows easy adaptation to other instruments and datasets. We describe the basic architecture of the two packages and examine in detail the noise and RFI modeling in HIDE, as well as the implementation of gain calibration and RFI mitigation in SEEK. We then apply HIDE &SEEK to forward-model a Galactic survey in the frequency range 990-1260 MHz based on data taken at the Bleien Observatory. For this survey, we expect to cover 70% of the full sky and achieve a median signal-to-noise ratio of approximately 5-6 in the cleanest channels including systematic uncertainties. However, we also point out the potential challenges of high RFI contamination and baseline removal when examining the early data from the Bleien Observatory. The fully documented HIDE &SEEK packages are available at http://hideseek.phys.ethz.ch/ and are published

  6. Traceability System Model for Quality Gelatin Raw Material of Cattle Hides

    Directory of Open Access Journals (Sweden)

    S Nur

    2010-09-01

    Full Text Available Several criteria must be accomplished within the provision of quality products in terms of the types of materials, the processing methods and effort to get it. Traceability system involves various parties that have different needs and goals in the process of supplying raw materials. Hence, there is a need for institutional systems engineering that can organize and manage the tracking process, the procurement of raw materials that guarantee the origin of gelatin raw materials, and facilitate the industry and customer to create a standardized quality of product. The purpose of the study formulates the institutional tracking models of gelatin raw material from cattle hide based on various criteria and assessment of the expert opinion. The methods used in this study were Interpretative structural modeling to formulate a representation of institutional tracking efficiently and analytical hierarchy process to determine the tracking strategy of industrial gelatin raw materials from cowhide. The results obtained from the study were some key elements of institutional tracking model for industrial gelatin raw materials from cowhide and the traceability strategies for industrial raw materials from cattle hide gelatin Indonesia. (Animal Production 12(3: 190-198 (2010 Key Words: traceability, institutional model, cattle hide, gelatin

  7. Entry points to stimulation of expansion in hides and skins processing

    African Journals Online (AJOL)

    Only 3.4% of respondents add value to hides and skins by processing. ... For this status of the chain, it was proposed that a workable intervention model has to encompass placement of tanneries and slaughter slabs in the chain as new actors, linking chain actors, improving livestock services especially dipping, and ...

  8. A dehydration process for ovine hide to obtain a new collagenous material

    OpenAIRE

    Ollé Otero, Lluís; Sorolla, Silvia; Casas Solé, Concepció; Bacardit Dalmases, Anna

    2014-01-01

    The aim of the present work is to develop a dehydration process for ovine hide to obtain a new collagenous material for use in the leather industry. What is obtained through this new process is a dry and very porous collagenous substrate which allows the application of tanning chemicals by immersion in aqueous solutions. When compared to existing, traditional processes, economic and environmental advantages are obtained from the use of this new material. More specifically, the new process ...

  9. A REVIEW ON HEAVY METALS CONTENTS IN HIDE, SKIN AND PROCESSED LEATHERS

    Directory of Open Access Journals (Sweden)

    KOIZHAIGANOVA Meruyert

    2016-05-01

    Full Text Available Heavy metals are metals with high atomic weight which can be deposited in soil, water, plants and animals. It is generally known that mammal tissues are good bioindicators of trace elements, including heavy metals. Heavy metal analysis serves to identify and quantify the elements that are a potential hazard to the consumer after varying levels of contact. Usage area of leather is increasingly expanding in these days and it has also become a material requested and demanded by effect of fashion. Leather must protect its appearance and physical stability and also be problem-free in ecological terms and harmless to human health. There is a lack of data concerning the content of toxic elements in raw hide and skin of animals. Mainly information concerning metals content, including toxic ones, in processed leathers may be found in the literature. The aim of the present study was to review and compare the content of some heavy metals in raw hide, skin and the processed leathers in order to evaluate their accumulation and transition to the end-up product.

  10. Sensor and Actuator Fault-Hiding Reconfigurable Control Design for a Four-Tank System Benchmark

    DEFF Research Database (Denmark)

    Hameed, Ibrahim; El-Madbouly, Esam I; Abdo, Mohamed I

    2015-01-01

    Invariant (LTI) system where virtual sensors and virtual actuators are used to correct faulty performance through the use of a pre-fault performance. Simulation results showed that the developed approach can handle different types of faults and able to completely and instantly recover the original system......Fault detection and compensation plays a key role to fulfill high demands for performance and security in today's technological systems. In this paper, a fault-hiding (i.e., tolerant) control scheme that detects and compensates for actuator and sensor faults in a four-tank system benchmark...

  11. Alkali-free method of hide preparation for tanning

    OpenAIRE

    Valeika, V.; Beleska, K.; Sirvaityte, J.

    2012-01-01

    Usually, beamhouse processes are carried out by varying a medium from strongly alkaline (unhairing-liming) up to strongly acid (pickling). This study is designed to develop a preparation of hide for tanning via processes that avoid a sharp change of hide pH. Enzymes active in acid medium are employed for hide unhairing in a buffer system containing 2.5% acetic acid and 0.3% sodium acetate. An oxidative treatment with peracetic acid then allows the complete removal of residual hair and scud. D...

  12. Reflections on Quantum Data Hiding

    Science.gov (United States)

    Winter, Andreas

    Quantum data hiding, originally invented as a limitation on local operations and classical communications (LOCC) in distinguishing globally orthogonal states, is actually a phenomenon arising generically in statistics whenever comparing a `strong' set of measurements (i.e., decision rules) with a `weak' one. The classical statistical analogue of this would be secret sharing, in which two perfectly distinguishable multi-partite hypotheses appear to be indistinguishable when accessing only a marginal. The quantum versions are richer in that for example LOCC allows for state tomography, so the states cannot be come perfectly indistinguishable but only nearly so, and hence the question is one of efficiency. I will discuss two concrete examples and associated sets of problems: 1. Gaussian operations and classical computation (GOCC): Not very surprisingly, GOCC cannot distinguish optimally even two coherent states of a single mode. Here we find states, each a mixture of multi-mode coherent states, which are almost perfectly distinguishable by suitable measurements, by when restricted to GOCC, i.e. linear optics and post-processing, the states appear almost identical. The construction is random and relies on coding arguments. Open questions include whether there one can give a constructive version of the argument, and whether for instance even thermal states can be used, or how efficient the hiding is. 2. Local operation and classical communication (LOCC): It is well-known that in a bipartite dxd-system, asymptotically logd bits can be hidden. Here we show for the first time, using the calculus of min-entropies, that this is asymptotically optimal. In fact, we get bounds on the data hiding capacity of any preparation system; these are however not always tight. While it is known that data hiding by separable states is possible (i.e. the state preparation can be done by LOCC), it is open whether the optimal information efficiency of (asymptotically) log d bits can be

  13. Integrated Association Rules Complete Hiding Algorithms

    Directory of Open Access Journals (Sweden)

    Mohamed Refaat Abdellah

    2017-01-01

    Full Text Available This paper presents database security approach for complete hiding of sensitive association rules by using six novel algorithms. These algorithms utilize three new weights to reduce the needed database modifications and support complete hiding, as well as they reduce the knowledge distortion and the data distortions. Complete weighted hiding algorithms enhance the hiding failure by 100%; these algorithms have the advantage of performing only a single scan for the database to gather the required information to form the hiding process. These proposed algorithms are built within the database structure which enables the sanitized database to be generated on run time as needed.

  14. Alkali-free method of hide preparation for tanning

    Directory of Open Access Journals (Sweden)

    V. Valeika

    2012-06-01

    Full Text Available Usually, beamhouse processes are carried out by varying a medium from strongly alkaline (unhairing-liming up to strongly acid (pickling. This study is designed to develop a preparation of hide for tanning via processes that avoid a sharp change of hide pH. Enzymes active in acid medium are employed for hide unhairing in a buffer system containing 2.5% acetic acid and 0.3% sodium acetate. An oxidative treatment with peracetic acid then allows the complete removal of residual hair and scud. During both processes, unhairing and oxidative treatment, the opening of the derma structure occurs: 13.3-14.6g of non-collagen proteins are removed and amount of dermatan sulphate decreases by 35%. The hide obtained can be chromed directly after the above processes and subsequent treatment with sodium chloride solution omitted conventional pickling. The pH of the hide varies in the range of 8.3-3.7 during the processes of preparation for tanning.

  15. Optical hiding with visual cryptography

    Science.gov (United States)

    Shi, Yishi; Yang, Xiubo

    2017-11-01

    We propose an optical hiding method based on visual cryptography. In the hiding process, we convert the secret information into a set of fabricated phase-keys, which are completely independent of each other, intensity-detected-proof and image-covered, leading to the high security. During the extraction process, the covered phase-keys are illuminated with laser beams and then incoherently superimposed to extract the hidden information directly by human vision, without complicated optical implementations and any additional computation, resulting in the convenience of extraction. Also, the phase-keys are manufactured as the diffractive optical elements that are robust to the attacks, such as the blocking and the phase-noise. Optical experiments verify that the high security, the easy extraction and the strong robustness are all obtainable in the visual-cryptography-based optical hiding.

  16. Image hiding using optical interference

    Science.gov (United States)

    Zhang, Yan; Wang, Weining

    2010-09-01

    Optical image encryption technology has attracted a lot of attentions due to its large capacitance and fast speed. In conventional image encryption methods, the random phase masks are used as encryption keys to encode the images into white noise distribution. Therefore, this kind of methods requires interference technology to record complex amplitude and is vulnerable to attack techniques. The image hiding methods which employ the phase retrieve algorithm to encode the images into two or more phase masks are proposed, the hiding process is carried out within a computer using iterative algorithm. But the iterative algorithms are time consumed. All method mentioned above are based on the optical diffraction of the phase masks. In this presentation, a new optical image hiding method based on optical interference is proposed. The coherence lights which pass through two phase masks are combined by a beam splitter. Two beams interfere with each other and the desired image appears at the pre-designed plane. Two phase distribution masks are design analytically; therefore, the hiding speed can be obviously improved. Simulation results are carried out to demonstrate the novelty of the new proposed methods. This method can be expanded for double images hiding.

  17. Information hiding technique

    Science.gov (United States)

    Younger, Michael; Budulas, Peter P.; Young, Stuart H.

    2002-08-01

    Spread spectrum communication techniques have been recognized as a viable method to gain an advantage in interference environments. Many military-oriented systems have been initiated, and some civil systems have been attempted. Spread spectrum allows the ability to hide the signal of interest below or in the noise floor, so as not to be detected. A spread spectrum system is one in which the transmitted signal is spread over a wide frequency band, much wider, in fact, than the minimum bandwidth required to transmit the information being sent. We at Army Research Lab (ARL) are proposing using the same technique on the Internet with port hopping. The information would be transmitted in data packets over multiple ports. The port used would vary per packet or per session basis. This port hopping gives you and the recipients the ability to take datagram's and spread them out over a multitude of ports. This will hide information among the Internet noise. This will allow trusted communications between the transmitter and receiver because of the port coding sequence. There are 64K possible ports to span datagram. Jamming of transmission would be limiting the ability of the sniffer/listener. Also, the listener will find it difficult to use a man in the middle attach, since the data will be spread over multiple ports and only the receiver and transmitter will know the specific port sequencing for the datagram.

  18. Recent Advances in Information Hiding and Applications

    CERN Document Server

    Huang, Hsiang-Cheh; Jain, Lakhmi; Zhao, Yao

    2013-01-01

    This research book presents a sample of recent advances in information hiding techniques and their applications. It includes:   Image data hiding scheme based on vector quantization and image graph coloring The copyright protection system for Android platform Reversible data hiding ICA-based image and video watermarking Content-based invariant image watermarking Single bitmap block truncation coding of color images using cat swarm optimization Genetic-based wavelet packet watermarking for copyright protection Lossless text steganography in compression coding Fast and low-distortion capacity acoustic synchronized acoustic-to-acoustic steganography scheme Video watermarking with shot detection

  19. Optical image hiding based on interference

    Science.gov (United States)

    Zhang, Yan; Wang, Bo

    2009-11-01

    Optical image processing has been paid a lot of attentions recently due to its large capacitance and fast speed. Many image encryption and hiding technologies have been proposed based on the optical technology. In conventional image encryption methods, the random phase masks are usually used as encryption keys to encode the images into random white noise distribution. However, this kind of methods requires interference technology such as holography to record complex amplitude. Furthermore, it is vulnerable to attack techniques. The image hiding methods employ the phase retrieve algorithm to encode the images into two or more phase masks. The hiding process is carried out within a computer and the images are reconstructed optically. But the iterative algorithms need a lot of time to hide the image into the masks. All methods mentioned above are based on the optical diffraction of the phase masks. In this presentation, we will propose a new optical image hiding method based on interference. The coherence lights pass through two phase masks and are combined by a beam splitter. Two beams interfere with each other and the desired image appears at the pre-designed plane. Two phase distribution masks are designed analytically; therefore, the hiding speed can be obviously improved. Simulation results are carried out to demonstrate the validity of the new proposed methods.

  20. Hiding Information Using different lighting Color images

    Science.gov (United States)

    Majead, Ahlam; Awad, Rash; Salman, Salema S.

    2018-05-01

    The host medium for the secret message is one of the important principles for the designers of steganography method. In this study, the best color image was studied to carrying any secret image.The steganography approach based Lifting Wavelet Transform (LWT) and Least Significant Bits (LSBs) substitution. The proposed method offers lossless and unnoticeable changes in the contrast carrier color image and imperceptible by human visual system (HVS), especially the host images which was captured in dark lighting conditions. The aim of the study was to study the process of masking the data in colored images with different light intensities. The effect of the masking process was examined on the images that are classified by a minimum distance and the amount of noise and distortion in the image. The histogram and statistical characteristics of the cover image the results showed the efficient use of images taken with different light intensities in hiding data using the least important bit substitution method. This method succeeded in concealing textual data without distorting the original image (low light) Lire developments due to the concealment process.The digital image segmentation technique was used to distinguish small areas with masking. The result is that smooth homogeneous areas are less affected as a result of hiding comparing with high light areas. It is possible to use dark color images to send any secret message between two persons for the purpose of secret communication with good security.

  1. Hackers in Hiding:

    DEFF Research Database (Denmark)

    Hansen, Ejvind

    2016-01-01

    On several occasions Michel Foucault advocated a methodological turn towards what he called a ‘happy positivism’. Foucault’s emphasis on the surface does not deny the importance of structures of hiding, but understands it as a game in which the structures of hiding are viewed as contingently given....... In this paper, I will analyse the conflict between the hacker movement and the field of corporate interests. I argue that the introduction of graphical user interfaces and the maintaining of copyright interests are the contingent background of the ongoing conflict. By bracketing the analyses of hidden...

  2. HIDING IN PLAIN SIGHT: RECORD-BREAKING COMPACT STELLAR SYSTEMS IN THE SLOAN DIGITAL SKY SURVEY

    International Nuclear Information System (INIS)

    Sandoval, Michael A.; Vo, Richard P.; Romanowsky, Aaron J.; Strader, Jay; Choi, Jieun; Conroy, Charlie; Jennings, Zachary G.; Villaume, Alexa; Brodie, Jean P.; Foster, Caroline; Norris, Mark A.; Janz, Joachim; Forbes, Duncan A.

    2015-01-01

    Motivated by the recent, serendipitous discovery of the densest known galaxy, M60-UCD1, we present two initial findings from a follow-up search, using the Sloan Digital Sky Survey, Subaru/Suprime-Cam, and Hubble Space Telescope imaging, and SOuthern Astrophysical Research (SOAR)/Goodman spectroscopy. The first object discovered, M59-UCD3, has a similar size to M60-UCD1 (half-light radius of r h ∼ 20 pc) but is 40% more luminous (M V ∼ −14.6), making it the new densest-known galaxy. The second, M85-HCC1, has a size like a typical globular cluster (GC; r h ∼ 1.8 pc) but is much more luminous (M V ∼ −12.5). This hypercompact cluster is by far the densest confirmed free-floating stellar system, and is equivalent to the densest known nuclear star clusters. From spectroscopy, we find that both objects are relatively young (∼9 and ∼3 Gyr, respectively), with metal-abundances that resemble those of galaxy centers. Their host galaxies show clear signs of large-scale disturbances, and we conclude that these dense objects are the remnant nuclei of recently accreted galaxies. M59-UCD3 is an ideal target for follow-up with high-resolution imaging and spectroscopy to search for an overweight central supermassive black hole as was discovered in M60-UCD1. These findings also emphasize the potential value of ultra-compact dwarfs and massive GCs as tracers of the assembly histories of galaxies

  3. HIDING IN PLAIN SIGHT: RECORD-BREAKING COMPACT STELLAR SYSTEMS IN THE SLOAN DIGITAL SKY SURVEY

    Energy Technology Data Exchange (ETDEWEB)

    Sandoval, Michael A.; Vo, Richard P.; Romanowsky, Aaron J. [Department of Physics and Astronomy, San José State University, One Washington Square, San Jose, CA 95192 (United States); Strader, Jay [Department of Physics and Astronomy, Michigan State University, East Lansing, MI 48824 (United States); Choi, Jieun; Conroy, Charlie [Harvard–Smithsonian Center for Astrophysics, 60 Garden Street, Cambridge, MA 02138 (United States); Jennings, Zachary G.; Villaume, Alexa [Department of Astronomy and Astrophysics, University of California, Santa Cruz, CA 95064 (United States); Brodie, Jean P. [University of California Observatories, 1156 High Street, Santa Cruz, CA 95064 (United States); Foster, Caroline [Australian Astronomical Observatory, P.O. Box 915, North Ryde, NSW 1670 (Australia); Norris, Mark A. [Max Planck Institut für Astronomie, Königstuhl 17, D-69117, Heidelberg (Germany); Janz, Joachim; Forbes, Duncan A. [Centre for Astrophysics and Supercomputing, Swinburne University, Hawthorn, VIC 3122 (Australia)

    2015-07-20

    Motivated by the recent, serendipitous discovery of the densest known galaxy, M60-UCD1, we present two initial findings from a follow-up search, using the Sloan Digital Sky Survey, Subaru/Suprime-Cam, and Hubble Space Telescope imaging, and SOuthern Astrophysical Research (SOAR)/Goodman spectroscopy. The first object discovered, M59-UCD3, has a similar size to M60-UCD1 (half-light radius of r{sub h} ∼ 20 pc) but is 40% more luminous (M{sub V} ∼ −14.6), making it the new densest-known galaxy. The second, M85-HCC1, has a size like a typical globular cluster (GC; r{sub h} ∼ 1.8 pc) but is much more luminous (M{sub V} ∼ −12.5). This hypercompact cluster is by far the densest confirmed free-floating stellar system, and is equivalent to the densest known nuclear star clusters. From spectroscopy, we find that both objects are relatively young (∼9 and ∼3 Gyr, respectively), with metal-abundances that resemble those of galaxy centers. Their host galaxies show clear signs of large-scale disturbances, and we conclude that these dense objects are the remnant nuclei of recently accreted galaxies. M59-UCD3 is an ideal target for follow-up with high-resolution imaging and spectroscopy to search for an overweight central supermassive black hole as was discovered in M60-UCD1. These findings also emphasize the potential value of ultra-compact dwarfs and massive GCs as tracers of the assembly histories of galaxies.

  4. Market structure and performance of value chain actors in hides and ...

    African Journals Online (AJOL)

    Market structure and performance of value chain actors in hides and skins processing and marketing in Nigeria. ... There was high performance in hides and skins processing and marketing in Nigeria. ... EMAIL FULL TEXT EMAIL FULL TEXT

  5. Children and Robots Learning to Play Hide and Seek

    National Research Council Canada - National Science Library

    Trafton, J. G; Schultz, Alan C; Perznowski, Dennis; Bugajska, Magdalena D; Adams, William; Cassimatis, Nicholas L; Brock, Derek P

    2006-01-01

    ...., containment, under) and use that information to play a credible game of hide and seek. They model this hypothesis within the ACT-R cognitive architecture and put the model on a robot, which is able to mimic the child's hiding behavior. They also take the "hiding" model and use it as the basis for a "seeking" model. They suggest that using the same representations and procedures that a person uses allows better interaction between the human and robotic system.

  6. Intersectional Analysis in Critical Mathematics Education Research: A Response to Figure Hiding

    Science.gov (United States)

    Bullock, Erika C.

    2018-01-01

    In this chapter, I use figure hiding as a metaphor representing the processes of exclusion and suppression that critical mathematics education (CME) seeks to address. Figure hiding renders identities and modes of thought in mathematics education and mathematics education research invisible. CME has a commitment to addressing figure hiding by…

  7. Understanding Information Hiding in iOS

    OpenAIRE

    Caviglione, Luca; Mazurczyk, Wojciech

    2014-01-01

    The Apple operating system (iOS) has so far proved resistant to information-hiding techniques, which help attackers covertly communicate. However, Siri - a native iOS service that controls iPhones and iPads via voice commands - could change this trend.

  8. Succession of hide-seek and pursuit-evasion at heterogeneous locations.

    Science.gov (United States)

    Gal, Shmuel; Casas, Jérôme

    2014-05-06

    Many interactions between searching agents and their elusive targets are composed of a succession of steps, whether in the context of immune systems, predation or counterterrorism. In the simplest case, a two-step process starts with a search-and-hide phase, also called a hide-and-seek phase, followed by a round of pursuit-escape. Our aim is to link these two processes, usually analysed separately and with different models, in a single game theory context. We define a matrix game in which a searcher looks at a fixed number of discrete locations only once each searching for a hider, which can escape with varying probabilities according to its location. The value of the game is the overall probability of capture after k looks. The optimal search and hide strategies are described. If a searcher looks only once into any of the locations, an optimal hider chooses it's hiding place so as to make all locations equally attractive. This optimal strategy remains true as long as the number of looks is below an easily calculated threshold; however, above this threshold, the optimal position for the hider is where it has the highest probability of escaping once spotted.

  9. Family networks and income hiding

    NARCIS (Netherlands)

    Beekman, Gonne; Gatto, Marcel; Nillesen, Eleonora

    2015-01-01

    This study investigates the relationship between family network density and income hiding in rural Liberia. We link people's behaviour in a modified lottery experiment and a time preference game to detailed information about their family networks. We find that individuals with a dense family

  10. Nowhere to hide: Effects of linear features on predator-prey dynamics in a large mammal system.

    Science.gov (United States)

    DeMars, Craig A; Boutin, Stan

    2018-01-01

    Rapid landscape alteration associated with human activity is currently challenging the evolved dynamical stability of many predator-prey systems by forcing species to behaviourally respond to novel environmental stimuli. In many forested systems, linear features (LFs) such as roads, pipelines and resource exploration lines (i.e. seismic lines) are a ubiquitous form of landscape alteration that have been implicated in altering predator-prey dynamics. One hypothesized effect is that LFs facilitate predator movement into and within prey refugia, thereby increasing predator-prey spatial overlap. We evaluated this hypothesis in a large mammal system, focusing on the interactions between boreal woodland caribou (Rangifer tarandus caribou) and their two main predators, wolves (Canis lupus) and black bears (Ursus americanus), during the calving season of caribou. In this system, LFs extend into and occur within peatlands (i.e. bogs and nutrient-poor fens), a habitat type highly used by caribou due to its refugia effects. Using resource selection analyses, we found that LFs increased predator selection of peatlands. Female caribou appeared to respond by avoiding LFs and areas with high LF density. However, in our study area, most caribou cannot completely avoid exposure to LFs and variation in female response had demographic effects. In particular, increasing proportional use of LFs by females negatively impacted survival of their neonate calves. Collectively, these results demonstrate how LFs can reduce the efficacy of prey refugia. Mitigating such effects will require limiting or restoring LFs within prey refugia, although the effectiveness of mitigation efforts will depend upon spatial scale, which in turn will be influenced by the life-history traits of predator and prey. © 2017 The Authors. Journal of Animal Ecology © 2017 British Ecological Society.

  11. Stegano-Crypto Hiding Encrypted Data in Encrypted Image Using Advanced Encryption Standard and Lossy Algorithm

    Directory of Open Access Journals (Sweden)

    Ari Shawakat Tahir

    2015-12-01

    Full Text Available The Steganography is an art and science of hiding information by embedding messages within other, seemingly harmless messages and lots of researches are working in it. Proposed system is using AES Algorithm and Lossy technique to overcome the limitation of previous work and increasing the process’s speed. The sender uses AES Algorithm to encrypt message and image, then using LSB technique to hide encrypted data in encrypted message. The receive get the original data using the keys that had been used in encryption process. The proposed system has been implemented in NetBeans 7.3 software uses image and data in different size to find the system’s speed.

  12. Polycyclic Aromatic Hydrocarbons (PAHs) Content in Cattle Hides ...

    African Journals Online (AJOL)

    ADOWIE PERE

    Vol. 21 (6) 1105-1110. Full-text Available Online at www.ajol.info and ... Keywords: Cattle hide, meat, tyre, singeing, hydrocarbons ... on the substance used as fuel for meat processing. .... through the centrifuge at 200 rpm for 5 min. The.

  13. Efficacy of citrilow™ and cecure™ spray wash on the levels and prevalence of aerobic bacterials and enterobacteriaceae bacteria on cattle hides

    Science.gov (United States)

    Bacterial cross-contamination from the haired outer surface of cattle skins to the inner meat and hide quality detrition from bacteria is recognized as a severe hygienic problem for commercial beef and hide processing facilities. To circumvent bacterial contamination, cattle are washed during hide p...

  14. Hiding secret data into a carrier image

    Directory of Open Access Journals (Sweden)

    Ovidiu COSMA

    2012-06-01

    Full Text Available The object of steganography is embedding hidden information in an appropriate multimedia carrier, e.g., image, audio, or video. There are several known methods of solving this problem, which operate either in the space domain or in the frequency domain, and are distinguished by the following characteristics: payload, robustness and strength. The payload is the amount of secret data that can be embedded in the carrier without inducing suspicious artefacts, robustness indicates the degree in which the secret data is affected by the normal processing of the carrier e.g., compression, and the strength indicate how easy the presence of hidden data can be detected by steganalysis techniques. This paper presents a new method of hiding secret data into a digital image compressed by a technique based on the Discrete Wavelet Transform (DWT [2] and the Set Partitioning In Hierarchical Trees (SPIHT subband coding algorithm [6]. The proposed method admits huge payloads and has considerable strength.

  15. Hiding Critical Targets in Smart Grid Networks

    Energy Technology Data Exchange (ETDEWEB)

    Bao, Wei [Univ. of Arkansas, Fayetteville, AR (United States); Li, Qinghua

    2017-10-23

    With the integration of advanced communication technologies, the power grid is expected to greatly enhance efficiency and reliability of future power systems. However, since most electrical devices in power grid substations are connected via communication networks, cyber security of these communication networks becomes a critical issue. Real-World incidents such as Stuxnet have shown the feasibility of compromising a device in the power grid network to further launch more sophisticated attacks. To deal with security attacks of this spirit, this paper aims to hide critical targets from compromised internal nodes and hence protect them from further attacks launched by those compromised nodes. In particular, we consider substation networks and propose to add carefully-controlled dummy traffic to a substation network to make critical target nodes indistinguishable from other nodes in network traffic patterns. This paper describes the design and evaluation of such a scheme. Evaluations show that the scheme can effectively protect critical nodes with acceptable communication cost.

  16. Efficient hiding of confidential high-utility itemsets with minimal side effects

    Science.gov (United States)

    Lin, Jerry Chun-Wei; Hong, Tzung-Pei; Fournier-Viger, Philippe; Liu, Qiankun; Wong, Jia-Wei; Zhan, Justin

    2017-11-01

    Privacy preserving data mining (PPDM) is an emerging research problem that has become critical in the last decades. PPDM consists of hiding sensitive information to ensure that it cannot be discovered by data mining algorithms. Several PPDM algorithms have been developed. Most of them are designed for hiding sensitive frequent itemsets or association rules. Hiding sensitive information in a database can have several side effects such as hiding other non-sensitive information and introducing redundant information. Finding the set of itemsets or transactions to be sanitised that minimises side effects is an NP-hard problem. In this paper, a genetic algorithm (GA) using transaction deletion is designed to hide sensitive high-utility itemsets for PPUM. A flexible fitness function with three adjustable weights is used to evaluate the goodness of each chromosome for hiding sensitive high-utility itemsets. To speed up the evolution process, the pre-large concept is adopted in the designed algorithm. It reduces the number of database scans required for verifying the goodness of an evaluated chromosome. Substantial experiments are conducted to compare the performance of the designed GA approach (with/without the pre-large concept), with a GA-based approach relying on transaction insertion and a non-evolutionary algorithm, in terms of execution time, side effects, database integrity and utility integrity. Results demonstrate that the proposed algorithm hides sensitive high-utility itemsets with fewer side effects than previous studies, while preserving high database and utility integrity.

  17. FFTF gas processing systems

    International Nuclear Information System (INIS)

    Halverson, T.G.

    1977-01-01

    The design and operation of the two radioactive gas processing systems at the Fast Flux Test Facility (FFTF) exemplifies the concept that will be used in the first generation of Liquid Metal Fast Breeder Reactors (LMFBR's). The two systems, the Radioactive Argon Processing System (RAPS) and the Cell Atmosphere Processing System (CAPS), process the argon and nitrogen used in the FFTF for cover gas on liquid metal systems and as inert atmospheres in steel lined cells housing sodium equipment. The RAPS specifically processes the argon cover gas from the reactor coolant system, providing for decontamination and eventual reuse. The CAPS processes radioactive gasses from inerted cells and other liquid metal cover gas systems, providing for decontamination and ultimate discharge to the atmosphere. The cryogenic processing of waste gas by both systems is described

  18. A Blind High-Capacity Wavelet-Based Steganography Technique for Hiding Images into other Images

    Directory of Open Access Journals (Sweden)

    HAMAD, S.

    2014-05-01

    Full Text Available The flourishing field of Steganography is providing effective techniques to hide data into different types of digital media. In this paper, a novel technique is proposed to hide large amounts of image data into true colored images. The proposed method employs wavelet transforms to decompose images in a way similar to the Human Visual System (HVS for more secure and effective data hiding. The designed model can blindly extract the embedded message without the need to refer to the original cover image. Experimental results showed that the proposed method outperformed all of the existing techniques not only imperceptibility but also in terms of capacity. In fact, the proposed technique showed an outstanding performance on hiding a secret image whose size equals 100% of the cover image while maintaining excellent visual quality of the resultant stego-images.

  19. Perception of Stakeholders to the Proposed Ban on Cow Hide ...

    African Journals Online (AJOL)

    User

    Keywords: Cow hide consumption, cow hide value chain, ponmo .... value chain;. 2. identify sources of information of the respondents on the proposed ban; ..... the health risk associated with the consumption of ponmo may favour its proposed.

  20. Hiding levitating objects above a ground plane

    DEFF Research Database (Denmark)

    Zhang, Jingjing; Luo, Yu; Mortensen, Asger

    2010-01-01

    An approach to hiding objects levitating above a conducting sheet is suggested in this paper. The proposed device makes use of isotropic negative-refractive-index materials without extreme material parameters, and creates an illusion of a remote conducting sheet. Numerical simulations are perform...

  1. Natural Information Processing Systems

    OpenAIRE

    John Sweller; Susan Sweller

    2006-01-01

    Natural information processing systems such as biological evolution and human cognition organize information used to govern the activities of natural entities. When dealing with biologically secondary information, these systems can be specified by five common principles that we propose underlie natural information processing systems. The principles equate: (1) human long-term memory with a genome; (2) learning from other humans with biological reproduction; (3) problem solving through random ...

  2. Online data processing system

    International Nuclear Information System (INIS)

    Nakahara, Yoshinori; Yagi, Hideyuki; Yamada, Takayuki

    1979-02-01

    A pulse height analyzer terminal system PHATS has been developed for online data processing via JAERI-TOKAI computer network. The system is controled by using a micro-computer MICRO-8 which was developed for the JAERI-TOKAI network. The system program consists of two subprograms, online control system ONLCS and pulse height analyzer control system PHACS. ONLCS links the terminal with the conversational programming system of FACOM 230/75 through the JAERI-TOKAI network and controls data processing in TSS and remote batch modes. PHACS is used to control INPUT/OUTPUT of data between pulse height analyzer and cassette-MT or typewriter. This report describes the hardware configuration and the system program in detail. In the appendix, explained are real time monitor, type of message, PEX to PEX protocol and Host to Host protocol, required for the system programming. (author)

  3. Hiding Techniques for Dynamic Encryption Text based on Corner Point

    Science.gov (United States)

    Abdullatif, Firas A.; Abdullatif, Alaa A.; al-Saffar, Amna

    2018-05-01

    Hiding technique for dynamic encryption text using encoding table and symmetric encryption method (AES algorithm) is presented in this paper. The encoding table is generated dynamically from MSB of the cover image points that used as the first phase of encryption. The Harris corner point algorithm is applied on cover image to generate the corner points which are used to generate dynamic AES key to second phase of text encryption. The embedded process in the LSB for the image pixels except the Harris corner points for more robust. Experimental results have demonstrated that the proposed scheme have embedding quality, error-free text recovery, and high value in PSNR.

  4. Process evaluation distributed system

    Science.gov (United States)

    Moffatt, Christopher L. (Inventor)

    2006-01-01

    The distributed system includes a database server, an administration module, a process evaluation module, and a data display module. The administration module is in communication with the database server for providing observation criteria information to the database server. The process evaluation module is in communication with the database server for obtaining the observation criteria information from the database server and collecting process data based on the observation criteria information. The process evaluation module utilizes a personal digital assistant (PDA). A data display module in communication with the database server, including a website for viewing collected process data in a desired metrics form, the data display module also for providing desired editing and modification of the collected process data. The connectivity established by the database server to the administration module, the process evaluation module, and the data display module, minimizes the requirement for manual input of the collected process data.

  5. Process fluid cooling system

    International Nuclear Information System (INIS)

    Farquhar, N.G.; Schwab, J.A.

    1977-01-01

    A system of heat exchangers is disclosed for cooling process fluids. The system is particularly applicable to cooling steam generator blowdown fluid in a nuclear plant prior to chemical purification of the fluid in which it minimizes the potential of boiling of the plant cooling water which cools the blowdown fluid

  6. The Effect of Eradication of Lice on the Occurrence of the Grain Defect Light Flecks and Spots on Cattle Hides

    Science.gov (United States)

    Nafstad, O; Grønstøl, H

    2001-01-01

    The influence of an eradication programme for lice on the prevalence of light flecks and spots on cattle hides was studied in 33 dairy cattle herds during a period of two and a half years. Lice were eradicated from the main group of herds after 9 to 12 months and the quality of the hides before and after treatment was compared. Hides from slaughtered animals were collected during the study period, tanned and examined with special emphasis on the occurrence of the grain damage light flecks and spots. The prevalence of hides without light flecks and spots increased from 24.2% before treatment to 61.6% after treatment. The prevalence of hides free from the damage increased significantly in all examined anatomical regions. The improvement in hide quality was most marked in the shoulders and neck region which corresponded to the major predilection site of cattle lice. The prevalence of hides with light flecks and spots started to decrease in the first period (2–40 days) after eradication. The changes after treatment suggested that most healing process took place over a period of about 4 months. The eradication programme eliminated the seasonal variation in the prevalence of light flecks and spots which was present before treatment. PMID:11455906

  7. The Effect of Eradication of Lice on the Occurrence of the Grain Defect Light Flecks and Spots on Cattle Hides

    Directory of Open Access Journals (Sweden)

    Grønstøl H

    2001-03-01

    Full Text Available The influence of an eradication programme for lice on the prevalence of light flecks and spots on cattle hides was studied in 33 dairy cattle herds during a period of two and a half years. Lice were eradicated from the main group of herds after 9 to 12 months and the quality of the hides before and after treatment was compared. Hides from slaughtered animals were collected during the study period, tanned and examined with special emphasis on the occurrence of the grain damage light flecks and spots. The prevalence of hides without light flecks and spots increased from 24.2% before treatment to 61.6% after treatment. The prevalence of hides free from the damage increased significantly in all examined anatomical regions. The improvement in hide quality was most marked in the shoulders and neck region which corresponded to the major predilection site of cattle lice. The prevalence of hides with light flecks and spots started to decrease in the first period (2–40 days after eradication. The changes after treatment suggested that most healing process took place over a period of about 4 months. The eradication programme eliminated the seasonal variation in the prevalence of light flecks and spots which was present before treatment.

  8. Process gas solidification system

    International Nuclear Information System (INIS)

    1980-01-01

    A process for withdrawing gaseous UF 6 from a first system and directing same into a second system for converting the gas to liquid UF 6 at an elevated temperature, additionally including the step of withdrawing the resulting liquid UF 6 from the second system, subjecting it to a specified sequence of flash-evaporation, cooling and solidification operations, and storing it as a solid in a plurality of storage vessels. (author)

  9. An Internal Data Non-hiding Type Real-time Kernel and its Application to the Mechatronics Controller

    Science.gov (United States)

    Yoshida, Toshio

    For the mechatronics equipment controller that controls robots and machine tools, high-speed motion control processing is essential. The software system of the controller like other embedded systems is composed of three layers software such as real-time kernel layer, middleware layer, and application software layer on the dedicated hardware. The application layer in the top layer is composed of many numbers of tasks, and application function of the system is realized by the cooperation between these tasks. In this paper we propose an internal data non-hiding type real-time kernel in which customizing the task control is possible only by change in the program code of the task side without any changes in the program code of real-time kernel. It is necessary to reduce the overhead caused by the real-time kernel task control for the speed-up of the motion control of the mechatronics equipment. For this, customizing the task control function is needed. We developed internal data non-cryptic type real-time kernel ZRK to evaluate this method, and applied to the control of the multi system automatic lathe. The effect of the speed-up of the task cooperation processing was able to be confirmed by combined task control processing on the task side program code using an internal data non-hiding type real-time kernel ZRK.

  10. Information Hiding: an Annotated Bibliography

    National Research Council Canada - National Science Library

    Anderson, Ross

    1999-01-01

    ... so. These steganography, copyright marking, the study of covert channels in operating systems, low-probability of intercept communications, and the study of subliminal channels in digital signature schemes...

  11. Matryoshka: Hiding Secret Communication in Plain Sight

    OpenAIRE

    Safaka, Iris; Fragouli, Christina; Argyraki, Katerina

    2016-01-01

    We want to enable a pair of communicating users to exchange secret messages while hiding the fact that secret communication is taking place. We propose a linguistic steganography approach, where each human message is hidden in another human-like message. A hard open question is how to keep the steganographic message small -- existing related tools tend to blow up its size, thereby revealing the use of steganography. We encrypt by compressing each message, mapping it to a plausible sequence of...

  12. Efficacy of Citrilow® and Cecure® spray wash on the prevalence of aerobic and enterobacteriaceae/gram negative enteric bacilli and cattle hide quality

    Science.gov (United States)

    Bacterial cross-contamination from the haired outer surface of cattle to the inner meat as well as hide quality deterioration from bacteria are hygienic problems for meat and hide processing facilities. This study investigated spray wash treatments independently with two antimicrobials used in the ...

  13. Electron beam processing system

    International Nuclear Information System (INIS)

    Kashiwagi, Masayuki

    2004-01-01

    Electron beam Processing Systems (EPS) are used as useful and powerful tools in many industrial application fields such as the production of cross-linked wire, rubber tire, heat shrinkable film and tubing, curing, degradation of polymers, sterilization and environmental application. In this paper, the feature and application fields, the selection of machine ratings and safety measures of EPS will be described. (author)

  14. On the implementation of IP protection using biometrics based information hiding and firewall

    Science.gov (United States)

    Basu, Abhishek; Nandy, Kingshuk; Banerjee, Avishek; Giri, Supratick; Sarkar, Souvik; Sarkar, Subir Kumar

    2016-02-01

    System-on-chip-based design style creates a revolution in very large scale integration industry with design efficiency, operating speed and development time. To support this process, reuse and exchange of components are essential in electronic form called intellectual property (IP). This, however, increases the possibility of encroachment of IP of the design. So copyright protection of IP against piracy is the most important concern for IP vendors. The existing solutions for IP protection are still not secure enough with flexibility, cost, etc. This paper proposes an information-hiding-based solution for IP protection by embedding a biometric copyright information and firewall inside an IP in the form of a finite state machine with unique configuration. The scheme first introduces biometric signature-based copyright as ownership proof. Second, firewall interrupts the normal functionality of IP at the end of the user time period. The experimental outcomes of field-programmable-gate-array implementation illustrate the efficiency of the proposed method.

  15. DATA HIDING IN ENCRYPTED IMAGES USING ARNOLD TRANSFORM

    Directory of Open Access Journals (Sweden)

    S. Siva Shankar

    2016-08-01

    Full Text Available Digital image steganography has several applications in information security and communication. Data hiding in encrypted images ensure that both the cover image and the secret message can be recovered at the receiver end. This work presents a novel data hiding and image encryption scheme using random diffusion and Two dimensional Arnold cat mapping transform. The secret message bits are placed in the least significant bit positions of the cover image. Then a shared key is used to generate random 8 bit random integer stream and is added to the stego image in the random diffusion step. Arnold cat mapping transformation is done to scramble the pixels. The two steps of random diffusion and Arnold transform mapping are done alternatively several times to completely encrypt the image contents. The process is reversed at the receiver end to get both the secret message and the cover image with little loss. The random diffusion step overcomes the limited period of the Arnold transform. The embedding capacity of one bit per pixel is achieved. Security analysis is carried out which shows that the encryption is highly secure. The number of collisions is low thus preventing brute force attacks. The original cover image is recoverable with minimal losses.

  16. Synergistic effects in the short-term preservation of hides with antiseptics and gamma radiation

    Energy Technology Data Exchange (ETDEWEB)

    Du Plessis, T.A.; Russell, A.E.; Stevens, R.C.B.; Galloway, A.C. (Iso-Ster (Pty) Ltd., Kempton Park (South Africa))

    1983-01-01

    The normal time lapse between the skinning and tanning processes of green hides necessitates the need for a short-term preservation technique to be employed. The most common method of bringing about such preservation is the coarse salting of the flesh side of hides. More recently the antiseptic treatment of hides was introduced to overcome the serious environmental pollution brought about by the salting process. The antiseptic treatment, however, must also be carefully controlled to avoid upsetting the biological breakdown processes in effluent plants. The gamma sterilization of such hides presents a non-polluting alternative to these methods. As the nature of this product demands excessively high radiation doses to be effective, which negatively influences the economics of the process and the physical properties of the resultant leather, a combination process employing radiation and antiseptics was investigated. It was observed that the radiation dose could be lowered from 50 kGy to 8 kGy in combination with certain antiseptics, whilst the required antiseptic concentration could be substantially lowered in the presence of radiation. The resultant leather was of an excellent quality whilst minimizing the environmental pollution problem.

  17. Synergistic effects in the short-term preservation of hides with antiseptics and gamma radiation

    Science.gov (United States)

    Du Plessis, TA; Russell, AE; Stevens, RCB; Galloway, AC

    The normal time lapse between the skinning and tanning processes of green hides necessitates the need for a short-term preservation technique to be employed. The most common method of bringing about such preservation is the coarse salting of the flesh side of hides. More recently the antiseptic treatment of hides was introduced to overcome the serious environmental pollution brought about by the salting process. The antiseptic treatment, however, must also be carefully controlled to avoid upsetting the biological breakdown processes in effluent plants. The gamma sterilization of such hides presents a non-polluting alternative to these methods. As the nature of this product demands excessively high radiation doses to be effective, which negatively influences the economics of the process and the physical properties of the resultant leather, a combination process employing radiation and antiseptics was investigated. It was observed that the radiation dose could be lowered from 50 kGy to 8 kGy in combination with certain antiseptics, whilst the required antiseptic concentration could be substantially lowered in the presence of radiation. The resultant leather was of an excellent quality whilst minimizing the environmental pollution problem.

  18. Synergistic effects in the short-term preservation of hides with antiseptics and gamma radiation

    International Nuclear Information System (INIS)

    Du Plessis, T.A.; Russell, A.E.; Stevens, R.C.B.; Galloway, A.C.

    1983-01-01

    The normal time lapse between the skinning and tanning processes of green hides necessitates the need for a short-term preservation technique to be employed. The most common method of bringing about such preservation is the coarse salting of the flesh side of hides. More recently the antiseptic treatment of hides was introduced to overcome the serious environmental pollution brought about by the salting process. The antiseptic treatment, however, must also be carefully controlled to avoid upsetting the biological breakdown processes in effluent plants. The gamma sterilization of such hides presents a non-polluting alternative to these methods. As the nature of this product demands excessively high radiation doses to be effective, which negatively influences the economics of the process and the physical properties of the resultant leather, a combination process employing radiation and antiseptics was investigated. It was observed that the radiation dose could be lowered from 50 kGy to 8 kGy in combination with certain antiseptics, whilst the required antiseptic concentration could be substantially lowered in the presence of radiation. The resultant leather was of an excellent quality whilst minimizing the environmental pollution problem. (author)

  19. Advanced information processing system

    Science.gov (United States)

    Lala, J. H.

    1984-01-01

    Design and performance details of the advanced information processing system (AIPS) for fault and damage tolerant data processing on aircraft and spacecraft are presented. AIPS comprises several computers distributed throughout the vehicle and linked by a damage tolerant data bus. Most I/O functions are available to all the computers, which run in a TDMA mode. Each computer performs separate specific tasks in normal operation and assumes other tasks in degraded modes. Redundant software assures that all fault monitoring, logging and reporting are automated, together with control functions. Redundant duplex links and damage-spread limitation provide the fault tolerance. Details of an advanced design of a laboratory-scale proof-of-concept system are described, including functional operations.

  20. An Image Encryption Method Based on Bit Plane Hiding Technology

    Institute of Scientific and Technical Information of China (English)

    LIU Bin; LI Zhitang; TU Hao

    2006-01-01

    A novel image hiding method based on the correlation analysis of bit plane is described in this paper. Firstly, based on the correlation analysis, different bit plane of a secret image is hided in different bit plane of several different open images. And then a new hiding image is acquired by a nesting "Exclusive-OR" operation on those images obtained from the first step. At last, by employing image fusion technique, the final hiding result is achieved. The experimental result shows that the method proposed in this paper is effective.

  1. HIDE working groups. A. Synchrotron based system

    International Nuclear Information System (INIS)

    Barton, M.Q.

    1977-01-01

    A summary is given of a week's discussions on an ion source to target scenario for a synchrotron for heavy ion fusion. Topics considered include: the number of beams on the target; beam dynamics; and a number of areas explicitly identified as needing further work

  2. Radiation signal processing system

    International Nuclear Information System (INIS)

    Bennett, M.; Knoll, G.; Strange, D.

    1980-01-01

    An improved signal processing system for radiation imaging apparatus comprises: a radiation transducer producing transducer signals proportional to apparent spatial coordinates of detected radiation events; means for storing true spatial coordinates corresponding to a plurality of predetermined apparent spatial coordinates relative to selected detected radiation events said means for storing responsive to said transducer signal and producing an output signal representative of said true spatial coordinates; and means for interpolating the true spatial coordinates of the detected radiation events located intermediate the stored true spatial coordinates, said means for interpolating communicating with said means for storing

  3. Efficiently Hiding Sensitive Itemsets with Transaction Deletion Based on Genetic Algorithms

    Directory of Open Access Journals (Sweden)

    Chun-Wei Lin

    2014-01-01

    Full Text Available Data mining is used to mine meaningful and useful information or knowledge from a very large database. Some secure or private information can be discovered by data mining techniques, thus resulting in an inherent risk of threats to privacy. Privacy-preserving data mining (PPDM has thus arisen in recent years to sanitize the original database for hiding sensitive information, which can be concerned as an NP-hard problem in sanitization process. In this paper, a compact prelarge GA-based (cpGA2DT algorithm to delete transactions for hiding sensitive itemsets is thus proposed. It solves the limitations of the evolutionary process by adopting both the compact GA-based (cGA mechanism and the prelarge concept. A flexible fitness function with three adjustable weights is thus designed to find the appropriate transactions to be deleted in order to hide sensitive itemsets with minimal side effects of hiding failure, missing cost, and artificial cost. Experiments are conducted to show the performance of the proposed cpGA2DT algorithm compared to the simple GA-based (sGA2DT algorithm and the greedy approach in terms of execution time and three side effects.

  4. Dynamics and driving forces of hides, skins, leather and leather ...

    African Journals Online (AJOL)

    Footwear and leather goods are constrained by lack of factories, competition from used goods, synthetic plastics and uninformed market. Investment in hides, skins and leather industry supported by training programmes has potential to generate great monetary revenue. Keywords: Hides, skin, leather, value chain, slaughter ...

  5. Wrapped up in Covers: Preschoolers' Secrets and Secret Hiding Places

    Science.gov (United States)

    Corson, Kimberly; Colwell, Malinda J.; Bell, Nancy J.; Trejos-Castillo, Elizabeth

    2014-01-01

    In this qualitative study, interviews about children's secret hiding places were conducted with 3-5-year-olds (n?=?17) in a university sponsored preschool programme using art narratives. Since prior studies indicate that children understand the concept of a secret as early as five and that they associate secrets with hiding places, the purpose of…

  6. Efficient Information Hiding Based on Theory of Numbers

    Directory of Open Access Journals (Sweden)

    Yanjun Liu

    2018-01-01

    Full Text Available Data hiding is an efficient technique that conceals secret data into a digital medium. In 2006, Zhang and Wang proposed a data hiding scheme called exploiting modification direction (EMD which has become a milestone in the field of data hiding. In recent years, many EMD-type data hiding schemes have been developed, but their embedding capacity remains restricted. In this paper, a novel data hiding scheme based on the combination of Chinese remainder theorem (CRT and a new extraction function is proposed. By the proposed scheme, the cover image is divided into non-overlapping pixel groups for embedding to increase the embedding capacity. Experimental results show that the embedding capacity of the proposed scheme is significantly higher (greater than 2.5 bpp than previously proposed schemes while ensuring very good visual quality of the stego image. In addition, security analysis is given to show that the proposed scheme can resist visual attack.

  7. Selective Redundancy Removal: A Framework for Data Hiding

    Directory of Open Access Journals (Sweden)

    Ugo Fiore

    2010-02-01

    Full Text Available Data hiding techniques have so far concentrated on adding or modifying irrelevant information in order to hide a message. However, files in widespread use, such as HTML documents, usually exhibit high redundancy levels, caused by code-generation programs. Such redundancy may be removed by means of optimization software. Redundancy removal, if applied selectively, enables information hiding. This work introduces Selective Redundancy Removal (SRR as a framework for hiding data. An example application of the framework is given in terms of hiding information in HTML documents. Non-uniformity across documents may raise alarms. Nevertheless, selective application of optimization techniques might be due to the legitimate use of optimization software not supporting all the optimization methods, or configured to not use all of them.

  8. Mars Aqueous Processing System

    Science.gov (United States)

    Berggren, Mark; Wilson, Cherie; Carrera, Stacy; Rose, Heather; Muscatello, Anthony; Kilgore, James; Zubrin, Robert

    2012-01-01

    The goal of the Mars Aqueous Processing System (MAPS) is to establish a flexible process that generates multiple products that are useful for human habitation. Selectively extracting useful components into an aqueous solution, and then sequentially recovering individual constituents, can obtain a suite of refined or semi-refined products. Similarities in the bulk composition (although not necessarily of the mineralogy) of Martian and Lunar soils potentially make MAPS widely applicable. Similar process steps can be conducted on both Mars and Lunar soils while tailoring the reaction extents and recoveries to the specifics of each location. The MAPS closed-loop process selectively extracts, and then recovers, constituents from soils using acids and bases. The emphasis on Mars involves the production of useful materials such as iron, silica, alumina, magnesia, and concrete with recovery of oxygen as a byproduct. On the Moon, similar chemistry is applied with emphasis on oxygen production. This innovation has been demonstrated to produce high-grade materials, such as metallic iron, aluminum oxide, magnesium oxide, and calcium oxide, from lunar and Martian soil simulants. Most of the target products exhibited purities of 80 to 90 percent or more, allowing direct use for many potential applications. Up to one-fourth of the feed soil mass was converted to metal, metal oxide, and oxygen products. The soil residue contained elevated silica content, allowing for potential additional refining and extraction for recovery of materials needed for photovoltaic, semiconductor, and glass applications. A high-grade iron oxide concentrate derived from lunar soil simulant was used to produce a metallic iron component using a novel, combined hydrogen reduction/metal sintering technique. The part was subsequently machined and found to be structurally sound. The behavior of the lunar-simulant-derived iron product was very similar to that produced using the same methods on a Michigan iron

  9. Radioisotope waste processing systems

    International Nuclear Information System (INIS)

    Machida, Tadashi

    1978-01-01

    The Atomic Energy Safety Bureau established the policy entitled ''On Common Processing System of Radioactive Wastes'' consulting with the Liaison Committee of Radioactive Waste Processing. Japan Atomic Energy Research Institute (JAERI) and Japan Radioisotope Association (JRIA) had been discussing the problems required for the establishment of the common disposal facilities based on the above policy, and they started the organization in spring, 1978. It is a foundation borrowing equipments from JAERI though installing newly some of them not available from JAERI, and depending the fund on JRIA. The operation expenses will be borne by those who want to dispose the wastes produced. The staffs are sent out from JAERI and JRIA. For animal wastes contaminated with RI, formaldehyde dipping should be abolished, but drying and freezing procedures will be taken before they are burnt up in a newly planned exclusive furnace with disposing capacity of 50 kg/hour. To settle the problems of other wastes, enough understanding and cooperation of users are to be requested. (Kobatake, H.)

  10. Digital processing data communication systems (bus systems)

    International Nuclear Information System (INIS)

    Fleck, K.

    1980-01-01

    After an introduction to the technology of digital processing data communication systems there are the following chapters: digital communication of processing data in automation technology, the technology of biserial communication, the implementaiton of a bus system, the data transmission of the TDC-2000 system of Honeywell's and the process bus CS 275 in the automation system TELEPERM M of Siemens AG. (WB) [de

  11. Processed Products Database System

    Data.gov (United States)

    National Oceanic and Atmospheric Administration, Department of Commerce — Collection of annual data on processed seafood products. The Division provides authoritative advice, coordination and guidance on matters related to the collection,...

  12. Mechanical properties of biobased films prepared from collagen solutions derived from bovine hides

    Science.gov (United States)

    The most valuable byproducts of the meat packing industry are hides. The U.S. is the world’s 3rd largest hide producing country and currently produces approximately 35 million cattle hides annually. Due to fierce competition in global markets, the American leather and hides industry is facing chal...

  13. Hiding information in open auctions with jump bids

    Czech Academy of Sciences Publication Activity Database

    Ettinger, D.; Michelucci, Fabio

    2016-01-01

    Roč. 126, č. 594 (2016), s. 1484-1502 ISSN 0013-0133 Institutional support: RVO:67985998 Keywords : hiding information * open auctions * jump bids Subject RIV: AH - Economics Impact factor: 2.608, year: 2016

  14. Hiding information in open auctions with jump bids

    Czech Academy of Sciences Publication Activity Database

    Ettinger, D.; Michelucci, Fabio

    2016-01-01

    Roč. 126, č. 594 (2016), s. 1484-1502 ISSN 0013-0133 Institutional support: PRVOUK-P23 Keywords : hiding information * open auctions * jump bids Subject RIV: AH - Economics Impact factor: 2.608, year: 2016

  15. Let’s play hide and seek!

    CERN Multimedia

    Computer Security Team

    2012-01-01

    This week, we would like you to play a small online game called “Virtual Hide & Seek”. The rules are simple: some of our colleagues have published some sensitive or confidential documents on CERN’s central services like Indico, CDS, EDMS or TWiki, as well as on our many websites. Your mission, should you choose to accept it: find them!   If you provide us with documents marked “confidential”, “classified”, “sensitive”, or containing plain text operational passwords, you can win a book on computer security. There are only few conditions: these documents must be visible from outside CERN, must not require a CERN account in order to access them, and must not belong to you or have a direct link with your work. Have fun! But seriously, are you sure that your documents are really properly protected? We regularly find confidential documents stored on one of the CERN central  services and w...

  16. Book Review: No Place To Hide

    Directory of Open Access Journals (Sweden)

    Gary Kessler

    2007-03-01

    Full Text Available O'Harrow, R., Jr. (2006. No Place To Hide. New York: Free Press. 352 pages, ISBN: 0-7432-8705-3 (paper, US$26Reviewed by Gary C. Kessler (gary.kessler@champlain.eduPersonal privacy and the protection of personal identifying information are of concern to all of us. Innumerable articles and conferences address our loss of privacy, either through the sale of consumer databases or our own inattention. Opinions vary from "You have no privacy; get over it" to "This is the end of civil liberties as we know them." We teach people to safely maneuver on the Internet and minimize their exposure to bogus sites set up to steal their identity, warn users about the dangers of phishing and posting personal information on social network sites, use firewalls to protect our databases, and enact laws such as the Health Insurance Portability and Accountability Act (HIPAA and the Family Educational Rights and Privacy Act (FERPA to protect information.(see PDF for full review

  17. Information hiding techniques for steganography and digital watermarking

    CERN Document Server

    Katzenbeisser, Stefan

    2000-01-01

    Steganography, a means by which two or more parties may communicate using ""invisible"" or ""subliminal"" communication, and watermarking, a means of hiding copyright data in images, are becoming necessary components of commercial multimedia applications that are subject to illegal use. This new book is the first comprehensive survey of steganography and watermarking and their application to modern communications and multimedia.Handbook of Information Hiding: Steganography and Watermarking helps you understand steganography, the history of this previously neglected element of cryptography, the

  18. Personal Investigations Processing System

    Data.gov (United States)

    US Agency for International Development — PIPS is a system that maintains the Security/Suitability Investigations Index (SII) for OPM. It contains over 11 million background investigation records of Federal...

  19. Expert systems in process control systems

    International Nuclear Information System (INIS)

    Wittig, T.

    1987-01-01

    To illustrate where the fundamental difference between expert systems in classical diagnosis and in industrial control lie, the work of process control instrumentation is used as an example for the job of expert systems. Starting from the general process of problem-solving, two classes of expert systems can be defined accordingly. (orig.) [de

  20. Suitability of the RGB Channels for a Pixel Manipulation in a Spatial Domain Data Hiding Techniques

    Directory of Open Access Journals (Sweden)

    Ante Poljicak

    2010-06-01

    Full Text Available The aim of this research was to determine which channel in rgb color space is the most suitable (regarding perceptibility for a pixel manipulation in a spatial domain data  hiding techniques. For this purpose three custom test targets were generated. The research also shows the behavior of two closely related colors in the ps (Print-Scan process. The results are interpreted using both a quantitative method (statistical comparison and a qualitative method (visual comparison.

  1. Application of Modified Digital Halftoning Techniques to Data Hiding in Personalized Stamps

    Institute of Scientific and Technical Information of China (English)

    Hsi-Chun Wang; Chi-Ming Lian; Pei-Chi Hsiao

    2004-01-01

    The objective of this research is to embed information in personalized stamps by modified digital halftoning techniques. The displaced and deformed halftone dots are used to encode data in the personalized stamps. Hidden information can be retrieved by either an optical decoder or digital image processing techniques.The results show that personalized stamps with value-added features like data hiding or digital watermarking can be successfully implemented.

  2. A Novel Approach for Arabic Text Steganography Based on the “BloodGroup” Text Hiding Method

    Directory of Open Access Journals (Sweden)

    S. Malalla,

    2017-04-01

    Full Text Available Steganography is the science of hiding certain messages (data in groups of irrelevant data possibly of other form. The purpose of steganography is covert communication to hide the existence of a message from an intermediary. Text Steganography is the process of embedding secret message (text in another text (cover text so that the existence of secret message cannot be detected by a third party. This paper presents a novel approach for text steganography using the Blood Group (BG method based on the behavior of blood group. Experimentally it is found that the proposed method got good results in capacity, hiding capacity, time complexity, robustness, visibility, and similarity which shows its superiority as compared to most several existing methods.

  3. A Game of Hide and Seek: Expectations of Clumpy Resources Influence Hiding and Searching Patterns.

    Directory of Open Access Journals (Sweden)

    Andreas Wilke

    Full Text Available Resources are often distributed in clumps or patches in space, unless an agent is trying to protect them from discovery and theft using a dispersed distribution. We uncover human expectations of such spatial resource patterns in collaborative and competitive settings via a sequential multi-person game in which participants hid resources for the next participant to seek. When collaborating, resources were mostly hidden in clumpy distributions, but when competing, resources were hidden in more dispersed (random or hyperdispersed patterns to increase the searching difficulty for the other player. More dispersed resource distributions came at the cost of higher overall hiding (as well as searching times, decreased payoffs, and an increased difficulty when the hider had to recall earlier hiding locations at the end of the experiment. Participants' search strategies were also affected by their underlying expectations, using a win-stay lose-shift strategy appropriate for clumpy resources when searching for collaboratively-hidden items, but moving equally far after finding or not finding an item in competitive settings, as appropriate for dispersed resources. Thus participants showed expectations for clumpy versus dispersed spatial resources that matched the distributions commonly found in collaborative versus competitive foraging settings.

  4. Optical multiple-image hiding based on interference and grating modulation

    International Nuclear Information System (INIS)

    He, Wenqi; Peng, Xiang; Meng, Xiangfeng

    2012-01-01

    We present a method for multiple-image hiding on the basis of interference-based encryption architecture and grating modulation. By using a modified phase retrieval algorithm, we can separately hide a number of secret images into one arbitrarily preselected host image associated with a set of phase-only masks (POMs), which are regarded as secret keys. Thereafter, a grating modulation operation is introduced to multiplex and store the different POMs into a single key mask, which is then assigned to the authorized users in privacy. For recovery, after an appropriate demultiplexing process, one can reconstruct the distributions of all the secret keys and then recover the corresponding hidden images with suppressed crosstalk. Computer simulation results are presented to validate the feasibility of our approach. (paper)

  5. Processors and systems (picture processing)

    Energy Technology Data Exchange (ETDEWEB)

    Gemmar, P

    1983-01-01

    Automatic picture processing requires high performance computers and high transmission capacities in the processor units. The author examines the possibilities of operating processors in parallel in order to accelerate the processing of pictures. He therefore discusses a number of available processors and systems for picture processing and illustrates their capacities for special types of picture processing. He stresses the fact that the amount of storage required for picture processing is exceptionally high. The author concludes that it is as yet difficult to decide whether very large groups of simple processors or highly complex multiprocessor systems will provide the best solution. Both methods will be aided by the development of VLSI. New solutions have already been offered (systolic arrays and 3-d processing structures) but they also are subject to losses caused by inherently parallel algorithms. Greater efforts must be made to produce suitable software for multiprocessor systems. Some possibilities for future picture processing systems are discussed. 33 references.

  6. Information hiding technology and application analysis based on decimal expansion of irrational numbers

    Science.gov (United States)

    Liu, Xiaoyong; Lu, Pei; Shao, Jianxin; Cao, Haibin; Zhu, Zhenmin

    2017-10-01

    In this paper, an information hiding method using decimal expansion of irrational numbers to generate random phase mask is proposed. Firstly, the decimal expansion parts of irrational numbers generate pseudo-random sequences using a new coding schemed, the irrational number and start and end bit numbers were used as keys in image information hiding. Secondly, we apply the coding schemed to the double phase encoding system, the pseudo-random sequences are taken to generate random phase masks. The mean square error is used to calculate the quality of the recovered image information. Finally, two tests had been carried out to verify the security of our method; the experimental results demonstrate that the cipher image has such features, strong robustness, key sensitivity, and resistance to brute force attack.

  7. Dosimetry systems for radiation processing

    International Nuclear Information System (INIS)

    McLaughlin, W.L.; Desrosiers, M.F.

    1995-01-01

    Dosimetry serves important functions in radiation processing, where large absorbed doses and dose rates from photon and electron sources have to be measured with reasonable accuracy. Proven dosimetry systems are widely used to perform radiation measurements in development of new processes, validation, qualification and verification (quality control) of established processes and archival documentation of day-to-day and plant-to-plant processing uniformity. Proper calibration and traceability of routine dosimetry systems to standards are crucial to the success of many large-volume radiation processes. Recent innovations and advances in performance of systems that enhance radiation measurement assurance and process diagnostics include dose-mapping media (new radiochromic film and solutions), optical waveguide systems for food irradiation, solid-state devices for real-time and passive dosimetry over wide dose-rate and dose ranges, and improved analytical instruments and data acquisition. (author)

  8. Non-linear quenching of current fluctuations in a self-exciting homopolar dynamo, proved by feedback system theory

    Science.gov (United States)

    de Paor, A. M.

    Hide (Nonlinear Processes in Geophysics, 1998) has produced a new mathematical model of a self-exciting homopolar dynamo driving a series- wound motor, as a continuing contribution to the theory of the geomagnetic field. By a process of exact perturbation analysis, followed by combination and partial solution of differential equations, the complete nonlinear quenching of current fluctuations reported by Hide in the case that a parameter ɛ has the value 1 is proved via the Popov theorem from feedback system stability theory.

  9. The new inter process communication middle-ware for the ATLAS Trigger and Data Acquisition system

    CERN Document Server

    Kolos, Serguei; The ATLAS collaboration

    2016-01-01

    The ATLAS Trigger & Data Acquisition (TDAQ) project was started almost twenty years ago with the aim of providing scalable distributed data collection system for the experiment. While the software dealing with physics data flow was implemented by directly using the low-level communication protocols, like TCP and UDP, the control and monitoring infrastructure services for the TDAQ system were implemented on top of the CORBA communication middle-ware. CORBA provides a high-level object oriented abstraction for the inter process communication, hiding communication complexity from the developers. This approach speeds up and simplifies development of communication services but incurs some extra cost in terms of performance and resources overhead. Our experience of using CORBA for control and monitoring data exchange in the distributed TDAQ system was very successful, mostly due to the outstanding quality of the CORBA brokers, which have been used in the project: omniORB for C++ and JacORB for Java. However, du...

  10. Perspective taking and theory of mind in hide and seek.

    Science.gov (United States)

    Street, Chris N H; Bischof, Walter F; Kingstone, Alan

    2018-01-01

    Does theory of mind play a significant role in where people choose to hide an item or where they search for an item that has been hidden? Adapting Anderson's "Hide-Find Paradigm" Anderson et al. (Action, Perception and Performance, 76, 907-913, 2014) participants viewed homogenous or popout visual arrays on a touchscreen table. Their task was to indicate where in the array they would hide an item, or to search for an item that had been hidden, by either a friend or a foe. Critically, participants believed that their sitting location at the touchtable was the same as-or opposite to-their partner's location. Replicating Anderson et al., participants tended to (1) select items nearer to themselves on homogenous displays, and this bias was stronger for a friend than foe; and (2) select popout items, and again, more for a friend than foe. These biases were observed only when participants believed that they shared the same physical perspective as their partner. Collectively, the data indicate that theory of mind plays a significant role in hiding and finding, and demonstrate that the hide-find paradigm is a powerful tool for investigating theory of mind in adults.

  11. The Process of Systemic Change

    Science.gov (United States)

    Duffy, Francis M.; Reigeluth, Charles M.; Solomon, Monica; Caine, Geoffrey; Carr-Chellman, Alison A.; Almeida, Luis; Frick, Theodore; Thompson, Kenneth; Koh, Joyce; Ryan, Christopher D.; DeMars, Shane

    2006-01-01

    This paper presents several brief papers about the process of systemic change. These are: (1) Step-Up-To-Excellence: A Protocol for Navigating Whole-System Change in School Districts by Francis M. Duffy; (2) The Guidance System for Transforming Education by Charles M. Reigeluth; (3) The Schlechty Center For Leadership In School Reform by Monica…

  12. Efficient Text Encryption and Hiding with Double-Random Phase-Encoding

    Directory of Open Access Journals (Sweden)

    Mohammad S. Alam

    2012-10-01

    Full Text Available In this paper, a double-random phase-encoding technique-based text encryption and hiding method is proposed. First, the secret text is transformed into a 2-dimensional array and the higher bits of the elements in the transformed array are used to store the bit stream of the secret text, while the lower bits are filled with specific values. Then, the transformed array is encoded with double-random phase-encoding technique. Finally, the encoded array is superimposed on an expanded host image to obtain the image embedded with hidden data. The performance of the proposed technique, including the hiding capacity, the recovery accuracy of the secret text, and the quality of the image embedded with hidden data, is tested via analytical modeling and test data stream. Experimental results show that the secret text can be recovered either accurately or almost accurately, while maintaining the quality of the host image embedded with hidden data by properly selecting the method of transforming the secret text into an array and the superimposition coefficient. By using optical information processing techniques, the proposed method has been found to significantly improve the security of text information transmission, while ensuring hiding capacity at a prescribed level.

  13. A High-Capacity Image Data Hiding Scheme Using Adaptive LSB Substitution

    Directory of Open Access Journals (Sweden)

    H. Yang

    2009-12-01

    Full Text Available Many existing steganographic methods hide more secret data into edged areas than smooth areas in the host image, which does not differentiate textures from edges and causes serious degradation in actual edge areas. To avoid abrupt changes in image edge areas, as well as to achieve better quality of the stego-image, a novel image data hiding technique by adaptive Least Significant Bits (LSBs substitution is proposed in this paper. The scheme exploits the brightness, edges, and texture masking of the host image to estimate the number k of LSBs for data hiding. Pixels in the noise non-sensitive regions are embedded by a k-bit LSB substitution with a lager value of k than that of the pixels in noise sensitive regions. Moreover, an optimal pixel adjustment process is used to enhance stego-image visual quality obtained by simple LSB substitution method. To ensure that the adaptive number k of LSBs remains unchanged after pixel modification, the LSBs number is computed by the high-order bits rather than all the bits of the image pixel value. The theoretical analyses and experiment results show that the proposed method achieves higher embedding capacity and better stegoimage quality compared with some existing LSB methods.

  14. Content-based Image Hiding Method for Secure Network Biometric Verification

    Directory of Open Access Journals (Sweden)

    Xiangjiu Che

    2011-08-01

    Full Text Available For secure biometric verification, most existing methods embed biometric information directly into the cover image, but content correlation analysis between the biometric image and the cover image is often ignored. In this paper, we propose a novel biometric image hiding approach based on the content correlation analysis to protect the network-based transmitted image. By using principal component analysis (PCA, the content correlation between the biometric image and the cover image is firstly analyzed. Then based on particle swarm optimization (PSO algorithm, some regions of the cover image are selected to represent the biometric image, in which the cover image can carry partial content of the biometric image. As a result of the correlation analysis, the unrepresented part of the biometric image is embedded into the cover image by using the discrete wavelet transform (DWT. Combined with human visual system (HVS model, this approach makes the hiding result perceptually invisible. The extensive experimental results demonstrate that the proposed hiding approach is robust against some common frequency and geometric attacks; it also provides an effective protection for the secure biometric verification.

  15. Congestion Management System Process Report

    Science.gov (United States)

    1996-03-01

    In January 1995, the Indianapolis Metropolitan Planning Organization with the help of an interagency Study Review Committee began the process of developing a Congestion Management System (CMS) Plan resulting in this report. This report documents the ...

  16. Human-Systems Integration Processes

    Data.gov (United States)

    National Aeronautics and Space Administration — The goal of this project is to baseline a Human-Systems Integration Processes (HSIP) document as a companion to the NASA-STD-3001 and Human Integration Design...

  17. System Theory and Physiological Processes.

    Science.gov (United States)

    Jones, R W

    1963-05-03

    Engineers and physiologists working together in experimental and theoretical studies predict that the application of system analysis to biological processes will increase understanding of these processes and broaden the base of system theory. Richard W. Jones, professor of electrical engineering at Northwestern University, Evanston, Illinois, and John S. Gray, professor of physiology at Northwestern's Medical School, discuss these developments. Their articles are adapted from addresses delivered in Chicago in November 1962 at the 15th Annual Conference on Engineering in Medicine and Biology.

  18. Handbook of signal processing systems

    CERN Document Server

    Deprettere, Ed; Leupers, Rainer; Takala, Jarmo

    2013-01-01

    Handbook of Signal Processing Systems is organized in three parts. The first part motivates representative applications that drive and apply state-of-the art methods for design and implementation of signal processing systems; the second part discusses architectures for implementing these applications; the third part focuses on compilers and simulation tools, describes models of computation and their associated design tools and methodologies. This handbook is an essential tool for professionals in many fields and researchers of all levels.

  19. Design of object processing systems

    NARCIS (Netherlands)

    Grigoras, D.R.; Hoede, C.

    Object processing systems are met rather often in every day life, in industry, tourism, commerce, etc. When designing such a system, many problems can be posed and considered, depending on the scope and purpose of design. We give here a general approach which involves graph theory, and which can

  20. Selection Process of ERP Systems

    OpenAIRE

    Molnár, Bálint; Szabó, Gyula; Benczúr, András

    2013-01-01

    Background: The application and introduction of ERP systems have become a central issue for management and operation of enterprises. The competition on market enforces the improvement and optimization of business processes of enterprises to increase their efficiency, effectiveness, and to manage better the resources outside the company. The primary task of ERP systems is to achieve the before-mentioned objectives. Objective: The selection of a particular ERP system has a decisive effect on th...

  1. Probability of error in information-hiding protocols

    NARCIS (Netherlands)

    Chatzikokolakis, K.; Palamidessi, C.; Panangaden, P.

    2007-01-01

    Randomized protocols for hiding private information can fruitfully be regarded as noisy channels in the information-theoretic sense, and the inference of the concealed information can be regarded as a hypothesis-testing problem. We consider the Bayesian approach to the problem, and investigate the

  2. On the Bayes risk in information-hiding protocols

    NARCIS (Netherlands)

    Chatzikokolakis, K.; Palamidessi, C.; Panangaden, P.

    2008-01-01

    Randomized protocols for hiding private information can be regarded as noisy channels in the information-theoretic sense, and the inference of the concealed information can be regarded as a hypothesis-testing problem. We consider the Bayesian approach to the problem, and investigate the probability

  3. Advanced Information Processing System (AIPS)

    Science.gov (United States)

    Pitts, Felix L.

    1993-01-01

    Advanced Information Processing System (AIPS) is a computer systems philosophy, a set of validated hardware building blocks, and a set of validated services as embodied in system software. The goal of AIPS is to provide the knowledgebase which will allow achievement of validated fault-tolerant distributed computer system architectures, suitable for a broad range of applications, having failure probability requirements of 10E-9 at 10 hours. A background and description is given followed by program accomplishments, the current focus, applications, technology transfer, FY92 accomplishments, and funding.

  4. Hiding in plain sight: communication theory in implementation science.

    Science.gov (United States)

    Manojlovich, Milisa; Squires, Janet E; Davies, Barbara; Graham, Ian D

    2015-04-23

    ignoring a key contributor to implementation intervention success. When conceptualized as a transformational process, the focus of communication moves to shared understanding and is grounded in human interactions and the way we go about constructing knowledge. Instead of hiding in plain sight, we suggest explicitly acknowledging the role that communication plays in our implementation efforts. By using both paradigms, we can investigate when communication facilitates implementation, when it does not, and how to improve it so that our implementation and clinical interventions are embraced by clinicians and patients alike.

  5. Green manufacturing processes and systems

    Energy Technology Data Exchange (ETDEWEB)

    Davim, J. Paulo (ed.) [Aveiro Univ. (Portugal). Dept. of Mechanical Engineering, Campus Universitario de Santiago

    2013-02-01

    This book provides the recent advances on green manufacturing processes and systems for modern industry. Chapter 1 provides information on sustainable manufacturing through environmentally-friendly machining. Chapter 2 is dedicated to environmentally-friendly machining: vegetable based cutting fluids. Chapter 3 describes environmental-friendly joining of tubes. Chapter 4 contains information on concepts, methods and strategies for zero-waste in manufacturing. Finally, chapter 5 is dedicated to the application of hybrid MCDM approach for selecting the best tyre recycling process.

  6. Hiding and Searching Strategies of Adult Humans in a Virtual and a Real-Space Room

    Science.gov (United States)

    Talbot, Katherine J.; Legge, Eric L. G.; Bulitko, Vadim; Spetch, Marcia L.

    2009-01-01

    Adults searched for or cached three objects in nine hiding locations in a virtual room or a real-space room. In both rooms, the locations selected by participants differed systematically between searching and hiding. Specifically, participants moved farther from origin and dispersed their choices more when hiding objects than when searching for…

  7. Effects of dehydration methods on the characteristics of fibrous networks from un-tanned hides

    Science.gov (United States)

    To improve prospective markets and to secure a viable future for the hides and leather industries, it is important to develop new uses and novel biobased products from hides. We hypothesize collagen fiber networks derived from un-tanned hides can be utilized to prepare high performance green compos...

  8. Effects of dehydration methods on characteristics of fibrous networks from un-tanned hides

    Science.gov (United States)

    To improve prospective markets and to secure a viable future for the hides and leather industries, it is important to develop new uses and novel biobased products from hides. We hypothesize collagen fiber networks derived from un-tanned hides can be utilized to prepare high performance green compos...

  9. Microprocessor based image processing system

    International Nuclear Information System (INIS)

    Mirza, M.I.; Siddiqui, M.N.; Rangoonwala, A.

    1987-01-01

    Rapid developments in the production of integrated circuits and introduction of sophisticated 8,16 and now 32 bit microprocessor based computers, have set new trends in computer applications. Nowadays the users by investing much less money can make optimal use of smaller systems by getting them custom-tailored according to their requirements. During the past decade there have been great advancements in the field of computer Graphics and consequently, 'Image Processing' has emerged as a separate independent field. Image Processing is being used in a number of disciplines. In the Medical Sciences, it is used to construct pseudo color images from computer aided tomography (CAT) or positron emission tomography (PET) scanners. Art, advertising and publishing people use pseudo colours in pursuit of more effective graphics. Structural engineers use Image Processing to examine weld X-rays to search for imperfections. Photographers use Image Processing for various enhancements which are difficult to achieve in a conventional dark room. (author)

  10. Characterization of biofilms produced by Escherichia coli O157 isolated from cattle hides

    Science.gov (United States)

    Milojević, L.; Velebit, B.; Baltić, T.; Nikolić, A.; Mitrović, R.; Đorđević, V.

    2017-09-01

    This study aimed to investigate possibility E. coli O157 from cattle hides to produced biofilms. We had 28 suspect primoisolates and 17 were confirmed to be E. coli O157. Biofilm production test showed that more than 50% of this isolates did not produce biofilm. From the other half of the isolates, 5 of them were weakly adherent, 3 were moderately adherent. Since E. coli O157 are one of the main foodborne hazards in meat processing industry and the discovery that some of them can produce moderately adherent biofilms, request necessity of strict implementation of HACCP procedures to prevent further expansion this pathogen.

  11. Forward Osmosis System And Process

    KAUST Repository

    Duan, Jintang

    2013-01-01

    A forward osmosis fluid purification system includes a cross-flow membrane module with a membrane, a channel on each side of the membrane which allows a feed solution and a draw solution to flow through separately, a feed side, a draw side including a draw solute, where the draw solute includes an aryl sulfonate salt. The system can be used in a process to extract water from impure water, such as wastewater or seawater. The purified water can be applied to arid land.

  12. Forward Osmosis System And Process

    KAUST Repository

    Duan, Jintang

    2013-08-22

    A forward osmosis fluid purification system includes a cross-flow membrane module with a membrane, a channel on each side of the membrane which allows a feed solution and a draw solution to flow through separately, a feed side, a draw side including a draw solute, where the draw solute includes an aryl sulfonate salt. The system can be used in a process to extract water from impure water, such as wastewater or seawater. The purified water can be applied to arid land.

  13. Optical image-hiding method with false information disclosure based on the interference principle and partial-phase-truncation in the fractional Fourier domain

    International Nuclear Information System (INIS)

    Dai, Chaoqing; Wang, Xiaogang; Zhou, Guoquan; Chen, Junlang

    2014-01-01

    An image-hiding method based on the optical interference principle and partial-phase-truncation in the fractional Fourier domain is proposed. The primary image is converted into three phase-only masks (POMs) using an analytical algorithm involved partial-phase-truncation and a fast random pixel exchange process. A procedure of a fake silhouette for a decryption key is suggested to reinforce the encryption and give a hint of the position of the key. The fractional orders of FrFT effectively enhance the security of the system. In the decryption process, the POM with false information and the other two POMs are, respectively, placed in the input and fractional Fourier planes to recover the primary image. There are no unintended information disclosures and iterative computations involved in the proposed method. Simulation results are presented to verify the validity of the proposed approach. (letters)

  14. Automation Processes and Blockchain Systems

    OpenAIRE

    Hegadekatti, Kartik

    2017-01-01

    Blockchain Systems and Ubiquitous computing are changing the way we do business and lead our lives. One of the most important applications of Blockchain technology is in automation processes and Internet-of-Things (IoT). Machines have so far been limited in ability primarily because they have restricted capacity to exchange value. Any monetary exchange of value has to be supervised by humans or human-based centralised ledgers. Blockchain technology changes all that. It allows machines to have...

  15. The Geonames Processing System Synopsis.

    Science.gov (United States)

    1985-09-01

    although it adds to costs), the majority of this discussion focuses on technical alter- natives for ideograph processing. Chinese hanzi and Japanese ...grammatical inflections. * ’ Hiragana ," used for exclamations, and "katakana," used for foreign words, each have 48 characters. Some characters may be...entry systems use varied strategies. "Hunt and peck" drives the Japanese typewriter, a two-dimensional array of 2000-plus keys (one character/key

  16. XCPU2 process management system

    Energy Technology Data Exchange (ETDEWEB)

    Ionkov, Latchesar [Los Alamos National Laboratory; Van Hensbergen, Eric [IBM AUSTIN RESEARCH LAB

    2009-01-01

    Xcpu2 is a new process management system that allows the users to specify custom file system for a running job. Most cluster management systems enforce single software distribution running on all nodes. Xcpu2 allows programs running on the cluster to work in environment identical to the user's desktop, using the same versions of the libraries and tools the user installed locally, and accessing the configuration file in the same places they are located on the desktop. Xcpu2 builds on our earlier work with the Xcpu system. Like Xcpu, Xcpu2's process management interface is represented as a set of files exported by a 9P file server. It supports heterogeneous clusters and multiple head nodes. Unlike Xcpu, it uses pull instead of push model. In this paper we describe the Xcpu2 clustering model, its operation and how the per-job filesystem configuration can be used to solve some of the common problems when running a cluster.

  17. NDMAS System and Process Description

    Energy Technology Data Exchange (ETDEWEB)

    Larry Hull

    2012-10-01

    Experimental data generated by the Very High Temperature Reactor Program need to be more available to users in the form of data tables on Web pages that can be downloaded to Excel or in delimited text formats that can be used directly for input to analysis and simulation codes, statistical packages, and graphics software. One solution that can provide current and future researchers with direct access to the data they need, while complying with records management requirements, is the Nuclear Data Management and Analysis System (NDMAS). This report describes the NDMAS system and its components, defines roles and responsibilities, describes the functions the system performs, describes the internal processes the NDMAS team uses to carry out the mission, and describes the hardware and software used to meet Very High Temperature Reactor Program needs.

  18. Applying Information Hiding in VANETs to Covertly Report Misbehaving Vehicles

    OpenAIRE

    de Fuentes, Jose Maria; Blasco, Jorge; González-Tablas, Ana Isabel; González-Manzano, Lorena

    2014-01-01

    Vehicular ad hoc networks (VANETs) are a new communication scenario in which vehicles take an active part. Real-time reporting of misbehaving vehicles by surrounding ones is enabled by in-vehicle sensors and VANETs. Thus, sensors allow detecting the misbehavior whereas VANETs allow sending the report to the authority. Nevertheless, these reports should pass unnoticed by the reported driver to avoid his/her potential reprisals. Information hiding techniques could be used to allow vehicles to t...

  19. Enhancing Network Data Obliviousness in Trusted Execution Environment-based Stream Processing Systems

    KAUST Repository

    Alsibyani, Hassan M.

    2018-05-15

    Cloud computing usage is increasing and a common concern is the privacy and security of the data and computation. Third party cloud environments are not considered fit for processing private information because the data will be revealed to the cloud provider. However, Trusted Execution Environments (TEEs), such as Intel SGX, provide a way for applications to run privately and securely on untrusted platforms. Nonetheless, using a TEE by itself for stream processing systems is not sufficient since network communication patterns may leak properties of the data under processing. This work addresses leaky topology structures and suggests mitigation techniques for each of these. We create specific metrics to evaluate leaks occurring from the network patterns; the metrics measure information leaked when the stream processing system is running. We consider routing techniques for inter-stage communication in a streaming application to mitigate this data leakage. We consider a dynamic policy to change the mitigation technique depending on how much information is currently leaking. Additionally, we consider techniques to hide irregularities resulting from a filtering stage in a topology. We also consider leakages resulting from applications containing cycles. For each of the techniques, we explore their effectiveness in terms of the advantage they provide in overcoming the network leakage. The techniques are tested partly using simulations and some were implemented in a prototype SGX-based stream processing system.

  20. Unitary embedding for data hiding with the SVD

    Science.gov (United States)

    Bergman, Clifford; Davidson, Jennifer

    2005-03-01

    Steganography is the study of data hiding for the purpose of covert communication. A secret message is inserted into a cover file so that the very existence of the message is not apparent. Most current steganography algorithms insert data in the spatial or transform domains; common transforms include the discrete cosine transform, the discrete Fourier transform, and discrete wavelet transform. In this paper, we present a data-hiding algorithm that exploits a decomposition representation of the data instead of a frequency-based transformation of the data. The decomposition transform used is the singular value decomposition (SVD). The SVD of a matrix A is a decomposition A= USV' in which S is a nonnegative diagonal matrix and U and V are orthogonal matrices. We show how to use the orthogonal matrices in the SVD as a vessel in which to embed information. Several challenges were presented in order to accomplish this, and we give effective information-hiding using the SVD can be just as effective as using transform-based techniques. Furthermore, different problems arise when using the SVD than using a transform-based technique. We have applied the SVD to image data, but the technique can be formulated for other data types such as audio and video.

  1. Efficient reversible data hiding in encrypted H.264/AVC videos

    Science.gov (United States)

    Xu, Dawen; Wang, Rangding

    2014-09-01

    Due to the security and privacy-preserving requirements for cloud data management, it is sometimes desired that video content is accessible in an encrypted form. Reversible data hiding in the encrypted domain is an emerging technology, as it can perform data hiding in encrypted videos without decryption, which preserves the confidentiality of the content. Furthermore, the original cover can be losslessly restored after decryption and data extraction. An efficient reversible data hiding scheme for encrypted H.264/AVC videos is proposed. During H.264/AVC encoding, the intraprediction mode, motion vector difference, and the sign bits of the residue coefficients are encrypted using a standard stream cipher. Then, the data-hider who does not know the original video content, may reversibly embed secret data into the encrypted H.264/AVC video by using a modified version of the histogram shifting technique. A scale factor is utilized for selecting the embedding zone, which is scalable for different capacity requirements. With an encrypted video containing hidden data, data extraction can be carried out either in the encrypted or decrypted domain. In addition, real reversibility is realized so that data extraction and video recovery are free of any error. Experimental results demonstrate the feasibility and efficiency of the proposed scheme.

  2. Soliciting Performance, Hiding Bias: Whiteness and Librarianship

    Directory of Open Access Journals (Sweden)

    Angela Galvan

    2015-06-01

    Full Text Available Image by Flickr user tweng (CC BY-SA 2.0 In Brief: Despite the growing body of research on our professional demographics and multi-year diversity initiatives, librarianship in the United States remains overwhelmingly white. I suggest the interview process is a series of repetitive gestures designed to mimic and reinforce white middle class values, which ultimately influence […

  3. Musashi dynamic image processing system

    International Nuclear Information System (INIS)

    Murata, Yutaka; Mochiki, Koh-ichi; Taguchi, Akira

    1992-01-01

    In order to produce transmitted neutron dynamic images using neutron radiography, a real time system called Musashi dynamic image processing system (MDIPS) was developed to collect, process, display and record image data. The block diagram of the MDIPS is shown. The system consists of a highly sensitive, high resolution TV camera driven by a custom-made scanner, a TV camera deflection controller for optimal scanning, which adjusts to the luminous intensity and the moving speed of an object, a real-time corrector to perform the real time correction of dark current, shading distortion and field intensity fluctuation, a real time filter for increasing the image signal to noise ratio, a video recording unit and a pseudocolor monitor to realize recording in commercially available products and monitoring by means of the CRTs in standard TV scanning, respectively. The TV camera and the TV camera deflection controller utilized for producing still images can be applied to this case. The block diagram of the real-time corrector is shown. Its performance is explained. Linear filters and ranked order filters were developed. (K.I.)

  4. Hide unhairing and characterization of commercial enzymes used in leather manufacture

    Directory of Open Access Journals (Sweden)

    A Dettmer

    2011-09-01

    Full Text Available The enzymatic treatment of hides in tannery processes is a promising technology. However, the reaction kinetics of commercial enzymes available to the leather industry are not fully understood and their activities have been mainly determined with model proteins such as casein as substrate, which are not of direct relevance for cattle hides. Therefore, it is important to determine their activities on collagen and keratin, the main proteins of skin, in order to use these enzymes in leather processing. This work describes the study of five proteases, used commercially in tanneries, to assess their ability to act upon collagen and keratin and to determine their unhairing. Results showed that all commercial enzymes tested had more activity on collagen than on keratin. Unhairing was also tested and four out of the five enzymes tested showed some unhairing activity. Optima of the temperature and pH of the enzymes were very similar for all five enzymes, with maximal activities around 55ºC and pH 9 to 12, respectively.

  5. Human Infrastructure Detection and Exploitation (HIDE)

    Science.gov (United States)

    2009-11-01

    7  Figure 4. Picture of the fluxgate magnetometer and the coil-type magnetic sensor...may also be used to detect the usage of computer monitors. We used two different B-field sensors (figure 4), namely, (1) a fluxgate magnetometer ...collected at 256 samples per second. The three-axis fluxgate magnetometer used was an Applied Physics Systems Model 1540. It has the sensitivity

  6. ACHEMA '85: Process control systems

    International Nuclear Information System (INIS)

    Rosskopf, E.

    1985-01-01

    The strategy obviously adopted by the well-established manufacturers is to offer 'easy-to-handle' equipment to gain new customers, and there is a variety of new compact systems or personal computers being put on the market. The changes and improvements within the processing sector proceed more or less in silence; high-capacity storage devices and multiprocessor configurations are obtainable at a moderate price, offering a greater variety of basic functions and enhanced control possibilities. Redundancy problems are handled with greater flexibility, and batch programs are advancing. Data communication has become a common feature, transmission speed and bus length have been improved. Important improvements have been made with regard to data display; even medium-sized equipment now offer the possibility of making dynamic flow-sheets and reserving space for process history display, and the hierarchy of displays has been considerably simplified. The user software also has been made more easy, 'fill-in-the-blancs' is the prevailing motto for dialog configurations, and such big terms as process computer' or 'programming skill' are passing into oblivion. (orig./HP) [de

  7. Cryptic cuckoo eggs hide from competing cuckoos

    Science.gov (United States)

    Gloag, Ros; Keller, Laurie-Anne; Langmore, Naomi E.

    2014-01-01

    Interspecific arms races between cuckoos and their hosts have produced remarkable examples of mimicry, with parasite eggs evolving to match host egg appearance and so evade removal by hosts. Certain bronze-cuckoo species, however, lay eggs that are cryptic rather than mimetic. These eggs are coated in a low luminance pigment that camouflages them within the dark interiors of hosts' nests. We investigated whether cuckoo egg crypsis is likely to have arisen from the same coevolutionary processes known to favour egg mimicry. We added high and low luminance-painted eggs to the nests of large-billed gerygones (Gerygone magnirostris), a host of the little bronze-cuckoo (Chalcites minutillus). Gerygones rarely rejected either egg type, and did not reject natural cuckoo eggs. Cuckoos, by contrast, regularly removed an egg from clutches before laying their own and were five times more likely to remove a high luminance model than its low luminance counterpart. Given that we found one-third of all parasitized nests were exploited by multiple cuckoos, our results suggest that competition between cuckoos has been the key selective agent for egg crypsis. In such intraspecific arms races, crypsis may be favoured over mimicry because it can reduce the risk of egg removal to levels below chance. PMID:25122227

  8. Fractional Fourier domain optical image hiding using phase retrieval algorithm based on iterative nonlinear double random phase encoding.

    Science.gov (United States)

    Wang, Xiaogang; Chen, Wen; Chen, Xudong

    2014-09-22

    We present a novel image hiding method based on phase retrieval algorithm under the framework of nonlinear double random phase encoding in fractional Fourier domain. Two phase-only masks (POMs) are efficiently determined by using the phase retrieval algorithm, in which two cascaded phase-truncated fractional Fourier transforms (FrFTs) are involved. No undesired information disclosure, post-processing of the POMs or digital inverse computation appears in our proposed method. In order to achieve the reduction in key transmission, a modified image hiding method based on the modified phase retrieval algorithm and logistic map is further proposed in this paper, in which the fractional orders and the parameters with respect to the logistic map are regarded as encryption keys. Numerical results have demonstrated the feasibility and effectiveness of the proposed algorithms.

  9. Fundamentals of process intensification: A process systems engineering view

    DEFF Research Database (Denmark)

    Babi, Deenesh Kavi; Sales Cruz, Alfonso Mauricio; Gani, Rafiqul

    2016-01-01

    This chapter gives an overview of the fundamentals of process intensification from a process systems engineering point of view. The concept of process intensification, including process integration, is explained together with the drivers for applying process intensification, which can be achieved...

  10. An image hiding method based on cascaded iterative Fourier transform and public-key encryption algorithm

    Science.gov (United States)

    Zhang, B.; Sang, Jun; Alam, Mohammad S.

    2013-03-01

    An image hiding method based on cascaded iterative Fourier transform and public-key encryption algorithm was proposed. Firstly, the original secret image was encrypted into two phase-only masks M1 and M2 via cascaded iterative Fourier transform (CIFT) algorithm. Then, the public-key encryption algorithm RSA was adopted to encrypt M2 into M2' . Finally, a host image was enlarged by extending one pixel into 2×2 pixels and each element in M1 and M2' was multiplied with a superimposition coefficient and added to or subtracted from two different elements in the 2×2 pixels of the enlarged host image. To recover the secret image from the stego-image, the two masks were extracted from the stego-image without the original host image. By applying public-key encryption algorithm, the key distribution was facilitated, and also compared with the image hiding method based on optical interference, the proposed method may reach higher robustness by employing the characteristics of the CIFT algorithm. Computer simulations show that this method has good robustness against image processing.

  11. Privacy-Aware Image Encryption Based on Logistic Map and Data Hiding

    Science.gov (United States)

    Sun, Jianglin; Liao, Xiaofeng; Chen, Xin; Guo, Shangwei

    The increasing need for image communication and storage has created a great necessity for securely transforming and storing images over a network. Whereas traditional image encryption algorithms usually consider the security of the whole plain image, region of interest (ROI) encryption schemes, which are of great importance in practical applications, protect the privacy regions of plain images. Existing ROI encryption schemes usually adopt approximate techniques to detect the privacy region and measure the quality of encrypted images; however, their performance is usually inconsistent with a human visual system (HVS) and is sensitive to statistical attacks. In this paper, we propose a novel privacy-aware ROI image encryption (PRIE) scheme based on logistical mapping and data hiding. The proposed scheme utilizes salient object detection to automatically, adaptively and accurately detect the privacy region of a given plain image. After private pixels have been encrypted using chaotic cryptography, the significant bits are embedded into the nonprivacy region of the plain image using data hiding. Extensive experiments are conducted to illustrate the consistency between our automatic ROI detection and HVS. Our experimental results also demonstrate that the proposed scheme exhibits satisfactory security performance.

  12. A New Images Hiding Scheme Based on Chaotic Sequences

    Institute of Scientific and Technical Information of China (English)

    LIU Nian-sheng; GUO Dong-hui; WU Bo-xi; Parr G

    2005-01-01

    We propose a data hidding technique in a still image. This technique is based on chaotic sequence in the transform domain of covert image. We use different chaotic random sequences multiplied by multiple sensitive images, respectively, to spread the spectrum of sensitive images. Multiple sensitive images are hidden in a covert image as a form of noise. The results of theoretical analysis and computer simulation show the new hiding technique have better properties with high security, imperceptibility and capacity for hidden information in comparison with the conventional scheme such as LSB (Least Significance Bit).

  13. Partitioning and Scheduling DSP Applications with Maximal Memory Access Hiding

    Directory of Open Access Journals (Sweden)

    Sha Edwin Hsing-Mean

    2002-01-01

    Full Text Available This paper presents an iteration space partitioning scheme to reduce the CPU idle time due to the long memory access latency. We take into consideration both the data accesses of intermediate and initial data. An algorithm is proposed to find the largest overlap for initial data to reduce the entire memory traffic. In order to efficiently hide the memory latency, another algorithm is developed to balance the ALU and memory schedules. The experiments on DSP benchmarks show that the algorithms significantly outperform the known existing methods.

  14. Renewal Processes and Repairable Systems

    NARCIS (Netherlands)

    2003-01-01

    In this thesis we discuss the following topics: 1. Renewal reward processes The marginal distributions of renewal reward processes and its version, which we call in this thesis instantaneous reward processes, are derived. Our approach is based on the theory of point processes, especially Poisson

  15. A gamma cammera image processing system

    International Nuclear Information System (INIS)

    Chen Weihua; Mei Jufang; Jiang Wenchuan; Guo Zhenxiang

    1987-01-01

    A microcomputer based gamma camera image processing system has been introduced. Comparing with other systems, the feature of this system is that an inexpensive microcomputer has been combined with specially developed hardware, such as, data acquisition controller, data processor and dynamic display controller, ect. Thus the process of picture processing has been speeded up and the function expense ratio of the system raised

  16. Radioactive liquid waste processing system

    International Nuclear Information System (INIS)

    Noda, Tetsuya; Kuramitsu, Kiminori; Ishii, Tomoharu.

    1997-01-01

    The present invention provides a system for processing radioactive liquid wastes containing laundry liquid wastes, shower drains or radioactive liquid wastes containing chemical oxygen demand (COD) ingredients and oil content generated from a nuclear power plant. Namely, a collecting tank collects radioactive liquid wastes. A filtering device is connected to the exit of the collective tank. A sump tank is connected to the exit of the filtering device. A powdery active carbon supplying device is connected to the collecting tank. A chemical fluid tank is connected to the collecting tank and the filtering device by way of chemical fluid injection lines. Backwarding pipelines connect a filtered water flowing exit of the filtering device and the collecting tank. The chemical solution is stored in the chemical solution tank. Then, radioactive materials in radioactive liquid wastes generated from a nuclear power plant are removed by the filtering device. The water quality standard specified in environmental influence reports can be satisfied. In the filtering device, when the filtering flow rate is reduced, the chemical fluid is supplied from the chemical fluid tank to the filtering device to recover the filtering flow rate. (I.S.)

  17. DUAL-PROCESS, a highly reliable process control system

    International Nuclear Information System (INIS)

    Buerger, L.; Gossanyi, A.; Parkanyi, T.; Szabo, G.; Vegh, E.

    1983-02-01

    A multiprocessor process control system is described. During its development the reliability was the most important aspect because it is used in the computerized control of a 5 MW research reactor. DUAL-PROCESS is fully compatible with the earlier single processor control system PROCESS-24K. The paper deals in detail with the communication, synchronization, error detection and error recovery problems of the operating system. (author)

  18. A GA-Based Approach to Hide Sensitive High Utility Itemsets

    Directory of Open Access Journals (Sweden)

    Chun-Wei Lin

    2014-01-01

    Full Text Available A GA-based privacy preserving utility mining method is proposed to find appropriate transactions to be inserted into the database for hiding sensitive high utility itemsets. It maintains the low information loss while providing information to the data demanders and protects the high-risk information in the database. A flexible evaluation function with three factors is designed in the proposed approach to evaluate whether the processed transactions are required to be inserted. Three different weights are, respectively, assigned to the three factors according to users. Moreover, the downward closure property and the prelarge concept are adopted in the proposed approach to reduce the cost of rescanning database, thus speeding up the evaluation process of chromosomes.

  19. Synthesis of Citric-Acrylate Oligomer and its in-Situ Reaction with Chrome Tanned Collagen (hide powder)

    International Nuclear Information System (INIS)

    Haroun, A.A.; Masoud, R.A.; Bronco, S.; Ciardelli, F.

    2005-01-01

    The purpose of this study was to formulate the new combined system of acrylic and citric acids, which has been prepared by free radical polymerization and esterification reaction at the same time to form citric acrylate (CAC) oligomer through ester linkage and low molecular weight (Mw 2241), in compared with polyacrylic acid. The chemical structure and the reaction mechanism of this oligomer were confirmed by different spectroscopic tools (1 H , 13 C-NMR, ATR-IR), gel permeation chromatography and thermogravimetric analysis (TGA/DTA). The problem of the effect of the masking agents in the chrome tanning of the collagen and the pickling of the hide has been approached from the study of the hydrothermal and mechanical properties, using this new eco-friendly oligomer, which was carried out in-situ treated/grafted chrome tanned collagen (hide powder), and pickled hide. The microemulsion grafting copolymerization of (CAC) using 2.2-azo-bis isobutyronitrile (ABIN), via direct coupling reaction, onto the chrome tanned collagen showed that the free amino groups of the collagen were considered to be a potential site for the in-situ reaction with (CAC) oligomer. Also, using of citric-acrylate (CAC) oligomer, during chrome tanning of leather, instead of the traditional strong acids (sulfuric, hydrochloric and formic) resulted in significant improvement in chrome exhaustion and physical properties

  20. Error Concealment using Data Hiding in Wireless Image Transmission

    Directory of Open Access Journals (Sweden)

    A. Akbari

    2016-11-01

    Full Text Available The transmission of image/video over unreliable medium like wireless networks generally results in receiving a damaged image/video. In this paper, a novel image error concealment scheme based on the idea of data hiding and Set Partitioning In Hierarchical Trees (SPIHT coding is investigated. In the encoder side, the coefficients of wavelet decomposed image are partitioned into “perfect trees”. The SPIHT coder is applied to encode each per-fect tree independently and generate an efficiently compressed reference code. This code is then embedded into the coefficients of another perfect tree which is located in a different place, using a robust data hiding scheme based on Quantization Index Modulation (QIM. In the decoder side, if a part of the image is lost, the algorithm extracts the embedded code for reference trees related to this part to reconstruct the lost information. Performance results show that for an error prone transmission, the proposed technique is promising to efficiently conceal the lost areas of the transmitted image.

  1. An Algorithm for Data Hiding in Radiographic Images and ePHI/R Application

    Directory of Open Access Journals (Sweden)

    Aqsa Rashid

    2018-01-01

    Full Text Available Telemedicine is the use of Information and Communication Technology (ICT for clinical health care from a distance. The exchange of radiographic images and electronic patient health information/records (ePHI/R for diagnostic purposes has the risk of confidentiality, ownership identity, and authenticity. In this paper, a data hiding technique for ePHI/R is proposed. The color information in the cover image is used for key generation, and stego-images are produced with ideal case. As a result, the whole stego-system is perfectly secure. This method includes the features of watermarking and steganography techniques. The method is applied to radiographic images. For the radiographic images, this method resembles watermarking, which is an ePHI/R data system. Experiments show promising results for the application of this method to radiographic images in ePHI/R for both transmission and storage purpose.

  2. Method for Business Process Management System Selection

    OpenAIRE

    Westelaken, van de, Thijs; Terwee, Bas; Ravesteijn, Pascal

    2013-01-01

    In recent years business process management (BPM) and specifically information systems that support the analysis, design and execution of processes (also called business process management systems (BPMS)) are getting more attention. This has lead to an increase in research on BPM and BPMS. However the research on BPMS is mostly focused on the architecture of the system and how to implement such systems. How to select a BPM system that fits the strategy and goals of a specific organization is ...

  3. NASA System Engineering Design Process

    Science.gov (United States)

    Roman, Jose

    2011-01-01

    This slide presentation reviews NASA's use of systems engineering for the complete life cycle of a project. Systems engineering is a methodical, disciplined approach for the design, realization, technical management, operations, and retirement of a system. Each phase of a NASA project is terminated with a Key decision point (KDP), which is supported by major reviews.

  4. Social Network Supported Process Recommender System

    Directory of Open Access Journals (Sweden)

    Yanming Ye

    2014-01-01

    Full Text Available Process recommendation technologies have gained more and more attention in the field of intelligent business process modeling to assist the process modeling. However, most of the existing technologies only use the process structure analysis and do not take the social features of processes into account, while the process modeling is complex and comprehensive in most situations. This paper studies the feasibility of social network research technologies on process recommendation and builds a social network system of processes based on the features similarities. Then, three process matching degree measurements are presented and the system implementation is discussed subsequently. Finally, experimental evaluations and future works are introduced.

  5. Social network supported process recommender system.

    Science.gov (United States)

    Ye, Yanming; Yin, Jianwei; Xu, Yueshen

    2014-01-01

    Process recommendation technologies have gained more and more attention in the field of intelligent business process modeling to assist the process modeling. However, most of the existing technologies only use the process structure analysis and do not take the social features of processes into account, while the process modeling is complex and comprehensive in most situations. This paper studies the feasibility of social network research technologies on process recommendation and builds a social network system of processes based on the features similarities. Then, three process matching degree measurements are presented and the system implementation is discussed subsequently. Finally, experimental evaluations and future works are introduced.

  6. The Groningen image processing system

    International Nuclear Information System (INIS)

    Allen, R.J.; Ekers, R.D.; Terlouw, J.P.

    1985-01-01

    This paper describes an interactive, integrated software and hardware computer system for the reduction and analysis of astronomical images. A short historical introduction is presented before some examples of the astonomical data currently handled by the system are shown. A description is given of the present hardware and software structure. The system is illustrated by describing its appearance to the user, to the applications programmer, and to the system manager. Some quantitative information on the size and cost of the system is given, and its good and bad features are discussed

  7. Process control using modern systems of information processing

    International Nuclear Information System (INIS)

    Baldeweg, F.

    1984-01-01

    Modern digital automation techniques allow the application of demanding types of process control. These types of process control are characterized by their belonging to higher levels in a multilevel model. Functional and technical aspects of the performance of digital automation plants are presented and explained. A modern automation system is described considering special procedures of process control (e.g. real time diagnosis)

  8. Reversible data hiding for image based on histogram modification of wavelet coefficients

    NARCIS (Netherlands)

    Liang, Xiaoping; Wu, Xiaoyun; Huang, Jiwu; Hao, Y.; Liu, J.; Wang, Y.; Cheung, Y.; Yin, H.; Jiao, L.; Ma, J.; Jiao, Y.C.

    2005-01-01

    Reversible data hiding has drawn intensive attention recently. Reversibility means to embed data into digital media and restore the original media from marked media losslessly. Reversible data hiding technique is desired in sensitive applications that require no permanent loss of signal fidelity. In

  9. A method for removing adobe-type manure from hides using an oxidizing agent

    Science.gov (United States)

    Adobe-type (hardened) manure attached to bovine hair is a major source of meat contamination, hide quality deterioration, and devalued leather products. Therefore, it is important to develop cleaning solutions that can rapidly remove adobe-type manure to improve the quality of hides delivered to tan...

  10. Process information systems in nuclear reprocessing

    International Nuclear Information System (INIS)

    Jaeschke, A.; Keller, H.; Orth, H.

    1987-01-01

    On a production management level, a process information system in a nuclear reprocessing plant (NRP) has to fulfill conventional operating functions and functions for nuclear material surveillance (safeguards). Based on today's state of the art of on-line process control technology, the progress in hardware and software technology allows to introduce more process-specific intelligence into process information systems. Exemplified by an expert-system-aided laboratory management system as component of a NRP process information system, the paper demonstrates that these technologies can be applied already. (DG) [de

  11. Super-rapid medical film processing system

    International Nuclear Information System (INIS)

    Honda, C.; Iwata, M.; Nozaki, H.

    1988-01-01

    A new super-rapid medical film processing system cuts processing time from 90 to 45 seconds, a critical advantage in traumatic injury, surgical operation, and other time-vital applications. The system consists of new films new processing chemicals (developer and fixer), and a new high-speed medical film processor. The system's creation is made possible by three new technologies. In film, multilayered monodispersed grains reduce processing time. In processing chemicals, an innovative design maximizes processing speed. And in the processor itself, a new drying apparatus increases drying efficiency. Together, these technologies achieve 45-second processing without degradation of image quality

  12. A novel attack method about double-random-phase-encoding-based image hiding method

    Science.gov (United States)

    Xu, Hongsheng; Xiao, Zhijun; Zhu, Xianchen

    2018-03-01

    By using optical image processing techniques, a novel text encryption and hiding method applied by double-random phase-encoding technique is proposed in the paper. The first step is that the secret message is transformed into a 2-dimension array. The higher bits of the elements in the array are used to fill with the bit stream of the secret text, while the lower bits are stored specific values. Then, the transformed array is encoded by double random phase encoding technique. Last, the encoded array is embedded on a public host image to obtain the image embedded with hidden text. The performance of the proposed technique is tested via analytical modeling and test data stream. Experimental results show that the secret text can be recovered either accurately or almost accurately, while maintaining the quality of the host image embedded with hidden data by properly selecting the method of transforming the secret text into an array and the superimposition coefficient.

  13. Radiation processing of aqueous systems

    International Nuclear Information System (INIS)

    Gehringer, P.

    1997-09-01

    Groundwater contaminated with about 60 μg/L perchloroethylene (PCE) is purified by a combined ozone/electron beam irradiation process for subsequent use as drinking water. The design of the first commercial plant for such a groundwater remediation having a capacity of 108 m 3 /h is described. The mechanism of the combined ozone/electron beam process for PCE decomposition is discussed with respect to other ozone based advanced oxidation processes like ozone/U.V. and ozone/hydrogen peroxide. The formation of trace amounts of trichloroacetic acid as the only organic by-product in all these processes has been interpreted as an indication that PCE decomposition proceeds via the same mechanism in all cases. (author)

  14. Library Information-Processing System

    Science.gov (United States)

    1985-01-01

    System works with Library of Congress MARC II format. System composed of subsystems that provide wide range of library informationprocessing capabilities. Format is American National Standards Institute (ANSI) format for machine-readable bibliographic data. Adaptable to any medium-to-large library.

  15. 9 CFR 310.10 - Carcasses with skin or hide on; cleaning before evisceration; removal of larvae of Hypodermae...

    Science.gov (United States)

    2010-01-01

    ..., DEPARTMENT OF AGRICULTURE AGENCY ORGANIZATION AND TERMINOLOGY; MANDATORY MEAT AND POULTRY PRODUCTS INSPECTION... pathological skin conditions. When a carcass is to be dressed with the skin or hide left on, the skin or hide...

  16. Effect of Some Sudanese Traditional Hot Iron Branding on Cattle Hide Quality

    Directory of Open Access Journals (Sweden)

    Rehab Eltejani Abdelkarim

    2016-12-01

    Full Text Available This study was designed in order to assess and evaluate the effect of hot iron branding on cattle hide quality. 62 shapes of hot iron branding were detected and classified. Branding damage was evaluated depending on: purpose of application, location in the animal body, branding area, tribe which applied and hide degree. The results showed that, Baggara tribes branding were causing the greater damage on cattle hides; where 71.4% of its brands placed in the abdominal and animal back area (middle of the hide; in proportion to Misseriya Zuraq tribes (68.4%. According to the location of branding, the less tribe that causing damages to the cattle hides were Darfur tribes (14.3%. In terms of branding area Darfur tribes were causing the most branding damages where 42.8% of its brands on cattle hides were between 20-30cm, followed by Baggara tribes where 57.1% of its brands were between 10-20cm then Misseriya Zuraq tribes by 52.6%, and finally North Kordofan tribes of 37.5%. grading of cattle hides depending on the presence of the brand marks the study revealed that, Misseriya Zuraq tribe's brands were obtained the highest percentage (89.4% of the rejected hides (Scarto= 4 and 5 grades, when compared with North Kordofan tribes (87.5%. For commercial reason brand's were mostly done in the area of 5-10cm but, their effect on cattle hide quality was greater, where 81% of the hides were classified as Scarto.

  17. Adaptive processes in economic systems

    CERN Document Server

    Murphy, Roy E

    1965-01-01

    In this book, we study theoretical and practical aspects of computing methods for mathematical modelling of nonlinear systems. A number of computing techniques are considered, such as methods of operator approximation with any given accuracy; operator interpolation techniques including a non-Lagrange interpolation; methods of system representation subject to constraints associated with concepts of causality, memory and stationarity; methods of system representation with an accuracy that is the best within a given class of models; methods of covariance matrix estimation;. methods for low-rank m

  18. Information systems process and practice

    CERN Document Server

    Urquhart, Christine; Tbaishat, Dina; Yeoman, Alison

    2017-01-01

    This book adopts a holistic interpretation of information architecture, to offer a variety of methods, tools, and techniques that may be used when designing websites and information systems that support workflows and what people require when 'managing information'.

  19. No place to hide: when shame causes proselfs to cooperate.

    Science.gov (United States)

    Declerck, Carolyn Henriette; Boone, Christophe; Kiyonari, Toko

    2014-01-01

    Shame is considered a social emotion with action tendencies that elicit socially beneficial behavior. Yet, unlike other social emotions, prior experimental studies do not indicate that incidental shame boosts prosocial behavior. Based on the affect as information theory, we hypothesize that incidental feelings of shame can increase cooperation, but only for self-interested individuals, and only in a context where shame is relevant with regards to its action tendency. To test this hypothesis, cooperation levels are compared between a simultaneous prisoner's dilemma (where "defect" may result from multiple motives) and a sequential prisoner's dilemma (where "second player defect" is the result of intentional greediness). As hypothesized, shame positively affected proselfs in a sequential prisoner's dilemma. Hence ashamed proselfs become inclined to cooperate when they believe they have no way to hide their greediness, and not necessarily because they want to make up for earlier wrong-doing.

  20. Universal Steganalysis of Data Hiding in Grayscale Images

    Institute of Scientific and Technical Information of China (English)

    HUANG Ji-feng; LIN Jia-jun

    2007-01-01

    This paper proposed an universal steganalysis program based on quantification attack which can detect several kinds of data hiding algorithms for grayscale images. In practice, most techniques produce stego images that are perceptually identical to the cover images but exhibit statistical irregularities that distinguish them from cover images. Attacking the suspicious images using the quantization method, we can obtain statistically different from embedded-and-quantization attacked images and from quantization attacked-but-not-embedded sources. We have developed a technique based on one-class SVM for discriminating between cover-images and stego-images. Simulation results show our approach is able to distinguish between cover and stego images with reasonable accuracy.

  1. Unconventional thermal cloak hiding an object outside the cloak

    Science.gov (United States)

    Gao, Y.; Huang, J. P.

    2013-11-01

    All the thermal cloaks reported in the literature can be used to thermally hide an object inside the cloak. However, a common limitation of this kind of thermal cloaks is that the cloaked object cannot feel the external heat flow since it is located inside the cloak; thus we call these cloaks “conventional thermal cloaks”. Here we manage to overcome this limitation by exploiting a class of unconventional thermal cloaks that enable the cloaked object to feel the external heat flow. Our finite-element simulations in two dimensions show the desired cloaking effect. The underlying mechanism originates from the complementary effect of thermal metamaterials with negative thermal conductivities. This work suggests a different method to design thermal devices where heat conduction can be controlled at will.

  2. Analysis Of Aspects Of Messages Hiding In Text Environments

    Directory of Open Access Journals (Sweden)

    Afanasyeva Olesya

    2015-09-01

    Full Text Available In the work are researched problems, which arise during hiding of messages in text environments, being transmitted by electronic communication channels and the Internet. The analysis of selection of places in text environment (TE, which can be replaced by word from the message is performed. Selection and replacement of words in the text environment is implemented basing on semantic analysis of text fragment, consisting of the inserted word, and its environment in TE. For implementation of such analysis is used concept of semantic parameters of words coordination and semantic value of separate word. Are used well-known methods of determination of values of these parameters. This allows moving from quality level to quantitative level analysis of text fragments semantics during their modification by word substitution. Invisibility of embedded messages is ensured by providing preset values of the semantic cooperation parameter deviations.

  3. Method for Business Process Management System Selection

    NARCIS (Netherlands)

    Thijs van de Westelaken; Bas Terwee; Pascal Ravesteijn

    2013-01-01

    In recent years business process management (BPM) and specifically information systems that support the analysis, design and execution of processes (also called business process management systems (BPMS)) are getting more attention. This has lead to an increase in research on BPM and BPMS. However

  4. Integrating system safety into the basic systems engineering process

    Science.gov (United States)

    Griswold, J. W.

    1971-01-01

    The basic elements of a systems engineering process are given along with a detailed description of what the safety system requires from the systems engineering process. Also discussed is the safety that the system provides to other subfunctions of systems engineering.

  5. On Distributed Port-Hamiltonian Process Systems

    NARCIS (Netherlands)

    Lopezlena, Ricardo; Scherpen, Jacquelien M.A.

    2004-01-01

    In this paper we use the term distributed port-Hamiltonian Process Systems (DPHPS) to refer to the result of merging the theory of distributed Port-Hamiltonian systems (DPHS) with the theory of process systems (PS). Such concept is useful for combining the systematic interconnection of PHS with the

  6. Vision Systems Illuminate Industrial Processes

    Science.gov (United States)

    2013-01-01

    When NASA designs a spacecraft to undertake a new mission, innovation does not stop after the design phase. In many cases, these spacecraft are firsts of their kind, requiring not only remarkable imagination and expertise in their conception but new technologies and methods for their manufacture. In the realm of manufacturing, NASA has from necessity worked on the cutting-edge, seeking new techniques and materials for creating unprecedented structures, as well as capabilities for reducing the cost and increasing the efficiency of existing manufacturing technologies. From friction stir welding enhancements (Spinoff 2009) to thermoset composites (Spinoff 2011), NASA s innovations in manufacturing have often transferred to the public in ways that enable the expansion of the Nation s industrial productivity. NASA has long pursued ways of improving upon and ensuring quality results from manufacturing processes ranging from arc welding to thermal coating applications. But many of these processes generate blinding light (hence the need for special eyewear during welding) that obscures the process while it is happening, making it difficult to monitor and evaluate. In the 1980s, NASA partnered with a company to develop technology to address this issue. Today, that collaboration has spawned multiple commercial products that not only support effective manufacturing for private industry but also may support NASA in the use of an exciting, rapidly growing field of manufacturing ideal for long-duration space missions.

  7. Robotic system for process sampling

    International Nuclear Information System (INIS)

    Dyches, G.M.

    1985-01-01

    A three-axis cartesian geometry robot for process sampling was developed at the Savannah River Laboratory (SRL) and implemented in one of the site radioisotope separations facilities. Use of the robot reduces personnel radiation exposure and contamination potential by routinely handling sample containers under operator control in a low-level radiation area. This robot represents the initial phase of a longer term development program to use robotics for further sample automation. Preliminary design of a second generation robot with additional capabilities is also described. 8 figs

  8. Radioactive waste gas processing systems

    International Nuclear Information System (INIS)

    Kita, Kaoru; Minemoto, Masaki; Takezawa, Kazuaki.

    1981-01-01

    Purpose: To effectively separate and remove only hydrogen from hydrogen gas-containing radioactive waste gases produced from nuclear power plants without using large scaled facilities. Constitution: From hydrogen gas-enriched waste gases which contain radioactive rare gases (Kr, Xe) sent from the volume control tank of a chemical volume control system, only the hydrogen is separated in a hydrogen separator using palladium alloy membrane and rare gases are concentrated, volume-decreased and then stored. In this case, an activated carbon adsorption device is connected at its inlet to the radioactive gas outlet of the hydrogen separator and opened at its outlet to external atmosphere. In this system, while only the hydrogen gas permeates through the palladium alloy membrane, other gases are introduced, without permeation, into the activated carbon adsorption device. Then, the radioactive rare gases are decayed by the adsorption on the activated carbon and then released to the external atmosphere. (Furukawa, Y.)

  9. A Classification Scheme for Production System Processes

    DEFF Research Database (Denmark)

    Sørensen, Daniel Grud Hellerup; Brunø, Thomas Ditlev; Nielsen, Kjeld

    2018-01-01

    Manufacturing companies often have difficulties developing production platforms, partly due to the complexity of many production systems and difficulty determining which processes constitute a platform. Understanding production processes is an important step to identifying candidate processes...... for a production platform based on existing production systems. Reviewing a number of existing classifications and taxonomies, a consolidated classification scheme for processes in production of discrete products has been outlined. The classification scheme helps ensure consistency during mapping of existing...

  10. Design of penicillin fermentation process simulation system

    Science.gov (United States)

    Qi, Xiaoyu; Yuan, Zhonghu; Qi, Xiaoxuan; Zhang, Wenqi

    2011-10-01

    Real-time monitoring for batch process attracts increasing attention. It can ensure safety and provide products with consistent quality. The design of simulation system of batch process fault diagnosis is of great significance. In this paper, penicillin fermentation, a typical non-linear, dynamic, multi-stage batch production process, is taken as the research object. A visual human-machine interactive simulation software system based on Windows operation system is developed. The simulation system can provide an effective platform for the research of batch process fault diagnosis.

  11. Integrated Monitoring System of Production Processes

    Directory of Open Access Journals (Sweden)

    Oborski Przemysław

    2016-12-01

    Full Text Available Integrated monitoring system for discrete manufacturing processes is presented in the paper. The multilayer hardware and software reference model was developed. Original research are an answer for industry needs of the integration of information flow in production process. Reference model corresponds with proposed data model based on multilayer data tree allowing to describe orders, products, processes and save monitoring data. Elaborated models were implemented in the integrated monitoring system demonstrator developed in the project. It was built on the base of multiagent technology to assure high flexibility and openness on applying intelligent algorithms for data processing. Currently on the base of achieved experience an application integrated monitoring system for real production system is developed. In the article the main problems of monitoring integration are presented, including specificity of discrete production, data processing and future application of Cyber-Physical-Systems. Development of manufacturing systems is based more and more on taking an advantage of applying intelligent solutions into machine and production process control and monitoring. Connection of technical systems, machine tools and manufacturing processes monitoring with advanced information processing seems to be one of the most important areas of near future development. It will play important role in efficient operation and competitiveness of the whole production system. It is also important area of applying in the future Cyber-Physical-Systems that can radically improve functionally of monitoring systems and reduce the cost of its implementation.

  12. Sensitive plant (Mimosa pudica hiding time depends on individual and state

    Directory of Open Access Journals (Sweden)

    Sarah Reed-Guy

    2017-07-01

    Full Text Available The decisions animals make to adjust their antipredator behavior to rapidly changing conditions have been well studied. Inducible defenses in plants are an antipredator behavior that acts on a longer time scale, but sensitive plants, Mimosa pudica, have a much more rapid antipredator response; they temporarily close their leaves when touched. The time they remain closed is defined as hiding time. We studied hiding time in sensitive plants and found that individual plants differed significantly in their hiding times. We then showed that the effect of individual explained substantial variation in hiding time on a short time scale. Finally, on a longer time scale, individuality persisted but the amount of variation attributed to individual decreased. We hypothesized that variation in plant condition might explain this change. We therefore manipulated sunlight availability and quantified hiding time. When deprived of light for 6 h, sensitive plants significantly shortened their hiding times. But when only half a plant was deprived of light, hiding times on the deprived half and light exposed half were not significantly different. This suggests that overall condition best explains variation in sensitive plant antipredator behavior. Just like in animals, sensitive plant antipredator behavior is condition dependent, and, just like in animals, a substantial amount of the remaining variation is explained by individual differences between plants. Thus, models designed to predict plasticity in animal behavior may be successfully applied to understand behavior in other organisms, including plants.

  13. Knowledge management: processes and systems | Igbinovia ...

    African Journals Online (AJOL)

    Knowledge management: processes and systems. ... Information Impact: Journal of Information and Knowledge Management ... observation, role reversal technique, and discussion forums as well as the forms of knowledge representation to include report writing, database management system and institutional repositories.

  14. IDAPS (Image Data Automated Processing System) System Description

    Science.gov (United States)

    1988-06-24

    This document describes the physical configuration and components used in the image processing system referred to as IDAPS (Image Data Automated ... Processing System). This system was developed by the Environmental Research Institute of Michigan (ERIM) for Eglin Air Force Base. The system is designed

  15. Gaseous radioactive waste processing system

    International Nuclear Information System (INIS)

    Onizawa, Hideo.

    1976-01-01

    Object: To prevent explosion of hydrogen gas within gaseous radioactive waste by removing the hydrogen gas by means of a hydrogen absorber. Structure: A coolant extracted from a reactor cooling system is sprayed by nozzle into a gaseous phase (hydrogen) portion within a tank, thus causing slipping of radioactive rare gas. The gaseous radioactive waste rich in hydrogen, which is purged in the tank, is forced by a waste gas compressor into a hydrogen occlusion device. The hydrogen occlusion device is filled with hydrogen occluding agents such as Mg, Mg-Ni alloy, V-Nb alloy, La-Ni alloy and so forth, and hydrogen in the waste gas is removed through reaction to produce hydrogen metal. The gaseous radioactive waste, which is deprived of hydrogen and reduced in volume, is stored in an attenuation tank. The hydrogen stored in the hydrogen absorber is released and used again as purge gas. (Horiuchi, T.)

  16. Soil remediation process and system

    International Nuclear Information System (INIS)

    Monlux, K.J.

    1992-01-01

    This patent describes a process for remediation of soil containing up to about 30,000 ppm hydrocarbon contaminants. It comprises: providing hydrocarbon-contaminated soil in a divided condition of minus 1 1/2 double-prime to a first confined zone where it is exposed to an open flame; heating while agitating the contaminated soil in an oxidizing atmosphere in the first zone to a temperature below soil ignition within a range of from about 375 degrees F. to about 750 degrees F. for a time sufficient to drive off as vapors a substantial percentage of the hydrocarbon contaminates from the soil; passing hot gases containing the hydrocarbon contaminates from the soil; passing hot gases containing the hydrocarbon vapors from the first zone to a second zone; recovering heat from the hot gases in the second zone to condense a substantial percentage of the hydrocarbon vapors as liquid hydrocarbons; recovering the liquid hydrocarbons; and removing the soil from the first zone as remediated soil having below about 1000 ppm hydrocarbon contaminants

  17. Marine living thing processing system

    International Nuclear Information System (INIS)

    Toyoshi, Takanori; Yanagisawa, Takao; Nakamura, Toshio; Ueda, Kiyokatsu; Terada, Takeshi.

    1994-01-01

    Marine living things collected upon cleaning of a seawater intake channel are sent to a solid/liquid separator. Discharged liquids containing separated sludges enter a coagulation/precipitation vessel. Condensed sludges precipitated in the vessel are sent to a dehydrator and converted into dehydrated cakes. On the other hand, supernatants discharged from the coagulation/precipitation vessel are sent to an ultra-filtration vessel and an active carbon vessel and then discharged to the sea area at improved the water quality. Further, the dehydrated cakes comprising condensed sluges are dried by a dryer, burnt in an incinerator and then processed as wastes. On the other hand, solid materials separated by the solid/liquid separator such as shells, are crushed finely by the crusher, then dried by an air stream dryer, baked in a high temperature baking furnace to form quick lime. The quick lime is sent to a digester and modified by hydration into slaked lime and it is shipped as slaked lime products. This can simplify the control for the operation and reduce the running cost. Further, resources of marine living (shells) can be utilized. (I.N.)

  18. Improving Process Heating System Performance v3

    Energy Technology Data Exchange (ETDEWEB)

    None

    2016-04-11

    Improving Process Heating System Performance: A Sourcebook for Industry is a development of the U.S. Department of Energy (DOE) Advanced Manufacturing Office (AMO) and the Industrial Heating Equipment Association (IHEA). The AMO and IHEA undertook this project as part of an series of sourcebook publications developed by AMO on energy-consuming industrial systems, and opportunities to improve performance. Other topics in this series include compressed air systems, pumping systems, fan systems, steam systems, and motors and drives

  19. Information Processing Capacity of Dynamical Systems

    Science.gov (United States)

    Dambre, Joni; Verstraeten, David; Schrauwen, Benjamin; Massar, Serge

    2012-07-01

    Many dynamical systems, both natural and artificial, are stimulated by time dependent external signals, somehow processing the information contained therein. We demonstrate how to quantify the different modes in which information can be processed by such systems and combine them to define the computational capacity of a dynamical system. This is bounded by the number of linearly independent state variables of the dynamical system, equaling it if the system obeys the fading memory condition. It can be interpreted as the total number of linearly independent functions of its stimuli the system can compute. Our theory combines concepts from machine learning (reservoir computing), system modeling, stochastic processes, and functional analysis. We illustrate our theory by numerical simulations for the logistic map, a recurrent neural network, and a two-dimensional reaction diffusion system, uncovering universal trade-offs between the non-linearity of the computation and the system's short-term memory.

  20. Information Processing Capacity of Dynamical Systems

    Science.gov (United States)

    Dambre, Joni; Verstraeten, David; Schrauwen, Benjamin; Massar, Serge

    2012-01-01

    Many dynamical systems, both natural and artificial, are stimulated by time dependent external signals, somehow processing the information contained therein. We demonstrate how to quantify the different modes in which information can be processed by such systems and combine them to define the computational capacity of a dynamical system. This is bounded by the number of linearly independent state variables of the dynamical system, equaling it if the system obeys the fading memory condition. It can be interpreted as the total number of linearly independent functions of its stimuli the system can compute. Our theory combines concepts from machine learning (reservoir computing), system modeling, stochastic processes, and functional analysis. We illustrate our theory by numerical simulations for the logistic map, a recurrent neural network, and a two-dimensional reaction diffusion system, uncovering universal trade-offs between the non-linearity of the computation and the system's short-term memory. PMID:22816038

  1. Dynamics Explorer science data processing system

    International Nuclear Information System (INIS)

    Smith, P.H.; Freeman, C.H.; Hoffman, R.A.

    1981-01-01

    The Dynamics Explorer project has acquired the ground data processing system from the Atmosphere Explorer project to provide a central computer facility for the data processing, data management and data analysis activities of the investigators. Access to this system is via remote terminals at the investigators' facilities, which provide ready access to the data sets derived from groups of instruments on both spacecraft. The original system has been upgraded with both new hardware and enhanced software systems. These new systems include color and grey scale graphics terminals, an augmentation computer, micrographies facility, a versatile data base with a directory and data management system, and graphics display software packages. (orig.)

  2. Sticky continuous processes have consistent price systems

    DEFF Research Database (Denmark)

    Bender, Christian; Pakkanen, Mikko; Sayit, Hasanjan

    Under proportional transaction costs, a price process is said to have a consistent price system, if there is a semimartingale with an equivalent martingale measure that evolves within the bid-ask spread. We show that a continuous, multi-asset price process has a consistent price system, under...

  3. Data processing system for NBT experiments

    International Nuclear Information System (INIS)

    Takahashi, C.; Hosokawa, M.; Shoji, T.; Fujiwara, M.

    1981-07-01

    Data processing system for Nagoya Bumpy Torus (NBT) has been developed. Since plasmas are produced and heated in steady state by use of high power microwaves, sampling and processing data prevails in long time scale on the order of one minute. The system, which consists of NOVA 3/12 minicomputer and many data acquisition devices, is designed to sample and process large amount of data before the next discharge starts. Several features of such long time scale data processing system are described in detail. (author)

  4. Thermal processing systems for TRU mixed waste

    International Nuclear Information System (INIS)

    Eddy, T.L.; Raivo, B.D.; Anderson, G.L.

    1992-01-01

    This paper presents preliminary ex situ thermal processing system concepts and related processing considerations for remediation of transuranic (TRU)-contaminated wastes (TRUW) buried at the Radioactive Waste Management Complex (RWMC) of the Idaho National Engineering Laboratory (INEL). Anticipated waste stream components and problems are considered. Thermal processing conditions required to obtain a high-integrity, low-leachability glass/ceramic final waste form are considered. Five practical thermal process system designs are compared. Thermal processing of mixed waste and soils with essentially no presorting and using incineration followed by high temperature melting is recommended. Applied research and development necessary for demonstration is also recommended

  5. Process Information System - Nuclear Power Plant Krsko

    International Nuclear Information System (INIS)

    Mandic, D.; Barbic, B.; Linke, B.; Colak, I.

    1998-01-01

    Original NEK design was using several Process Computer Systems (PCS) for both process control and process supervision. PCS were built by different manufacturers around different hardware and software platforms. Operational experience and new regulatory requirements imposed new technical and functional requirements on the PCS. Requirements such as: - Acquisition of new signals from the technological processes and environment - Implementation of new application programs - Significant improvement of MMI (Man Machine Interface) - Process data transfer to other than Main Control Room (MCR) locations - Process data archiving and capability to retrieve same data for future analysis were impossible to be implemented within old systems. In order to satisfy new requirements, NEK has decided to build new Process Information System (PIS). During the design and construction of the PIS Project Phase I, in addition to the main foreign contractor, there was significant participation of local architect engineering and construction companies. This paper presents experience of NEK and local partners. (author)

  6. Power processing systems for ion thrusters.

    Science.gov (United States)

    Herron, B. G.; Garth, D. R.; Finke, R. C.; Shumaker, H. A.

    1972-01-01

    The proposed use of ion thrusters to fulfill various communication satellite propulsion functions such as east-west and north-south stationkeeping, attitude control, station relocation and orbit raising, naturally leads to the requirement for lightweight, efficient and reliable thruster power processing systems. Collectively, the propulsion requirements dictate a wide range of thruster power levels and operational lifetimes, which must be matched by the power processing. This paper will discuss the status of such power processing systems, present system design alternatives and project expected near future power system performance.

  7. Multidisciplinary systems engineering architecting the design process

    CERN Document Server

    Crowder, James A; Demijohn, Russell

    2016-01-01

    This book presents Systems Engineering from a modern, multidisciplinary engineering approach, providing the understanding that all aspects of systems design, systems, software, test, security, maintenance and the full life-cycle must be factored in to any large-scale system design; up front, not factored in later. It lays out a step-by-step approach to systems-of-systems architectural design, describing in detail the documentation flow throughout the systems engineering design process. It provides a straightforward look and the entire systems engineering process, providing realistic case studies, examples, and design problems that will enable students to gain a firm grasp on the fundamentals of modern systems engineering.  Included is a comprehensive design problem that weaves throughout the entire text book, concluding with a complete top-level systems architecture for a real-world design problem.

  8. Digital processing data communication systems (bus systems). Digitale Prozessdaten-Kommunikations-Systeme (Bus Systeme)

    Energy Technology Data Exchange (ETDEWEB)

    Fleck, K

    1980-01-01

    After an introduction to the technology of digital processing data communication systems there are the following chapters: digital communication of processing data in automation technology, the technology of biserial communication, the implementaiton of a bus system, the data transmission of the TDC-2000 system of Honeywell's and the process bus CS 275 in the automation system TELEPERM M of Siemens AG.

  9. On-line process control monitoring system

    International Nuclear Information System (INIS)

    O'Rourke, P.E.; Van Hare, D.R.; Prather, W.S.

    1992-01-01

    This patent describes apparatus for monitoring at a plurality of locations within a system the concentration of at least one chemical substance involved in a chemical process. It comprises plurality of process cells; first means for carrying the light; second means for carrying the light; means for producing a spectrum from the light received by the second carrying means; multiplexing means for selecting one process cell of the plurality of process cells at a time so that the producing means can produce a process spectrum from the one cell of the process cells; a reference cell for producing a reference spectrum for comparison to the process spectrum; a standard cell for producing a standard spectrum for comparison to the process spectrum; and means for comparing the reference spectrum, the standard spectrum and the process spectrum and determining the concentration of the chemical substance in the process cell

  10. High temperature nuclear process heat systems for chemical processes

    International Nuclear Information System (INIS)

    Jiacoletti, R.J.

    1976-01-01

    The development planning and status of the very high temperature gas cooled reactor as a source of industrial process heat is presented. The dwindling domestic reserves of petroleum and natural gas dictate major increases in the utilization of coal and nuclear sources to meet the national energy demand. The nuclear process heat system offers a unique combination of the two that is environmentally and economically attractive and technically sound. Conceptual studies of several energy-intensive processes coupled to a nuclear heat source are presented

  11. Integrated control system for electron beam processes

    Science.gov (United States)

    Koleva, L.; Koleva, E.; Batchkova, I.; Mladenov, G.

    2018-03-01

    The ISO/IEC 62264 standard is widely used for integration of the business systems of a manufacturer with the corresponding manufacturing control systems based on hierarchical equipment models, functional data and manufacturing operations activity models. In order to achieve the integration of control systems, formal object communication models must be developed, together with manufacturing operations activity models, which coordinate the integration between different levels of control. In this article, the development of integrated control system for electron beam welding process is presented as part of a fully integrated control system of an electron beam plant, including also other additional processes: surface modification, electron beam evaporation, selective melting and electron beam diagnostics.

  12. Non-linear quenching of current fluctuations in a self-exciting homopolar dynamo, proved by feedback system theory

    Directory of Open Access Journals (Sweden)

    A. M. de Paor

    1998-01-01

    Full Text Available Hide (Nonlinear Processes in Geophysics, 1998 has produced a new mathematical model of a self-exciting homopolar dynamo driving a series- wound motor, as a continuing contribution to the theory of the geomagnetic field. By a process of exact perturbation analysis, followed by combination and partial solution of differential equations, the complete nonlinear quenching of current fluctuations reported by Hide in the case that a parameter ε has the value 1 is proved via the Popov theorem from feedback system stability theory.

  13. Motivation to hide emotion and children's understanding of the distinction between real and apparent emotions.

    Science.gov (United States)

    Gosselin, Pierre; Warren, Madeleine; Diotte, Michèle

    2002-12-01

    The authors investigated the extent to which children's understanding of the distinction between real and apparent emotions varied according to the motivation to hide emotions. Children, aged 6-7 and 10-11 years, were read stories designed to elicit either prosocial or self-protective motivated display rules and were asked to predict the facial expressions the protagonists would make to hide felt emotions. Children were found to understand the distinction between real and apparent emotions very well, independently of the type of motivation. Contrary to predictions, boys understood this distinction better than did girls when the motivation to hide positive emotions was prosocial. Children perceived neutralization as the most appropriate strategy to hide felt emotions, followed by masking.

  14. Livestock and Hides and Skins Marketing in Kenya: Problems and investment needs

    OpenAIRE

    Jabbar, Mohammad A.

    2002-01-01

    The paper briefly summarises the historical perspective on the development of livestock marketing in Kenya, current problems of livestock and hides and skins marketing, and recommends investment opportunities to improve the situation.

  15. A Process Management System for Networked Manufacturing

    Science.gov (United States)

    Liu, Tingting; Wang, Huifen; Liu, Linyan

    With the development of computer, communication and network, networked manufacturing has become one of the main manufacturing paradigms in the 21st century. Under the networked manufacturing environment, there exist a large number of cooperative tasks susceptible to alterations, conflicts caused by resources and problems of cost and quality. This increases the complexity of administration. Process management is a technology used to design, enact, control, and analyze networked manufacturing processes. It supports efficient execution, effective management, conflict resolution, cost containment and quality control. In this paper we propose an integrated process management system for networked manufacturing. Requirements of process management are analyzed and architecture of the system is presented. And a process model considering process cost and quality is developed. Finally a case study is provided to explain how the system runs efficiently.

  16. An Improved Information Hiding Method Based on Sparse Representation

    Directory of Open Access Journals (Sweden)

    Minghai Yao

    2015-01-01

    Full Text Available A novel biometric authentication information hiding method based on the sparse representation is proposed for enhancing the security of biometric information transmitted in the network. In order to make good use of abundant information of the cover image, the sparse representation method is adopted to exploit the correlation between the cover and biometric images. Thus, the biometric image is divided into two parts. The first part is the reconstructed image, and the other part is the residual image. The biometric authentication image cannot be restored by any one part. The residual image and sparse representation coefficients are embedded into the cover image. Then, for the sake of causing much less attention of attackers, the visual attention mechanism is employed to select embedding location and embedding sequence of secret information. Finally, the reversible watermarking algorithm based on histogram is utilized for embedding the secret information. For verifying the validity of the algorithm, the PolyU multispectral palmprint and the CASIA iris databases are used as biometric information. The experimental results show that the proposed method exhibits good security, invisibility, and high capacity.

  17. Hiding effort to gain a competitive advantage: Evidence from China.

    Science.gov (United States)

    Zhao, Li; Heyman, Gail D

    2018-06-01

    Previous studies with Western populations have shown that adolescents' tendency to downplay their academic effort is affected by two kinds of motives: ability-related motives (e.g., to appear competent) and social approval motives (e.g., to be popular). In this research, we test for the presence of additional competition-related motives in China, a culture placing strong emphasis on academic competition. Study 1 (N = 150) showed that, in response to a scenario in which a hard-working high-school junior hid effort from classmates, the most highly endorsed explanation was "to influence others to work less hard to maintain a competitive advantage." Study 2 (N = 174) revealed that competition-related explanations were endorsed relatively more often when the speaker and audience had similar academic rankings. This tendency was most evident when both speaker and audience were top performers, and when this was the case, participants' desire to demonstrate superiority over others was a positive predictor of endorsement of competition-related motives. Study 3 (N = 137) verified that competition-related motives were more strongly endorsed among Chinese participants than U.S. These results suggest that at least in cultures that emphasize academic competition and in contexts where competition is salient, hiding effort is often about attempting to gain strategic advantage. © 2016 International Union of Psychological Science.

  18. Strategie del patetico e interludi circensi in Hide and Seek di Wilkie Collins

    OpenAIRE

    De Giovanni, Flora

    2013-01-01

    Starting from Victor Turner’s definitions of cultural performance and liminoid phenomena, the essay aims to analyse Wilkie Collins’s third novel, Hide and Seek (1854), which seems to be a sort of survey of the pastimes Victorian England allowed itself in the age of the increasing commodification of leisure. Though not a proper sensation novel (the genre for which Collins became famous in the 1860s), Hide and Seek draws on the conventions of melodrama, which, as Peter Brook conv...

  19. An information hiding method based on LSB and tent chaotic map

    Science.gov (United States)

    Song, Jianhua; Ding, Qun

    2011-06-01

    In order to protect information security more effectively, a novel information hiding method based on LSB and Tent chaotic map was proposed, first the secret message is Tent chaotic encrypted, and then LSB steganography is executed for the encrypted message in the cover-image. Compared to the traditional image information hiding method, the simulation results indicate that the method greatly improved in imperceptibility and security, and acquired good results.

  20. Effects of gamma rays on the physical and mechanical properties of hide

    International Nuclear Information System (INIS)

    Sutrisno Puspodikoro.

    1976-01-01

    The effect of gamma rays on the physical and mechanical properties of hide has been studied, using Gammacell 220 as an irradiator. The determination of the physical and mechanical properties of the irradiated hide was carried out by Balai Penelitian Kulit (Leather Research Institute) at Yogyakarta. Experiments show that up to a certain dose of irradiation, favourable effects can be obtained, while higher doses impair the physical and mechanical properties of the leather raw materials. (author)

  1. Architecture Of High Speed Image Processing System

    Science.gov (United States)

    Konishi, Toshio; Hayashi, Hiroshi; Ohki, Tohru

    1988-01-01

    One of architectures for a high speed image processing system which corresponds to a new algorithm for a shape understanding is proposed. And the hardware system which is based on the archtecture was developed. Consideration points of the architecture are mainly that using processors should match with the processing sequence of the target image and that the developed system should be used practically in an industry. As the result, it was possible to perform each processing at a speed of 80 nano-seconds a pixel.

  2. Features, Events, and Processes: System Level

    Energy Technology Data Exchange (ETDEWEB)

    D. McGregor

    2004-04-19

    The primary purpose of this analysis is to evaluate System Level features, events, and processes (FEPs). The System Level FEPs typically are overarching in nature, rather than being focused on a particular process or subsystem. As a result, they are best dealt with at the system level rather than addressed within supporting process-level or subsystem level analyses and models reports. The System Level FEPs also tend to be directly addressed by regulations, guidance documents, or assumptions listed in the regulations; or are addressed in background information used in development of the regulations. This evaluation determines which of the System Level FEPs are excluded from modeling used to support the total system performance assessment for license application (TSPA-LA). The evaluation is based on the information presented in analysis reports, model reports, direct input, or corroborative documents that are cited in the individual FEP discussions in Section 6.2 of this analysis report.

  3. An evaluation of selected methods for the decontamination of cattle hides prior to skinning.

    Science.gov (United States)

    Small, A; Wells-Burr, B; Buncic, S

    2005-02-01

    The effectiveness of different decontamination treatments in reducing microbial loads on cattle hides was assessed. The 10-s hide treatments were conducted using a wet-and-dry vacuum cleaner filled with one of the liquids (heated to 50 °C) indicated below, followed or not by 10-min drying in the air. Also, the hide was clipped, followed or not by 10-s singeing using a hand-held blowtorch. Before and after each decontamination treatment, the hide was sampled (100 cm(2) areas) by a sponge-swabbing method to compare the total viable counts of bacteria (TVC). The largest bacterial reduction (Psanitizer solution (10% Betane Plus) resulted in significant reductions of 1.80 (Peffects. Since hide contamination is associated with microbial contamination of the carcasses, the results indicate that post-killing/pre-skinning hide decontamination (used alone, or in combination with carcass decontamination) has a potential to improve microbial meat safety. Nevertheless, further research is required to optimise the efficacy of these treatments in the reduction of specific pathogens under commercial conditions.

  4. ISP: an optimal out-of-core image-set processing streaming architecture for parallel heterogeneous systems.

    Science.gov (United States)

    Ha, Linh Khanh; Krüger, Jens; Dihl Comba, João Luiz; Silva, Cláudio T; Joshi, Sarang

    2012-06-01

    Image population analysis is the class of statistical methods that plays a central role in understanding the development, evolution, and disease of a population. However, these techniques often require excessive computational power and memory that are compounded with a large number of volumetric inputs. Restricted access to supercomputing power limits its influence in general research and practical applications. In this paper we introduce ISP, an Image-Set Processing streaming framework that harnesses the processing power of commodity heterogeneous CPU/GPU systems and attempts to solve this computational problem. In ISP, we introduce specially designed streaming algorithms and data structures that provide an optimal solution for out-of-core multiimage processing problems both in terms of memory usage and computational efficiency. ISP makes use of the asynchronous execution mechanism supported by parallel heterogeneous systems to efficiently hide the inherent latency of the processing pipeline of out-of-core approaches. Consequently, with computationally intensive problems, the ISP out-of-core solution can achieve the same performance as the in-core solution. We demonstrate the efficiency of the ISP framework on synthetic and real datasets.

  5. Prevalence and relatedness of Escherichia coli O157:H7 strains in the feces and on the hides and carcasses of U.S. meat goats at slaughter.

    Science.gov (United States)

    Jacob, M E; Foster, D M; Rogers, A T; Balcomb, C C; Sanderson, M W

    2013-07-01

    We determined the prevalences of Escherichia coli O157:H7 in feces, hide, and carcasses of meat goats at a U.S. processing plant. Prevalences were 11.1%, 2.7%, and 2.7%, respectively. Sixteen pulsed-field gel electrophoresis (PFGE) subtypes were identified among 49 E. coli O157:H7 isolates, some of which were present on multiple sample types or collection days.

  6. Mars Aqueous Processing System, Phase II

    Data.gov (United States)

    National Aeronautics and Space Administration — The Mars Aqueous Processing System (MAPS) is a novel technology for recovering oxygen, iron, and other constituents from lunar and Mars soils. The closed-loop...

  7. DIAPASON: a continuous process supervision system

    International Nuclear Information System (INIS)

    Mathieu, D.; Penalva, J.M.; Coudouneau, L.; Leyval, L.; Montmain, J.

    1991-01-01

    DIAPASON is a system for the simulation and diagnosis aid of industrial processes. Qualitative simulation and defect diagnosis are briefly presented taking as an example a pulse column for liquid-liquid extraction in spent fuel reprocessing

  8. Cyclic LTI Systems in Digital Signal Processing

    National Research Council Canada - National Science Library

    Vaidyanathan, P

    1998-01-01

    .... While circular convolution has been the centerpiece of many algorithms in signal processing for decades, such freedom, especially from the viewpoint of linear system theory, has not been studied in the past...

  9. Arabic Natural Language Processing System Code Library

    Science.gov (United States)

    2014-06-01

    Adelphi, MD 20783-1197 This technical note provides a brief description of a Java library for Arabic natural language processing ( NLP ) containing code...for training and applying the Arabic NLP system described in the paper "A Cross-Task Flexible Transition Model for Arabic Tokenization, Affix...and also English) natural language processing ( NLP ), containing code for training and applying the Arabic NLP system described in Stephen Tratz’s

  10. No need to hide : Protecting safe regions on commodity hardware

    NARCIS (Netherlands)

    Koning, Koen; Chen, Xi; Bos, Herbert; Giuffrida, Cristiano; Athanasopoulos, Elias

    2017-01-01

    As modern 64-bit x86 processors no longer support the segmentation capabilities of their 32-bit predecessors, most research projects assume that strong in-process memory isolation is no longer an affordable option. Instead of strong, deterministic isolation, new defense systems therefore rely on the

  11. Parallel asynchronous systems and image processing algorithms

    Science.gov (United States)

    Coon, D. D.; Perera, A. G. U.

    1989-01-01

    A new hardware approach to implementation of image processing algorithms is described. The approach is based on silicon devices which would permit an independent analog processing channel to be dedicated to evey pixel. A laminar architecture consisting of a stack of planar arrays of the device would form a two-dimensional array processor with a 2-D array of inputs located directly behind a focal plane detector array. A 2-D image data stream would propagate in neuronlike asynchronous pulse coded form through the laminar processor. Such systems would integrate image acquisition and image processing. Acquisition and processing would be performed concurrently as in natural vision systems. The research is aimed at implementation of algorithms, such as the intensity dependent summation algorithm and pyramid processing structures, which are motivated by the operation of natural vision systems. Implementation of natural vision algorithms would benefit from the use of neuronlike information coding and the laminar, 2-D parallel, vision system type architecture. Besides providing a neural network framework for implementation of natural vision algorithms, a 2-D parallel approach could eliminate the serial bottleneck of conventional processing systems. Conversion to serial format would occur only after raw intensity data has been substantially processed. An interesting challenge arises from the fact that the mathematical formulation of natural vision algorithms does not specify the means of implementation, so that hardware implementation poses intriguing questions involving vision science.

  12. Information processing in decision-making systems.

    Science.gov (United States)

    van der Meer, Matthijs; Kurth-Nelson, Zeb; Redish, A David

    2012-08-01

    Decisions result from an interaction between multiple functional systems acting in parallel to process information in very different ways, each with strengths and weaknesses. In this review, the authors address three action-selection components of decision-making: The Pavlovian system releases an action from a limited repertoire of potential actions, such as approaching learned stimuli. Like the Pavlovian system, the habit system is computationally fast but, unlike the Pavlovian system permits arbitrary stimulus-action pairings. These associations are a "forward'' mechanism; when a situation is recognized, the action is released. In contrast, the deliberative system is flexible but takes time to process. The deliberative system uses knowledge of the causal structure of the world to search into the future, planning actions to maximize expected rewards. Deliberation depends on the ability to imagine future possibilities, including novel situations, and it allows decisions to be taken without having previously experienced the options. Various anatomical structures have been identified that carry out the information processing of each of these systems: hippocampus constitutes a map of the world that can be used for searching/imagining the future; dorsal striatal neurons represent situation-action associations; and ventral striatum maintains value representations for all three systems. Each system presents vulnerabilities to pathologies that can manifest as psychiatric disorders. Understanding these systems and their relation to neuroanatomy opens up a deeper way to treat the structural problems underlying various disorders.

  13. Teaching Information Systems Development via Process Variants

    Science.gov (United States)

    Tan, Wee-Kek; Tan, Chuan-Hoo

    2010-01-01

    Acquiring the knowledge to assemble an integrated Information System (IS) development process that is tailored to the specific needs of a project has become increasingly important. It is therefore necessary for educators to impart to students this crucial skill. However, Situational Method Engineering (SME) is an inherently complex process that…

  14. Geologic processes and sedimentary system on Mars

    Energy Technology Data Exchange (ETDEWEB)

    Lewis, A S

    1988-01-01

    The subject is covered under following headings: (1) morphology and processes at the martian surface (impact craters, water and ice, landslide, aeolian processes, volcanism, chemical weathering); (2) the sedimentary system (martian geologic documentation, sedimentary balance, regolith, pyroclastics, erosion phenomena, deposit and loss of sediments) as well as (3) summary and final remarks. 72 refs.

  15. Interactive data-processing system for metallurgy

    Science.gov (United States)

    Rathz, T. J.

    1978-01-01

    Equipment indicates that system can rapidly and accurately process metallurgical and materials-processing data for wide range of applications. Advantages include increase in contract between areas on image, ability to analyze images via operator-written programs, and space available for storing images.

  16. Decision process simulation in training systems

    International Nuclear Information System (INIS)

    Zajtsev, K.S.; Serov, A.A.; Ajnutdinov, V.A.

    1984-01-01

    One of the approaches to arrangement of training process an automated trainning systems (ATS) based on actjve use of knowledge of experienced operators is presented. Problems of mathematical model simulatjon of decision process by people not having special knowledge in mathematics are considered. A language of solution tables based on indistinct tables is suggested to the used as a simulation language. The problem of automation of decision process simulation in ATS is solued

  17. Control system for technological processes in tritium processing plants with process analysis

    International Nuclear Information System (INIS)

    Retevoi, Carmen Maria; Stefan, Iuliana; Balteanu, Ovidiu; Stefan, Liviu; Bucur, Ciprian

    2005-01-01

    Integration of a large variety of installations and equipment into a unitary system for controlling the technological process in tritium processing nuclear facilities appears to be a rather complex approach particularly when experimental or new technologies are developed. Ensuring a high degree of versatility allowing easy modifications in configurations and process parameters is a major requirement imposed on experimental installations. The large amount of data which must be processed, stored and easily accessed for subsequent analyses imposes development of a large information network based on a highly integrated system containing the acquisition, control and technological process analysis data as well as data base system. On such a basis integrated systems of computation and control able to conduct the technological process could be developed as well protection systems for cases of failures or break down. The integrated system responds to the control and security requirements in case of emergency and of the technological processes specific to the industry that processes radioactive or toxic substances with severe consequences in case of technological failure as in the case of tritium processing nuclear plant. In order to lower the risk technological failure of these processes an integrated software, data base and process analysis system are developed, which, based on identification algorithm of the important parameters for protection and security systems, will display the process evolution trend. The system was checked on a existing plant that includes a removal tritium unit, finally used in a nuclear power plant, by simulating the failure events as well as the process. The system will also include a complete data base monitoring all the parameters and a process analysis software for the main modules of the tritium processing plant, namely, isotope separation, catalytic purification and cryogenic distillation

  18. National Recordal System IK holder catalogue process

    CSIR Research Space (South Africa)

    Pretorius, R

    2011-11-01

    Full Text Available The aim of this poster is to illustrate the South African National Recordal Systems (NRS) process whereby Indigenous Knowledge (IK) holder’s information is captured in a registry, as specified in South Africa’s Indigenous Knowledge Systems Policy...

  19. BUSINESS PROCESS MANAGEMENT SYSTEMS TECHNOLOGY COMPONENTS ANALYSIS

    Directory of Open Access Journals (Sweden)

    Andrea Giovanni Spelta

    2007-05-01

    Full Text Available The information technology that supports the implementation of the business process management appproach is called Business Process Management System (BPMS. The main components of the BPMS solution framework are process definition repository, process instances repository, transaction manager, conectors framework, process engine and middleware. In this paper we define and characterize the role and importance of the components of BPMS's framework. The research method adopted was the case study, through the analysis of the implementation of the BPMS solution in an insurance company called Chubb do Brasil. In the case study, the process "Manage Coinsured Events"" is described and characterized, as well as the components of the BPMS solution adopted and implemented by Chubb do Brasil for managing this process.

  20. Development of DUMAS data processing system

    International Nuclear Information System (INIS)

    Sakamoto, Hiroshi

    1982-01-01

    In the field of nuclear experiments, the speed-up of data processing has been required recently along with the increase of the amount of data per event or the rate of event occurrence per unit time. In the DUMAS project of RCNP, the development of data processing system has been required, which can perform the high speed transfer and processing. The system should transfer the data of 5 multiwire proportional counters and other counters from the laboratory to the counting room at the rate of 1000 events every second, and also should perform considerably complex processes such as histogramming, particle identification, calculation of various polarizations as well as dumping to the secondary memory in the counting room. Furthermore, easy start-up, adjustment, inspection and maintenance and non-special hardware and software should be considered. A system presently being investigated for satisfying the above requirements is described. The main points are as follows: to employ CAMAC system for the interface with readout circuit, to transfer data between the laboratory and the counting room by converting the byte-serial transfer to the bit-serial optical fiber communication, and to unify the data processing computers to the PDP-11 family by connecting two miniature computers. Development of such a data processing system seems to be useful as an preparatory research for the development of NUMATRON measuring instruments. (Wakatsuki, Y.)

  1. Power systems signal processing for smart grids

    CERN Document Server

    Ribeiro, Paulo Fernando; Ribeiro, Paulo Márcio; Cerqueira, Augusto Santiago

    2013-01-01

    With special relation to smart grids, this book provides clear and comprehensive explanation of how Digital Signal Processing (DSP) and Computational Intelligence (CI) techniques can be applied to solve problems in the power system. Its unique coverage bridges the gap between DSP, electrical power and energy engineering systems, showing many different techniques applied to typical and expected system conditions with practical power system examples. Surveying all recent advances on DSP for power systems, this book enables engineers and researchers to understand the current state of the art a

  2. Data processing system for neutron experiments

    Energy Technology Data Exchange (ETDEWEB)

    Emoto, T; Yamamuro, N [Tokyo Inst. of Tech. (Japan). Research Lab. of Nuclear Reactor

    1979-03-01

    A data processing system for neutron experiments has been equipped at the Pelletron Laboratory of the Research Laboratory for Nuclear Reactors. The system comprises a Hewlett Packard 21 MX computer and a CAMAC standard. It can control two ADCs and some CAMAC modules. CAMAC control programs as well as data acquisition programs with high-level language can be readily developed. Terminals are well designed for man-machine interactions and program developments. To demonstrate the usefulness of the system, it was applied for the on-line data processing of neutron spectrum measurement.

  3. Portable brine evaporator unit, process, and system

    Science.gov (United States)

    Hart, Paul John; Miller, Bruce G.; Wincek, Ronald T.; Decker, Glenn E.; Johnson, David K.

    2009-04-07

    The present invention discloses a comprehensive, efficient, and cost effective portable evaporator unit, method, and system for the treatment of brine. The evaporator unit, method, and system require a pretreatment process that removes heavy metals, crude oil, and other contaminates in preparation for the evaporator unit. The pretreatment and the evaporator unit, method, and system process metals and brine at the site where they are generated (the well site). Thus, saving significant money to producers who can avoid present and future increases in transportation costs.

  4. National Recordal System IK holder catalogue process

    CSIR Research Space (South Africa)

    Pretorius, R

    2012-10-01

    Full Text Available good, based on IK.? Subsequently, the South African Department of Science and Technology (DST) created a National Indigenous Knowledge Systems Office (NIKSO) that is taking the lead on interfacing IKS with other recognised knowledge holders... is to illustrate the South African National Recordal Systems (NRS) process whereby Indigenous Knowledge (IK) holder?s information is captured in a registry, as specified in South Africa?s Indigenous Knowledge Systems (IKS) Policy, through an IK cataloguing...

  5. Air conditioning for data processing system areas

    Directory of Open Access Journals (Sweden)

    Hernando Camacho García

    1996-09-01

    Full Text Available The appropiate selection of air conditioners for data processing system areas requires the knowledge of the environmental desing conditions, the air conditioning systems succssfully used computer and the cooling loads to handle. This work contains information about a wide variety of systems designed for computer room applications. a complete example of calculation to determine the amount of heat to be removed for satisfactory operation, is also included.

  6. Process equipment waste and process waste liquid collection systems

    International Nuclear Information System (INIS)

    1990-06-01

    The US DOE has prepared an environmental assessment for construction related to the Process Equipment Waste (PEW) and Process Waste Liquid (PWL) Collection System Tasks at the Idaho Chemical Processing Plant. This report describes and evaluates the environmental impacts of the proposed action (and alternatives). The purpose of the proposed action would be to ensure that the PEW and PWL collection systems, a series of enclosed process hazardous waste, and radioactive waste lines and associated equipment, would be brought into compliance with applicable State and Federal hazardous waste regulations. This would be accomplished primarily by rerouting the lines to stay within the buildings where the lined floors of the cells and corridors would provide secondary containment. Leak detection would be provided via instrumented collection sumps locate din the cells and corridors. Hazardous waste transfer lines that are routed outside buildings will be constructed using pipe-in-pipe techniques with leak detection instrumentation in the interstitial area. The need for the proposed action was identified when a DOE-sponsored Resource Conservation and Recovery Act (RCRA) compliance assessment of the ICPP facilities found that singly-contained waste lines ran buried in the soil under some of the original facilities. These lines carried wastes with a pH of less than 2.0, which were hazardous waste according to the RCRA standards. 20 refs., 7 figs., 1 tab

  7. Dosimetry systems for radiation processing in Japan

    International Nuclear Information System (INIS)

    Tamura, Naoyuki

    1995-01-01

    The present situation of dosimetry systems for radiation processing industry in Japan is reviewed. For gamma-rays irradiation the parallel-plate ionization chamber in TRCRE, JAERI has been placed as a reference standard dosimeter for processing-level dose. Various solid and liquid chemical dosimeters are used as routine dosimeters for gamma processing industries. Alanine dosimeters is used for the irradiation purpose which needs precise dosimetry. For electron-beam irradiation the electron current density meter and the total absorption calorimeter of TRCRE are used for the calibration of routine dosimeters. Plastic film dosimeters, such as cellulose triacetate and radiochromic dye are used as routine dosimeters for electron processing industries. When the official traceability systems for processing-level dosimetry now under investigation is completed, the ionization chamber of TRCRE is expected to have a role of the primary standard dosimeter and the specified alanine dosimeter will be nominated for the secondary or reference standard dosimeter. (author)

  8. Waste receiving and processing plant control system; system design description

    International Nuclear Information System (INIS)

    LANE, M.P.

    1999-01-01

    The Plant Control System (PCS) is a heterogeneous computer system composed of numerous sub-systems. The PCS represents every major computer system that is used to support operation of the Waste Receiving and Processing (WRAP) facility. This document, the System Design Description (PCS SDD), includes several chapters and appendices. Each chapter is devoted to a separate PCS sub-system. Typically, each chapter includes an overview description of the system, a list of associated documents related to operation of that system, and a detailed description of relevant system features. Each appendice provides configuration information for selected PCS sub-systems. The appendices are designed as separate sections to assist in maintaining this document due to frequent changes in system configurations. This document is intended to serve as the primary reference for configuration of PCS computer systems. The use of this document is further described in the WRAP System Configuration Management Plan, WMH-350, Section 4.1

  9. Waste receiving and processing plant control system; system design description

    Energy Technology Data Exchange (ETDEWEB)

    LANE, M.P.

    1999-02-24

    The Plant Control System (PCS) is a heterogeneous computer system composed of numerous sub-systems. The PCS represents every major computer system that is used to support operation of the Waste Receiving and Processing (WRAP) facility. This document, the System Design Description (PCS SDD), includes several chapters and appendices. Each chapter is devoted to a separate PCS sub-system. Typically, each chapter includes an overview description of the system, a list of associated documents related to operation of that system, and a detailed description of relevant system features. Each appendice provides configuration information for selected PCS sub-systems. The appendices are designed as separate sections to assist in maintaining this document due to frequent changes in system configurations. This document is intended to serve as the primary reference for configuration of PCS computer systems. The use of this document is further described in the WRAP System Configuration Management Plan, WMH-350, Section 4.1.

  10. Oscillating systems with cointegrated phase processes

    DEFF Research Database (Denmark)

    Østergaard, Jacob; Rahbek, Anders; Ditlevsen, Susanne

    2017-01-01

    We present cointegration analysis as a method to infer the network structure of a linearly phase coupled oscillating system. By defining a class of oscillating systems with interacting phases, we derive a data generating process where we can specify the coupling structure of a network...... that resembles biological processes. In particular we study a network of Winfree oscillators, for which we present a statistical analysis of various simulated networks, where we conclude on the coupling structure: the direction of feedback in the phase processes and proportional coupling strength between...... individual components of the system. We show that we can correctly classify the network structure for such a system by cointegration analysis, for various types of coupling, including uni-/bi-directional and all-to-all coupling. Finally, we analyze a set of EEG recordings and discuss the current...

  11. Control measurement system in purex process

    International Nuclear Information System (INIS)

    Mani, V.V.S.

    1985-01-01

    The dependence of a bulk facility handling Purex Process on the control measurement system for evaluating the process performance needs hardly be emphasized. process control, Plant control, inventory control and quality control are the four components of the control measurement system. The scope and requirements of each component are different and the measurement methods are selected accordingly. However, each measurement system has six important elements. These are described in detail. The quality assurance programme carried out by the laboratory as a mechanism through which the quality of measurements is regularly tested and stated in quantitative terms is also explained in terms of internal and external quality assurance, with examples. Suggestions for making the control measurement system more responsive to the operational needs in future are also briefly discussed. (author)

  12. A multitransputer parallel processing system (MTPPS)

    International Nuclear Information System (INIS)

    Jethra, A.K.; Pande, S.S.; Borkar, S.P.; Khare, A.N.; Ghodgaonkar, M.D.; Bairi, B.R.

    1993-01-01

    This report describes the design and implementation of a 16 node Multi Transputer Parallel Processing System(MTPPS) which is a platform for parallel program development. It is a MIMD machine based on message passing paradigm. The basic compute engine is an Inmos Transputer Ims T800-20. Transputer with local memory constitutes the processing element (NODE) of this MIMD architecture. Multiple NODES can be connected to each other in an identifiable network topology through the high speed serial links of the transputer. A Network Configuration Unit (NCU) incorporates the necessary hardware to provide software controlled network configuration. System is modularly expandable and more NODES can be added to the system to achieve the required processing power. The system is backend to the IBM-PC which has been integrated into the system to provide user I/O interface. PC resources are available to the programmer. Interface hardware between the PC and the network of transputers is INMOS compatible. Therefore, all the commercially available development software compatible to INMOS products can run on this system. While giving the details of design and implementation, this report briefly summarises MIMD Architectures, Transputer Architecture and Parallel Processing Software Development issues. LINPACK performance evaluation of the system and solutions of neutron physics and plasma physics problem have been discussed along with results. (author). 12 refs., 22 figs., 3 tabs., 3 appendixes

  13. AUTOMATION DESIGN FOR MONORAIL - BASED SYSTEM PROCESSES

    Directory of Open Access Journals (Sweden)

    Bunda BESA

    2016-12-01

    Full Text Available Currently, conventional methods of decline development put enormous cost pressure on the profitability of mining operations. This is the case with narrow vein ore bodies where current methods and mine design of decline development may be too expensive to support economic extraction of the ore. According to studies, the time it takes to drill, clean and blast an end in conventional decline development can be up to 224 minutes. This is because once an end is blasted, cleaning should first be completed before drilling can commence, resulting in low advance rates per shift. Improvements in advance rates during decline development can be achieved by application of the Electric Monorail Transport System (EMTS based drilling system. The system consists of the drilling and loading components that use monorail technology to drill and clean the face during decline development. The two systems work simultaneously at the face in such a way that as the top part of the face is being drilled the pneumatic loading system cleans the face. However, to improve the efficiency of the two systems, critical processes performed by the two systems during mining operations must be automated. Automation increases safety and productivity, reduces operator fatigue and also reduces the labour costs of the system. The aim of this paper is, therefore, to describe automation designs of the two processes performed by the monorail drilling and loading systems during operations. During automation design, critical processes performed by the two systems and control requirements necessary to allow the two systems execute such processes automatically have also been identified.

  14. Information processing systems, reasoning modules, and reasoning system design methods

    Science.gov (United States)

    Hohimer, Ryan E; Greitzer, Frank L; Hampton, Shawn D

    2014-03-04

    Information processing systems, reasoning modules, and reasoning system design methods are described. According to one aspect, an information processing system includes working memory comprising a semantic graph which comprises a plurality of abstractions, wherein the abstractions individually include an individual which is defined according to an ontology and a reasoning system comprising a plurality of reasoning modules which are configured to process different abstractions of the semantic graph, wherein a first of the reasoning modules is configured to process a plurality of abstractions which include individuals of a first classification type of the ontology and a second of the reasoning modules is configured to process a plurality of abstractions which include individuals of a second classification type of the ontology, wherein the first and second classification types are different.

  15. Information processing systems, reasoning modules, and reasoning system design methods

    Energy Technology Data Exchange (ETDEWEB)

    Hohimer, Ryan E.; Greitzer, Frank L.; Hampton, Shawn D.

    2016-08-23

    Information processing systems, reasoning modules, and reasoning system design methods are described. According to one aspect, an information processing system includes working memory comprising a semantic graph which comprises a plurality of abstractions, wherein the abstractions individually include an individual which is defined according to an ontology and a reasoning system comprising a plurality of reasoning modules which are configured to process different abstractions of the semantic graph, wherein a first of the reasoning modules is configured to process a plurality of abstractions which include individuals of a first classification type of the ontology and a second of the reasoning modules is configured to process a plurality of abstractions which include individuals of a second classification type of the ontology, wherein the first and second classification types are different.

  16. Information processing systems, reasoning modules, and reasoning system design methods

    Energy Technology Data Exchange (ETDEWEB)

    Hohimer, Ryan E.; Greitzer, Frank L.; Hampton, Shawn D.

    2015-08-18

    Information processing systems, reasoning modules, and reasoning system design methods are described. According to one aspect, an information processing system includes working memory comprising a semantic graph which comprises a plurality of abstractions, wherein the abstractions individually include an individual which is defined according to an ontology and a reasoning system comprising a plurality of reasoning modules which are configured to process different abstractions of the semantic graph, wherein a first of the reasoning modules is configured to process a plurality of abstractions which include individuals of a first classification type of the ontology and a second of the reasoning modules is configured to process a plurality of abstractions which include individuals of a second classification type of the ontology, wherein the first and second classification types are different.

  17. An ecological process model of systems change.

    Science.gov (United States)

    Peirson, Leslea J; Boydell, Katherine M; Ferguson, H Bruce; Ferris, Lorraine E

    2011-06-01

    In June 2007 the American Journal of Community Psychology published a special issue focused on theories, methods and interventions for systems change which included calls from the editors and authors for theoretical advancement in this field. We propose a conceptual model of systems change that integrates familiar and fundamental community psychology principles (succession, interdependence, cycling of resources, adaptation) and accentuates a process orientation. To situate our framework we offer a definition of systems change and a brief review of the ecological perspective and principles. The Ecological Process Model of Systems Change is depicted, described and applied to a case example of policy driven systems level change in publicly funded social programs. We conclude by identifying salient implications for thinking and action which flow from the Model.

  18. Data processing system for ETL TPE-2

    International Nuclear Information System (INIS)

    Yahagi, E.; Kiyama, M.

    1988-01-01

    The data processing system for ETL TPE-2 consists of 2 CPU systems and it is composing a duplex system. One system is used as a data acquisition system, which is abbreviated as DAS and functions controlling various data input devices, data acquisition, communication with the main controller of TPE-2 confirming safety system operation. Another one is used as data processing system, which is abbreviated as DPS and functions the processing of the data after the acquisition, the interconnections with the mainframe and the development of software. A transient memory system, which has 64 channels of 8 bits ADC with maximum sampling frequency of 20 MHz and 4 KB buffer memory in each channel, is used to record the time sequential experimental data. Two CAMAC crates are used for the acquisition of the informations of the experiment condition and Thomson scattering data. They are composing a serial high way system through fiber optics. The CAMAC crate for Thomson scattering data is controlled by a personal computer, HP-85, and is available stand-alone use, and the communication between the CAMAC system and DAS is easily performed by using a CAMAC memory module as an intermediator without complicated procedure in the connection of different type computers. Two magnetic disk pack units, which have the formatted storage capacity of 158 KB in each one and can record the data over 2,000 shots, are used in parallel with a magnetic tape handler for the data file. Thus we realized the high speed data processing over the wide range of experimental shots and confirmed the preservation of the data. (author)

  19. Endogenous System Microbes as Treatment Process ...

    Science.gov (United States)

    Monitoring the efficacy of treatment strategies to remove pathogens in decentralized systems remains a challenge. Evaluating log reduction targets by measuring pathogen levels is hampered by their sporadic and low occurrence rates. Fecal indicator bacteria are used in centralized systems to indicate the presence of fecal pathogens, but are ineffective decentralized treatment process indicators as they generally occur at levels too low to assess log reduction targets. System challenge testing by spiking with high loads of fecal indicator organisms, like MS2 coliphage, has limitations, especially for large systems. Microbes that are endogenous to the decentralized system, occur in high abundances and mimic removal rates of bacterial, viral and/or parasitic protozoan pathogens during treatment could serve as alternative treatment process indicators to verify log reduction targets. To identify abundant microbes in wastewater, the bacterial and viral communities were examined using deep sequencing. Building infrastructure-associated bacteria, like Zoogloea, were observed as dominant members of the bacterial community in graywater. In blackwater, bacteriophage of the order Caudovirales constituted the majority of contiguous sequences from the viral community. This study identifies candidate treatment process indicators in decentralized systems that could be used to verify log removal during treatment. The association of the presence of treatment process indic

  20. The endocannabinoid system in brain reward processes.

    Science.gov (United States)

    Solinas, M; Goldberg, S R; Piomelli, D

    2008-05-01

    Food, drugs and brain stimulation can serve as strong rewarding stimuli and are all believed to activate common brain circuits that evolved in mammals to favour fitness and survival. For decades, endogenous dopaminergic and opioid systems have been considered the most important systems in mediating brain reward processes. Recent evidence suggests that the endogenous cannabinoid (endocannabinoid) system also has an important role in signalling of rewarding events. First, CB(1) receptors are found in brain areas involved in reward processes, such as the dopaminergic mesolimbic system. Second, activation of CB(1) receptors by plant-derived, synthetic or endogenous CB(1) receptor agonists stimulates dopaminergic neurotransmission, produces rewarding effects and increases rewarding effects of abused drugs and food. Third, pharmacological or genetic blockade of CB(1) receptors prevents activation of dopaminergic neurotransmission by several addictive drugs and reduces rewarding effects of food and these drugs. Fourth, brain levels of the endocannabinoids anandamide and 2-arachidonoylglycerol are altered by activation of reward processes. However, the intrinsic activity of the endocannabinoid system does not appear to play a facilitatory role in brain stimulation reward and some evidence suggests it may even oppose it. The influence of the endocannabinoid system on brain reward processes may depend on the degree of activation of the different brain areas involved and might represent a mechanism for fine-tuning dopaminergic activity. Although involvement of the various components of the endocannabinoid system may differ depending on the type of rewarding event investigated, this system appears to play a major role in modulating reward processes.

  1. Improving industrial process control systems security

    CERN Document Server

    Epting, U; CERN. Geneva. TS Department

    2004-01-01

    System providers are today creating process control systems based on remote connectivity using internet technology, effectively exposing these systems to the same threats as corporate computers. It is becoming increasingly difficult and costly to patch/maintain the technical infrastructure monitoring and control systems to remove these vulnerabilities. A strategy including risk assessment, security policy issues, service level agreements between the IT department and the controls engineering groups must be defined. In addition an increased awareness of IT security in the controls system engineering domain is needed. As consequence of these new factors the control system architectures have to take into account security requirements, that often have an impact on both operational aspects as well as on the project and maintenance cost. Manufacturers of industrial control system equipment do however also propose progressively security related solutions that can be used for our active projects. The paper discusses ...

  2. Launch Processing System. [for Space Shuttle

    Science.gov (United States)

    Byrne, F.; Doolittle, G. V.; Hockenberger, R. W.

    1976-01-01

    This paper presents a functional description of the Launch Processing System, which provides automatic ground checkout and control of the Space Shuttle launch site and airborne systems, with emphasis placed on the Checkout, Control, and Monitor Subsystem. Hardware and software modular design concepts for the distributed computer system are reviewed relative to performing system tests, launch operations control, and status monitoring during ground operations. The communication network design, which uses a Common Data Buffer interface to all computers to allow computer-to-computer communication, is discussed in detail.

  3. [Mechanized system for planning technological processes].

    Science.gov (United States)

    Pashchenko, V S; Shapiro, A M

    1977-01-01

    A mechanized system for the production processes planning involving the use of an electronic code device for data preparation on a punched tape of the "EPECT-IT" type, at the base of which there are classifiers of standard operations and transitions to individual design members, is considered. A fragment of the classifier and a skeleton diagram of the system are presented. It is pointed out that the use of the system helps improve the quality of the design work, as well as to yield considerable economic advantages. The system is in operation at some enterprises of the medical engineering industry.

  4. Fuels processing for transportation fuel cell systems

    Science.gov (United States)

    Kumar, R.; Ahmed, S.

    Fuel cells primarily use hydrogen as the fuel. This hydrogen must be produced from other fuels such as natural gas or methanol. The fuel processor requirements are affected by the fuel to be converted, the type of fuel cell to be supplied, and the fuel cell application. The conventional fuel processing technology has been reexamined to determine how it must be adapted for use in demanding applications such as transportation. The two major fuel conversion processes are steam reforming and partial oxidation reforming. The former is established practice for stationary applications; the latter offers certain advantages for mobile systems and is presently in various stages of development. This paper discusses these fuel processing technologies and the more recent developments for fuel cell systems used in transportation. The need for new materials in fuels processing, particularly in the area of reforming catalysis and hydrogen purification, is discussed.

  5. Data processing system of GA and PPPL

    International Nuclear Information System (INIS)

    Oshima, Takayuki

    2001-11-01

    Results of research in 1997 to General Atomics (GA) and Princeton Plasma Physics Laboratory (PPPL) are reported. The author visited the computer system of fusion group in GA. He joined the tokamak experiment in DIII-D, especially on the demonstration of the remote experiment inside U.S., and investigated the data processing system of DIII-D and the computer network, etc. After the visit to GA, He visited PPPL and exchanged the information about the equipment of remote experiment between JAERI and PPPL based on the US-Japan fusion energy research cooperation. He also investigated the data processing system of TFTR tokamak, the computer network and so on. Results of research of the second visit to GA in 2000 are also reported, which describes a rapid progress of each data processing equipment by the advance on the computer technology in just three years. (author)

  6. Systems integration processes for space nuclear electric propulsion systems

    International Nuclear Information System (INIS)

    Olsen, C.S.; Rice, J.W.; Stanley, M.L.

    1991-01-01

    The various components and subsystems that comprise a nuclear electric propulsion system should be developed and integrated so that each functions ideally and so that each is properly integrated with the other components and subsystems in the optimum way. This paper discusses how processes similar to those used in the development and intergration of the subsystems that comprise the Multimegawatt Space Nuclear Power System concepts can be and are being efficiently and effectively utilized for these purposes. The processes discussed include the development of functional and operational requirements at the system and subsystem level; the assessment of individual nuclear power supply and thruster concepts and their associated technologies; the conduct of systems integration efforts including the evaluation of the mission benefits for each system; the identification and resolution of concepts development, technology development, and systems integration feasibility issues; subsystem, system, and technology development and integration; and ground and flight subsystem and integrated system testing

  7. Ontological Model of Business Process Management Systems

    Science.gov (United States)

    Manoilov, G.; Deliiska, B.

    2008-10-01

    The activities which constitute business process management (BPM) can be grouped into five categories: design, modeling, execution, monitoring and optimization. Dedicated software packets for business process management system (BPMS) are available on the market. But the efficiency of its exploitation depends on used ontological model in the development time and run time of the system. In the article an ontological model of BPMS in area of software industry is investigated. The model building is preceded by conceptualization of the domain and taxonomy of BPMS development. On the base of the taxonomy an simple online thesaurus is created.

  8. Telemedicine optoelectronic biomedical data processing system

    Science.gov (United States)

    Prosolovska, Vita V.

    2010-08-01

    The telemedicine optoelectronic biomedical data processing system is created to share medical information for the control of health rights and timely and rapid response to crisis. The system includes the main blocks: bioprocessor, analog-digital converter biomedical images, optoelectronic module for image processing, optoelectronic module for parallel recording and storage of biomedical imaging and matrix screen display of biomedical images. Rated temporal characteristics of the blocks defined by a particular triggering optoelectronic couple in analog-digital converters and time imaging for matrix screen. The element base for hardware implementation of the developed matrix screen is integrated optoelectronic couples produced by selective epitaxy.

  9. Haptic teleoperation systems signal processing perspective

    CERN Document Server

    Lee, Jae-young

    2015-01-01

    This book examines the signal processing perspective in haptic teleoperation systems. This text covers the topics of prediction, estimation, architecture, data compression, and error correction that can be applied to haptic teleoperation systems. The authors begin with an overview of haptic teleoperation systems, then look at a Bayesian approach to haptic teleoperation systems. They move onto a discussion of haptic data compression, haptic data digitization and forward error correction.   ·         Presents haptic data prediction/estimation methods that compensate for unreliable networks   ·         Discusses haptic data compression that reduces haptic data size over limited network bandwidth and haptic data error correction that compensate for packet loss problem   ·         Provides signal processing techniques used with existing control architectures.

  10. Development of Souvenir Production Transaction Processing System

    Science.gov (United States)

    Rumambi, H.; Kaparang, R.; Lintong, J.

    2018-01-01

    This research aims to design a souvenir production transaction processing system for the craftsmen in North Sulawesi. The craftsmen make very simple recordings about souvenir production transactions and use documents that are not in accordance with the generally accepted accounting practices. This research uses qualitative method. The data is collected through interviews, observations, documents and literatures studies. The research stages are conducted in preliminary studies, data collection, data analyzed and system design. The design of system is built from chart of account, accounting cycle and documents as input and get processed in accounting recording. The outputs are financial statements. The system design provides benefits for the craftsmen in assessing the financial performance and getting financing from bank.

  11. Tank Waste Remediation System optimized processing strategy

    International Nuclear Information System (INIS)

    Slaathaug, E.J.; Boldt, A.L.; Boomer, K.D.; Galbraith, J.D.; Leach, C.E.; Waldo, T.L.

    1996-03-01

    This report provides an alternative strategy evolved from the current Hanford Site Tank Waste Remediation System (TWRS) programmatic baseline for accomplishing the treatment and disposal of the Hanford Site tank wastes. This optimized processing strategy performs the major elements of the TWRS Program, but modifies the deployment of selected treatment technologies to reduce the program cost. The present program for development of waste retrieval, pretreatment, and vitrification technologies continues, but the optimized processing strategy reuses a single facility to accomplish the separations/low-activity waste (LAW) vitrification and the high-level waste (HLW) vitrification processes sequentially, thereby eliminating the need for a separate HLW vitrification facility

  12. Deficiency tracking system, conceptual business process requirements

    Energy Technology Data Exchange (ETDEWEB)

    Hermanson, M.L.

    1997-04-18

    The purpose of this document is to describe the conceptual business process requirements of a single, site-wide, consolidated, automated, deficiency management tracking, trending, and reporting system. This description will be used as the basis for the determination of the automated system acquisition strategy including the further definition of specific requirements, a ''make or buy'' determination and the development of specific software design details.

  13. Deficiency tracking system, conceptual business process requirements

    International Nuclear Information System (INIS)

    Hermanson, M.L.

    1997-01-01

    The purpose of this document is to describe the conceptual business process requirements of a single, site-wide, consolidated, automated, deficiency management tracking, trending, and reporting system. This description will be used as the basis for the determination of the automated system acquisition strategy including the further definition of specific requirements, a ''make or buy'' determination and the development of specific software design details

  14. Aiming for knowledge information processing systems

    Energy Technology Data Exchange (ETDEWEB)

    Fuchi, K

    1982-01-01

    The Fifth Generation Computer Project in Japan intends to develop a new generation of computers by extensive research in many areas. This paper discusses many research topics which the Japanese are hoping will lead to a radical new knowledge information processing system. Topics discussed include new computer architecture, programming styles, semantics of programming languages, relational databases, linguistics theory, artificial intelligence, functional images and interference systems.

  15. The Costs of Hiding and Faking Emotions: The Case of Extraverts and Introverts.

    Science.gov (United States)

    Seger-Guttmann, Tali; Medler-Liraz, Hana

    2016-01-01

    The present study examined the moderation effects of extraversion on the relationships between hiding and faking emotions, perceived satisfaction from intimate relationships, and reported physical health concerns. Four hundred and four Israeli participants, who were all involved in intimate relationships at the time of the study, responded to the Extraversion scale from the Big-Five Inventory, the DEELS to measure hiding and faking emotions, the SELF to assess physical health concerns, and the short version of the ENRICH to evaluate perceived satisfaction with intimate relationships. The mean age was 32.3 years (SD = 8.2); and the average length of time as a couple was 7.8 years (SD = 8.2). Of the participants, 198 were married (48.5%). The findings indicate that the effect of hiding negative emotions was stronger for perceived satisfaction with intimate relationships and physical health concerns than that for faking positive emotions. Extraverts who showed a higher frequency of hiding their negative emotions were significantly less satisfied with their relationships than introverts and they also tended to report more concerns with their physical health. These results were not found when extraverts reported a high frequency of faking positive emotions. These results are discussed in the context of the trait-behavior-concordance model and stress the importance of distinguishing faking from hiding.

  16. Best Hiding Capacity Scheme for Variable Length Messages Using Particle Swarm Optimization

    Science.gov (United States)

    Bajaj, Ruchika; Bedi, Punam; Pal, S. K.

    Steganography is an art of hiding information in such a way that prevents the detection of hidden messages. Besides security of data, the quantity of data that can be hidden in a single cover medium, is also very important. We present a secure data hiding scheme with high embedding capacity for messages of variable length based on Particle Swarm Optimization. This technique gives the best pixel positions in the cover image, which can be used to hide the secret data. In the proposed scheme, k bits of the secret message are substituted into k least significant bits of the image pixel, where k varies from 1 to 4 depending on the message length. The proposed scheme is tested and results compared with simple LSB substitution, uniform 4-bit LSB hiding (with PSO) for the test images Nature, Baboon, Lena and Kitty. The experimental study confirms that the proposed method achieves high data hiding capacity and maintains imperceptibility and minimizes the distortion between the cover image and the obtained stego image.

  17. Features, Events, and Processes: system Level

    Energy Technology Data Exchange (ETDEWEB)

    D. McGregor

    2004-10-15

    The purpose of this analysis report is to evaluate and document the inclusion or exclusion of the system-level features, events, and processes (FEPs) with respect to modeling used to support the total system performance assessment for the license application (TSPA-LA). A screening decision, either Included or Excluded, is given for each FEP along with the technical basis for screening decisions. This information is required by the U.S. Nuclear Regulatory Commission (NRC) at 10 CFR 63.113 (d, e, and f) (DIRS 156605). The system-level FEPs addressed in this report typically are overarching in nature, rather than being focused on a particular process or subsystem. As a result, they are best dealt with at the system level rather than addressed within supporting process-level or subsystem-level analyses and models reports. The system-level FEPs also tend to be directly addressed by regulations, guidance documents, or assumptions listed in the regulations; or are addressed in background information used in development of the regulations. For included FEPs, this analysis summarizes the implementation of the FEP in the TSPA-LA (i.e., how the FEP is included). For excluded FEPs, this analysis provides the technical basis for exclusion from the TSPA-LA (i.e., why the FEP is excluded). The initial version of this report (Revision 00) was developed to support the total system performance assessment for site recommendation (TSPA-SR). This revision addresses the license application (LA) FEP List (DIRS 170760).

  18. Features, Events, and Processes: system Level

    International Nuclear Information System (INIS)

    D. McGregor

    2004-01-01

    The purpose of this analysis report is to evaluate and document the inclusion or exclusion of the system-level features, events, and processes (FEPs) with respect to modeling used to support the total system performance assessment for the license application (TSPA-LA). A screening decision, either Included or Excluded, is given for each FEP along with the technical basis for screening decisions. This information is required by the U.S. Nuclear Regulatory Commission (NRC) at 10 CFR 63.113 (d, e, and f) (DIRS 156605). The system-level FEPs addressed in this report typically are overarching in nature, rather than being focused on a particular process or subsystem. As a result, they are best dealt with at the system level rather than addressed within supporting process-level or subsystem-level analyses and models reports. The system-level FEPs also tend to be directly addressed by regulations, guidance documents, or assumptions listed in the regulations; or are addressed in background information used in development of the regulations. For included FEPs, this analysis summarizes the implementation of the FEP in the TSPA-LA (i.e., how the FEP is included). For excluded FEPs, this analysis provides the technical basis for exclusion from the TSPA-LA (i.e., why the FEP is excluded). The initial version of this report (Revision 00) was developed to support the total system performance assessment for site recommendation (TSPA-SR). This revision addresses the license application (LA) FEP List (DIRS 170760)

  19. System and process for biomass treatment

    Science.gov (United States)

    Dunson, Jr., James B; Tucker, III, Melvin P; Elander, Richard T; Lyons, Robert C

    2013-08-20

    A system including an apparatus is presented for treatment of biomass that allows successful biomass treatment at a high solids dry weight of biomass in the biomass mixture. The design of the system provides extensive distribution of a reactant by spreading the reactant over the biomass as the reactant is introduced through an injection lance, while the biomass is rotated using baffles. The apparatus system to provide extensive assimilation of the reactant into biomass using baffles to lift and drop the biomass, as well as attrition media which fall onto the biomass, to enhance the treatment process.

  20. Genesis Eco Systems, Inc. soil washing process

    International Nuclear Information System (INIS)

    Cena, R.J.

    1994-01-01

    The Genesis soil washing system is an integrated system of modular design allowing for maximum material handling capabilities, with optimized use of space for site mobility. The Surfactant Activated Bio-enhanced Remediation Equipment-Generation 1 (SABRE-1, Patent Applied For) modification was developed specifically for removing petroleum byproducts from contaminated soils. Scientifically formulated surfactants, introduced by high pressure spray nozzles, displace the contaminant from the surface of the soil particles into the process solution. Once the contaminant is dispersed into the liquid fraction of the process, it is either mechanically removed, chemically oxidized, or biologically oxidized. The contaminated process water is pumped through the Genesis Biosep (Patent Applied For) filtration system where the fines portion is flocculated, and the contaminant-rich liquid portion is combined with an activated mixture of nutrients and carefully selected bacteria to decompose the hydrocarbon fraction. The treated soil and dewatered fines are transferred to a bermed stockpile where bioremediation continues during drying. The process water is reclaimed, filtered, and recycled within the system

  1. General programmed system for physiological signal processing

    Energy Technology Data Exchange (ETDEWEB)

    Tournier, E; Monge, J; Magnet, C; Sonrel, C

    1975-01-01

    Improvements made to the general programmed signal acquisition and processing system, Plurimat S, are described, the aim being to obtain a less specialized system adapted to the biological and medical field. In this modified system the acquisition will be simplified. The standard processings offered will be integrated to a real advanced language which will enable the user to create his own processings, the loss of speed being compensated by a greater flexibility and universality. The observation screen will be large and the quality of the recording very good so that a large signal fraction may be displayed. The data will be easily indexed and filed for subsequent display and processing. This system will be used for two kinds of task: it can either be specialized, as an integral part of measurement and diagnostic preparation equipment used routinely in clinical work (e.g. vectocardiographic examination), or its versatility can be used for studies of limited duration to gain information in a given field or to study new diagnosis or treatment methods.

  2. Power systems signal processing for smart grids

    NARCIS (Netherlands)

    Ribeiro, P.F.; Duque, C.A.; Da Silveira, P.M.; Cerqueira, A.S.

    2013-01-01

    With special relation to smart grids, this book provides clear and comprehensive explanation of how Digital Signal Processing (DSP) and Computational Intelligence (CI) techniques can be applied to solve problems in the power system. Its unique coverage bridges the gap between DSP, electrical power

  3. Process Systems Engineering Education: Learning by Research

    Science.gov (United States)

    Abbas, A.; Alhammadi, H. Y.; Romagnoli, J. A.

    2009-01-01

    In this paper, we discuss our approach in teaching the final-year course Process Systems Engineering. Students are given ownership of the course by transferring to them the responsibility of learning. A project-based group environment stimulates learning while solving a real engineering problem. We discuss postgraduate student involvement and how…

  4. Modeling Kanban Processes in Systems Engineering

    Science.gov (United States)

    2012-06-01

    results in lower change traffic and defect incidence. • KSS: Incremental SE, with some design up-front and design continuing throughout development...Boston: Addison-Wesley. [11] Morgan, James M, and Jeffrey K Liker. (2006). The Toyota Product Development System: Integrating People, Process, and

  5. NJOY nuclear data processing system: user's manual

    International Nuclear Information System (INIS)

    MacFarlane, R.E.; Barrett, R.J.; Muir, D.W.; Boicourt, R.M.

    1978-12-01

    The NJOY nuclear data processing system is a comprehensive computer code package for producing cross sections for neutron and photon transport calculations from ENDF/B-IV and -V evaluated nuclear data. This user's manual provides a concise description of the code, input instructions, sample problems, and installation instructions. 1 figure, 3 tables

  6. Process-aware information systems : design, enactment and analysis

    NARCIS (Netherlands)

    Aalst, van der W.M.P.; Wah, B.W.

    2009-01-01

    Process-aware information systems support operational business processes by combining advances in information technology with recent insights from management science. Workflow management systems are typical examples of such systems. However, many other types of information systems are also "process

  7. Hide-Scrapers from Arukhlo I Settlement in Georgia (on correspondence of the shape and function of prehistoric implements

    Directory of Open Access Journals (Sweden)

    Esakia Ketevan M.

    2017-09-01

    Full Text Available The article analyses one of the primary categories of the implement complex discovered at Arukhlo I Neolithic settlement (Georgia, Kvemo Kartli Region. The stone implements discovered at the site are characterized by their great variety. Comprehensive functional research conducted by the authors demonstrated that the typological and morphological characteristics of the various categories of stone implements do not always correspond to their functions. Thus, the shapes and functions of the hide-scrapers were fully identical for 18 of 39 implements only, whereas the other tools were used for different purposes and did not feature traces of utilization. A microanalysis of their working parts allowed to determine the types of processed raw material, means of processing, and in certain cases the type of obtained articles as well. The authors made a conclusion on the importance of the comprehensive research of production inventory for the reconstruction of the characteristic features of prehistoric economy.

  8. A versatile scalable PET processing system

    International Nuclear Information System (INIS)

    Dong, H.; Weisenberger, A.; McKisson, J.; Wenze, Xi; Cuevas, C.; Wilson, J.; Zukerman, L.

    2011-01-01

    Positron Emission Tomography (PET) historically has major clinical and preclinical applications in cancerous oncology, neurology, and cardiovascular diseases. Recently, in a new direction, an application specific PET system is being developed at Thomas Jefferson National Accelerator Facility (Jefferson Lab) in collaboration with Duke University, University of Maryland at Baltimore (UMAB), and West Virginia University (WVU) targeted for plant eco-physiology research. The new plant imaging PET system is versatile and scalable such that it could adapt to several plant imaging needs - imaging many important plant organs including leaves, roots, and stems. The mechanical arrangement of the detectors is designed to accommodate the unpredictable and random distribution in space of the plant organs without requiring the plant be disturbed. Prototyping such a system requires a new data acquisition system (DAQ) and data processing system which are adaptable to the requirements of these unique and versatile detectors.

  9. Image processing system for flow pattern measurements

    International Nuclear Information System (INIS)

    Ushijima, Satoru; Miyanaga, Yoichi; Takeda, Hirofumi

    1989-01-01

    This paper describes the development and application of an image processing system for measurements of flow patterns occuring in natural circulation water flows. In this method, the motions of particles scattered in the flow are visualized by a laser light slit and they are recorded on normal video tapes. These image data are converted to digital data with an image processor and then transfered to a large computer. The center points and pathlines of the particle images are numerically analized, and velocity vectors are obtained with these results. In this image processing system, velocity vectors in a vertical plane are measured simultaneously, so that the two dimensional behaviors of various eddies, with low velocity and complicated flow patterns usually observed in natural circulation flows, can be determined almost quantitatively. The measured flow patterns, which were obtained from natural circulation flow experiments, agreed with photographs of the particle movements, and the validity of this measuring system was confirmed in this study. (author)

  10. System Enhancements for Mechanical Inspection Processes

    Science.gov (United States)

    Hawkins, Myers IV

    2011-01-01

    Quality inspection of parts is a major component to any project that requires hardware implementation. Keeping track of all of the inspection jobs is essential to having a smooth running process. By using HTML, the programming language ColdFusion, and the MySQL database, I created a web-based job management system for the 170 Mechanical Inspection Group that will replace the Microsoft Access based management system. This will improve the ways inspectors and the people awaiting inspection view and keep track of hardware as it is in the inspection process. In the end, the management system should be able to insert jobs into a queue, place jobs in and out of a bonded state, pre-release bonded jobs, and close out inspection jobs.

  11. Employing expert systems for process control

    International Nuclear Information System (INIS)

    Ahrens, W.

    1987-01-01

    The characteristic features of expert systems are explained in detail, and the systems' application in process control engineering. Four points of main interest are there, namely: Applications for diagnostic tasks, for safety analyses, planning, and training and expert training. For the modelling of the technical systems involved in all four task fields mentioned above, an object-centred approach has shown to be the suitable method, as process control techniques are determined by technical objects that in principle are specified by data sheets, schematic representations, flow charts, and plans. The graphical surface allows these data to be taken into account, so that the object can be displayed in the way best suited to the individual purposes. (orig./GL) [de

  12. Model systems for life processes on Mars

    Science.gov (United States)

    Mitz, M. A.

    1974-01-01

    In the evolution of life forms nonphotosynthetic mechanisms are developed. The question remains whether a total life system could evolve which is not dependent upon photosynthesis. In trying to visualize life on other planets, the photosynthetic process has problems. On Mars, the high intensity of light at the surface is a concern and alternative mechanisms need to be defined and analyzed. In the UV search for alternate mechanisms, several different areas may be identified. These involve activated inorganic compounds in the atmosphere, such as the products of photodissociation of carbon dioxide and the organic material which may be created by natural phenomena. In addition, a life system based on the pressure of the atmospheric constituents, such as carbon dioxide, is a possibility. These considerations may be important for the understanding of evolutionary processes of life on another planet. Model systems which depend on these alternative mechanisms are defined and related to presently planned and future planetary missions.

  13. Minicomputer controlled test system for process control and monitoring systems

    International Nuclear Information System (INIS)

    Worster, L.D.

    A minicomputer controlled test system for testing process control and monitoring systems is described. This system, in service for over one year, has demonstrated that computerized control of such testing has a real potential for expanding the scope of the testing, improving accuracy of testing, and significantly reducing the time required to do the testing. The test system is built around a 16-bit minicomputer with 12K of memory. The system programming language is BASIC with the addition of assembly level routines for communication with the peripheral devices. The peripheral devices include a 100 channel scanner, analog-to-digital converter, visual display, and strip printer. (auth)

  14. Systemic analysis of the caulking assembly process

    Directory of Open Access Journals (Sweden)

    Rodean Claudiu

    2017-01-01

    Full Text Available The present paper highlights the importance of a caulking process which is nowadays less studied in comparison with the growing of its usage in the automotive industry. Due to the fact that the caulking operation is used in domains with high importance such as shock absorbers and brake systems there comes the demand of this paper to detail the parameters which characterize the process, viewed as input data and output data, and the requirements asked for the final product. The paper presents the actual measurement methods used for analysis the performance of the caulking assembly. All this parameters leads to an analysis algorithm of performance established for the caulking process which it is used later in the paper for an experimental research. The study is a basis from which it will be able to go to further researches in order to optimize the following processing.

  15. Multiple-image hiding using super resolution reconstruction in high-frequency domains

    Science.gov (United States)

    Li, Xiao-Wei; Zhao, Wu-Xiang; Wang, Jun; Wang, Qiong-Hua

    2017-12-01

    In this paper, a robust multiple-image hiding method using the computer-generated integral imaging and the modified super-resolution reconstruction algorithm is proposed. In our work, the host image is first transformed into frequency domains by cellular automata (CA), to assure the quality of the stego-image, the secret images are embedded into the CA high-frequency domains. The proposed method has the following advantages: (1) robustness to geometric attacks because of the memory-distributed property of elemental images, (2) increasing quality of the reconstructed secret images as the scheme utilizes the modified super-resolution reconstruction algorithm. The simulation results show that the proposed multiple-image hiding method outperforms other similar hiding methods and is robust to some geometric attacks, e.g., Gaussian noise and JPEG compression attacks.

  16. Separable Reversible Data Hiding in Encrypted Signals with Public Key Cryptography

    Directory of Open Access Journals (Sweden)

    Wei-Liang Tai

    2018-01-01

    Full Text Available We propose separable reversible data hiding in an encrypted signal with public key cryptography. In our separable framework, the image owner encrypts the original image by using a public key. On receipt of the encrypted signal, the data-hider embeds data in it by using a data-hiding key. The image decryption and data extraction are independent and separable at the receiver side. Even though the receiver, who has only the data-hiding key, does not learn about the decrypted content, he can extract data from the received marked encrypted signal. However, the receiver who has only the private key cannot extract the embedded data, but he can directly decrypt the received marked encrypted signal to obtain the original image without any error. Compared with other schemes using a cipher stream to encrypt the image, the proposed scheme is more appropriate for cloud services without degrading the security level.

  17. Radio frequency tags systems to initiate system processing

    Science.gov (United States)

    Madsen, Harold O.; Madsen, David W.

    1994-09-01

    This paper describes the automatic identification technology which has been installed at Applied Magnetic Corp. MR fab. World class manufacturing requires technology exploitation. This system combines (1) FluoroTrac cassette and operator tracking, (2) CELLworks cell controller software tools, and (3) Auto-Soft Inc. software integration services. The combined system eliminates operator keystrokes and errors during normal processing within a semiconductor fab. The methods and benefits of this system are described.

  18. System THEMIS. Cross sections processing system from ENDF/B

    Energy Technology Data Exchange (ETDEWEB)

    Gonnord, J.

    1983-09-01

    The THEMIS system allowed to prepare a self punctual and multigroup library for codes solving the TRIPOLI-PROMETHEE transport equation, allowing comparisons with different methods and approximations. The contents of the THEMIS data base was fixed from its use by the PROMETHEE system (punctual Monte Carlo calculations, multigroup calculations, uncertainties analysis and sensitivity studies). The main characteristics of the THEMIS cross section processing system are briefly presented.

  19. System THEMIS. Cross sections processing system from ENDF/B

    International Nuclear Information System (INIS)

    Gonnord, J.

    1983-09-01

    The THEMIS system allowed to prepare a self punctual and multigroup library for codes solving the TRIPOLI-PROMETHEE transport equation, allowing comparisons with different methods and approximations. The contents of the THEMIS data base was fixed from its use by the PROMETHEE system (punctual Monte Carlo calculations, multigroup calculations, uncertainties analysis and sensitivity studies). The main characteristics of the THEMIS cross section processing system are briefly presented [fr

  20. Intelligent Adaptation Process for Case Based Systems

    International Nuclear Information System (INIS)

    Nassar, A.M.; Mohamed, A.H.; Mohamed, A.H.

    2014-01-01

    Case Based Reasoning (CBR) Systems is one of the important decision making systems applied in many fields all over the world. The effectiveness of any CBR system based on the quality of the storage cases in the case library. Similar cases can be retrieved and adapted to produce the solution for the new problem. One of the main issues faced the CBR systems is the difficulties of achieving the useful cases. The proposed system introduces a new approach that uses the genetic algorithm (GA) technique to automate constructing the cases into the case library. Also, it can optimize the best one to be stored in the library for the future uses. However, the proposed system can avoid the problems of the uncertain and noisy cases. Besides, it can simply the retrieving and adaptation processes. So, it can improve the performance of the CBR system. The suggested system can be applied for many real-time problems. It has been applied for diagnosis the faults of the wireless network, diagnosis of the cancer diseases, diagnosis of the debugging of a software as cases of study. The proposed system has proved its performance in this field

  1. Data processing systems for clinical nuclear medicine

    International Nuclear Information System (INIS)

    Winkler, C.; Knopp, R.

    1975-01-01

    The model studies on the above mentioned data processing demonstration systems have shown that the development of a modular process computer with an applicable operation system makes it possible to meet the special demands of any nuclear-medical clinical centre corresponding to its capacity and finances. The respective first draft of the compact system described was discussed by a major circle of competent specialists at the DP-meeting of the Rheinisch-Westfaelische Gesellschaft fuer Nuklearmedizin in 1974. The positive response which the draft was met with confirmes our opinion that in the future equipment of the nuclear-medical institutions with DP-systems the universal applicability of these systems in operation with several participants and the implementation of clinically tested user's software should have priority over all other things. The development of the compact system, which is being carried out with the help of the Federal Ministry for Research and Technology will be instrumental in creating the preconditions necessary. It will be fully available in 1977 and is even expected to be completed in its partial functions (such as camera scanning, renal clearance, evaluation of laboratory data) in 1976 already. (orig.) [de

  2. Uranium bed oxidation vacuum process system

    International Nuclear Information System (INIS)

    McLeland, H.L.

    1977-01-01

    Deuterium and tritium gases are occluded in uranium powder for release into neutron generator tubes. The uranium powder is contained in stainless steel bottles, termed ''beds.'' If these beds become damaged, the gases must be removed and the uranium oxidized in order not to be flammable before shipment to ERDA disposal grounds. This paper describes the system and methods designed for the controlled degassing and oxidation process. The system utilizes sputter-ion, cryo-sorption and bellows pumps for removing the gases from the heated source bed. Removing the tritium gas is complicated by the shielding effect of helium-3, a byproduct of tritium decay. This effect is minimized by incremental pressure changes, or ''batch'' processing. To prevent runaway exothermic reaction, oxidation of the uranium bed is also done incrementally, or by ''batch'' processing, rather than by continuous flow. The paper discusses in detail the helium-3 shielding effect, leak checks that must be made during processing, bed oxidation, degree of gas depletion, purity of gases sorbed from beds, radioactivity of beds, bed disposal and system renovation

  3. Processing a difficult urethane elastomer system

    International Nuclear Information System (INIS)

    Gillespie, T.J.

    1977-01-01

    A detailed study of an adiprene/butanediol/trimethylolpropane elastomer system and the associated production process was performed to assess the importance of various processing factors on the physical properties of the system. Results indicated that control of the curing cycle, material ratio, moisture in the curing agent and elastomer, mixing, and vacuum level was necessary. Sufficient control of the manual process could not be obtained to eliminate significant physical property variability. An automatic metering, mixing and dispensing machine was purchased for laboratory evaluation. After modification, including the addition of a high shear vacuum type mixer, and with close vacuum and temperature control, material property variability was still at an unacceptable level. A tracer agent was introduced into the curing agent system to assess the distribution of the curing agent in the elastomer. Machine evaluation using the tracer agent indicated that distribution of the curing agent in the elastomer was very poor is spite of the high shear mixing configuration. The addition of an oscillating motion to the mixing configuration. The addition of an oscillating motion to the mixing system significantly improved curing agent distribution and eliminated material property variability problems. 16 figures, 3 tables

  4. Process simulation in digital camera system

    Science.gov (United States)

    Toadere, Florin

    2012-06-01

    The goal of this paper is to simulate the functionality of a digital camera system. The simulations cover the conversion from light to numerical signal and the color processing and rendering. We consider the image acquisition system to be linear shift invariant and axial. The light propagation is orthogonal to the system. We use a spectral image processing algorithm in order to simulate the radiometric properties of a digital camera. In the algorithm we take into consideration the transmittances of the: light source, lenses, filters and the quantum efficiency of a CMOS (complementary metal oxide semiconductor) sensor. The optical part is characterized by a multiple convolution between the different points spread functions of the optical components. We use a Cooke triplet, the aperture, the light fall off and the optical part of the CMOS sensor. The electrical part consists of the: Bayer sampling, interpolation, signal to noise ratio, dynamic range, analog to digital conversion and JPG compression. We reconstruct the noisy blurred image by blending different light exposed images in order to reduce the photon shot noise, also we filter the fixed pattern noise and we sharpen the image. Then we have the color processing blocks: white balancing, color correction, gamma correction, and conversion from XYZ color space to RGB color space. For the reproduction of color we use an OLED (organic light emitting diode) monitor. The analysis can be useful to assist students and engineers in image quality evaluation and imaging system design. Many other configurations of blocks can be used in our analysis.

  5. Process and control systems for composites manufacturing

    Science.gov (United States)

    Tsiang, T. H.; Wanamaker, John L.

    1992-01-01

    A precise control of composite material processing would not only improve part quality, but it would also directly reduce the overall manufacturing cost. The development and incorporation of sensors will help to generate real-time information for material processing relationships and equipment characteristics. In the present work, the thermocouple, pressure transducer, and dielectrometer technologies were investigated. The monitoring sensors were integrated with the computerized control system in three non-autoclave fabrication techniques: hot-press, self contained tool (self heating and pressurizing), and pressure vessel). The sensors were implemented in the parts and tools.

  6. Process and system for removing tritium

    International Nuclear Information System (INIS)

    Ridgely, J.N.

    1976-01-01

    A process and system for removing tritium, particularly from high temperature gas cooled atomic reactors (HTGR), is disclosed. Portions of the reactor coolant, which is permeated with the pervasive tritium atom, are processed to remove the tritium. Under conditions of elevated temperature and pressure, the reactor coolant is combined with gaseous oxygen, resulting in the formation of tritiated water vapor from the tritium in the reactor coolant and the gaseous oxygen. The tritiated water vapor and the remaining gaseous oxygen are then successively removed by fractional liquefaction steps. The reactor coolant is then recirculated to the reactor

  7. Application engineering for process computer systems

    International Nuclear Information System (INIS)

    Mueller, K.

    1975-01-01

    The variety of tasks for process computers in nuclear power stations necessitates the centralization of all production stages from the planning stage to the delivery of the finished process computer system (PRA) to the user. This so-called 'application engineering' comprises all of the activities connected with the application of the PRA: a) establishment of the PRA concept, b) project counselling, c) handling of offers, d) handling of orders, e) internal handling of orders, f) technical counselling, g) establishing of parameters, h) monitoring deadlines, i) training of customers, j) compiling an operation manual. (orig./AK) [de

  8. Penn State astronomical image processing system

    International Nuclear Information System (INIS)

    Truax, R.J.; Nousek, J.A.; Feigelson, E.D.; Lonsdale, C.J.

    1987-01-01

    The needs of modern astronomy for image processing set demanding standards in simultaneously requiring fast computation speed, high-quality graphic display, large data storage, and interactive response. An innovative image processing system was designed, integrated, and used; it is based on a supermicro architecture which is tailored specifically for astronomy, which provides a highly cost-effective alternative to the traditional minicomputer installation. The paper describes the design rationale, equipment selection, and software developed to allow other astronomers with similar needs to benefit from the present experience. 9 references

  9. Plasma-chemical processes and systems

    International Nuclear Information System (INIS)

    Castro B, J.

    1987-01-01

    The direct applications of plasma technology on chemistry and metallurgy are presented. The physical fundaments of chemically active non-equilibrium plasma, the reaction kinetics, and the physical chemical transformations occuring in the electrical discharges, which are applied in the industry, are analysed. Some plasma chemical systems and processes related to the energy of hydrogen, with the chemical technology and with the metallurgy are described. Emphasis is given to the optimization of the energy effectiveness of these processes to obtain reducers and artificial energetic carriers. (M.C.K.) [pt

  10. Hiding a Covert Digital Image by Assembling the RSA Encryption Method and the Binary Encoding Method

    OpenAIRE

    Kuang Tsan Lin; Sheng Lih Yeh

    2014-01-01

    The Rivest-Shamir-Adleman (RSA) encryption method and the binary encoding method are assembled to form a hybrid hiding method to hide a covert digital image into a dot-matrix holographic image. First, the RSA encryption method is used to transform the covert image to form a RSA encryption data string. Then, all the elements of the RSA encryption data string are transferred into binary data. Finally, the binary data are encoded into the dot-matrix holographic image. The pixels of the dot-matri...

  11. MIDAS - ESO's new image processing system

    Science.gov (United States)

    Banse, K.; Crane, P.; Grosbol, P.; Middleburg, F.; Ounnas, C.; Ponz, D.; Waldthausen, H.

    1983-03-01

    The Munich Image Data Analysis System (MIDAS) is an image processing system whose heart is a pair of VAX 11/780 computers linked together via DECnet. One of these computers, VAX-A, is equipped with 3.5 Mbytes of memory, 1.2 Gbytes of disk storage, and two tape drives with 800/1600 bpi density. The other computer, VAX-B, has 4.0 Mbytes of memory, 688 Mbytes of disk storage, and one tape drive with 1600/6250 bpi density. MIDAS is a command-driven system geared toward the interactive user. The type and number of parameters in a command depends on the unique parameter invoked. MIDAS is a highly modular system that provides building blocks for the undertaking of more sophisticated applications. Presently, 175 commands are available. These include the modification of the color-lookup table interactively, to enhance various image features, and the interactive extraction of subimages.

  12. Sedimentation process and design of settling systems

    CERN Document Server

    De, Alak

    2017-01-01

    This book is designed to serve as a comprehensive source of information of sedimentation processes and design of settling systems, especially as applied to design of such systems in civil and environmental engineering. The book begins with an introduction to sedimentation as a whole and goes on to cover the development and details of various settling theories. The book traces the chronological developments of the comprehensive knowledge of settling studies and design of settling systems from 1889.A new concept of 'Velocity Profile Theorem', tool for settling problem analysis, has been employed to the analysis of the phenomenon of short circuiting. Complete theory of tube settling has been developed and its application to the computation of residual solids from the assorted solids through the same has been demonstrated. Experimental verification of the tube settling theory has also been presented. Field-oriented compatible design and operation methodology of settling system has been developed from the detailed...

  13. Intelligent systems for KSC ground processing

    Science.gov (United States)

    Heard, Astrid E.

    1992-01-01

    The ground processing and launch of Shuttle vehicles and their payloads is the primary task of Kennedy Space Center. It is a process which is largely manual and contains little inherent automation. Business is conducted today much as it was during previous NASA programs such as Apollo. In light of new programs and decreasing budgets, NASA must find more cost effective ways in which to do business while retaining the quality and safety of activities. Advanced technologies including artificial intelligence could cut manpower and processing time. This paper is an overview of the research and development in Al technology at KSC with descriptions of the systems which have been implemented, as well as a few under development which are promising additions to ground processing software. Projects discussed cover many facets of ground processing activities, including computer sustaining engineering, subsystem monitor and diagnosis tools and launch team assistants. The deployed Al applications have proven an effectiveness which has helped to demonstrate the benefits of utilizing intelligent software in the ground processing task.

  14. Solar thermochemical processing system and method

    Science.gov (United States)

    Wegeng, Robert S.; Humble, Paul H.; Krishnan, Shankar; Leith, Steven D.; Palo, Daniel R.; Dagle, Robert A.

    2018-04-24

    A solar thermochemical processing system is disclosed. The system includes a first unit operation for receiving concentrated solar energy. Heat from the solar energy is used to drive the first unit operation. The first unit operation also receives a first set of reactants and produces a first set of products. A second unit operation receives the first set of products from the first unit operation and produces a second set of products. A third unit operation receives heat from the second unit operation to produce a portion of the first set of reactants.

  15. Remote nuclear green pellet processing system

    International Nuclear Information System (INIS)

    Cellier, Francis.

    1980-01-01

    An automated system for manufacturing nuclear fuel pellets for use in nuclear fuel elements of nuclear power reactors is described. The system comprises process components arranged vertically but not directly under each other within a single enclosure. The vertical-lateral arrangement provides for gravity flow of the product from one component to the next and for removal of each component without interference with the other components. The single enclosure eliminates time consuming transfer between separate enclosures of each component while providing three-sided access to the component through glove ports. (auth)

  16. Waste processing system for nuclear power plant

    International Nuclear Information System (INIS)

    Higashinakagawa, Emiko; Tezuka, Fuminobu; Maesawa, Yukishige; Irie, Hiromitsu; Daibu, Etsuji.

    1996-01-01

    The present invention concerns a waste processing system of a nuclear power plant, which can reduce the volume of a large amount of plastics without burying them. Among burnable wastes and plastic wastes to be discarded in the power plant located on the sea side, the plastic wastes are heated and converted into oils, and the burnable wastes are burnt using the oils as a fuel. The system is based on the finding that the presence of Na 2 O, K 2 O contained in the wastes catalytically improves the efficiency of thermal decomposition in a heating atmosphere, in the method of heating plastics and converting them into oils. (T.M.)

  17. Advanced alarm systems: Display and processing issues

    Energy Technology Data Exchange (ETDEWEB)

    O`Hara, J.M. [Brookhaven National Lab., Upton, NY (United States); Wachtel, J.; Perensky, J. [US Nuclear Regulatory Commission, Washington, DC (United States). Office of Nuclear Regulatory Research

    1995-05-01

    This paper describes a research program sponsored by the US Nuclear Regulatory Commission to address the human factors engineering (HFE) deficiencies associated with nuclear power plant alarm systems. The overall objective of the study is to develop HFE review guidance for alarm systems. In support of this objective, human performance issues needing additional research were identified. Among the important issues were alarm processing strategies and alarm display techniques. This paper will discuss these issues and briefly describe our current research plan to address them.

  18. Computer performance optimization systems, applications, processes

    CERN Document Server

    Osterhage, Wolfgang W

    2013-01-01

    Computing power performance was important at times when hardware was still expensive, because hardware had to be put to the best use. Later on this criterion was no longer critical, since hardware had become inexpensive. Meanwhile, however, people have realized that performance again plays a significant role, because of the major drain on system resources involved in developing complex applications. This book distinguishes between three levels of performance optimization: the system level, application level and business processes level. On each, optimizations can be achieved and cost-cutting p

  19. Fuzzy systems for process identification and control

    International Nuclear Information System (INIS)

    Gorrini, V.; Bersini, H.

    1994-01-01

    Various issues related to the automatic construction and on-line adaptation of fuzzy controllers are addressed. A Direct Adaptive Fuzzy Control (this is an adaptive control methodology requiring a minimal knowledge of the processes to be coupled with) derived in a way reminiscent of neurocontrol methods, is presented. A classical fuzzy controller and a fuzzy realization of a PID controller is discussed. These systems implement a highly non-linear control law, and provide to be quite robust, even in the case of noisy inputs. In order to identify dynamic processes of order superior to one, we introduce a more complex architecture, called Recurrent Fuzzy System, that use some fuzzy internal variables to perform an inferential chaining.I

  20. Security of legacy process control systems : Moving towards secure process control systems

    NARCIS (Netherlands)

    Oosterink, M.

    2012-01-01

    This white paper describes solutions which organisations may use to improve the security of their legacy process control systems. When we refer to a legacy system, we generally refer to old methodologies, technologies, computer systems or applications which are still in use, despite the fact that

  1. Process for Selecting System Level Assessments for Human System Technologies

    Science.gov (United States)

    Watts, James; Park, John

    2006-01-01

    The integration of many life support systems necessary to construct a stable habitat is difficult. The correct identification of the appropriate technologies and corresponding interfaces is an exhaustive process. Once technologies are selected secondary issues such as mechanical and electrical interfaces must be addressed. The required analytical and testing work must be approached in a piecewise fashion to achieve timely results. A repeatable process has been developed to identify and prioritize system level assessments and testing needs. This Assessment Selection Process has been defined to assess cross cutting integration issues on topics at the system or component levels. Assessments are used to identify risks, encourage future actions to mitigate risks, or spur further studies.

  2. Inert atmosphere system for plutonium processing gloveboxes

    International Nuclear Information System (INIS)

    Bogard, C.F.; Calkins, K.W.; Rogers, R.F.

    1975-01-01

    Recent efforts to reduce fire hazards in plutonium processing operations are described. In such operations, the major environmental controls are developed through various kinds of glovebox systems. In evaluating the air-atmosphere glovebox systems, formerly in use at Rocky Flats and many other plants, a decision was made to convert to a recirculating ''inert'' atmosphere. The inert atmosphere consists of nitrogen, supplied from an on-site generating plant, diluting oxygen content to one to 5 percent by volume. Problems encountered during the change over included: determination of all factors influencing air leakage into the system, and reducing leakage to the practical minimum; meeting all fire and safety standards on the filter plenum and exhaust systems; provision for converting portions of the system to an air atmosphere to conduct maintenance work; inclusion of oxygen analyzers throughout the system to check gas quality and monitor for leaks; and the use of automatic controls to protect against a variety of potential malfunctions. The current objectives to reduce fire hazards have been met and additional safeguards were added. The systems are operating satisfactorily. (U.S.)

  3. Status of JT-60 data processing system

    International Nuclear Information System (INIS)

    Matsuda, T.; Tsugita, T.; Oshima, T.; Sakata, S.; Sato, M.; Koiwa, M.; Aoyagi, T.

    2000-01-01

    The JT-60 data processing system is a large computer complex and gradually modernized by utilizing progressing computer and network technology. There are two major changes in our system. A main computer of FACOM M-780 has been replaced with compatible GS8300 using state-of-art CMOS technology, which results in lower power and space usage with nearly the same performance. Now it can handle ∼500 MB of data per discharge. A gigabit ethernet switch with FDDI ports has been introduced to cope with the increase of handling data. The switch will connect a tera-byte (TB) data server at the bandwidth of a gigabit per second with the main computer and many data acquisition workstations. Other developments in our system are the realization of three workstation-based plans, the TB data server, the VME-based fast data acquisition system and a CICU. The TB data server is basically a UNIX workstation with ∼100 GB RAID disks and ∼900 GB MO auto-exchangers. The VME-based fast data acquisition system has been developed to enlarge the present TMDS. The CICU, which has a function of interfacing the main computer with the CAMAC system, has been replaced with the workstation-based system after the fine tuning

  4. Preservation of bovine hide using less salt with low concentration of antiseptic, part I: effectiveness of developed formulations

    Science.gov (United States)

    Bovine raw hides are commercially cured either with high salt concentration of about half the weight of actual hide or 95% saturated brine solution. This conventional technique is very popular due to the availability of common salt (sodium chloride) and its cost effective procedure but it generates ...

  5. Method of controlling radioactive waste processing systems

    International Nuclear Information System (INIS)

    Mikawa, Hiroji; Sato, Takao.

    1981-01-01

    Purpose: To minimize the pellet production amount, maximize the working life of a solidifying device and maintaining the mechanical strength of pellets to a predetermined value irrespective of the type and the cycle of occurrence of the secondary waste in the secondary waste solidifying device for radioactive waste processing systems in nuclear power plants. Method: Forecasting periods for the type, production amount and radioactivity level of the secondary wastes are determined in input/output devices connected to a control system and resulted signals are sent to computing elements. The computing elements forecast the production amount of regenerated liquid wastes after predetermined days based on the running conditions of a condensate desalter and the production amounts of filter sludges and liquid resin wastes after predetermined days based on the liquid waste processing amount or the like in a processing device respectively. Then, the mass balance between the type and the amount of the secondary wastes presently stored in a tank are calculated and the composition and concentration for the processing liquid are set so as to obtain predetermined values for the strength of pellets that can be dried to solidify, the working life of the solidifying device itself and the radioactivity level of the pellets. Thereafter, the running conditions for the solidifying device are determined so as to maximize the working life of the solidifying device. (Horiuchi, T.)

  6. Graphics Processing Units for HEP trigger systems

    International Nuclear Information System (INIS)

    Ammendola, R.; Bauce, M.; Biagioni, A.; Chiozzi, S.; Cotta Ramusino, A.; Fantechi, R.; Fiorini, M.; Giagu, S.; Gianoli, A.; Lamanna, G.; Lonardo, A.; Messina, A.

    2016-01-01

    General-purpose computing on GPUs (Graphics Processing Units) is emerging as a new paradigm in several fields of science, although so far applications have been tailored to the specific strengths of such devices as accelerator in offline computation. With the steady reduction of GPU latencies, and the increase in link and memory throughput, the use of such devices for real-time applications in high-energy physics data acquisition and trigger systems is becoming ripe. We will discuss the use of online parallel computing on GPU for synchronous low level trigger, focusing on CERN NA62 experiment trigger system. The use of GPU in higher level trigger system is also briefly considered.

  7. Integrated system for automated financial document processing

    Science.gov (United States)

    Hassanein, Khaled S.; Wesolkowski, Slawo; Higgins, Ray; Crabtree, Ralph; Peng, Antai

    1997-02-01

    A system was developed that integrates intelligent document analysis with multiple character/numeral recognition engines in order to achieve high accuracy automated financial document processing. In this system, images are accepted in both their grayscale and binary formats. A document analysis module starts by extracting essential features from the document to help identify its type (e.g. personal check, business check, etc.). These features are also utilized to conduct a full analysis of the image to determine the location of interesting zones such as the courtesy amount and the legal amount. These fields are then made available to several recognition knowledge sources such as courtesy amount recognition engines and legal amount recognition engines through a blackboard architecture. This architecture allows all the available knowledge sources to contribute incrementally and opportunistically to the solution of the given recognition query. Performance results on a test set of machine printed business checks using the integrated system are also reported.

  8. Graphics Processing Units for HEP trigger systems

    Energy Technology Data Exchange (ETDEWEB)

    Ammendola, R. [INFN Sezione di Roma “Tor Vergata”, Via della Ricerca Scientifica 1, 00133 Roma (Italy); Bauce, M. [INFN Sezione di Roma “La Sapienza”, P.le A. Moro 2, 00185 Roma (Italy); University of Rome “La Sapienza”, P.lee A.Moro 2, 00185 Roma (Italy); Biagioni, A. [INFN Sezione di Roma “La Sapienza”, P.le A. Moro 2, 00185 Roma (Italy); Chiozzi, S.; Cotta Ramusino, A. [INFN Sezione di Ferrara, Via Saragat 1, 44122 Ferrara (Italy); University of Ferrara, Via Saragat 1, 44122 Ferrara (Italy); Fantechi, R. [INFN Sezione di Pisa, Largo B. Pontecorvo 3, 56127 Pisa (Italy); CERN, Geneve (Switzerland); Fiorini, M. [INFN Sezione di Ferrara, Via Saragat 1, 44122 Ferrara (Italy); University of Ferrara, Via Saragat 1, 44122 Ferrara (Italy); Giagu, S. [INFN Sezione di Roma “La Sapienza”, P.le A. Moro 2, 00185 Roma (Italy); University of Rome “La Sapienza”, P.lee A.Moro 2, 00185 Roma (Italy); Gianoli, A. [INFN Sezione di Ferrara, Via Saragat 1, 44122 Ferrara (Italy); University of Ferrara, Via Saragat 1, 44122 Ferrara (Italy); Lamanna, G., E-mail: gianluca.lamanna@cern.ch [INFN Sezione di Pisa, Largo B. Pontecorvo 3, 56127 Pisa (Italy); INFN Laboratori Nazionali di Frascati, Via Enrico Fermi 40, 00044 Frascati (Roma) (Italy); Lonardo, A. [INFN Sezione di Roma “La Sapienza”, P.le A. Moro 2, 00185 Roma (Italy); Messina, A. [INFN Sezione di Roma “La Sapienza”, P.le A. Moro 2, 00185 Roma (Italy); University of Rome “La Sapienza”, P.lee A.Moro 2, 00185 Roma (Italy); and others

    2016-07-11

    General-purpose computing on GPUs (Graphics Processing Units) is emerging as a new paradigm in several fields of science, although so far applications have been tailored to the specific strengths of such devices as accelerator in offline computation. With the steady reduction of GPU latencies, and the increase in link and memory throughput, the use of such devices for real-time applications in high-energy physics data acquisition and trigger systems is becoming ripe. We will discuss the use of online parallel computing on GPU for synchronous low level trigger, focusing on CERN NA62 experiment trigger system. The use of GPU in higher level trigger system is also briefly considered.

  9. Biointervention makes leather processing greener: an integrated cleansing and tanning system.

    Science.gov (United States)

    Thanikaivelan, Palanisamy; Rao, Jonnalagadda Raghava; Nair, Balachandran Unni; Ramasami, Thirumalachari

    2003-06-01

    The do-undo methods adopted in conventional leather processing generate huge amounts of pollutants. In other words, conventional methods employed in leather processing subject the skin/hide to wide variations in pH. Pretanning and tanning processes alone contribute more than 90% of the total pollution from leather processing. Included in this is a great deal of solid wastes such as lime and chrome sludge. In the approach described here, the hair and flesh removal as well as fiber opening have been achieved using biocatalysts at pH 8.0 for cow hides. This was followed by a pickle-free chrome tanning, which does not require a basification step. Hence, this tanning technique involves primarily three steps, namely, dehairing, fiber opening, and tanning. It has been found that the extent of hair removal, opening up of fiber bundles, and penetration and distribution of chromium are comparable to that produced by traditional methods. This has been substantiated through scanning electron microscopic, stratigraphic chrome distribution analysis, and softness measurements. Performance of the leathers is shown to be on par with conventionally processed leathers through physical and hand evaluation. Importantly, softness of the leathers is numerically proven to be comparable with that of control. The process also demonstrates reduction in chemical oxygen demand load by 80%, total solids load by 85%, and chromium load by 80% as compared to the conventional process, thereby leading toward zero discharge. The input-output audit shows that the biocatalytic three-step tanning process employs a very low amount of chemicals, thereby reducing the discharge by 90% as compared to the conventional multistep processing. Furthermore, it is also demonstrated that the process is technoeconomically viable.

  10. Stochastic transport processes in discrete biological systems

    CERN Document Server

    Frehland, Eckart

    1982-01-01

    These notes are in part based on a course for advanced students in the applications of stochastic processes held in 1978 at the University of Konstanz. These notes contain the results of re­ cent studies on the stochastic description of ion transport through biological membranes. In particular, they serve as an introduction to an unified theory of fluctuations in complex biological transport systems. We emphasize that the subject of this volume is not to introduce the mathematics of stochastic processes but to present a field of theoretical biophysics in which stochastic methods are important. In the last years the study of membrane noise has become an important method in biophysics. Valuable information on the ion transport mechanisms in membranes can be obtained from noise analysis. A number of different processes such as the opening and closing of ion channels have been shown to be sources of the measured current or voltage fluctuations. Bio­ logical 'transport systems can be complex. For example, the tr...

  11. Advances in Packaging Methods, Processes and Systems

    Directory of Open Access Journals (Sweden)

    Nitaigour Premchand Mahalik

    2014-10-01

    Full Text Available The food processing and packaging industry is becoming a multi-trillion dollar global business. The reason is that the recent increase in incomes in traditionally less economically developed countries has led to a rise in standards of living that includes a significantly higher consumption of packaged foods. As a result, food safety guidelines have been more stringent than ever. At the same time, the number of research and educational institutions—that is, the number of potential researchers and stakeholders—has increased in the recent past. This paper reviews recent developments in food processing and packaging (FPP, keeping in view the aforementioned advancements and bearing in mind that FPP is an interdisciplinary area in that materials, safety, systems, regulation, and supply chains play vital roles. In particular, the review covers processing and packaging principles, standards, interfaces, techniques, methods, and state-of-the-art technologies that are currently in use or in development. Recent advances such as smart packaging, non-destructive inspection methods, printing techniques, application of robotics and machineries, automation architecture, software systems and interfaces are reviewed.

  12. Disease processes as hybrid dynamical systems

    Directory of Open Access Journals (Sweden)

    Pietro Liò

    2012-08-01

    Full Text Available We investigate the use of hybrid techniques in complex processes of infectious diseases. Since predictive disease models in biomedicine require a multiscale approach for understanding the molecule-cell-tissue-organ-body interactions, heterogeneous methodologies are often employed for describing the different biological scales. Hybrid models provide effective means for complex disease modelling where the action and dosage of a drug or a therapy could be meaningfully investigated: the infection dynamics can be classically described in a continuous fashion, while the scheduling of multiple treatment discretely. We define an algebraic language for specifying general disease processes and multiple treatments, from which a semantics in terms of hybrid dynamical system can be derived. Then, the application of control-theoretic tools is proposed in order to compute the optimal scheduling of multiple therapies. The potentialities of our approach are shown in the case study of the SIR epidemic model and we discuss its applicability on osteomyelitis, a bacterial infection affecting the bone remodelling system in a specific and multiscale manner. We report that formal languages are helpful in giving a general homogeneous formulation for the different scales involved in a multiscale disease process; and that the combination of hybrid modelling and control theory provides solid grounds for computational medicine.

  13. Irreversible processes in quantum mechanical systems

    International Nuclear Information System (INIS)

    Talkner, P.

    1979-01-01

    Although the information provided by the evolution of the density matrix of a quantum system is equivalent with the knowledge of all observables at a given time, it turns out ot be insufficient to answer certain questions in quantum optics or linear response theory where the commutator of certain observables at different space-time points is needed. In this doctoral thesis we prove the existence of density matrices for common probabilities at multiple times and discuss their properties and their characterization independent of a special representation. We start with a compilation of definitions and properties of classical common probabilities and correlation functions. In the second chapter we give the definition of a quantum mechanical Markov process and derive the properties of propagators, generators and conditional probabilities as well as their mutual relations. The third chapter is devoted to a treatment of quantum mechanical systems in thermal equilibrium for which the principle of detailed balance holds as a consequence of microreversibility. We work out the symmetry properties of the two-sided correlation functions which turn out to be analogous to those in classical processes. In the final chapter we use the Gaussian behavior of the stationary correlation function of an oscillator and determine a class of Markov processes which are characterized by dissipative Lionville operators. We succeed in obtaining the canonical representation in a purely algebraic way by means of similarity transformations. Starting from this representation it is particularly easy to calculate the propagator and the correlation function. (HJ) 891 HJ/HJ 892 MKO

  14. Examples of data processing systems. Data processing system for JT-60

    International Nuclear Information System (INIS)

    Aoyagi, Tetsuo

    1996-01-01

    JT-60 data processing system is a large computer complex system including a lot of micro-computers, several mini-computers, and a main-frame computer. As general introduction of the original system configuration has been published previously, some improvements are described here. Transient mass data storage system, network database server, a data acquisition system using engineering workstations, and a graphic terminal emulator for X-Window are presented. These new features are realized by utilizing recent progress in computer and network technology and carefully designed user interface specification of the original system. (author)

  15. Variation in the Level of Grain Defect Light Flecks and Spots on Cattle Hides

    Science.gov (United States)

    Nafstad, O; Grønstøl, H

    2001-01-01

    The occurrence of hide damage light flecks and spots was determined on tanned hides from 28 herds during a period of 8 to 12 months. Light flecks and spots are described as small areas of grain loss up to 3 mm in diameter that are seen on dyed crust cattle leather. Damage was found on 75.8% of all hides. The neck and shoulders were the anatomical region with the highest prevalence of damage. Sixty-eight per cent of all hides had light flecks and spots in this region. The forelimbs and dewlap were the anatomical region with the second highest occurrence with a prevalence of 39.1%. This distribution corresponded to the known distribution of lice in cattle. No significant differences were observed in age, sex, prevalence of lice in the herd assessed in March or infestations with different lice species. The frequency of light flecks and spots varied significantly during the year. The frequency was highest in the late winter and early spring, decreased significantly during the summer and was lowest in the autumn. This variation supported the importance of lice in the development of light flecks and spots and suggested a relatively long healing period for the damages induced by lice. PMID:11455905

  16. The impact of a gender and business training on income hiding

    NARCIS (Netherlands)

    Bulte, Erwin H.; Lensink, Robert; Winkel, Anne B.

    2018-01-01

    We use a randomized controlled trial and behavioral game to study the extent and determinants of income hiding in rural Vietnam. We focus on a training program that aims to promote gender equality and entrepreneurship among women in poverty who are engaged in running a small business. In one

  17. Effect of hiding places, straw and territory on agression in group-housed rabbit does

    NARCIS (Netherlands)

    Rommers, J.M.; Reuvekamp, B.F.J.; Gunnink, H.; Jong, de I.C.

    2014-01-01

    Group-housing of rabbit does may be preferred from welfare point of view. However, group-housing causes agonistic behaviour which may cause severe injuries. Severe injuries may be prevented by offering hiding places for attacked does. Providing enrichment (straw) may reduce agonistic behaviour by

  18. The Use of Polymerized Genipin for the Stabilization of the Collagen Structure of Animal Hides

    Science.gov (United States)

    Animal hides are the major byproduct of meat industry and the collagen fibers is the main constituent. Crosslinkers play a key role in stabilizing the collagen structure for useful applications. Genipin is widely used as an ideal biological protein crosslinking agent due to its low toxicity compare...

  19. STADUS - Ultrasonic data acquisition and processing system

    International Nuclear Information System (INIS)

    Saglio, Robert; Birac, A.M.; Frappier, J.C.

    1982-05-01

    The CEA (Commissariat a l'Energie Atomique) has developed a system for the acquisition and analysis of data recorded during ultrasonic testing. Initially this system was designed and built for the needs of in-service inspection of PWR type power reactors. It is in far wider use today for miscellaneous automatic ultrasonic inspection procedures. This system records, in digital form, the ultrasonic data supplied by the transducers (maximum 16 simultaneous channels), and the geometric coordinates defining the position of the inspection tool. Based on these data, which are recorded on floppy disk, this system helps to display data in the form of A SCAN, B SCAN and C SCAN images. In addition, processing programs of data transfer from the STADUS floppy disks have been developed and inserted on computers more powerful than the one used in the STADUS system. These programs serve to obtain different fault charts on an adjustable scale, as well as listings concerning the defect positions and dimensions [fr

  20. The LLNL portable tritium processing system

    International Nuclear Information System (INIS)

    Anon.

    1995-01-01

    The end of the Cold War significantly reduced the need for facilities to handle radioactive materials for the US nuclear weapons program. The LLNL Tritium Facility was among those slated for decommissioning. The plans for the facility have since been reversed, and it remains open. Nevertheless, in the early 1990s, the cleanup (the Tritium Inventory Removal Project) was undertaken. However, removing the inventory of tritium within the facility and cleaning up any pockets of high-level residual contamination required that we design a system adequate to the task and meeting today's stringent standards of worker and environmental protection. In collaboration with Sandia National Laboratory and EG ampersand G Mound Applied Technologies, we fabricated a three-module Portable Tritium Processing System (PTPS) that meets current glovebox standards, is operated from a portable console, and is movable from laboratory to laboratory for performing the basic tritium processing operations: pumping and gas transfer, gas analysis, and gas-phase tritium scrubbing. The Tritium Inventory Removal Project is now in its final year, and the portable system continues to be the workhorse. To meet a strong demand for tritium services, the LLNL Tritium Facility will be reconfigured to provide state-of-the-art tritium and radioactive decontamination research and development. The PTPS will play a key role in this new facility

  1. Electrochemical decontamination system for actinide processing gloveboxes

    International Nuclear Information System (INIS)

    Wedman, D.E.; Lugo, J.L.; Ford, D.K.; Nelson, T.O.; Trujillo, V.L.; Martinez, H.E.

    1998-03-01

    An electrolytic decontamination technology has been developed and successfully demonstrated at Los Alamos National Laboratory (LANL) for the decontamination of actinide processing gloveboxes. The technique decontaminates the interior surfaces of stainless steel gloveboxes utilizing a process similar to electropolishing. The decontamination device is compact and transportable allowing it to be placed entirely within the glovebox line. In this way, decontamination does not require the operator to wear any additional personal protective equipment and there is no need for additional air handling or containment systems. Decontamination prior to glovebox decommissioning reduces the potential for worker exposure and environmental releases during the decommissioning, transport, and size reduction procedures which follow. The goal of this effort is to reduce contamination levels of alpha emitting nuclides for a resultant reduction in waste level category from High Level Transuranic (TRU) to low Specific Activity (LSA, less than or equal 100 nCi/g). This reduction in category results in a 95% reduction in disposal and disposition costs for the decontaminated gloveboxes. The resulting contamination levels following decontamination by this method are generally five orders of magnitude below the LSA specification. Additionally, the sodium sulfate based electrolyte utilized in the process is fully recyclable which results in the minimum of secondary waste. The process bas been implemented on seven gloveboxes within LANL's Plutonium Facility at Technical Area 55. Of these gloveboxes, two have been discarded as low level waste items and the remaining five have been reused

  2. NASA Human System Risk Assessment Process

    Science.gov (United States)

    Francisco, D.; Romero, E.

    2016-01-01

    NASA utilizes an evidence based system to perform risk assessments for the human system for spaceflight missions. The center of this process is the multi-disciplinary Human System Risk Board (HSRB). The HSRB is chartered from the Chief Health and Medical Officer (OCHMO) at NASA Headquarters. The HSRB reviews all human system risks via an established comprehensive risk and configuration management plan based on a project management approach. The HSRB facilitates the integration of human research (terrestrial and spaceflight), medical operations, occupational surveillance, systems engineering and many other disciplines in a comprehensive review of human system risks. The HSRB considers all factors that influence human risk. These factors include pre-mission considerations such as screening criteria, training, age, sex, and physiological condition. In mission factors such as available countermeasures, mission duration and location and post mission factors such as time to return to baseline (reconditioning), post mission health screening, and available treatments. All of the factors influence the total risk assessment for each human risk. The HSRB performed a comprehensive review of all potential inflight medical conditions and events and over the course of several reviews consolidated the number of human system risks to 30, where the greatest emphasis is placed for investing program dollars for risk mitigation. The HSRB considers all available evidence from human research and, medical operations and occupational surveillance in assessing the risks for appropriate mitigation and future work. All applicable DRMs (low earth orbit for 6 and 12 months, deep space for 30 days and 1 year, a lunar mission for 1 year, and a planetary mission for 3 years) are considered as human system risks are modified by the hazards associated with space flight such as microgravity, exposure to radiation, distance from the earth, isolation and a closed environment. Each risk has a summary

  3. System and process for upgrading hydrocarbons

    Science.gov (United States)

    Bingham, Dennis N.; Klingler, Kerry M.; Smith, Joseph D.; Turner, Terry D.; Wilding, Bruce M.

    2015-08-25

    In one embodiment, a system for upgrading a hydrocarbon material may include a black wax upgrade subsystem and a molten salt gasification (MSG) subsystem. The black wax upgrade subsystem and the MSG subsystem may be located within a common pressure boundary, such as within a pressure vessel. Gaseous materials produced by the MSG subsystem may be used in the process carried out within the black wax upgrade subsystem. For example, hydrogen may pass through a gaseous transfer interface to interact with black wax feed material to hydrogenate such material during a cracking process. In one embodiment, the gaseous transfer interface may include one or more openings in a tube or conduit which is carrying the black wax material. A pressure differential may control the flow of hydrogen within the tube or conduit. Related methods are also disclosed.

  4. Data processing device for computed tomography system

    International Nuclear Information System (INIS)

    Nakayama, N.; Ito, Y.; Iwata, K.; Nishihara, E.; Shibayama, S.

    1984-01-01

    A data processing device applied to a computed tomography system which examines a living body utilizing radiation of X-rays is disclosed. The X-rays which have penetrated the living body are converted into electric signals in a detecting section. The electric signals are acquired and converted from an analog form into a digital form in a data acquisition section, and then supplied to a matrix data-generating section included in the data processing device. By this matrix data-generating section are generated matrix data which correspond to a plurality of projection data. These matrix data are supplied to a partial sum-producing section. The partial sums respectively corresponding to groups of the matrix data are calculated in this partial sum-producing section and then supplied to an accumulation section. In this accumulation section, the final value corresponding to the total sum of the matrix data is calculated, whereby the calculation for image reconstruction is performed

  5. Processing and Linguistics Properties of Adaptable Systems

    Directory of Open Access Journals (Sweden)

    Dumitru TODOROI

    2006-01-01

    Full Text Available Continuation and development of the research in Adaptable Programming Initialization [Tod-05.1,2,3] is presented. As continuation of [Tod-05.2,3] in this paper metalinguistic tools used in the process of introduction of new constructions (data, operations, instructions and controls are developed. The generalization schemes of evaluation of adaptable languages and systems are discussed. These results analogically with [Tod-05.2,3] are obtained by the team, composed from the researchers D. Todoroi [Tod-05.4], Z. Todoroi [ZTod-05], and D. Micusa [Mic-03]. Presented results will be included in the book [Tod-06].

  6. System and process for dissolution of solids

    Science.gov (United States)

    Liezers, Martin; Farmer, III, Orville T.

    2017-10-10

    A system and process are disclosed for dissolution of solids and "difficult-to-dissolve" solids. A solid sample may be ablated in an ablation device to generate nanoscale particles. Nanoparticles may then swept into a coupled plasma device operating at atmospheric pressure where the solid nanoparticles are atomized. The plasma exhaust may be delivered directly into an aqueous fluid to form a solution containing the atomized and dissolved solids. The composition of the resulting solution reflects the composition of the original solid sample.

  7. Document Examination: Applications of Image Processing Systems.

    Science.gov (United States)

    Kopainsky, B

    1989-12-01

    Dealing with images is a familiar business for an expert in questioned documents: microscopic, photographic, infrared, and other optical techniques generate images containing the information he or she is looking for. A recent method for extracting most of this information is digital image processing, ranging from the simple contrast and contour enhancement to the advanced restoration of blurred texts. When combined with a sophisticated physical imaging system, an image pricessing system has proven to be a powerful and fast tool for routine non-destructive scanning of suspect documents. This article reviews frequent applications, comprising techniques to increase legibility, two-dimensional spectroscopy (ink discrimination, alterations, erased entries, etc.), comparison techniques (stamps, typescript letters, photo substitution), and densitometry. Computerized comparison of handwriting is not included. Copyright © 1989 Central Police University.

  8. Image processing system for videotape review

    International Nuclear Information System (INIS)

    Bettendroffer, E.

    1988-01-01

    In a nuclear plant, the areas in which fissile materials are stored or handled, have to be monitored continuously. One method of surveillance is to record pictures of TV cameras with determined time intervals on special video recorders. The 'time lapse' recorded tape is played back at normal speed and an inspector checks visually the pictures. This method requires much manpower and an automated method would be useful. The present report describes an automatic reviewing method based on an image processing system; the system detects scene changes in the picture sequence and stores the reduced data set on a separate video tape. The resulting reduction of reviewing time by inspector is important for surveillance data with few movements

  9. Processing module operating methods, processing modules, and communications systems

    Science.gov (United States)

    McCown, Steven Harvey; Derr, Kurt W.; Moore, Troy

    2014-09-09

    A processing module operating method includes using a processing module physically connected to a wireless communications device, requesting that the wireless communications device retrieve encrypted code from a web site and receiving the encrypted code from the wireless communications device. The wireless communications device is unable to decrypt the encrypted code. The method further includes using the processing module, decrypting the encrypted code, executing the decrypted code, and preventing the wireless communications device from accessing the decrypted code. Another processing module operating method includes using a processing module physically connected to a host device, executing an application within the processing module, allowing the application to exchange user interaction data communicated using a user interface of the host device with the host device, and allowing the application to use the host device as a communications device for exchanging information with a remote device distinct from the host device.

  10. Information hiding techniques for infrared images: exploring the state-of-the art and challenges

    Science.gov (United States)

    Pomponiu, Victor; Cavagnino, Davide; Botta, Marco; Nejati, Hossein

    2015-10-01

    The proliferation of Infrared technology and imaging systems enables a different perspective to tackle many computer vision problems in defense and security applications. Infrared images are widely used by the law enforcement, Homeland Security and military organizations to achieve a significant advantage or situational awareness, and thus is vital to protect these data against malicious attacks. Concurrently, sophisticated malware are developed which are able to disrupt the security and integrity of these digital media. For instance, illegal distribution and manipulation are possible malicious attacks to the digital objects. In this paper we explore the use of a new layer of defense for the integrity of the infrared images through the aid of information hiding techniques such as watermarking. In this context, we analyze the efficiency of several optimal decoding schemes for the watermark inserted into the Singular Value Decomposition (SVD) domain of the IR images using an additive spread spectrum (SS) embedding framework. In order to use the singular values (SVs) of the IR images with the SS embedding we adopt several restrictions that ensure that the values of the SVs will maintain their statistics. For both the optimal maximum likelihood decoder and sub-optimal decoders we assume that the PDF of SVs can be modeled by the Weibull distribution. Furthermore, we investigate the challenges involved in protecting and assuring the integrity of IR images such as data complexity and the error probability behavior, i.e., the probability of detection and the probability of false detection, for the applied optimal decoders. By taking into account the efficiency and the necessary auxiliary information for decoding the watermark, we discuss the suitable decoder for various operating situations. Experimental results are carried out on a large dataset of IR images to show the imperceptibility and efficiency of the proposed scheme against various attack scenarios.

  11. Information Processing in Auto-regulated Systems

    Directory of Open Access Journals (Sweden)

    Karl Javorszky

    2003-06-01

    Full Text Available Abstract: We present a model of information processing which is based on two concurrent ways of describing the world, where a description in one of the languages limits the possibilities for realisations in the other language. The two describing dimensions appear in our common sense as dichotomies of perspectives: subjective - objective; diversity - similarity; individual - collective. We abstract from the subjective connotations and treat the test theoretical case of an interval on which several concurrent categories can be introduced. We investigate multidimensional partitions as potential carriers of information and compare their efficiency to that of sequenced carriers. We regard the same assembly once as a contemporary collection, once as a longitudinal sequence and find promising inroads towards understanding information processing by auto-regulated systems. Information is understood to point out that what is the case from among alternatives, which could be the case. We have translated these ideas into logical operations on the set of natural numbers and have found two equivalence points on N where matches between sequential and commutative ways of presenting a state of the world can agree in a stable fashion: a flip-flop mechanism is envisioned. By following this new approach, a mathematical treatment of some poignant biomathematical problems is allowed. Also, the concepts presented in this treatise may well have relevance and applications within the information processing and the theory of language fields.

  12. Life Support Systems: Wastewater Processing and Water Management

    Data.gov (United States)

    National Aeronautics and Space Administration — Advanced Exploration Systems (AES) Life Support Systems project Wastewater Processing and Water Management task: Within an integrated life support system, water...

  13. Integration mockup and process material management system

    Science.gov (United States)

    Verble, Adas James, Jr.

    1992-01-01

    Work to define and develop a full scale Space Station Freedom (SSF) mockup with the flexibility to evolve into future designs, to validate techniques for maintenance and logistics and verify human task allocations and support trade studies is described. This work began in early 1985 and ended in August, 1991. The mockups are presently being used at MSFC in Building 4755 as a technology and design testbed, as well as for public display. Micro Craft also began work on the Process Material Management System (PMMS) under this contract. The PMMS simulator was a sealed enclosure for testing to identify liquids, gaseous, particulate samples, and specimen including, urine, waste water, condensate, hazardous gases, surrogate gasses, liquids, and solids. The SSF would require many trade studies to validate techniques for maintenance and logistics and verify system task allocations; it was necessary to develop a full scale mockup which would be representative of current SSF design with the ease of changing those designs as the SSF design evolved and changed. The tasks defined for Micro Craft were to provide the personnel, services, tools, and materials for the SSF mockup which would consist of four modules, nodes, interior components, and part task mockups of MSFC responsible engineering systems. This included the Engineering Control and Life Support Systems (ECLSS) testbed. For the initial study, the mockups were low fidelity, soft mockups of graphics art bottle, and other low cost materials, which evolved into higher fidelity mockups as the R&D design evolved, by modifying or rebuilding, an important cost saving factor in the design process. We designed, fabricated, and maintained the full size mockup shells and support stands. The shells consisted of cylinders, end cones, rings, longerons, docking ports, crew airlocks, and windows. The ECLSS required a heavier cylinder to support the ECLSS systems test program. Details of this activity will be covered. Support stands were

  14. Aviation Safety Reporting System: Process and Procedures

    Science.gov (United States)

    Connell, Linda J.

    1997-01-01

    The Aviation Safety Reporting System (ASRS) was established in 1976 under an agreement between the Federal Aviation Administration (FAA) and the National Aeronautics and Space Administration (NASA). This cooperative safety program invites pilots, air traffic controllers, flight attendants, maintenance personnel, and others to voluntarily report to NASA any aviation incident or safety hazard. The FAA provides most of the program funding. NASA administers the program, sets its policies in consultation with the FAA and aviation community, and receives the reports submitted to the program. The FAA offers those who use the ASRS program two important reporting guarantees: confidentiality and limited immunity. Reports sent to ASRS are held in strict confidence. More than 350,000 reports have been submitted since the program's beginning without a single reporter's identity being revealed. ASRS removes all personal names and other potentially identifying information before entering reports into its database. This system is a very successful, proof-of-concept for gathering safety data in order to provide timely information about safety issues. The ASRS information is crucial to aviation safety efforts both nationally and internationally. It can be utilized as the first step in safety by providing the direction and content to informed policies, procedures, and research, especially human factors. The ASRS process and procedures will be presented as one model of safety reporting feedback systems.

  15. ENGINEERED BARRIER SYSTEM FEATURES, EVENTS AND PROCESSES

    Energy Technology Data Exchange (ETDEWEB)

    Jaros, W.

    2005-08-30

    The purpose of this report is to evaluate and document the inclusion or exclusion of engineered barrier system (EBS) features, events, and processes (FEPs) with respect to models and analyses used to support the total system performance assessment for the license application (TSPA-LA). A screening decision, either Included or Excluded, is given for each FEP along with the technical basis for exclusion screening decisions. This information is required by the U.S. Nuclear Regulatory Commission (NRC) at 10 CFR 63.114 (d, e, and f) [DIRS 173273]. The FEPs addressed in this report deal with those features, events, and processes relevant to the EBS focusing mainly on those components and conditions exterior to the waste package and within the rock mass surrounding emplacement drifts. The components of the EBS are the drip shield, waste package, waste form, cladding, emplacement pallet, emplacement drift excavated opening (also referred to as drift opening in this report), and invert. FEPs specific to the waste package, cladding, and drip shield are addressed in separate FEP reports: for example, ''Screening of Features, Events, and Processes in Drip Shield and Waste Package Degradation'' (BSC 2005 [DIRS 174995]), ''Clad Degradation--FEPs Screening Arguments (BSC 2004 [DIRS 170019]), and Waste-Form Features, Events, and Processes'' (BSC 2004 [DIRS 170020]). For included FEPs, this report summarizes the implementation of the FEP in the TSPA-LA (i.e., how the FEP is included). For excluded FEPs, this analysis provides the technical basis for exclusion from TSPA-LA (i.e., why the FEP is excluded). This report also documents changes to the EBS FEPs list that have occurred since the previous versions of this report. These changes have resulted due to a reevaluation of the FEPs for TSPA-LA as identified in Section 1.2 of this report and described in more detail in Section 6.1.1. This revision addresses updates in Yucca Mountain Project

  16. ENGINEERED BARRIER SYSTEM FEATURES, EVENTS AND PROCESSES

    International Nuclear Information System (INIS)

    Jaros, W.

    2005-01-01

    The purpose of this report is to evaluate and document the inclusion or exclusion of engineered barrier system (EBS) features, events, and processes (FEPs) with respect to models and analyses used to support the total system performance assessment for the license application (TSPA-LA). A screening decision, either Included or Excluded, is given for each FEP along with the technical basis for exclusion screening decisions. This information is required by the U.S. Nuclear Regulatory Commission (NRC) at 10 CFR 63.114 (d, e, and f) [DIRS 173273]. The FEPs addressed in this report deal with those features, events, and processes relevant to the EBS focusing mainly on those components and conditions exterior to the waste package and within the rock mass surrounding emplacement drifts. The components of the EBS are the drip shield, waste package, waste form, cladding, emplacement pallet, emplacement drift excavated opening (also referred to as drift opening in this report), and invert. FEPs specific to the waste package, cladding, and drip shield are addressed in separate FEP reports: for example, ''Screening of Features, Events, and Processes in Drip Shield and Waste Package Degradation'' (BSC 2005 [DIRS 174995]), ''Clad Degradation--FEPs Screening Arguments (BSC 2004 [DIRS 170019]), and Waste-Form Features, Events, and Processes'' (BSC 2004 [DIRS 170020]). For included FEPs, this report summarizes the implementation of the FEP in the TSPA-LA (i.e., how the FEP is included). For excluded FEPs, this analysis provides the technical basis for exclusion from TSPA-LA (i.e., why the FEP is excluded). This report also documents changes to the EBS FEPs list that have occurred since the previous versions of this report. These changes have resulted due to a reevaluation of the FEPs for TSPA-LA as identified in Section 1.2 of this report and described in more detail in Section 6.1.1. This revision addresses updates in Yucca Mountain Project (YMP) administrative procedures as they

  17. Cross-sectional study to estimate the prevalence of enterohaemorrhagic Escherichia coli on hides of market beef cows at harvest.

    Science.gov (United States)

    Schneider, L G; Stromberg, Z R; Lewis, G L; Moxley, R A; Smith, D R

    2018-03-25

    Cattle hides are an important source of enterohaemorrhagic Escherichia coli (EHEC) carcass contamination at slaughter. Seven EHEC serogroups are adulterants in raw, non-intact beef: EHEC O26, O45, O103, O111, O121, O145 and O157. The objective of this study was to estimate the probability for hide contamination with EHEC among US market beef cows at slaughter and to test the effects of season and geographic region on prevalence of hide contamination. Hides (n = 800) of market cows were swabbed at slaughter immediately after exsanguination, prior to hide removal. Cows were sampled from two geographically distinct beef packing plants during four seasons of 2015. Cattle source was categorized by northern or southern region. Samples were tested for EHEC by a molecular screening assay. The effects of region, season and their interaction on the probability of hide contamination by each EHEC serogroup were tested in separate multilevel multivariable logistic regression models, accounting for the random effect of clustering by plant. Statistical significance was set α = .05. Of 800 total samples, at least one EHEC was detected on 630 (79%) hides. Enterohaemorrhagic E. coli O26 was detected on 129 (16%) of all hides sampled, EHEC O45 on 437 (55%), EHEC O103 on 289 (36%), EHEC O111 on 189 (24%), EHEC O121 on 140 (18%), EHEC O145 on 171 (21%) and EHEC O157 on 89 (11%). Detection of EHEC O26 and EHEC O121 was associated with season. Season and region were associated with detecting EHEC O45 and EHEC O157. Season-by-region interactions were associated with the outcome of detecting EHEC O103, EHEC O111 and EHEC O145. Season, region of origin and the interaction of these factors affect hide contamination of market beef cattle at slaughter by EHEC, and each serogroup responds to these factors uniquely. © 2018 Blackwell Verlag GmbH.

  18. Using Process Mining to Learn from Process Changes in Evolutionary Systems

    NARCIS (Netherlands)

    Günther, Christian W.; Rinderle, S.B.; Reichert, M.U.; van der Aalst, Wil M.P.; Recker, Jan

    2008-01-01

    Traditional information systems struggle with the requirement to provide flexibility and process support while still enforcing some degree of control. Accordingly, adaptive process management systems (PMSs) have emerged that provide some flexibility by enabling dynamic process changes during

  19. Expect systems and optimisation in process control

    Energy Technology Data Exchange (ETDEWEB)

    Mamdani, A.; Efstathiou, J. (eds.)

    1986-01-01

    This report brings together recent developments both in expert systems and in optimisation, and deals with current applications in industry. Part One is concerned with Artificial Intellegence in planning and scheduling and with rule-based control implementation. The tasks of control maintenance, rescheduling and planning are each discussed in relation to new theoretical developments, techniques available, and sample applications. Part Two covers model based control techniques in which the control decisions are used in a computer model of the process. Fault diagnosis, maintenance and trouble-shooting are just some of the activities covered. Part Three contains case studies of projects currently in progress, giving details of the software available and the likely future trends. One of these, on qualitative plant modelling as a basis for knowledge-based operator aids in nuclear power stations is indexed separately.

  20. Expert systems and optimisation in process control

    International Nuclear Information System (INIS)

    Mamdani, A.; Efstathiou, J.

    1986-01-01

    This report brings together recent developments both in expert systems and in optimisation, and deals with current applications in industry. Part One is concerned with Artificial Intellegence in planning and scheduling and with rule-based control implementation. The tasks of control maintenance, rescheduling and planning are each discussed in relation to new theoretical developments, techniques available, and sample applications. Part Two covers model based control techniques in which the control decisions are used in a computer model of the process. Fault diagnosis, maintenance and trouble-shooting are just some of the activities covered. Part Three contains case studies of projects currently in progress, giving details of the software available and the likely future trends. One of these, on qualitative plant modelling as a basis for knowledge-based operator aids in nuclear power stations is indexed separately. (author)

  1. Process and system for treating waste water

    Science.gov (United States)

    Olesen, Douglas E.; Shuckrow, Alan J.

    1978-01-01

    A process of treating raw or primary waste water using a powdered, activated carbon/aerated biological treatment system is disclosed. Effluent turbidities less than 2 JTU (Jackson turbidity units), zero TOC (total organic carbon) and in the range of 10 mg/l COD (chemical oxygen demand) can be obtained. An influent stream of raw or primary waste water is contacted with an acidified, powdered, activated carbon/alum mixture. Lime is then added to the slurry to raise the pH to about 7.0. A polyelectrolyte flocculant is added to the slurry followed by a flocculation period -- then sedimentation and filtration. The separated solids (sludge) are aerated in a stabilization sludge basin and a portion thereof recycled to an aerated contact basin for mixing with the influent waste water stream prior to or after contact of the influent stream with the powdered, activated carbon/alum mixture.

  2. Hammerstein system represention of financial volatility processes

    Science.gov (United States)

    Capobianco, E.

    2002-05-01

    We show new modeling aspects of stock return volatility processes, by first representing them through Hammerstein Systems, and by then approximating the observed and transformed dynamics with wavelet-based atomic dictionaries. We thus propose an hybrid statistical methodology for volatility approximation and non-parametric estimation, and aim to use the information embedded in a bank of volatility sources obtained by decomposing the observed signal with multiresolution techniques. Scale dependent information refers both to market activity inherent to different temporally aggregated trading horizons, and to a variable degree of sparsity in representing the signal. A decomposition of the expansion coefficients in least dependent coordinates is then implemented through Independent Component Analysis. Based on the described steps, the features of volatility can be more effectively detected through global and greedy algorithms.

  3. Integrated Dialogue System for Spatial Decision Process

    International Nuclear Information System (INIS)

    Nishiyama, Yumi; Fukui, Hiromichi; Kaneyasu, Iwao; Nagasaka, Toshinari; Usuda, Yuichiro; Sakamoto, Ai; Kusafuka, Minako

    2003-01-01

    The disposal of high-level radioactive waste (HLW) is a difficult challenge for all countries that uses nuclear energy. In Japan, an implementing agency for HLW was authorized in 2001, and now seeking for municipalities that voluntarily apply to be a preliminary investigation area for a final disposal site. Along with these policy progresses, the HLW disposal program has been gaining social attentions. This leads to high demand for a systematic process for evaluating the proposed policy and environmental impact of geological disposal so that policy decisions can adequately address technical, ethical, and social considerations. As a step toward this objective, we have developed a participatory decision support system on the web. Web-based communication is in its infancy but may be viable support tool to engage different people. Through the study, we aimed to examine the possibility of web-based dialogue system for spatial decision process. One conclusion from the web-based dialogue is that it is possible to create a working environment on the web within those who have different backgrounds and interests. From the results, we found many findings that should be taken into account for further development. One is the need to re-construct the data, model imagery and opinions to judge the problem objectively. We will reexamine the contents based on the international activities so that participants can understand what the information means in the context. Facilitation is key element on the web, also. He or she is expected to make the atmosphere where even those who don't have high-level knowledge can participate in and arouse their opinion from the faceless communication. In the point, the auto navigation comes in very useful

  4. Hiding in plain sight: communication theory in implementation science

    OpenAIRE

    Manojlovich, Milisa; Squires, Janet E; Davies, Barbara; Graham, Ian D

    2015-01-01

    Background Poor communication among healthcare professionals is a pressing problem, contributing to widespread barriers to patient safety. The word ?communication? means to share or make common. In the literature, two communication paradigms dominate: (1) communication as a transactional process responsible for information exchange, and (2) communication as a transformational process responsible for causing change. Implementation science has focused on information exchange attributes while la...

  5. Leak processing system for valve gland portion

    International Nuclear Information System (INIS)

    Nishino, Masami

    1990-01-01

    When a process fluid for a valve to be checked is at such a normal temperature as during reactor operation, leaked fluid can be detected depending on the temperature increase accompanying the leakage. However, detection is difficult if the temperature of the process fluid for the valve to be checked is low and, if leakage is detected after the reactor start-up, repair has to be applied after the shutdown of the plant. Then, gland leak is detected by detecting the pressure instead of the temperature in the pipeline system and the leak flow rate is calculated based on the pressure. As a result, leakage is detected irrespective of the temperature of the leaked fluid and, for instance, leakage can be detected even in a case where the temperature is not high as in the case of pressure proof test for the pressure vessel before start-up. It can contribute much to the improvement of the plant operation efficiency and can determine the leak flow rate at a high accuracy. (N.H.)

  6. AHTR Refueling Systems and Process Description

    Energy Technology Data Exchange (ETDEWEB)

    Varma, V.K.; Holcomb, D.E.; Bradley, E.C.; Zaharia, N.M.; Cooper, E.J.

    2012-07-15

    The Advanced High-Temperature Reactor (AHTR) is a design concept for a central station-type [1500 MW(e)] Fluoride salt–cooled High-temperature Reactor (FHR) that is currently undergoing development by Oak Ridge National Laboratory for the US. Department of Energy, Office of Nuclear Energy’s Advanced Reactor Concepts program. FHRs, by definition, feature low-pressure liquid fluoride salt cooling, coated-particle fuel, a high-temperature power cycle, and fully passive decay heat rejection. The overall goal of the AHTR development program is to demonstrate the technical feasibility of FHRs as low-cost, large-size power producers while maintaining full passive safety. The AHTR is approaching a preconceptual level of maturity. An initial integrated layout of its major systems, structures, and components (SSCs), and an initial, high-level sequence of operations necessary for constructing and operating the plant is nearing completion. An overview of the current status of the AHTR concept has been recently published [1], and a report providing a more detailed overview of the AHTR structures and mechanical systems is currently in preparation. This report documents the refueling components and processes envisioned at this early development phase. The report is limited to the refueling aspects of the AHTR and does not include overall reactor or power plant design information. The report, however, does include a description of the materials envisioned for the various components and the instrumentation necessary to control the refueling process. The report begins with an overview of the refueling strategy. Next a mechanical description of the AHTR fuel assemblies and core is provided. The reactor vessel upper assemblies are then described. Following this the refueling path structures and the refueling mechanisms and components are described. The sequence of operations necessary to fuel and defuel the reactor is then discussed. The report concludes with a discussion of the

  7. AHTR Refueling Systems and Process Description

    Energy Technology Data Exchange (ETDEWEB)

    Varma, Venugopal Koikal [ORNL; Holcomb, David Eugene [ORNL; Bradley, Eric Craig [ORNL; Zaharia, Nathaniel M [ORNL; Cooper, Eliott J [ORNL

    2012-07-01

    The Advanced High-Temperature Reactor (AHTR) is a design concept for a central station-type [1500 MW(e)] Fluoride salt-cooled High-temperature Reactor (FHR) that is currently undergoing development by Oak Ridge National Laboratory for the US. Department of Energy, Office of Nuclear Energy's Advanced Reactor Concepts program. FHRs, by definition, feature low-pressure liquid fluoride salt cooling, coated-particle fuel, a high-temperature power cycle, and fully passive decay heat rejection. The overall goal of the AHTR development program is to demonstrate the technical feasibility of FHRs as low-cost, large-size power producers while maintaining full passive safety. The AHTR is approaching a preconceptual level of maturity. An initial integrated layout of its major systems, structures, and components (SSCs), and an initial, high-level sequence of operations necessary for constructing and operating the plant is nearing completion. An overview of the current status of the AHTR concept has been recently published and a report providing a more detailed overview of the AHTR structures and mechanical systems is currently in preparation. This report documents the refueling components and processes envisioned at this early development phase. The report is limited to the refueling aspects of the AHTR and does not include overall reactor or power plant design information. The report, however, does include a description of the materials envisioned for the various components and the instrumentation necessary to control the refueling process. The report begins with an overview of the refueling strategy. Next a mechanical description of the AHTR fuel assemblies and core is provided. The reactor vessel upper assemblies are then described. Following this the refueling path structures and the refueling mechanisms and components are described. The sequence of operations necessary to fuel and defuel the reactor is then discussed. The report concludes with a discussion of the

  8. [The limbic system and the motivation process].

    Science.gov (United States)

    Karli, P

    1968-01-01

    Understanding the part played by the limbic system in the shaping of overall behaviour is assisted by the previous study of that system's involvement in the mechanisms underlying certain sections of behaviour. a) Limbic structures contribute to the dynamic synthesis of contemporary information, by reason of their share in mechanisms: I. of modulatory central control in the production and transmission of sensory messages, 2. in the genesis of states of vigilance, especially the focussing of attention. On the other hand, they have an inhibitory role in somatic motility by way of progressive elimination of all inadequate motor response. b) Limbic structures participate in the elaboration of emotional states, in the initiation of both positive and negative reinforcement. That is to say they participate in the processes by which: I. "appetitive" or "aversive" significance is progressively conferred upon a given stimulus or situation, 2. behaviour is subjected to a positive or negative reinforcement, assuring its stabilization or its extinction. c) The comparison of the present situation with experience, enabling the organism to foresee the results of its behaviour; and similarly the comparison of results achieved with those anticipated, imply information storage, and the formation of lasting memory traces. It appears that the limbic system by integration of cognitive and affective components of sensory information, contributes to the compilation of experience which can be drawn upon in recognition or evocation. When the lasting results of different limbic lesions upon total behaviour are studied, it is clear that these effects are all the more profound as, among the motivational factors involved, those due to experience and to adaptation to environment, play the more important part. Behavioural deficits appear especially due to the absence of inhibition of certain inadequate responses, which results in a "maladaptation" of behavior as much towards present environmental

  9. ENGINEERED BARRIER SYSTEM FEATURES, EVENTS, AND PROCESSES

    International Nuclear Information System (INIS)

    2005-01-01

    This analysis report is one of the technical reports containing documentation of the Environmental Radiation Model for Yucca Mountain, Nevada (ERMYN), a biosphere model supporting the total system performance assessment (TSPA) for the license application (LA) for the Yucca Mountain repository. This analysis report describes the development of biosphere dose conversion factors (BDCFs) for the volcanic ash exposure scenario, and the development of dose factors for calculating inhalation dose during volcanic eruption. A graphical representation of the documentation hierarchy for the ERMYN is presented in Figure 1 - 1. This figure shows the interrelationships among the products (i.e., analysis and model reports) developed for biosphere modeling and provides an understanding of how this analysis report contributes to biosphere modeling. This report is one of two reports that develop biosphere BDCFs, which are input parameters for the TSPA model. The ''Biosphere Model Report'' (BSC 2004 [DIRS 169460]) describes in detail the ERMYN conceptual model and mathematical model. The input parameter reports, shown to the right of the Biosphere Model Report in Figure 1-1, contain detailed descriptions of the model input parameters, their development and the relationship between the parameters and specific features, events and processes (FEPs). This report describes biosphere model calculations and their output, the BDCFs, for the volcanic ash exposure scenario. This analysis receives direct input from the outputs of the ''Biosphere Model Report'' (BSC 2004 [DIRS 169460]) and from the five analyses that develop parameter values for the biosphere model (BSC 2005 [DIRS 172827]; BSC 2004 [DIRS 169672]; BSC 2004 [DIRS 169673]; BSC 2004 [DIRS 169458]; and BSC 2004 [DIRS 169459]). The results of this report are further analyzed in the ''Biosphere Dose Conversion Factor Importance and Sensitivity Analysis'' (Figure 1 - 1). The objective of this analysis was to develop the BDCFs for the

  10. Point cloud processing for smart systems

    Directory of Open Access Journals (Sweden)

    Jaromír Landa

    2013-01-01

    Full Text Available High population as well as the economical tension emphasises the necessity of effective city management – from land use planning to urban green maintenance. The management effectiveness is based on precise knowledge of the city environment. Point clouds generated by mobile and terrestrial laser scanners provide precise data about objects in the scanner vicinity. From these data pieces the state of the roads, buildings, trees and other objects important for this decision-making process can be obtained. Generally, they can support the idea of “smart” or at least “smarter” cities.Unfortunately the point clouds do not provide this type of information automatically. It has to be extracted. This extraction is done by expert personnel or by object recognition software. As the point clouds can represent large areas (streets or even cities, usage of expert personnel to identify the required objects can be very time-consuming, therefore cost ineffective. Object recognition software allows us to detect and identify required objects semi-automatically or automatically.The first part of the article reviews and analyses the state of current art point cloud object recognition techniques. The following part presents common formats used for point cloud storage and frequently used software tools for point cloud processing. Further, a method for extraction of geospatial information about detected objects is proposed. Therefore, the method can be used not only to recognize the existence and shape of certain objects, but also to retrieve their geospatial properties. These objects can be later directly used in various GIS systems for further analyses.

  11. Hiding a Covert Digital Image by Assembling the RSA Encryption Method and the Binary Encoding Method

    Directory of Open Access Journals (Sweden)

    Kuang Tsan Lin

    2014-01-01

    Full Text Available The Rivest-Shamir-Adleman (RSA encryption method and the binary encoding method are assembled to form a hybrid hiding method to hide a covert digital image into a dot-matrix holographic image. First, the RSA encryption method is used to transform the covert image to form a RSA encryption data string. Then, all the elements of the RSA encryption data string are transferred into binary data. Finally, the binary data are encoded into the dot-matrix holographic image. The pixels of the dot-matrix holographic image contain seven groups of codes used for reconstructing the covert image. The seven groups of codes are identification codes, covert-image dimension codes, covert-image graylevel codes, pre-RSA bit number codes, RSA key codes, post-RSA bit number codes, and information codes. The reconstructed covert image derived from the dot-matrix holographic image and the original covert image are exactly the same.

  12. Impact of Media Richness on Reduction of Knowledge-Hiding Behavior in Enterprises

    DEFF Research Database (Denmark)

    Labafi, Somayeh; Khajeheian, Datis; Williams, Idongesit

    2018-01-01

    in a qualitative study. Thematic analysis is used to analyze transcribed interview data from employees in a software company in Iran. The findings of the analysis show that media richness significantly impacts on organizational learning and influences on knowledge hiding behavior in employees. This article...... suggests that entrepreneurs and managers of small firms should provide employees’ access to rich media content as well as established organizational learning as part of their organizational culture.......Knowledge hiding is one of the major obstacles in the progression of organizations that hinder the use of tacit knowledge of employees. The negative impact of this behavior is more significant in enterprises and small firms because they are more reliant on knowledge of their employees...

  13. Hiding objects and creating illusions above a carpet filter using a Fourier optics approach.

    Science.gov (United States)

    Wu, Kedi; Wang, Guo Ping

    2010-09-13

    Invisibility carpet cloaks are usually used to hide an object beneath carpet. In this paper we propose and demonstrate a carpet filter to hide objects and create illusions above the filter by using a Fourier optics method. Instead of using transformation optics, we get electromagnetic parameters of the filter by optical transfer functions, which play the role of modulating the propagation of the scattering angular spectrum directly from an object above the filter. By further adding a functional layer onto the filter, we can even camouflage the object so that it appears to be a different object. The analytical results are confirmed by numerical simulations. Our method is completely different from the current coordinate transfer method and may provide another point of view to more clearly understand the mechanism of invisibility cloaks.

  14. Hide depilation and feather disintegration studies with keratinolytic serine protease from a novel Bacillus subtilis isolate.

    Science.gov (United States)

    Pillai, Priya; Archana, G

    2008-03-01

    Keratinases play an important role in biotechnological applications such as improvement of feather meal, enzymatic dehairing and production of amino acids or peptides from high molecular weight substrates. Bacillus subtilis P13, isolated from Vajreshwari hot spring (45-50 degrees C) near Mumbai, India, produces a neutral serine protease and has an optimum temperature of 65 degrees C. This enzyme preparation was keratinolytic in nature and could disintegrate whole chicken feathers, except for the remnants of shafts. The enzyme preparation also exhibited depilation of goat hides with the recovery of intact animal hair. The enzyme preparation could release peptides from ground feathers and bring about their weight reduction; however, similar action on hair was relatively weak. A single major PMSF-sensitive protease band could be detected upon zymogram analysis, indicating that a single enzyme may be responsible for feather degradation and hide depilation. The importance of these findings in the biotechnological application for feather and leather industries is discussed.

  15. An Efficient Association Rule Hiding Algorithm for Privacy Preserving Data Mining

    OpenAIRE

    Yogendra Kumar Jain,; Vinod Kumar Yadav,; Geetika S. Panday

    2011-01-01

    The security of the large database that contains certain crucial information, it will become a serious issue when sharing data to the network against unauthorized access. Privacy preserving data mining is a new research trend in privacy data for data mining and statistical database. Association analysis is a powerful toolfor discovering relationships which are hidden in large database. Association rules hiding algorithms get strong and efficient performance for protecting confidential and cru...

  16. Optical image hiding based on chaotic vibration of deformable moiré grating

    Science.gov (United States)

    Lu, Guangqing; Saunoriene, Loreta; Aleksiene, Sandra; Ragulskis, Minvydas

    2018-03-01

    Image hiding technique based on chaotic vibration of deformable moiré grating is presented in this paper. The embedded secret digital image is leaked in a form of a pattern of time-averaged moiré fringes when the deformable cover grating vibrates according to a chaotic law of motion with a predefined set of parameters. Computational experiments are used to demonstrate the features and the applicability of the proposed scheme.

  17. Process-aware information systems : lessons to be learned from process mining

    NARCIS (Netherlands)

    Aalst, van der W.M.P.; Jensen, K.; Aalst, van der W.M.P.

    2009-01-01

    A Process-Aware Information System (PAIS) is a software system that manages and executes operational processes involving people, applications, and/or information sources on the basis of process models. Example PAISs are workflow management systems, case-handling systems, enterprise information

  18. Enthalpy restoration in geothermal energy processing system

    Science.gov (United States)

    Matthews, Hugh B.

    1983-01-01

    A geothermal deep well energy extraction system is provided of the general type in which solute-bearing hot water is pumped to the earth's surface from a relatively low temperature geothermal source by transferring thermal energy from the hot water to a working fluid for driving a primary turbine-motor and a primary electrical generator at the earth's surface. The superheated expanded exhaust from the primary turbine motor is conducted to a bubble tank where it bubbles through a layer of sub-cooled working fluid that has been condensed. The superheat and latent heat from the expanded exhaust of the turbine transfers thermal energy to the sub-cooled condensate. The desuperheated exhaust is then conducted to the condenser where it is condensed and sub-cooled, whereupon it is conducted back to the bubble tank via a barometric storage tank. The novel condensing process of this invention makes it possible to exploit geothermal sources which might otherwise be non-exploitable.

  19. Theory of Neural Information Processing Systems

    International Nuclear Information System (INIS)

    Galla, Tobias

    2006-01-01

    It is difficult not to be amazed by the ability of the human brain to process, to structure and to memorize information. Even by the toughest standards the behaviour of this network of about 10 11 neurons qualifies as complex, and both the scientific community and the public take great interest in the growing field of neuroscience. The scientific endeavour to learn more about the function of the brain as an information processing system is here a truly interdisciplinary one, with important contributions from biology, computer science, physics, engineering and mathematics as the authors quite rightly point out in the introduction of their book. The role of the theoretical disciplines here is to provide mathematical models of information processing systems and the tools to study them. These models and tools are at the centre of the material covered in the book by Coolen, Kuehn and Sollich. The book is divided into five parts, providing basic introductory material on neural network models as well as the details of advanced techniques to study them. A mathematical appendix complements the main text. The range of topics is extremely broad, still the presentation is concise and the book well arranged. To stress the breadth of the book let me just mention a few keywords here: the material ranges from the basics of perceptrons and recurrent network architectures to more advanced aspects such as Bayesian learning and support vector machines; Shannon's theory of information and the definition of entropy are discussed, and a chapter on Amari's information geometry is not missing either. Finally the statistical mechanics chapters cover Gardner theory and the replica analysis of the Hopfield model, not without being preceded by a brief introduction of the basic concepts of equilibrium statistical physics. The book also contains a part on effective theories of the macroscopic dynamics of neural networks. Many dynamical aspects of neural networks are usually hard to find in the

  20. Prey should hide more randomly when a predator attacks more persistently.

    Science.gov (United States)

    Gal, Shmuel; Alpern, Steve; Casas, Jérôme

    2015-12-06

    When being searched for and then (if found) pursued by a predator, a prey animal has a choice between choosing very randomly among hiding locations so as to be hard to find or alternatively choosing a location from which it is more likely to successfully flee if found. That is, the prey can choose to be hard to find or hard to catch, if found. In our model, capture of prey requires both finding it and successfully pursuing it. We model this dilemma as a zero-sum repeated game between predator and prey, with the eventual capture probability as the pay-off to the predator. We find that the more random hiding strategy is better when the chances of repeated pursuit, which are known to be related to area topography, are high. Our results extend earlier results of Gal and Casas, where there was at most only a single pursuit. In that model, hiding randomly was preferred by the prey when the predator has only a few looks. Thus, our new multistage model shows that the effect of more potential looks is opposite. Our results can be viewed as a generalization of search games to the repeated game context and are in accordance with observed escape behaviour of different animals. © 2015 The Author(s).

  1. Improved Encrypted-Signals-Based Reversible Data Hiding Using Code Division Multiplexing and Value Expansion

    Directory of Open Access Journals (Sweden)

    Xianyi Chen

    2018-01-01

    Full Text Available Compared to the encrypted-image-based reversible data hiding (EIRDH method, the encrypted-signals-based reversible data hiding (ESRDH technique is a novel way to achieve a greater embedding rate and better quality of the decrypted signals. Motivated by ESRDH using signal energy transfer, we propose an improved ESRDH method using code division multiplexing and value expansion. At the beginning, each pixel of the original image is divided into several parts containing a little signal and multiple equal signals. Next, all signals are encrypted by Paillier encryption. And then a large number of secret bits are embedded into the encrypted signals using code division multiplexing and value expansion. Since the sum of elements in any spreading sequence is equal to 0, lossless quality of directly decrypted signals can be achieved using code division multiplexing on the encrypted equal signals. Although the visual quality is reduced, high-capacity data hiding can be accomplished by conducting value expansion on the encrypted little signal. The experimental results show that our method is better than other methods in terms of the embedding rate and average PSNR.

  2. Spread spectrum image data hiding in the encrypted discrete cosine transform coefficients

    Science.gov (United States)

    Zhang, Xiaoqiang; Wang, Z. Jane

    2013-10-01

    Digital watermarking and data hiding are important tools for digital rights protection of media data. Spread spectrum (SS)-based watermarking and data-hiding approaches are popular due to their outstanding robustness, but their security might not be sufficient. To improve the security of SS, a SS-based image data-hiding approach is proposed by encrypting the discrete cosine transform coefficients of the host image with the piecewise linear chaotic map, before the operation of watermark embedding. To evaluate the performance of the proposed approach, simulations and analyses of its robustness and security are carried out. The average bit-error-rate values on 100 real images from the Berkeley segmentation dataset under the JPEG compression, additive Gaussian noise, salt and pepper noise, and cropping attacks are reported. Experimental results show that the proposed approach can maintain the high robustness of traditional SS schemes and, meanwhile, also improve the security. The proposed approach can extend the key space of traditional SS schemes from 10 to 10 and thus can resist brute-force attack and unauthorized detection watermark attack.

  3. High-capacity method for hiding data in the discrete cosine transform domain

    Science.gov (United States)

    Qazanfari, Kazem; Safabakhsh, Reza

    2013-10-01

    Steganography is the art and science of hiding data in different media such as texts, audios, images, and videos. Data hiding techniques are generally divided into two groups: spatial and frequency domain techniques. Spatial domain methods generally have low security and, as a result, are less attractive to researchers. Discrete cosine transform (DCT) is the most common transform domain used in steganography and JPEG compression. Since a large number of the DCT coefficients of JPEG images are zero, the capacity of DCT domain-based steganography methods is not very high. We present a high-capacity method for hiding messages in the DCT domain. We describe the method in two classes where the receiver has and where the receiver does not have the cover image. In each class, we consider three cases for each coefficient. By considering n coefficients, there are 3n different situations. The method embeds ⌊log2 3n⌋ bits in these n coefficients. We show that the maximum reachable capacity by our method is 58% higher than the other general steganography methods. Experimental results show that the histogram-based steganalysis methods cannot detect the stego images produced by the proposed method while the capacity is increased significantly.

  4. Data Hiding Based on a Two-Layer Turtle Shell Matrix

    Directory of Open Access Journals (Sweden)

    Xiao-Zhu Xie

    2018-02-01

    Full Text Available Data hiding is a technology that embeds data into a cover carrier in an imperceptible way while still allowing the hidden data to be extracted accurately from the stego-carrier, which is one important branch of computer science and has drawn attention of scholars in the last decade. Turtle shell-based (TSB schemes have become popular in recent years due to their higher embedding capacity (EC and better visual quality of the stego-image than most of the none magic matrices based (MMB schemes. This paper proposes a two-layer turtle shell matrix-based (TTSMB scheme for data hiding, in which an extra attribute presented by a 4-ary digit is assigned to each element of the turtle shell matrix with symmetrical distribution. Therefore, compared with the original TSB scheme, two more bits are embedded into each pixel pair to obtain a higher EC up to 2.5 bits per pixel (bpp. The experimental results reveal that under the condition of the same visual quality, the EC of the proposed scheme outperforms state-of-the-art data hiding schemes.

  5. Steganography and Hiding Data with Indicators-based LSB Using a Secret Key

    Directory of Open Access Journals (Sweden)

    W. Saqer

    2016-06-01

    Full Text Available Steganography is the field of science concerned with hiding secret data inside other innocent-looking data, called the container, carrier or cover, in a way that no one apart from the meant parties can suspect the existence of the secret data. There are many algorithms and techniques of concealing data. Each of which has its own way of hiding and its own advantages and limitations. In our research we introduce a new algorithm of hiding data. The algorithm uses the same technique used by the Least Significant Bit (LSB algorithm which is embedding secret data in the least significant bit(s of the bytes of the carrier. It differs from the LSB algorithm in that it does not embed the bytes of the cover data sequentially but it embeds into one bit or two bits at once. Actually it depends on indicators to determine where and how many bits to embed at a time. These indicators are two bits of each cover byte after the least two significant bits. The advantage of this algorithm over the LSB algorithm is the randomness used to confuse intruders as it does not use fixed sequential bytes and it does not always embed one bit at a time. This aims to increase the security of the technique. Also, the amount of cover data consumed is less because it sometimes embeds two bits at once.

  6. Information Hiding In Digital Video Using DCT, DWT and CvT

    Science.gov (United States)

    Abed Shukur, Wisam; Najah Abdullah, Wathiq; Kareem Qurban, Luheb

    2018-05-01

    The type of video that used in this proposed hiding a secret information technique is .AVI; the proposed technique of a data hiding to embed a secret information into video frames by using Discrete Cosine Transform (DCT), Discrete Wavelet Transform (DWT) and Curvelet Transform (CvT). An individual pixel consists of three color components (RGB), the secret information is embedded in Red (R) color channel. On the receiver side, the secret information is extracted from received video. After extracting secret information, robustness of proposed hiding a secret information technique is measured and obtained by computing the degradation of the extracted secret information by comparing it with the original secret information via calculating the Normalized cross Correlation (NC). The experiments shows the error ratio of the proposed technique is (8%) while accuracy ratio is (92%) when the Curvelet Transform (CvT) is used, but compared with Discrete Wavelet Transform (DWT) and Discrete Cosine Transform (DCT), the error rates are 11% and 14% respectively, while the accuracy ratios are (89%) and (86%) respectively. So, the experiments shows the Poisson noise gives better results than other types of noises, while the speckle noise gives worst results compared with other types of noises. The proposed technique has been established by using MATLAB R2016a programming language.

  7. Physicochemical Properties of Gelatin Extracted from Buffalo Hide Pretreated with Different Acids.

    Science.gov (United States)

    Mulyani, Sri; Setyabudi, Francis M C Sigit; Pranoto, Yudi; Santoso, Umar

    2017-01-01

    The acid pretreatment of collagen molecules disrupts their crosslinks and assists in the release of acid-soluble proteins, fats, and other components. Generally, to achieve optimum extraction efficiency, strong acids may be used at a lower acid concentration compared to weak acids. This study aimed to determine the yield and physicochemical properties of gelatins extracted from buffalo hides pretreated with different acids. Hides were extracted with hydrochloric, citric, and acetic acids at concentrations of 0.3, 0.6, 0.9, 1.2, and 1.5 M. A completely randomized design and the least significant difference test were used in the experimental design, and all measurements were performed in triplicate. The highest yield (29.17%) was obtained from pretreatment with 0.9 M HCl. The gel strength did not differ significantly ( p >0.05) according to acid type (280.26-259.62 g Bloom), and the highest viscosity was obtained from the 0.6 M citric acid pretreatment. All the gelatins contained α- and β-chain components and several degraded peptides (24-66 kDa). The color and Fourier-transform infrared spectrum of the gelatin extracted using 0.9 M HCl were similar to those of commercial bovine skin gelatin. In general, the physicochemical properties of the gelatin complied with the industry standard set by the Gelatin Manufacturers Institute of America, revealing that buffalo hide could serve as a potential alternative source of gelatin.

  8. ENGINEERED BARRIER SYSTEM FEATURES, EVENTS, AND PROCESSES

    Energy Technology Data Exchange (ETDEWEB)

    na

    2005-05-30

    This analysis report is one of the technical reports containing documentation of the Environmental Radiation Model for Yucca Mountain, Nevada (ERMYN), a biosphere model supporting the total system performance assessment (TSPA) for the license application (LA) for the Yucca Mountain repository. This analysis report describes the development of biosphere dose conversion factors (BDCFs) for the volcanic ash exposure scenario, and the development of dose factors for calculating inhalation dose during volcanic eruption. A graphical representation of the documentation hierarchy for the ERMYN is presented in Figure 1 - 1. This figure shows the interrelationships among the products (i.e., analysis and model reports) developed for biosphere modeling and provides an understanding of how this analysis report contributes to biosphere modeling. This report is one of two reports that develop biosphere BDCFs, which are input parameters for the TSPA model. The ''Biosphere Model Report'' (BSC 2004 [DIRS 169460]) describes in detail the ERMYN conceptual model and mathematical model. The input parameter reports, shown to the right of the Biosphere Model Report in Figure 1-1, contain detailed descriptions of the model input parameters, their development and the relationship between the parameters and specific features, events and processes (FEPs). This report describes biosphere model calculations and their output, the BDCFs, for the volcanic ash exposure scenario. This analysis receives direct input from the outputs of the ''Biosphere Model Report'' (BSC 2004 [DIRS 169460]) and from the five analyses that develop parameter values for the biosphere model (BSC 2005 [DIRS 172827]; BSC 2004 [DIRS 169672]; BSC 2004 [DIRS 169673]; BSC 2004 [DIRS 169458]; and BSC 2004 [DIRS 169459]). The results of this report are further analyzed in the ''Biosphere Dose Conversion Factor Importance and Sensitivity Analysis'' (Figure 1 - 1). The

  9. Fugitive carbon dioxide: It's not hiding in the ocean

    International Nuclear Information System (INIS)

    Kerr, R.A.

    1992-01-01

    The fugitive carbon is the difference between the 7 billion or so tons that spew as carbon dioxide from smokestacks and burning tropical forests and the 3.4 billion tons known to stay in the atmosphere. Finding the other 3 billion or 4 billion tons has frustrated researchers for the past 15 years. The oceans certainly take up some of it. Any forecast of global warming has to be based on how much of the carbon dioxide released by human activity will remain in the atmosphere, and predictions vary by 30% depending on the mix of oceanic and terrestrial processes assumed to be removing the gas. What's more, those predictions assume that the processes at work today will go on operating. But not knowing where all the carbon is going raises the unnerving possibility that whatever processes are removing it may soon fall down on the job without warning, accelerating any warming. Such concerns add urgency to the question of whether the ocean harbors the missing carbon. But there's no simple way to find out. The obvious strategy might seem to be to measure the carbon content of the ocean repeatedly to see how much it increases year by year. The trouble is that several billion tons of added carbon, though impressive on a human scale, are undetectable against the huge swings in ocean carbon that occur from season to season, year to year, and place to place

  10. Annuitants Added to the Annuity Roll Processing System (ARPS)

    Data.gov (United States)

    Office of Personnel Management — Small table showing the total Civil Service Retirement System (CSRS) and Federal Employees Retirement System (FERS) Annuitants added to the Annuity Roll Processing...

  11. Efficient process migration in the EMPS multiprocessor system

    NARCIS (Netherlands)

    van Dijk, G.J.W.; Gils, van M.J.

    1992-01-01

    The process migration facility in the Eindhoven multiprocessor system (EMPS) is presented. In the EMPS system, mailboxes are used for interprocess communication. These mailboxes provide transparency of location for communicating processes. The major advantages of mailbox communication in the EMPS

  12. Method of parallel processing in SANPO real time system

    International Nuclear Information System (INIS)

    Ostrovnoj, A.I.; Salamatin, I.M.

    1981-01-01

    A method of parellel processing in SANPO real time system is described. Algorithms of data accumulation and preliminary processing in this system as a parallel processes using a specialized high level programming language are described. Hierarchy of elementary processes are also described. It provides the synchronization of concurrent processes without semaphors. The developed means are applied to the systems of experiment automation using SM-3 minicomputers [ru

  13. System Documentation AS Basis For Company Business Process Improvement

    OpenAIRE

    Pelawi, Dewan

    2012-01-01

    Business process is an activity performed together to achieve business goals. Good business process will support the achievement of the organization’s plan to make profit for the company. In order to understand the business process, the business process needs to be documented and analyzed. The purpose of research is to make the system documentation as a basis to improve or complete the ongoing business process. The research method is system documentation. System documentation is a way to desc...

  14. Influence Business Process On The Quality Of Accounting Information System

    OpenAIRE

    Meiryani; Muhammad Syaifullah

    2015-01-01

    Abstract The purpose of this study was to determine the influence of business process to the quality of the accounting information system. This study aims to examine the influence of business process on the quality of the information system of accounting information system. The study was theoritical research which considered the roles of business process on quality of accounting information system which use secondary data collection. The results showed that the business process have a signifi...

  15. Aligning Business Process Quality and Information System Quality

    OpenAIRE

    Heinrich, Robert

    2013-01-01

    Business processes and information systems mutually affect each other in non-trivial ways. Frequently, the business process design and the information system design are not well aligned. This means that business processes are designed without taking the information system impact into account, and vice versa. Missing alignment at design time often results in quality problems at runtime, such as large response times of information systems, large process execution times, overloaded information s...

  16. AIRSAR Automated Web-based Data Processing and Distribution System

    Science.gov (United States)

    Chu, Anhua; vanZyl, Jakob; Kim, Yunjin; Lou, Yunling; Imel, David; Tung, Wayne; Chapman, Bruce; Durden, Stephen

    2005-01-01

    In this paper, we present an integrated, end-to-end synthetic aperture radar (SAR) processing system that accepts data processing requests, submits processing jobs, performs quality analysis, delivers and archives processed data. This fully automated SAR processing system utilizes database and internet/intranet web technologies to allow external users to browse and submit data processing requests and receive processed data. It is a cost-effective way to manage a robust SAR processing and archival system. The integration of these functions has reduced operator errors and increased processor throughput dramatically.

  17. Biocatalytic process development using microfluidic miniaturized systems

    DEFF Research Database (Denmark)

    Krühne, Ulrich; Heintz, Søren; Ringborg, Rolf Hoffmeyer

    2014-01-01

    The increasing interest in biocatalytic processes means there is a clear need for a new systematic development paradigm which encompasses both protein engineering and process engineering. This paper argues that through the use of a new microfluidic platform, data can be collected more rapidly...

  18. Surprising structures hiding in Penrose’s future null infinity

    Science.gov (United States)

    Newman, Ezra T.

    2017-07-01

    Since the late1950s, almost all discussions of asymptotically flat (Einstein-Maxwell) space-times have taken place in the context of Penrose’s null infinity, I+. In addition, almost all calculations have used the Bondi coordinate and tetrad systems. Beginning with a known asymptotically flat solution to the Einstein-Maxwell equations, we show first, that there are other natural coordinate systems, near I+, (analogous to light-cones in flat-space) that are based on (asymptotically) shear-free null geodesic congruences (analogous to the flat-space case). Using these new coordinates and their associated tetrad, we define the complex dipole moment, (the mass dipole plus i times angular momentum), from the l  =  1 harmonic coefficient of a component of the asymptotic Weyl tensor. Second, from this definition, from the Bianchi identities and from the Bondi-Sachs mass and linear momentum, we show that there exists a large number of results—identifications and dynamics—identical to those of classical mechanics and electrodynamics. They include, among many others, {P}=M{v}+..., {L}= {r} × {P} , spin, Newton’s second law with the rocket force term (\\dotM v) and radiation reaction, angular momentum conservation and others. All these relations take place in the rather mysterious H-space rather than in space-time. This leads to the enigma: ‘why do these well known relations of classical mechanics take place in H-space?’ and ‘What is the physical meaning of H-space?’

  19. HIDING IN THE SHADOWS. II. COLLISIONAL DUST AS EXOPLANET MARKERS

    International Nuclear Information System (INIS)

    Dobinson, Jack; Leinhardt, Zoë M.; Lines, Stefan; Carter, Philip J.; Dodson-Robinson, Sarah E.; Teanby, Nick A.

    2016-01-01

    Observations of the youngest planets (∼1–10 Myr for a transitional disk) will increase the accuracy of our planet formation models. Unfortunately, observations of such planets are challenging and time-consuming to undertake, even in ideal circumstances. Therefore, we propose the determination of a set of markers that can preselect promising exoplanet-hosting candidate disks. To this end, N-body simulations were conducted to investigate the effect of an embedded Jupiter-mass planet on the dynamics of the surrounding planetesimal disk and the resulting creation of second-generation collisional dust. We use a new collision model that allows fragmentation and erosion of planetesimals, and dust-sized fragments are simulated in a post-process step including non-gravitational forces due to stellar radiation and a gaseous protoplanetary disk. Synthetic images from our numerical simulations show a bright double ring at 850 μm for a low-eccentricity planet, whereas a high-eccentricity planet would produce a characteristic inner ring with asymmetries in the disk. In the presence of first-generation primordial dust these markers would be difficult to detect far from the orbit of the embedded planet, but would be detectable inside a gap of planetary origin in a transitional disk

  20. Systems of Systems: Scaling Up the Development Process

    National Research Council Canada - National Science Library

    Humphrey, Watts

    2006-01-01

    ... of massive systems into system-of-systems structures Section 3 points out how large-scale systems development efforts have typically failed because of project-management and not technical problems...

  1. Process of system design and analysis

    International Nuclear Information System (INIS)

    Gardner, B.

    1995-01-01

    The design of an effective physical protection system includes the determination of the physical protection system objectives, the initial design of a physical protection system, the evaluation of the design, and, probably, a redesign or refinement of the system. To develop the objectives, the designer must begin by gathering information about facility operations and conditions, such as a comprehensive description of the facility, operating states, and the physical protection requirements. The designer then needs to define the threat. This involves considering factors about potential adversaries: Class of adversary, adversary's capabilities, and range of adversary's tactics. Next, the designer should identify targets. Determination of whether or not nuclear materials are attractive targets is based mainly on the ease or difficulty of acquisition and desirability of the materiaL The designer now knows the objectives of the physical protection system, that is, ''What to protect against whom.'' The next step is to design the system by determining how best to combine such elements as fences, vaults, sensors, procedures, communication devices, and protective force personnel to meet the objectives of the system. Once a physical protection system is designed, it must be analyzed and evaluated to ensure it meets the physical protection objectives. Evaluation must allow for features working together to assure protection rather than regarding each feature separately. Due to the complexity of protection systems, an evaluation usually requires modeling techniques. If any vulnerabilities are found, the initial system must be redesigned to correct the vulnerabilities and a reevaluation conducted

  2. Development of methods for the neutron activation analysis to the determination of essential and toxic trace elements of biological and environmental samples: application of enzyme activity of raw hides

    International Nuclear Information System (INIS)

    Sipos, T.; Nagy, L.G.; Toeroek, G.; Kollar, J.

    1974-01-01

    Investigations on the post mortem enzymatic processes pointed out the fact, that significant deviations can be observed in the extent and in the results of the autolytic transformations occurring during the storage of raw hide. A neutron activation analysis procedure, based on a semiautomated radiochemical separation procedure and scintillation gamma spectrometry, was selected for the determination of some trace elements. Six trace elements, Cu, Mn, Zn, Au, As, and Cr, and one minor component,Br, were detected and/or determined in the concentration region of 0,1-10 3 ppM. According to preliminary investigations evaluated at the time being, concentration differences of some orders of magnitude were obtained for some trace elements: copper, zinc and manganese, whereas the concentration of bromine remained practically constant. These findings seem to correlate with large differences in appearance due to different enzyme activities in the raw hides

  3. Using DNS amplification DDoS attack for hiding data

    Science.gov (United States)

    Mehić, M.; Voznak, M.; Safarik, J.; Partila, P.; Mikulec, M.

    2014-05-01

    This paper concerns available steganographic techniques that can be used for sending hidden data through public network. Typically, in steganographic communication it is advised to use popular/often used method for sending hidden data and amount of that data need to be high as much as possible. We confirmed this by choosing a Domain Name System (DNS) as a vital protocol of each network and choosing Distributed denial of service (DDoS) attacks that are most popular network attacks currently represented in the world. Apart from characterizing existing steganographic methods we provide new insights by presenting two new techniques. The first one is network steganography solution which exploits free/unused protocols fields and is known for IP, UDP or TCP protocols, but has never been applied to DNS (Domain Name Server) which are the fundamental part of network communications. The second explains the usage of DNS Amplification DDoS Attack to send seamlessly data through public network. The calculation that was performed to estimate the total amount of data that can be covertly transferred by using these technique, regardless of steganalysis, is included in this paper.

  4. Chern Numbers Hiding in Time of Flight Images

    Science.gov (United States)

    Satija, Indubala; Zhao, Erhai; Ghosh, Parag; Bray-Ali, Noah

    2011-03-01

    Since the experimental realization of synthetic magnetic fields in neural ultracold atoms, transport measurement such as quantized Hall conductivity remains an open challenge. Here we propose a novel and feasible scheme to measure the topological invariants, namely the chern numbers, in the time of flight images. We study both the commensurate and the incommensurate flux, with the later being the main focus here. The central concept underlying our proposal is the mapping between the chern numbers and the size of the dimerized states that emerge when the two-dimensional hopping is tuned to the highly anisotropic limit. In a uncoupled double quantum Hall system exhibiting time reversal invariance, only odd-sized dimer correlation functions are non-zero and hence encode quantized spin current. Finally, we illustrate that inspite of highly fragmented spectrum, a finite set of chern numbers are meaningful. Our results are supported by direct numerical computation of transverse conductivity. NBA acknowledges support from a National Research Council postdoctoral research associateship.

  5. Rethinking the Systems Engineering Process in Light of Design Thinking

    Science.gov (United States)

    2016-04-30

    systems engineering process models (Blanchard & Fabrycky, 1990) and the majority of engineering design education (Dym et al., 2005). The waterfall model ...Engineering Career Competency Model Clifford Whitcomb, Systems Engineering Professor, NPS Corina White, Systems Engineering Research Associate, NPS...Postgraduate School (NPS) in Monterey, CA. He teaches and conducts research in the design of enterprise systems, systems modeling , and system

  6. System and method for deriving a process-based specification

    Science.gov (United States)

    Hinchey, Michael Gerard (Inventor); Rash, James Larry (Inventor); Rouff, Christopher A. (Inventor)

    2009-01-01

    A system and method for deriving a process-based specification for a system is disclosed. The process-based specification is mathematically inferred from a trace-based specification. The trace-based specification is derived from a non-empty set of traces or natural language scenarios. The process-based specification is mathematically equivalent to the trace-based specification. Code is generated, if applicable, from the process-based specification. A process, or phases of a process, using the features disclosed can be reversed and repeated to allow for an interactive development and modification of legacy systems. The process is applicable to any class of system, including, but not limited to, biological and physical systems, electrical and electro-mechanical systems in addition to software, hardware and hybrid hardware-software systems.

  7. Process control system for fresh concrete preparation

    International Nuclear Information System (INIS)

    Bachvarov, N.; Pavlov, P.; Shukov, H.

    1983-01-01

    The paper discusses the principles, structure and organization of a modular microprocessor based control system, designed to be used in fresh concrete fabrication plants. The system is based on the measurement of the aggregate moisture by means of a neutron moisture meter. (author)

  8. Multiparameter nuclear data acquisition and processing system

    Energy Technology Data Exchange (ETDEWEB)

    Morhac, M; Turzo, I; Kristiak, J; Matousek, V [Inst. of Physics, Slovak Academy of Sciences, Bratislava (Slovakia)

    1996-12-31

    A modular system to determine correlations among many detection in radiation measurements is described. The capabilities of the system are illustrated of correlation between positron annihilation life-time and the momentum of electron-positron pairs using four detectors. 8 refs.

  9. Front-end data processing the SLD data acquisition system

    International Nuclear Information System (INIS)

    Nielsen, B.S.

    1986-07-01

    The data acquisition system for the SLD detector will make extensive use of parallel at the front-end level. Fastbus acquisition modules are being built with powerful processing capabilities for calibration, data reduction and further pre-processing of the large amount of analog data handled by each module. This paper describes the read-out electronics chain and data pre-processing system adapted for most of the detector channels, exemplified by the central drift chamber waveform digitization and processing system

  10. Development of the Diagnostic Expert System for Tea Processing

    Science.gov (United States)

    Yoshitomi, Hitoshi; Yamaguchi, Yuichi

    A diagnostic expert system for tea processing which can presume the cause of the defect of the processed tea was developed to contribute to the improvement of tea processing. This system that consists of some programs can be used through the Internet. The inference engine, the core of the system adopts production system which is well used on artificial intelligence, and is coded by Prolog as the artificial intelligence oriented language. At present, 176 rules for inference have been registered on this system. The system will be able to presume better if more rules are added to the system.

  11. Insider Anomaly Measurement Processing System (IAMPS)

    National Research Council Canada - National Science Library

    McCallam, Dennis

    2002-01-01

    .... Several forms of authentication information and types of sensors were considered as part of the IAMPS suite, with the goal of using common COTS sensors to enhance transfer of IAMPS technology into real world systems...

  12. Cooling water systems design using process integration

    CSIR Research Space (South Africa)

    Gololo, KV

    2010-09-01

    Full Text Available Cooling water systems are generally designed with a set of heat exchangers arranged in parallel. This arrangement results in higher cooling water flowrate and low cooling water return temperature thus reducing cooling tower efficiency. Previous...

  13. System Engineering Process Realization Toolkit, Phase I

    Data.gov (United States)

    National Aeronautics and Space Administration — NASA faces many systems engineering challenges as it seeks to conduct exploration and science missions concurrently. One such challenge is implementing a repeatable...

  14. Matching intelligent systems with business process reengineering

    NARCIS (Netherlands)

    Hart, 't M.W.

    1996-01-01

    According to Venkatraman (1991) five degrees of IT-induced business reconfiguration can be distinguished: (1) localized exploitation of IT, (2) internal integration, (3) business process redesign, (4) business network redesign, and (5) business scope redefinition. On each of these levels, different

  15. Modeling and simulation for process and safeguards system design

    International Nuclear Information System (INIS)

    Gutmacher, R.G.; Kern, E.A.; Duncan, D.R.; Benecke, M.W.

    1983-01-01

    A computer modeling and simulation approach that meets the needs of both the process and safeguards system designers is described. The results have been useful to Westinghouse Hanford Company process designers in optimizing the process scenario and operating scheme of the Secure Automated Fabrication line. The combined process/measurements model will serve as the basis for design of the safeguards system. Integration of the process design and the safeguards system design should result in a smoothly operating process that is easier to safeguard

  16. Precision microwave applicators and systems for plasma and materials processing

    International Nuclear Information System (INIS)

    Asmussen, J.; Garard, R.

    1988-01-01

    Modern applications of microwave energy have imposed new requirements upon microwave processing systems. Interest in energy efficiency, processing uniformity and control of process cycles has placed new design conditions upon microwave power oscillators, microwave systems and microwave applicator design. One approach of meeting new application requirements is the use of single-mode or controlled multimode applicators. The use of a single-mode applicator for plasma generation and materials processing will be presented. Descriptions of actual applicator designs for heating, curing, and processing of solid materials and the generations of high and low pressure discharges will be given. The impact of these applicators on the total microwave system including the microwave power source will be described. Specific examples of applicator and associated microwave systems will be detailed for the applications of (1) plasma thin film deposition and (2) the precision processing and diagnosis of materials. Methods of process control and diagnosis, control of process uniformity and process scale up are discussed

  17. Parallel and distributed processing: applications to power systems

    Energy Technology Data Exchange (ETDEWEB)

    Wu, Felix; Murphy, Liam [California Univ., Berkeley, CA (United States). Dept. of Electrical Engineering and Computer Sciences

    1994-12-31

    Applications of parallel and distributed processing to power systems problems are still in the early stages. Rapid progress in computing and communications promises a revolutionary increase in the capacity of distributed processing systems. In this paper, the state-of-the art in distributed processing technology and applications is reviewed and future trends are discussed. (author) 14 refs.,1 tab.

  18. Investigating the success of operational business process management systems

    NARCIS (Netherlands)

    Poelmans, S.; Reijers, H.A.; Recker, J.

    2013-01-01

    Business process management systems (BPMS) belong to a class of enterprise information systems that are characterized by the dependence on explicitly modeled process logic. Through the process logic, it is relatively easy to manage explicitly the routing and allocation of work items along a business

  19. Influence Business Process On The Quality Of Accounting Information System

    Directory of Open Access Journals (Sweden)

    Meiryani

    2015-01-01

    Full Text Available Abstract The purpose of this study was to determine the influence of business process to the quality of the accounting information system. This study aims to examine the influence of business process on the quality of the information system of accounting information system. The study was theoritical research which considered the roles of business process on quality of accounting information system which use secondary data collection. The results showed that the business process have a significant effect on the quality of accounting information systems.

  20. Development of technical information processing systems

    International Nuclear Information System (INIS)

    Lee, Ji Ho; Kim, Tae Whan; Kim, Sun Ja; Kim, Young Min; Choi, Kwang; Oh, Joung Hun; Choung, Hyun Suk; Keum, Jong Yong; Yoo, An Na; Harn, Deuck Haing; Choun, Young Chun

    1993-12-01

    The major goal of this project is to develop a more efficient information management system by connecting the KAREI serials database which enable the users to access from their own laboratory facilities through KAREI-NET. The importance of this project is to make the serials information of KAERI easily accessible to users as valuable resources for R and D activities. The results of the project are as follows. 1) Development of the serials database and retrieval system enabled us to access to the serials holding information through KAERI-NET. 2) The database construction establishes a foundation for the management of 1,600 serials held in KAERI. 3) The system can be applied not only to KAERI but also to similar medium-level libraries. (Author)

  1. Process control for the ISABELLE system

    International Nuclear Information System (INIS)

    Frankel, R.; Herman, A.; Stattel, P.; Warkentien, R.

    1981-01-01

    A low cost, highly reliable control system has been developed for use in the radiation environment of the ISABELLE ring. The Ultra-High Vacuum installation will consist of approximately 1500 stations - each having 8 readbacks, 4 on-off operations and 4 special functions - distributed over 2.5 mills. The paper will describe a multidrop party line system in which a μp based controller located in a protected environment communicates with up to 25 vacuum stations. All the μp controllers will be linked via the ISABELLE data highway. Mechanical, electronic and software aspects of the system are discussed and performance data from our First Cell model are presented

  2. Mask alignment system for semiconductor processing

    Science.gov (United States)

    Webb, Aaron P.; Carlson, Charles T.; Weaver, William T.; Grant, Christopher N.

    2017-02-14

    A mask alignment system for providing precise and repeatable alignment between ion implantation masks and workpieces. The system includes a mask frame having a plurality of ion implantation masks loosely connected thereto. The mask frame is provided with a plurality of frame alignment cavities, and each mask is provided with a plurality of mask alignment cavities. The system further includes a platen for holding workpieces. The platen may be provided with a plurality of mask alignment pins and frame alignment pins configured to engage the mask alignment cavities and frame alignment cavities, respectively. The mask frame can be lowered onto the platen, with the frame alignment cavities moving into registration with the frame alignment pins to provide rough alignment between the masks and workpieces. The mask alignment cavities are then moved into registration with the mask alignment pins, thereby shifting each individual mask into precise alignment with a respective workpiece.

  3. Real-time monitoring of clinical processes using complex event processing and transition systems.

    Science.gov (United States)

    Meinecke, Sebastian

    2014-01-01

    Dependencies between tasks in clinical processes are often complex and error-prone. Our aim is to describe a new approach for the automatic derivation of clinical events identified via the behaviour of IT systems using Complex Event Processing. Furthermore we map these events on transition systems to monitor crucial clinical processes in real-time for preventing and detecting erroneous situations.

  4. Internet-based intelligent information processing systems

    CERN Document Server

    Tonfoni, G; Ichalkaranje, N S

    2003-01-01

    The Internet/WWW has made it possible to easily access quantities of information never available before. However, both the amount of information and the variation in quality pose obstacles to the efficient use of the medium. Artificial intelligence techniques can be useful tools in this context. Intelligent systems can be applied to searching the Internet and data-mining, interpreting Internet-derived material, the human-Web interface, remote condition monitoring and many other areas. This volume presents the latest research on the interaction between intelligent systems (neural networks, adap

  5. Hybrid Data Hiding Scheme Using Right-Most Digit Replacement and Adaptive Least Significant Bit for Digital Images

    Directory of Open Access Journals (Sweden)

    Mehdi Hussain

    2016-05-01

    Full Text Available The goal of image steganographic methods considers three main key issues: high embedding capacity, good visual symmetry/quality, and security. In this paper, a hybrid data hiding method combining the right-most digit replacement (RMDR with an adaptive least significant bit (ALSB is proposed to provide not only high embedding capacity but also maintain a good visual symmetry. The cover-image is divided into lower texture (symmetry patterns and higher texture (asymmetry patterns areas and these textures determine the selection of RMDR and ALSB methods, respectively, according to pixel symmetry. This paper has three major contributions. First, the proposed hybrid method enhanced the embedding capacity due to efficient ALSB utilization in the higher texture areas of cover images. Second, the proposed hybrid method maintains the high visual quality because RMDR has the closest selection process to generate the symmetry between stego and cover pixels. Finally, the proposed hybrid method is secure against statistical regular or singular (RS steganalysis and pixel difference histogram steganalysis because RMDR is capable of evading the risk of RS detection attacks due to pixel digits replacement instead of bits. Extensive experimental tests (over 1500+ cover images are conducted with recent least significant bit (LSB-based hybrid methods and it is demonstrated that the proposed hybrid method has a high embedding capacity (800,019 bits while maintaining good visual symmetry (39.00% peak signal-to-noise ratio (PSNR.

  6. Digital image processing software system using an array processor

    International Nuclear Information System (INIS)

    Sherwood, R.J.; Portnoff, M.R.; Journeay, C.H.; Twogood, R.E.

    1981-01-01

    A versatile array processor-based system for general-purpose image processing was developed. At the heart of this system is an extensive, flexible software package that incorporates the array processor for effective interactive image processing. The software system is described in detail, and its application to a diverse set of applications at LLNL is briefly discussed. 4 figures, 1 table

  7. Effect of acanthocephalan parasites on hiding behaviour in two species of shore crabs.

    Science.gov (United States)

    Latham, A D M; Poulin, R

    2002-12-01

    The effect of acanthocephalan parasites (Profilicollis spp.) on the hiding behaviour during low tide of two species of shore crabs (intermediate hosts), Macrophthalmus hirtipes (Brachyura: Ocypodidae) and Hemigrapsus crenulatus (Brachyura: Grapsidae), was examined at Blueskin Bay, South Island, New Zealand. Exposed M. hirtipes were found to have significantly higher infection levels than did hidden conspecifics. This pattern was not observed for H. crenulatus. Mean cystacanth numbers were found to be considerably higher in M. hirtipes than H. crenulatus. Crabs exposed at low tide are at a greater risk of predation by definitive shorebird hosts than are hidden conspecifics. Preferential manipulation of one intermediate host species over another could influence diversity within ecosystems.

  8. A Statistically-Hiding Integer Commitment Scheme Based on Groups with Hidden Order

    DEFF Research Database (Denmark)

    Damgård, Ivan Bjerre; Fujisaki, Eiichiro

    2002-01-01

    We present a statistically-hiding commitment scheme allowing commitment to arbitrary size integers, based on any (Abelian) group with certain properties, most importantly, that it is hard for the committer to compute its order. We also give efficient zero-knowledge protocols for proving knowledge...... input is chosen by the (possibly cheating) prover. -  - Our results apply to any group with suitable properties. In particular, they apply to a much larger class of RSA moduli than the safe prime products proposed in [14] - Potential examples include RSA moduli, class groups and, with a slight...

  9. Information hiding based on double random-phase encoding and public-key cryptography.

    Science.gov (United States)

    Sheng, Yuan; Xin, Zhou; Alam, Mohammed S; Xi, Lu; Xiao-Feng, Li

    2009-03-02

    A novel information hiding method based on double random-phase encoding (DRPE) and Rivest-Shamir-Adleman (RSA) public-key cryptosystem is proposed. In the proposed technique, the inherent diffusion property of DRPE is cleverly utilized to make up the diffusion insufficiency of RSA public-key cryptography, while the RSA cryptosystem is utilized for simultaneous transmission of the cipher text and the two phase-masks, which is not possible under the DRPE technique. This technique combines the complementary advantages of the DPRE and RSA encryption techniques and brings security and convenience for efficient information transmission. Extensive numerical simulation results are presented to verify the performance of the proposed technique.

  10. Private States, Quantum Data Hiding, and the Swapping of Perfect Secrecy

    DEFF Research Database (Denmark)

    Christandl, Matthias; Ferrara, Roberto

    2017-01-01

    An important contribution to the understanding of quantum key distribution has been the discovery of entangled states from which secret bits, but no maximally entangled states, can be extracted [Horodecki et al., Phys. Rev. Lett. 94, 200501 (2005)]. The construction of those states was based...... on an intuition that the quantum mechanical phenomena of data hiding and privacy might be related. In this Letter we firmly connect these two phenomena and highlight three aspects of this result. First, we simplify the definition of the secret key rate. Second, we give a formula for the one-way distillable...

  11. What Hides Behind an Umemployment Rate: Comparing Portuguese and U.S. Unemployment

    OpenAIRE

    Olivier Blanchard; Pedro Portugal

    1998-01-01

    Over the last 15 years, Portugal and the United States have had the same average unemployment rate, about 6.5%. But behind these similar rates hide two very different labor markets. Unemployment duration in Portugal is more than three times that of the United States. Symmetrically, the flow of workers into unemployment in Portugal is, in proportion to the labor force, less than a third of what it is in the United States. Relying on evidence from Portuguese and U.S. micro data sets, we show th...

  12. Prediction-error of Prediction Error (PPE)-based Reversible Data Hiding

    OpenAIRE

    Wu, Han-Zhou; Wang, Hong-Xia; Shi, Yun-Qing

    2016-01-01

    This paper presents a novel reversible data hiding (RDH) algorithm for gray-scaled images, in which the prediction-error of prediction error (PPE) of a pixel is used to carry the secret data. In the proposed method, the pixels to be embedded are firstly predicted with their neighboring pixels to obtain the corresponding prediction errors (PEs). Then, by exploiting the PEs of the neighboring pixels, the prediction of the PEs of the pixels can be determined. And, a sorting technique based on th...

  13. Experiment 2-B data processing system

    International Nuclear Information System (INIS)

    Price, H.; Svrcek, F.

    1976-08-01

    A new set of programs has been written for the analysis of data from the Fermilab 30-inch bubble chamber--wide gap spark chamber hybrid system. This report describes those programs, provides operating instructions, and indicates how they fit into the overall data flow

  14. Supporting the Architecting Process of Adaptive Systems

    NARCIS (Netherlands)

    Komoto, H.; Hamberg, R.; Tomiyama, T.

    2013-01-01

    Full flexible use of inkjet printhead units in printing systems requires consistent generation of drops with any given volume and velocity at any moment and place desired. True drop-on-demand is currently hampered by physical phenomena in the printhead. These are residual vibrations and crosstalk

  15. Processing abstract language modulates motor system activity.

    Science.gov (United States)

    Glenberg, Arthur M; Sato, Marc; Cattaneo, Luigi; Riggio, Lucia; Palumbo, Daniele; Buccino, Giovanni

    2008-06-01

    Embodiment theory proposes that neural systems for perception and action are also engaged during language comprehension. Previous neuroimaging and neurophysiological studies have only been able to demonstrate modulation of action systems during comprehension of concrete language. We provide neurophysiological evidence for modulation of motor system activity during the comprehension of both concrete and abstract language. In Experiment 1, when the described direction of object transfer or information transfer (e.g., away from the reader to another) matched the literal direction of a hand movement used to make a response, speed of responding was faster than when the two directions mismatched (an action-sentence compatibility effect). In Experiment 2, we used single-pulse transcranial magnetic stimulation to study changes in the corticospinal motor pathways to hand muscles while reading the same sentences. Relative to sentences that do not describe transfer, there is greater modulation of activity in the hand muscles when reading sentences describing transfer of both concrete objects and abstract information. These findings are discussed in relation to the human mirror neuron system.

  16. On Representing Instance Changes in Adaptive Process Management Systems.

    NARCIS (Netherlands)

    Rinderle, S.B.; Kreher, U; Lauer, M.; Dadam, P.; Reichert, M.U.

    2006-01-01

    By separating the process logic from the application code process management systems (PMS) offer promising perspectives for automation and management of business processes. However, the added value of PMS strongly depends on their ability to support business process changes which can affect the

  17. The Impacts of Bologna Process on European Higher Education Systems

    Directory of Open Access Journals (Sweden)

    Zafer ÇELİK

    2012-01-01

    Full Text Available This study aims to examine the impact of Bologna Process on European higher education systems. It focuses on the influences of the main components of Bologna Process (i.e., implementing two-cycle system, increasing the student and academic staffs' mobility, European Credit Transfer System, quality assurance and qualification framework on the transformation of higher education systems. Although Bologna Process is perceived as a move to increase the quality of higher education system in Turkey, there are very serious criticisms from academics, students, and businessmen to the Bologna Process in various European countries. This study claims that the Process did not achieve its goals, more importantly the main instruments of the Process (qualifications, quality assurance agency etc. brought about hyper-bureaucratization, hierarchization and standardization of European higher education systems.

  18. High risk process control system assessment methodology

    Energy Technology Data Exchange (ETDEWEB)

    Santos, Venetia [Pontificia Universidade Catolica do Rio de Janeiro (PUC-Rio), RJ (Brazil); Zamberlan, Maria Cristina [National Institute of Tehnology (INT), Rio de Janeiro, RJ (Brazil). Human Reliability and Ergonomics Research Group for the Oil, Gas and Energy Sector

    2009-07-01

    The evolution of ergonomics methodology has become necessary due to the dynamics imposed by the work environment, by the increase of the need of human cooperation and by the high interaction between various sections within a company. In the last 25 years, as of studies made in the high risk process control, we have developed a methodology to evaluate these situations that focus on the assessment of activities and human cooperation, the assessment of context, the assessment of the impact of work of other sectors in the final activity of the operator, as well as the modeling of existing risks. (author)

  19. Model for analyzing decontamination process systems

    International Nuclear Information System (INIS)

    Boykin, R.F.; Rolland, C.W.

    1979-06-01

    Selection of equipment and the design of a new facility in light of minimizing cost and maximizing capacity, is a problem managers face many times in the operations of a manufacturing organization. This paper deals with the actual analysis of equipment facility design for a decontamination operation. Discussions on the selection method of the equipment and the development of the facility design criteria are presented along with insight into the problems encountered in the equipment analysis for a new decontamination facility. The presentation also includes a review of the transition from the old facility into the new facility and the process used to minimize the cost and conveyance problems of the transition

  20. Solar energy engineering processes and systems

    CERN Document Server

    Kalogirou, Soteris A

    2009-01-01

    As perhaps the most promising of all the renewable energy sources available today, solar energy is becoming increasingly important in the drive to achieve energy independence and climate balance. This new book is the masterwork from world-renowned expert Dr. Soteris Kalogirou, who has championed solar energy for decades. The book includes all areas of solar energy engineering, from the fundamentals to the highest level of current research. The author includes pivotal subjects such as solar collectors, solar water heating, solar space heating and cooling, industrial process heat, solar desalina

  1. Lowland river systems - processes, form and function

    DEFF Research Database (Denmark)

    Pedersen, M. L.; Kronvang, B.; Sand-Jensen, K.

    2006-01-01

    Present day river valleys and rivers are not as dynamic and variable as they used to be. We will here describe the development and characteristics of rivers and their valleys and explain the background to the physical changes in river networks and channel forms from spring to the sea. We seek...... to answer two fundamental questions: How has anthropogenic disturbance of rivers changed the fundamental form and physical processes in river valleys? Can we use our understanding of fl uvial patterns to restore the dynamic nature of channelised rivers and drained fl oodplains in river valleys?...

  2. Solar energy engineering processes and systems

    CERN Document Server

    Kalogirou, Soteris A

    2013-01-01

    As perhaps the most promising of all the renewable energy sources available today, solar energy is becoming increasingly important in the drive to achieve energy independence and climate balance. This new book is the masterwork from world-renowned expert Dr. Soteris Kalogirou, who has championed solar energy for decades. The book includes all areas of solar energy engineering, from the fundamentals to the highest level of current research. The author includes pivotal subjects such as solar collectors, solar water heating, solar space heating and cooling, industrial process heat, solar desalina

  3. Development of technical information processing system (VII)

    International Nuclear Information System (INIS)

    Kim, Tae Whan; Choi, Kwang; Oh, Jeong Hoon; Jeong, Hyun Sook; Keum, Jong Yong

    1995-12-01

    The goal of this project is to establish integrated environment focused on enhanced information services to researchers through the providing of acquisition information, key phrase retrieval function, journal content information linked with various subsystems already developed. The results of the project are as follows. 1. It is possible to serve information on unreceivable materials among required materials throughout the system. 2. Retrieval efficiency is increased by the adding of key phrase retrieval function. 3. Rapidity of information service is enhanced by the providing of journal contents of each issue received and work performance of contents service is become higher. 4. It is possible to acquire, store, serve technical information needed in R and D synthetically and systematically throughout the development of total system linked with various subsystems required to technical information management and service. 21 refs. (Author)

  4. Deposit control in process cooling water systems

    International Nuclear Information System (INIS)

    Venkataramani, B.

    1981-01-01

    In order to achieve efficient heat transfer in cooling water systems, it is essential to control the fouling of heat exchanger surfaces. Solubilities of scale forming salts, their growth into crystals, and the nature of the surfaces play important roles in the deposition phenomenon. Condensed phosphates, organic polymers and compounds like phosphates are effective in controlling deposition of scale forming salts. The surface active agents inhibit crystal growth and modify the crystals of the scale forming salts, and thus prevent deposition of dense, uniformly structured crystalline mass on the heat transfer surface. Understanding the mechanism of biofouling is essential to control it by surface active agents. Certain measures taken in the plant, such as back flushing, to control scaling, sometimes may not be effective and can be detrimental to the system itself. (author)

  5. Novel Variants of a Histogram Shift-Based Reversible Watermarking Technique for Medical Images to Improve Hiding Capacity

    Directory of Open Access Journals (Sweden)

    Vishakha Kelkar

    2017-01-01

    Full Text Available In telemedicine systems, critical medical data is shared on a public communication channel. This increases the risk of unauthorised access to patient’s information. This underlines the importance of secrecy and authentication for the medical data. This paper presents two innovative variations of classical histogram shift methods to increase the hiding capacity. The first technique divides the image into nonoverlapping blocks and embeds the watermark individually using the histogram method. The second method separates the region of interest and embeds the watermark only in the region of noninterest. This approach preserves the medical information intact. This method finds its use in critical medical cases. The high PSNR (above 45 dB obtained for both techniques indicates imperceptibility of the approaches. Experimental results illustrate superiority of the proposed approaches when compared with other methods based on histogram shifting techniques. These techniques improve embedding capacity by 5–15% depending on the image type, without affecting the quality of the watermarked image. Both techniques also enable lossless reconstruction of the watermark and the host medical image. A higher embedding capacity makes the proposed approaches attractive for medical image watermarking applications without compromising the quality of the image.

  6. Novel Variants of a Histogram Shift-Based Reversible Watermarking Technique for Medical Images to Improve Hiding Capacity

    Science.gov (United States)

    Tuckley, Kushal

    2017-01-01

    In telemedicine systems, critical medical data is shared on a public communication channel. This increases the risk of unauthorised access to patient's information. This underlines the importance of secrecy and authentication for the medical data. This paper presents two innovative variations of classical histogram shift methods to increase the hiding capacity. The first technique divides the image into nonoverlapping blocks and embeds the watermark individually using the histogram method. The second method separates the region of interest and embeds the watermark only in the region of noninterest. This approach preserves the medical information intact. This method finds its use in critical medical cases. The high PSNR (above 45 dB) obtained for both techniques indicates imperceptibility of the approaches. Experimental results illustrate superiority of the proposed approaches when compared with other methods based on histogram shifting techniques. These techniques improve embedding capacity by 5–15% depending on the image type, without affecting the quality of the watermarked image. Both techniques also enable lossless reconstruction of the watermark and the host medical image. A higher embedding capacity makes the proposed approaches attractive for medical image watermarking applications without compromising the quality of the image. PMID:29104744

  7. Test processing integrated system (S.I.D.E.X.)

    International Nuclear Information System (INIS)

    Sabas, M.; Oules, H.; Badel, D.

    1969-01-01

    The Test Processing Integrated System is mostly composed of a CAE 9080 (equiv. S. D. S. 9300) computer which is equipped of a 100 000 samples/sec acquisition system. The System is designed for high speed data acquisition and data processing on environment tests, and also calculation of structural models. Such a digital appliance on data processing has many advantages compared to the conventional methods based on analog instruments. (author) [fr

  8. Summary of the International Conference on Software and System Processes

    DEFF Research Database (Denmark)

    Kuhrmann, Marco; O'Connor, Rory V.; Perry, Dewayne E.

    2016-01-01

    The International Conference on Software and Systems Process (ICSSP), continuing the success of Software Process Workshop (SPW), the Software Process Modeling and Simulation Workshop (ProSim) and the International Conference on Software Process (ICSP) conference series, has become the established...... premier event in the field of software and systems engineering processes. It provides a leading forum for the exchange of research outcomes and industrial best-practices in process development from software and systems disciplines. ICSSP 2016 was held in Austin, Texas, from 14-15 May 2016, co......-located with the 38th International Conference on Software Engineering (ICSE). The theme of mICSSP 2016 was studying "Process(es) in Action" by recognizing that the AS-Planned and AS-Practiced processes can be quite different in many ways including their ows, their complexity and the evolving needs of stakeholders...

  9. Software Defined Common Processing System (SDCPS), Phase I

    Data.gov (United States)

    National Aeronautics and Space Administration — Coherent Logix, Incorporated proposes the Software Defined Common Processing System (SDCPS) program to facilitate the development of a Software Defined Radio...

  10. Software Defined Common Processing System (SDCPS), Phase II

    Data.gov (United States)

    National Aeronautics and Space Administration — Coherent Logix, Incorporated (CLX) proposes the development of a Software Defined Common Processing System (SDCPS) that leverages the inherent advantages of an...

  11. Development of continuous pharmaceutical production processes supported by process systems engineering methods and tools

    DEFF Research Database (Denmark)

    Gernaey, Krist; Cervera Padrell, Albert Emili; Woodley, John

    2012-01-01

    The pharmaceutical industry is undergoing a radical transition towards continuous production processes. Systematic use of process systems engineering (PSE) methods and tools form the key to achieve this transition in a structured and efficient way.......The pharmaceutical industry is undergoing a radical transition towards continuous production processes. Systematic use of process systems engineering (PSE) methods and tools form the key to achieve this transition in a structured and efficient way....

  12. Process and system for recovering energy

    International Nuclear Information System (INIS)

    Trichet, J.-C.

    1975-01-01

    The invention concerns a system for heating a room or similar, using a 'dibare' cycle working with a less volatile fluid and a more volatile fluid and employing a coupling between a fractionated separation area working at high pressure and a fractionated mixing zone working at low pressure. The invention relates to the following uses: heating a room or building, drying any material and recovering the thermal discharge from a motive cycle, particularly the recovery of the thermal discharge of an electric nuclear power station to carry out district heating [fr

  13. Smart image processing system for retinal prosthesis.

    Science.gov (United States)

    Weiland, James D; Parikh, Neha; Pradeep, Vivek; Medioni, Gerard

    2012-01-01

    Retinal prostheses for the blind have demonstrated the ability to provide the sensation of light in otherwise blind individuals. However, visual task performance in these patients remains poor relative to someone with normal vision. Computer vision algorithms for navigation and object detection were evaluated for their ability to improve task performance. Blind subjects navigating a mobility course had fewer collisions when using a wearable camera system that guided them on a safe path. Subjects using a retinal prosthesis simulator could locate objects more quickly when an object detection algorithm assisted them. Computer vision algorithms can assist retinal prosthesis patients and low-vision patients in general.

  14. Systems engineering management process maturity of South African manufacturing organisations

    CSIR Research Space (South Africa)

    Lemberger, ID

    2014-07-01

    Full Text Available to integrate people, processes and technologies to deliver innovative complex systems. The investigation set out to improve the understanding of systems engineering (SE) with focus on organisations in manufacturing of coke, petroleum, chemical products, rubber...

  15. The embodied embedded character of system 1 processing.

    Science.gov (United States)

    Bellini-Leite, Samuel de Castro

    2013-01-01

    In the last thirty years, a relatively large group of cognitive scientists have begun characterising the mind in terms of two distinct, relatively autonomous systems. To account for paradoxes in empirical results of studies mainly on reasoning, Dual Process Theories were developed. Such Dual Process Theories generally agree that System 1 is rapid, automatic, parallel, and heuristic-based and System 2 is slow, capacity-demanding, sequential, and related to consciousness. While System 2 can still be decently understood from a traditional cognitivist approach, I will argue that it is essential for System 1 processing to be comprehended in an Embodied Embedded approach to Cognition.

  16. The Systems Engineering Process for Human Support Technology Development

    Science.gov (United States)

    Jones, Harry

    2005-01-01

    Systems engineering is designing and optimizing systems. This paper reviews the systems engineering process and indicates how it can be applied in the development of advanced human support systems. Systems engineering develops the performance requirements, subsystem specifications, and detailed designs needed to construct a desired system. Systems design is difficult, requiring both art and science and balancing human and technical considerations. The essential systems engineering activity is trading off and compromising between competing objectives such as performance and cost, schedule and risk. Systems engineering is not a complete independent process. It usually supports a system development project. This review emphasizes the NASA project management process as described in NASA Procedural Requirement (NPR) 7120.5B. The process is a top down phased approach that includes the most fundamental activities of systems engineering - requirements definition, systems analysis, and design. NPR 7120.5B also requires projects to perform the engineering analyses needed to ensure that the system will operate correctly with regard to reliability, safety, risk, cost, and human factors. We review the system development project process, the standard systems engineering design methodology, and some of the specialized systems analysis techniques. We will discuss how they could apply to advanced human support systems development. The purpose of advanced systems development is not directly to supply human space flight hardware, but rather to provide superior candidate systems that will be selected for implementation by future missions. The most direct application of systems engineering is in guiding the development of prototype and flight experiment hardware. However, anticipatory systems engineering of possible future flight systems would be useful in identifying the most promising development projects.

  17. Towards fraud-proof ID documents using multiple data hiding technologies and biometrics

    Science.gov (United States)

    Picard, Justin; Vielhauer, Claus; Thorwirth, Niels

    2004-06-01

    Identity documents, such as ID cards, passports, and driver's licenses, contain textual information, a portrait of the legitimate holder, and eventually some other biometric characteristics such as a fingerprint or handwritten signature. As prices for digital imaging technologies fall, making them more widely available, we have seen an exponential increase in the ease and the number of counterfeiters that can effectively forge documents. Today, with only limited knowledge of technology and a small amount of money, a counterfeiter can effortlessly replace a photo or modify identity information on a legitimate document to the extent that it is very diffcult to differentiate from the original. This paper proposes a virtually fraud-proof ID document based on a combination of three different data hiding technologies: digital watermarking, 2-D bar codes, and Copy Detection Pattern, plus additional biometric protection. As will be shown, that combination of data hiding technologies protects the document against any forgery, in principle without any requirement for other security features. To prevent a genuine document to be used by an illegitimate user,biometric information is also covertly stored in the ID document, to be used for identification at the detector.

  18. An Improved Quantum Information Hiding Protocol Based on Entanglement Swapping of χ-type Quantum States

    International Nuclear Information System (INIS)

    Xu Shu-Jiang; Wang Lian-Hai; Ding Qing-Yan; Zhang Shu-Hui; Chen Xiu-Bo

    2016-01-01

    In 2011, Qu et al. proposed a quantum information hiding protocol based on the entanglement swapping of χ-type quantum states. Because a χ-type state can be described by the 4-particle cat states which have good symmetry, the possible output results of the entanglement swapping between a given χ-type state and all of the 16 χ-type states are divided into 8 groups instead of 16 groups of different results when the global phase is not considered. So it is difficult to read out the secret messages since each result occurs twice in each line (column) of the secret messages encoding rule for the original protocol. In fact, a 3-bit instead of a 4-bit secret message can be encoded by performing two unitary transformations on 2 particles of a χ-type quantum state in the original protocol. To overcome this defect, we propose an improved quantum information hiding protocol based on the general term formulas of the entanglement swapping among χ-type states. (paper)

  19. Suggested Method for Encryption and Hiding ‎Image using LCG and LSB

    Directory of Open Access Journals (Sweden)

    Atheer Hussein Zyara

    2017-12-01

    Full Text Available Maintaining the confidentiality of the data of the very important areas in computer applications , Where many researchers work in the fields of concealment and encryption . So in this research we are working on the combining of the two methods , where confidential data is encrypted by using  a proposed method , Then the cover is encrypted (regular image by LCG algorithm (which generates a series of random numbers to generate the encrypted cover (irregular image , After that ,we hide the encrypted data in encrypted cover by depending on the LSB technique, then we convert the irregular image into regular image and thereby getting  hidden data in random locations in the  cover image  , This method is characterized by flexibility in terms of the possibility of hiding the different  types of confidential data in different types of media , and durability as that data be hidden in random locations and this  what distinguishes the proposed algorithm , and the results showed high security, because the data is hidden in random locations in encrypted image then convert to the original regular image For clarification of the proposed algorithm , it has been applied on a digital image of the gray type using MATLAB language  by using the efficiency scales PSNR and MSE

  20. HIDING TEXT IN DIGITAL IMAGES USING PERMUTATION ORDERING AND COMPACT KEY BASED DICTIONARY

    Directory of Open Access Journals (Sweden)

    Nagalinga Rajan

    2017-05-01

    Full Text Available Digital image steganography is an emerging technique in secure communication for the modern connected world. It protects the content of the message without arousing suspicion in a passive observer. A novel steganography method is presented to hide text in digital images. A compact dictionary is designed to efficiently communicate all types of secret messages. The sorting order of pixels in image blocks are chosen as the carrier of embedded information. The high correlation in image pixel values means reordering within image blocks do not cause high distortion. The image is divided into blocks and perturbed to create non repeating sequences of intensity values. These values are then sorted according to the message. At the receiver end, the message is read from the sorting order of the pixels in image blocks. Only those image blocks with standard deviation lesser than a given threshold are chosen for embedding to alleviate visual distortion. Information Security is provided by shuffling the dictionary according to a shared key. Experimental Results and Analysis show that the method is capable of hiding text with more than 4000 words in a 512×512 grayscale image with a peak signal to noise ratio above 40 decibels.

  1. Reversible Data Hiding Using Two Marked Images Based on Adaptive Coefficient-Shifting Algorithm

    Directory of Open Access Journals (Sweden)

    Ching-Yu Yang

    2012-01-01

    Full Text Available This paper proposes a novel form of reversible data hiding using two marked images by employing the adaptive coefficient-shifting (ACS algorithm. The proposed ACS algorithm consists of three parts: the minimum-preserved scheme, the minimum-preserved with squeezing scheme, and the base-value embedding scheme. More specifically, each input block of a host image can be encoded to two stego-blocks according to three predetermined rules by the above three schemes. Simulations validate that the proposed method not only completely recovers the host medium but also losslessly extracts the hidden message. The proposed method can handle various kinds of images without any occurrence of overflow/underflow. Moreover, the payload and peak signal-to-noise ratio (PSNR performance of the proposed method is superior to that of the conventional invertible data hiding schemes. Furthermore, the number of shadows required by the proposed method is less than that required by the approaches which are based upon secret image sharing with reversible steganography.

  2. Process systems of PHWR - Indian experience

    Energy Technology Data Exchange (ETDEWEB)

    Ramandan, T S.V. [Madras Atomic Power Station (MAPS), Madras (India)

    1991-04-01

    Three operational problems are discussed in this paper. The reactors in Madras Atomic Power Station (MAPS), India are Pressurised Heavy Water Reactors PHWR), similar to Douglas Point PGS. The moderator heavy water is pumped into the bottom half of the calandria (horizontal reactor vessel) through one inlet manifold plenum chamber and horizontal louvers which help to distribute the moderator evenly at a very low velocity. The outlet from the calandria is through a smaller manifold structure at a higher elevation. The moderator is held on the shell side of the calandria by means of helium gas pressure differential between top of calandria and dump tank located below. The primary coolant system consists of 306 coolant channels containing the fuel and steam generators (SGs) and pumps on either side of the reactor. Each SC consists of 11 Nos. inverted U tube vertical heat exchangers where heat is transferred from primary coolant heavy water to secondary light water to produce steam. (author)

  3. Process systems of PHWR - Indian experience

    International Nuclear Information System (INIS)

    Ramandan, T.S.V.

    1991-01-01

    Three operational problems are discussed in this paper. The reactors in Madras Atomic Power Station (MAPS), India are Pressurised Heavy Water Reactors PHWR), similar to Douglas Point PGS. The moderator heavy water is pumped into the bottom half of the calandria (horizontal reactor vessel) through one inlet manifold plenum chamber and horizontal louvers which help to distribute the moderator evenly at a very low velocity. The outlet from the calandria is through a smaller manifold structure at a higher elevation. The moderator is held on the shell side of the calandria by means of helium gas pressure differential between top of calandria and dump tank located below. The primary coolant system consists of 306 coolant channels containing the fuel and steam generators (SGs) and pumps on either side of the reactor. Each SC consists of 11 Nos. inverted U tube vertical heat exchangers where heat is transferred from primary coolant heavy water to secondary light water to produce steam. (author)

  4. Selected systems engineering process deficiencies and their consequences

    Science.gov (United States)

    Thomas, L. Dale

    2007-06-01

    The systems engineering process is well established and well understood. While this statement could be argued in the light of the many systems engineering guidelines and that have been developed, comparative review of these respective descriptions reveal that they differ primarily in the number of discrete steps or other nuances, and are at their core essentially common. Likewise, the systems engineering textbooks differ primarily in the context for application of systems engineering or in the utilization of evolved tools and techniques, not in the basic method. Thus, failures in systems engineering cannot credibly be attributed to implementation of the wrong systems engineering process among alternatives. However, numerous system failures can be attributed to deficient implementation of the systems engineering process. What may clearly be perceived as a systems engineering deficiency in retrospect can appear to be a well considered system engineering efficiency in real time—an efficiency taken to reduce cost or meet a schedule, or more often both. Typically these efficiencies are grounded on apparently solid rationale, such as reuse of heritage hardware or software. Over time, unintended consequences of a systems engineering process deficiency may begin to be realized, and unfortunately often the consequence is systems failure. This paper describes several actual cases of system failures that resulted from deficiencies in their systems engineering process implementation, including the Ariane 5 and the Hubble Space Telescope.

  5. Process modeling for the Integrated Nonthermal Treatment System (INTS) study

    Energy Technology Data Exchange (ETDEWEB)

    Brown, B.W.

    1997-04-01

    This report describes the process modeling done in support of the Integrated Nonthermal Treatment System (INTS) study. This study was performed to supplement the Integrated Thermal Treatment System (ITTS) study and comprises five conceptual treatment systems that treat DOE contract-handled mixed low-level wastes (MLLW) at temperatures of less than 350{degrees}F. ASPEN PLUS, a chemical process simulator, was used to model the systems. Nonthermal treatment systems were developed as part of the INTS study and include sufficient processing steps to treat the entire inventory of MLLW. The final result of the modeling is a process flowsheet with a detailed mass and energy balance. In contrast to the ITTS study, which modeled only the main treatment system, the INTS study modeled each of the various processing steps with ASPEN PLUS, release 9.1-1. Trace constituents, such as radionuclides and minor pollutant species, were not included in the calculations.

  6. Development of advanced spent fuel management process. System analysis of advanced spent fuel management process

    International Nuclear Information System (INIS)

    Ro, S.G.; Kang, D.S.; Seo, C.S.; Lee, H.H.; Shin, Y.J.; Park, S.W.

    1999-03-01

    The system analysis of an advanced spent fuel management process to establish a non-proliferation model for the long-term spent fuel management is performed by comparing the several dry processes, such as a salt transport process, a lithium process, the IFR process developed in America, and DDP developed in Russia. In our system analysis, the non-proliferation concept is focused on the separation factor between uranium and plutonium and decontamination factors of products in each process, and the non-proliferation model for the long-term spent fuel management has finally been introduced. (Author). 29 refs., 17 tabs., 12 figs

  7. Process algebras for hybrid systems : comparison and development

    NARCIS (Netherlands)

    Khadim, U.

    2008-01-01

    Our research is about formal speci¯cation and analysis of hybrid systems. The formalism used is process algebra. Hybrid systems are systems that exhibit both discrete and continuous behaviour. An example of a hybrid system is a digital controller controlling a physical device such as present in

  8. Optimal redundant systems for works with random processing time

    International Nuclear Information System (INIS)

    Chen, M.; Nakagawa, T.

    2013-01-01

    This paper studies the optimal redundant policies for a manufacturing system processing jobs with random working times. The redundant units of the parallel systems and standby systems are subject to stochastic failures during the continuous production process. First, a job consisting of only one work is considered for both redundant systems and the expected cost functions are obtained. Next, each redundant system with a random number of units is assumed for a single work. The expected cost functions and the optimal expected numbers of units are derived for redundant systems. Subsequently, the production processes of N tandem works are introduced for parallel and standby systems, and the expected cost functions are also summarized. Finally, the number of works is estimated by a Poisson distribution for the parallel and standby systems. Numerical examples are given to demonstrate the optimization problems of redundant systems

  9. Process fault diagnosis using knowledge-based systems

    International Nuclear Information System (INIS)

    Sudduth, A.L.

    1991-01-01

    Advancing technology in process plants has led to increased need for computer based process diagnostic systems to assist the operator. One approach to this problem is to use an embedded knowledge based system to interpret measurement signals. Knowledge based systems using only symptom based rules are inadequate for real time diagnosis of dynamic systems; therefore a model based approach is necessary. Though several forms of model based reasoning have been proposed, the use of qualitative causal models incorporating first principles knowledge of process behavior structure, and function appear to have the most promise as a robust modeling methodology. In this paper the structure of a diagnostic system is described which uses model based reasoning and conventional numerical methods to perform process diagnosis. This system is being applied to emergency diesel generator system in nuclear stations

  10. Implementation of a healthcare process in four different workflow systems

    NARCIS (Netherlands)

    Mans, R.S.; Aalst, van der W.M.P.; Russell, N.C.; Bakker, P.J.M.

    2009-01-01

    Currently, many hospitals are investigating the use of a work-flow management system in order to provide support for care processes. However, today's workow management systems fall short in supporting care processes as exibility is required for its execution. In this paper, we investigate the

  11. Classification process in a text document recommender system

    Directory of Open Access Journals (Sweden)

    Dan MUNTEANU

    2005-12-01

    Full Text Available This paper presents the classification process in a recommender system used for textual documents taken especially from web. The system uses in the classification process a combination of content filters, event filters and collaborative filters and it uses implicit and explicit feedback for evaluating documents.

  12. A system of automated processing of deep water hydrological information

    Science.gov (United States)

    Romantsov, V. A.; Dyubkin, I. A.; Klyukbin, L. N.

    1974-01-01

    An automated system for primary and scientific analysis of deep water hydrological information is presented. Primary processing of the data in this system is carried out on a drifting station, which also calculates the parameters of vertical stability of the sea layers, as well as their depths and altitudes. Methods of processing the raw data are described.

  13. An Automated Sample Processing System for Planetary Exploration

    Science.gov (United States)

    Soto, Juancarlos; Lasnik, James; Roark, Shane; Beegle, Luther

    2012-01-01

    An Automated Sample Processing System (ASPS) for wet chemistry processing of organic materials on the surface of Mars has been jointly developed by Ball Aerospace and the Jet Propulsion Laboratory. The mechanism has been built and tested to demonstrate TRL level 4. This paper describes the function of the system, mechanism design, lessons learned, and several challenges that were overcome.

  14. Image processing system performance prediction and product quality evaluation

    Science.gov (United States)

    Stein, E. K.; Hammill, H. B. (Principal Investigator)

    1976-01-01

    The author has identified the following significant results. A new technique for image processing system performance prediction and product quality evaluation was developed. It was entirely objective, quantitative, and general, and should prove useful in system design and quality control. The technique and its application to determination of quality control procedures for the Earth Resources Technology Satellite NASA Data Processing Facility are described.

  15. Eco-efficiency of grinding processes and systems

    CERN Document Server

    Winter, Marius

    2016-01-01

    This research monograph aims at presenting an integrated assessment approach to describe, model, evaluate and improve the eco-efficiency of existing and new grinding processes and systems. Various combinations of grinding process parameters and system configurations can be evaluated based on the eco-efficiency. The book presents the novel concept of empirical and physical modeling of technological, economic and environmental impact indicators. This includes the integrated evaluation of different grinding process and system scenarios. The book is a valuable read for research experts and practitioners in the field of eco-efficiency of manufacturing processes but the book may also be beneficial for graduate students.

  16. Buffer mass test - data aquisition and data processing systems

    International Nuclear Information System (INIS)

    Hagvall, B.

    1982-08-01

    This report describes data aquisition and data processing systems used for the Buffer Mass Test at Stripa. A data aquisition system, designed mainly to provide high reliability, in Stripa produces raw-data log tapes. Copies of these tapes are mailed to the computer center at the University of Luleaa for processing of raw-data. The computer systems in Luleaa offer a wide range of processing facilities: large mass storage units, several plotting facilities, programs for processing and monitoring of vast amounts of data, etc.. (Author)

  17. SIMULATION AS A TOOL FOR PROCESS OPTIMIZATION OF LOGISTIC SYSTEMS

    Directory of Open Access Journals (Sweden)

    Radko Popovič

    2015-09-01

    Full Text Available The paper deals with the simulation of the production processes, especially module of Siemens Tecnomatix software. Tecnomatix Process Simulate is designed for building new or modifying existing production processes. The simulation created in this software has a posibility for fast testing of planned changes or improvements of the production processes. On the base of simulation you can imagine the future picture of the real production system. 3D Simulation can reflects the actual status and conditions on the running system and of course, after some improvements, it can show the possible figure of the production system.

  18. Access Control for Monitoring System-Spanning Business Processes

    NARCIS (Netherlands)

    Bassil, S.; Reichert, M.U.; Bobrik, R.; Bauer, Th.

    2007-01-01

    Integrated process support is highly desirable in environ- ments where data related to a particular (business) process are scattered over distributed and heterogeneous information systems (IS). A process monitoring component is a much-needed module in order to provide an integrated view on all these

  19. Robust collaborative process interactions under system crash and network failures

    NARCIS (Netherlands)

    Wang, Lei; Wombacher, Andreas; Ferreira Pires, Luis; van Sinderen, Marten J.; Chi, Chihung

    2013-01-01

    With the possibility of system crashes and network failures, the design of robust client/server interactions for collaborative process execution is a challenge. If a business process changes its state, it sends messages to the relevant processes to inform about this change. However, server crashes

  20. Advanced social features in a recommendation system for process modeling

    NARCIS (Netherlands)

    Koschmider, A.; Song, M.S.; Reijers, H.A.; Abramowicz, W.

    2009-01-01

    Social software is known to stimulate the exchange and sharing of information among peers. This paper describes how an existing system that supports process builders in completing a business process can be enhanced with various social features. In that way, it is easier for process modeler to become

  1. Implementing BPM systems: the role of process orientation

    NARCIS (Netherlands)

    Reijers, H.A.

    2006-01-01

    Purpose – The presentation and validation of a checklist that can be used to determine an organization's process orientation prior to a business process management systems (BPMS) implementation. Its aim is to help predict the success of BPMS implementation on the basis of the identified process

  2. The operation technology of realtime image processing system (Datacube)

    Energy Technology Data Exchange (ETDEWEB)

    Cho, Jai Wan; Lee, Yong Bum; Lee, Nam Ho; Choi, Young Soo; Park, Soon Yong; Park, Jin Seok

    1997-02-01

    In this project, a Sparc VME-based MaxSparc system, running the solaris operating environment, is selected as the dedicated image processing hardware for robot vision applications. In this report, the operation of Datacube maxSparc system, which is high performance realtime image processing hardware, is systematized. And image flow example programs for running MaxSparc system are studied and analyzed. The state-of-the-arts of Datacube system utilizations are studied and analyzed. For the next phase, advanced realtime image processing platform for robot vision application is going to be developed. (author). 19 refs., 71 figs., 11 tabs.

  3. Industrial process system assessment: bridging process engineering and life cycle assessment through multiscale modeling.

    Science.gov (United States)

    The Industrial Process System Assessment (IPSA) methodology is a multiple step allocation approach for connecting information from the production line level up to the facility level and vice versa using a multiscale model of process systems. The allocation procedure assigns inpu...

  4. Process-aware information systems : bridging people and software through process technology

    NARCIS (Netherlands)

    Dumas, M.; Aalst, van der W.M.P.; Hofstede, ter A.H.M.

    2005-01-01

    A unifying foundation to design and implement process-aware information systems This publication takes on the formidable task of establishing a unifying foundation and set of common underlying principles to effectively model, design, and implement process-aware information systems. Authored by

  5. Optimal control of switched systems arising in fermentation processes

    CERN Document Server

    Liu, Chongyang

    2014-01-01

    The book presents, in a systematic manner, the optimal controls under different mathematical models in fermentation processes. Variant mathematical models – i.e., those for multistage systems; switched autonomous systems; time-dependent and state-dependent switched systems; multistage time-delay systems and switched time-delay systems – for fed-batch fermentation processes are proposed and the theories and algorithms of their optimal control problems are studied and discussed. By putting forward novel methods and innovative tools, the book provides a state-of-the-art and comprehensive systematic treatment of optimal control problems arising in fermentation processes. It not only develops nonlinear dynamical system, optimal control theory and optimization algorithms, but can also help to increase productivity and provide valuable reference material on commercial fermentation processes.

  6. INFORMATION SYSTEM OF AUTOMATION OF PREPARATION EDUCATIONAL PROCESS DOCUMENTS

    Directory of Open Access Journals (Sweden)

    V. A. Matyushenko

    2016-01-01

    Full Text Available Information technology is rapidly conquering the world, permeating all spheres of human activity. Education is not an exception. An important direction of information of education is the development of university management systems. Modern information systems improve and facilitate the management of all types of activities of the institution. The purpose of this paper is development of system, which allows automating process of formation of accounting documents. The article describes the problem of preparation of the educational process documents. Decided to project and create the information system in Microsoft Access environment. The result is four types of reports obtained by using the developed system. The use of this system now allows you to automate the process and reduce the effort required to prepare accounting documents. All reports was implement in Microsoft Excel software product and can be used for further analysis and processing.

  7. Transparent checkpointing and process migration in a distributed system

    OpenAIRE

    2004-01-01

    A distributed system for creating a checkpoint for a plurality of processes running on the distributed system. The distributed system includes a plurality of compute nodes with an operating system executing on each compute node. A checkpoint library resides at the user level on each of the compute nodes, and the checkpoint library is transparent to the operating system residing on the same compute node and to the other compute nodes. Each checkpoint library uses a windowed messaging logging p...

  8. Process Control System Cyber Security Standards - An Overview

    Energy Technology Data Exchange (ETDEWEB)

    Robert P. Evans

    2006-05-01

    The use of cyber security standards can greatly assist in the protection of process control systems by providing guidelines and requirements for the implementation of computer-controlled systems. These standards are most effective when the engineers and operators, using the standards, understand what each standard addresses. This paper provides an overview of several standards that deal with the cyber security of process measurements and control systems.

  9. SOCOM Training and Rehearsal System (STRS) Process Improvement and Decision Support System (DSS) Development

    National Research Council Canada - National Science Library

    Crossland, Neal; Broussard, Steve

    2005-01-01

    ...) Process Improvement and Decision Support System (DSS) Development. Discussion sequence is: Why the study? Objectives; Areas of inquiry; Study products; Observations; Recommendations; Decision Support System.

  10. Process of activation of a palladium catalyst system

    Science.gov (United States)

    Sobolevskiy, Anatoly [Orlando, FL; Rossin, Joseph A [Columbus, OH; Knapke, Michael J [Columbus, OH

    2011-08-02

    Improved processes for activating a catalyst system used for the reduction of nitrogen oxides are provided. In one embodiment, the catalyst system is activated by passing an activation gas stream having an amount of each of oxygen, water vapor, nitrogen oxides, and hydrogen over the catalyst system and increasing a temperature of the catalyst system to a temperature of at least 180.degree. C. at a heating rate of from 1-20.degree./min. Use of activation processes described herein leads to a catalyst system with superior NOx reduction capabilities.

  11. Multi-kilowatt modularized spacecraft power processing system development

    International Nuclear Information System (INIS)

    Andrews, R.E.; Hayden, J.H.; Hedges, R.T.; Rehmann, D.W.

    1975-07-01

    A review of existing information pertaining to spacecraft power processing systems and equipment was accomplished with a view towards applicability to the modularization of multi-kilowatt power processors. Power requirements for future spacecraft were determined from the NASA mission model-shuttle systems payload data study which provided the limits for modular power equipment capabilities. Three power processing systems were compared to evaluation criteria to select the system best suited for modularity. The shunt regulated direct energy transfer system was selected by this analysis for a conceptual design effort which produced equipment specifications, schematics, envelope drawings, and power module configurations

  12. Support system, excavation arrangement, and process of supporting an object

    Science.gov (United States)

    Arnold, Bill W.

    2017-08-01

    A support system, an excavation arrangement, and a process of supporting an object are disclosed. The support system includes a weight-bearing device and a camming mechanism positioned below the weight-bearing device. A downward force on the weight-bearing device at least partially secures the camming mechanism to opposing surfaces. The excavation arrangement includes a borehole, a support system positioned within and secured to the borehole, and an object positioned on and supported by the support system. The process includes positioning and securing the support system and positioning the object on the weight-bearing device.

  13. Boiling water reactor liquid radioactive waste processing system

    International Nuclear Information System (INIS)

    Anon.

    1977-01-01

    The standard sets forth minimum design, construction and performance requirements with due consideration for operation of the liquid radioactive waste processing system for boiling water reactor plants for routine operation including design basis fuel leakage and design basis occurrences. For the purpose of this standard, the liquid radioactive waste processing system begins at the interfaces with the reactor coolant pressure boundary, at the interface valve(s) in lines from other systems and at those sumps and floor drains provided for liquid waste with the potential of containing radioactive material. The system terminates at the point of controlled discharge to the environment, at the point of interface with the waste solidification system and at the point of recycle back to storage for reuse. The standard does not include the reactor coolant clean-up system, fuel pool clean-up system, sanitary waste system, any nonaqueous liquid system or controlled area storm drains

  14. Software control and system configuration management - A process that works

    Science.gov (United States)

    Petersen, K. L.; Flores, C., Jr.

    1983-01-01

    A comprehensive software control and system configuration management process for flight-crucial digital control systems of advanced aircraft has been developed and refined to insure efficient flight system development and safe flight operations. Because of the highly complex interactions among the hardware, software, and system elements of state-of-the-art digital flight control system designs, a systems-wide approach to configuration control and management has been used. Specific procedures are implemented to govern discrepancy reporting and reconciliation, software and hardware change control, systems verification and validation testing, and formal documentation requirements. An active and knowledgeable configuration control board reviews and approves all flight system configuration modifications and revalidation tests. This flexible process has proved effective during the development and flight testing of several research aircraft and remotely piloted research vehicles with digital flight control systems that ranged from relatively simple to highly complex, integrated mechanizations.

  15. Bologna Process Principles Integrated into Education System of Kazakhstan

    Science.gov (United States)

    Nessipbayeva, Olga

    2013-01-01

    The purpose of this paper is to analyze the fulfillment of the parameters of the Bologna Process in the education system of Kazakhstan. The author gives short review of higher education system of the Republic of Kazakhstan with necessary data. And the weaknesses of the system of higher education are identified. Moreover, implementing…

  16. Analysis of multi-stage open shop processing systems

    NARCIS (Netherlands)

    Eggermont, C.E.J.; Schrijver, A.; Woeginger, G.J.; Schwentick, T.; Dürr, C.

    2011-01-01

    We study algorithmic problems in multi-stage open shop processing systems that are centered around reachability and deadlock detection questions. We characterize safe and unsafe system states. We show that it is easy to recognize system states that can be reached from the initial state (where the

  17. Diagnostic system for process control at NPP Dukovany load follow

    International Nuclear Information System (INIS)

    Rubek, J.; Petruzela, I.

    1998-01-01

    The NPP Dukovany is being operated in the frequency control since 1996. In last year a project for the plant load follow has been developed. One part of the project is to install a diagnostic system for process control. At present the main control loops of the plant control system are regular tested after unit refuelling only. The functionality and control system parameter adjusting is tested by certificated procedures. This state is unsuitable in view of the plan load follow operation. The relevant operational modes are based on minimisation of influence on plant component life time and on achievement of planned unit parameters. Therefore it is necessary to provide testing of main control system parts in shorter time period. Mainly at time when the unit is really in load follow operation. The paper describes the diagnostic system for process control which will be at NPP Dukovany implemented. The principal of the system will be evaluation of real and expected changes of technological variables. The system utilises thermohydraulic relation among main technological variables and relation among controlled and manipulated variables. Outputs of the system will be used to operational staff support at the plant operation. It enables: determination of control system state, estimation and check of future control system state, early indication of the deviation of process from normal conditions, check of efficiency of operational staff intervention into plant control. The system gives the plant operator new information for the plant process control. Simultaneously the coupling of new system outputs on existing signalisation is solved. (author)

  18. System justification: A motivational process with implications for social conflict

    NARCIS (Netherlands)

    Jost, J. T.; Liviatan, I.; van der Toorn, J.; Ledgerwood, A.; Mandisodza, A.; Nosek, B. A.

    2012-01-01

    According to system justification theory, people are motivated to defend and legitimize the social systems that affect them. In this chapter, we review 15 years of theory and empirical research demonstrating the motivational underpinnings of system justification processes. We begin by explaining why

  19. Teaching Case: MiHotel--Applicant Processing System Design Case

    Science.gov (United States)

    Miller, Robert E.; Dunn, Paul

    2018-01-01

    This teaching case describes the functionality of an applicant processing system designed for a fictitious hotel chain. The system detailed in the case includes a webform where applicants complete and submit job applications. The system also includes a desktop application used by hotel managers and Human Resources to track applications and process…

  20. Noncontaminating technique for making holes in existing process systems

    Science.gov (United States)

    Hecker, T. P.; Czapor, H. P.; Giordano, S. M.

    1972-01-01

    Technique is developed for making cleanly-contoured holes in assembled process systems without introducing chips or other contaminants into system. Technique uses portable equipment and does not require dismantling of system. Method was tested on Inconel, stainless steel, ASTMA-53, and Hastelloy X in all positions.

  1. 1st International Conference on Cognitive Systems and Information Processing

    CERN Document Server

    Hu, Dewen; Liu, Huaping

    2014-01-01

    "Foundations and Practical Applications of Cognitive Systems and Information Processing" presents selected papers from the First International Conference on Cognitive Systems and Information Processing, held in Beijing, China on December 15-17, 2012 (CSIP2012). The aim of this conference is to bring together experts from different fields of expertise to discuss the state-of-the-art in artificial cognitive systems and advanced information processing, and to present new findings and perspectives on future development. This book introduces multidisciplinary perspectives on the subject areas of Cognitive Systems and Information Processing, including cognitive sciences and technology, autonomous vehicles, cognitive psychology, cognitive metrics, information fusion, image/video understanding, brain-computer interfaces, visual cognitive processing, neural computation, bioinformatics, etc. The book will be beneficial for both researchers and practitioners in the fields of Cognitive Science, Computer Science and Cogni...

  2. Cobit system in the audit processes of the systems of computer systems

    Directory of Open Access Journals (Sweden)

    Julio Jhovany Santacruz Espinoza

    2017-12-01

    Full Text Available The present research work has been carried out to show the benefits of the use of the COBIT system in the auditing processes of the computer systems, the problem is related to: How does it affect the process of audits in the institutions, use of the COBIT system? The main objective is to identify the incidence of the use of the COBIT system in the auditing process used by computer systems within both public and private organizations; In order to achieve our stated objectives of the research will be developed first with the conceptualization of key terms for an easy understanding of the subject, as a conclusion: we can say the COBIT system allows to identify the methodology by using information from the IT departments, to determine the resources of the (IT Information Technology, specified in the COBIT system, such as files, programs, computer networks, including personnel that use or manipulate the information, with the purpose of providing information that the organization or company requires to achieve its objectives.

  3. A Process For Performance Evaluation Of Real-Time Systems

    Directory of Open Access Journals (Sweden)

    Andrew J. Kornecki

    2003-12-01

    Full Text Available Real-time developers and engineers must not only meet the system functional requirements, but also the stringent timing requirements. One of the critical decisions leading to meeting these timing requirements is the selection of an operating system under which the software will be developed and run. Although there is ample documentation on real-time systems performance and evaluation, little can be found that combines such information into an efficient process for use by developers. As the software industry moves towards clearly defined processes, creation of appropriate guidelines describing a process for performance evaluation of real-time system would greatly benefit real-time developers. This technology transition research focuses on developing such a process. PROPERT (PROcess for Performance Evaluation of Real Time systems - the process described in this paper - is based upon established techniques for evaluating real-time systems. It organizes already existing real-time performance criteria and assessment techniques in a manner consistent with a well-formed process, based on the Personal Software Process concepts.

  4. Developing a lean measurement system to enhance process improvement

    Directory of Open Access Journals (Sweden)

    Lewis P.

    2013-01-01

    Full Text Available A key ingredient to underpin process improvement is a robust, reliable, repeatable measurement system. Process improvement activity needs to be supported by accurate and precise data because effective decision making, within process improvement activity, demands the use of “hard” data. One of the oldest and most established process improvement methods is Deming’s Plan-Do-Check-Act (PDCA cycle which is reliant on the check phase, a measurement activity where data is being gathered and evaluated. Recent expansions of the PDCA such as the Six-Sigma Define-Measure-Analyse-Improve-Control (DMAIC methodology place significant importance upon measurement. The DMAIC cycle incorporates the regimented requirement for the inclusion of measurement system analysis (MSA into the breakthrough strategy. The call for MSA within the DMAIC cycle is to provide the improvement activity with a robust measurement system that will ensure a pertinent level of data during any validation process. The Lean methodology is heavily centred on the removal of the seven Mudas (wastes from a manufacturing process: defects, overproduction, transportation, waiting, inventory, motion and processing. The application of lean, particularly within the manufacturing industry, has led to a perception that measurement is a waste within a manufacturing process because measurement processes identify defective products. The metrologists’ pursuit for measurement excellence could be construed as a hindrance by the “cost down” demands being perpetrated from the same organisation’s lean policy. So what possible benefits does enforcing the regimes of the lean and quality philosophies upon the measurement process have and how does this ultimately enhance the process improvement activity? The key fundamental to embed with any process improvement is the removal of waste. The process improvement techniques embedded within lean and quality concepts are extremely powerful practices in the

  5. Implementation of a security system in the radiotherapy process

    International Nuclear Information System (INIS)

    Orellana Salas, A.; Melgar Perez, J.; Arrocha Aceveda, J. F.

    2011-01-01

    Systems of work within the field of health are complex. Even the most routine activities involving chain and coordinate a number of actions to be developed by different professionals of different specialties. These systems often fail due to a combination of small errors along the process, each insufficient to cause an accident. We must ensure safe systems of work for each process we are involved, so it is essential to implement security systems to evaluate and find the vulnerabilities in all phases of the process. In the Service of Radio Physics and Radiation Protection of Punta de Europa Hospital has implemented a security system for radiotherapy process after the analysis and evaluation of the safety culture of the Service.

  6. Thermal processing system concepts and considerations for RWMC buried waste

    Energy Technology Data Exchange (ETDEWEB)

    Eddy, T.L.; Kong, P.C.; Raivo, B.D.; Anderson, G.L.

    1992-02-01

    This report presents a preliminary determination of ex situ thermal processing system concepts and related processing considerations for application to remediation of transuranic (TRU)-contaminated buried wastes (TRUW) at the Radioactive Waste Management Complex (RWMC) of the Idaho National Engineering Laboratory (INEL). Beginning with top-level thermal treatment concepts and requirements identified in a previous Preliminary Systems Design Study (SDS), a more detailed consideration of the waste materials thermal processing problem is provided. Anticipated waste stream elements and problem characteristics are identified and considered. Final waste form performance criteria, requirements, and options are examined within the context of providing a high-integrity, low-leachability glass/ceramic, final waste form material. Thermal processing conditions required and capability of key systems components (equipment) to provide these material process conditions are considered. Information from closely related companion study reports on melter technology development needs assessment and INEL Iron-Enriched Basalt (IEB) research are considered. Five potentially practicable thermal process system design configuration concepts are defined and compared. A scenario for thermal processing of a mixed waste and soils stream with essentially no complex presorting and using a series process of incineration and high temperature melting is recommended. Recommendations for applied research and development necessary to further detail and demonstrate the final waste form, required thermal processes, and melter process equipment are provided.

  7. Thermal processing system concepts and considerations for RWMC buried waste

    International Nuclear Information System (INIS)

    Eddy, T.L.; Kong, P.C.; Raivo, B.D.; Anderson, G.L.

    1992-02-01

    This report presents a preliminary determination of ex situ thermal processing system concepts and related processing considerations for application to remediation of transuranic (TRU)-contaminated buried wastes (TRUW) at the Radioactive Waste Management Complex (RWMC) of the Idaho National Engineering Laboratory (INEL). Beginning with top-level thermal treatment concepts and requirements identified in a previous Preliminary Systems Design Study (SDS), a more detailed consideration of the waste materials thermal processing problem is provided. Anticipated waste stream elements and problem characteristics are identified and considered. Final waste form performance criteria, requirements, and options are examined within the context of providing a high-integrity, low-leachability glass/ceramic, final waste form material. Thermal processing conditions required and capability of key systems components (equipment) to provide these material process conditions are considered. Information from closely related companion study reports on melter technology development needs assessment and INEL Iron-Enriched Basalt (IEB) research are considered. Five potentially practicable thermal process system design configuration concepts are defined and compared. A scenario for thermal processing of a mixed waste and soils stream with essentially no complex presorting and using a series process of incineration and high temperature melting is recommended. Recommendations for applied research and development necessary to further detail and demonstrate the final waste form, required thermal processes, and melter process equipment are provided

  8. Nonterrestrial material processing and manufacturing of large space systems

    Science.gov (United States)

    Von Tiesenhausen, G.

    1979-01-01

    Nonterrestrial processing of materials and manufacturing of large space system components from preprocessed lunar materials at a manufacturing site in space is described. Lunar materials mined and preprocessed at the lunar resource complex will be flown to the space manufacturing facility (SMF), where together with supplementary terrestrial materials, they will be final processed and fabricated into space communication systems, solar cell blankets, radio frequency generators, and electrical equipment. Satellite Power System (SPS) material requirements and lunar material availability and utilization are detailed, and the SMF processing, refining, fabricating facilities, material flow and manpower requirements are described.

  9. Advanced Manufacturing Systems in Food Processing and Packaging Industry

    International Nuclear Information System (INIS)

    Sani, Mohd Shafie; Aziz, Faieza Abdul

    2013-01-01

    In this paper, several advanced manufacturing systems in food processing and packaging industry are reviewed, including: biodegradable smart packaging and Nano composites, advanced automation control system consists of fieldbus technology, distributed control system and food safety inspection features. The main purpose of current technology in food processing and packaging industry is discussed due to major concern on efficiency of the plant process, productivity, quality, as well as safety. These application were chosen because they are robust, flexible, reconfigurable, preserve the quality of the food, and efficient.

  10. Data processing system for spectroscopy at Novillo Tokamak

    International Nuclear Information System (INIS)

    Ortega C, G.; Gaytan G, E.

    1998-01-01

    Taking as basis some proposed methodologies by software engineering it was designed and developed a data processing system coming from the diagnostic equipment by spectroscopy, for the study of plasma impurities, during the cleaning discharges. the data acquisition is realized through an electronic interface which communicates the computer with the spectroscopy system of Novillo Tokamak. The data were obtained starting from files type text and processed for their subsequently graphic presentation. For development of this system named PRODATN (Processing of Data for Spectroscopy in Novillo Tokamak) was used the LabVIEW graphic programming language. (Author)

  11. A Process for Capturing the Art of Systems Engineering

    Science.gov (United States)

    Owens, Clark V., III; Sekeres, Carrie; Roumie, Yasmeen

    2016-01-01

    There is both an art and a science to systems engineering. The science of systems engineering is effectively captured in processes and procedures, but the art is much more elusive. We propose that there is six step process that can be applied to any systems engineering organization to create an environment from which the "art" of that organization can be captured, be allowed to evolve collaboratively and be shared with all members of the organization. This paper details this process as it was applied to NASA Launch Services Program (LSP) Integration Engineering Branch during a pilot program of Confluence, a Commercial Off The Shelf (COTS) wiki tool.

  12. Advanced Manufacturing Systems in Food Processing and Packaging Industry

    Science.gov (United States)

    Shafie Sani, Mohd; Aziz, Faieza Abdul

    2013-06-01

    In this paper, several advanced manufacturing systems in food processing and packaging industry are reviewed, including: biodegradable smart packaging and Nano composites, advanced automation control system consists of fieldbus technology, distributed control system and food safety inspection features. The main purpose of current technology in food processing and packaging industry is discussed due to major concern on efficiency of the plant process, productivity, quality, as well as safety. These application were chosen because they are robust, flexible, reconfigurable, preserve the quality of the food, and efficient.

  13. Real-time information and processing system for radiation protection

    International Nuclear Information System (INIS)

    Oprea, I.; Oprea, M.; Stoica, M.; Badea, E.; Guta, V.

    1999-01-01

    The real-time information and processing system has as main task to record, collect, process and transmit the radiation level and weather data, being proposed for radiation protection, environmental monitoring around nuclear facilities and for civil defence. Such a system can offer information in order to provide mapping, data base, modelling and communication and to assess the consequences of nuclear accidents. The system incorporates a number of stationary or mobile radiation monitoring equipment, weather parameter measuring station, a GIS-based information processing center and the communication network, all running on a real-time operating system. It provides the automatic data collection on-line and off-line, remote diagnostic, advanced presentation techniques, including a graphically oriented executive support, which has the ability to respond to an emergency by geographical representation of the hazard zones on the map.The system can be integrated into national or international environmental monitoring systems, being based on local intelligent measuring and transmission units, simultaneous processing and data presentation using a real-time operating system for PC and geographical information system (GIS). Such an integrated system is composed of independent applications operating under the same computer, which is capable to improve the protection of the population and decision makers efforts, updating the remote GIS data base. All information can be managed directly from the map by multilevel data retrieving and presentation by using on-line dynamic evolution of the events, environment information, evacuation optimization, image and voice processing

  14. Active Learning of Markov Decision Processes for System Verification

    DEFF Research Database (Denmark)

    Chen, Yingke; Nielsen, Thomas Dyhre

    2012-01-01

    deterministic Markov decision processes from data by actively guiding the selection of input actions. The algorithm is empirically analyzed by learning system models of slot machines, and it is demonstrated that the proposed active learning procedure can significantly reduce the amount of data required...... demanding process, and this shortcoming has motivated the development of algorithms for automatically learning system models from observed system behaviors. Recently, algorithms have been proposed for learning Markov decision process representations of reactive systems based on alternating sequences...... of input/output observations. While alleviating the problem of manually constructing a system model, the collection/generation of observed system behaviors can also prove demanding. Consequently we seek to minimize the amount of data required. In this paper we propose an algorithm for learning...

  15. A digital signal processing system for coherent laser radar

    Science.gov (United States)

    Hampton, Diana M.; Jones, William D.; Rothermel, Jeffry

    1991-01-01

    A data processing system for use with continuous-wave lidar is described in terms of its configuration and performance during the second survey mission of NASA'a Global Backscatter Experiment. The system is designed to estimate a complete lidar spectrum in real time, record the data from two lidars, and monitor variables related to the lidar operating environment. The PC-based system includes a transient capture board, a digital-signal processing (DSP) board, and a low-speed data-acquisition board. Both unprocessed and processed lidar spectrum data are monitored in real time, and the results are compared to those of a previous non-DSP-based system. Because the DSP-based system is digital it is slower than the surface-acoustic-wave signal processor and collects 2500 spectra/s. However, the DSP-based system provides complete data sets at two wavelengths from the continuous-wave lidars.

  16. Integrated Main Propulsion System Performance Reconstruction Process/Models

    Science.gov (United States)

    Lopez, Eduardo; Elliott, Katie; Snell, Steven; Evans, Michael

    2013-01-01

    The Integrated Main Propulsion System (MPS) Performance Reconstruction process provides the MPS post-flight data files needed for postflight reporting to the project integration management and key customers to verify flight performance. This process/model was used as the baseline for the currently ongoing Space Launch System (SLS) work. The process utilizes several methodologies, including multiple software programs, to model integrated propulsion system performance through space shuttle ascent. It is used to evaluate integrated propulsion systems, including propellant tanks, feed systems, rocket engine, and pressurization systems performance throughout ascent based on flight pressure and temperature data. The latest revision incorporates new methods based on main engine power balance model updates to model higher mixture ratio operation at lower engine power levels.

  17. Integration of process computer systems to Cofrentes NPP

    International Nuclear Information System (INIS)

    Saettone Justo, A.; Pindado Andres, R.; Buedo Jimenez, J.L.; Jimenez Fernandez-Sesma, A.; Delgado Muelas, J.A.

    1997-01-01

    The existence of three different process computer systems in Cofrentes NPP and the ageing of two of them have led to the need for their integration into a single real time computer system, known as Integrated ERIS-Computer System (SIEC), which covers the functionality of the three systems: Process Computer (PC), Emergency Response Information System (ERIS) and Nuclear Calculation Computer (OCN). The paper describes the integration project developed, which has essentially consisted in the integration of PC, ERIS and OCN databases into a single database, the migration of programs from the old process computer into the new SIEC hardware-software platform and the installation of a communications programme to transmit all necessary data for OCN programs from the SIEC computer, which in the new configuration is responsible for managing the databases of the whole system. (Author)

  18. ATLAS Grid Data Processing: system evolution and scalability

    CERN Document Server

    Golubkov, D; The ATLAS collaboration; Klimentov, A; Minaenko, A; Nevski, P; Vaniachine, A; Walker, R

    2012-01-01

    The production system for Grid Data Processing handles petascale ATLAS data reprocessing and Monte Carlo activities. The production system empowered further data processing steps on the Grid performed by dozens of ATLAS physics groups with coordinated access to computing resources worldwide, including additional resources sponsored by regional facilities. The system provides knowledge management of configuration parameters for massive data processing tasks, reproducibility of results, scalable database access, orchestrated workflow and performance monitoring, dynamic workload sharing, automated fault tolerance and petascale data integrity control. The system evolves to accommodate a growing number of users and new requirements from our contacts in ATLAS main areas: Trigger, Physics, Data Preparation and Software & Computing. To assure scalability, the next generation production system architecture development is in progress. We report on scaling up the production system for a growing number of users provi...

  19. A reconfigurable hybrid supervisory system for process control

    International Nuclear Information System (INIS)

    Garcia, H.E.; Ray, A.; Edwards, R.M.

    1994-01-01

    This paper presents a reconfigurable approach to decision and control systems for complex dynamic processes. The proposed supervisory control system is a reconfigurable hybrid architecture structured into three functional levels of hierarchy, namely, execution, supervision, and coordination. While the bottom execution level is constituted by either reconfigurable continuously varying or discrete event systems, the top two levels are necessarily governed by reconfigurable sets of discrete event decision and control systems. Based on the process status, the set of active control and supervisory algorithm is chosen. The reconfigurable hybrid system is briefly described along with a discussion on its implementation at the Experimental Breeder Reactor II of Argonne National Laboratory. A process control application of this hybrid system is presented and evaluated in an in-plant experiment

  20. A reconfigurable hybrid supervisory system for process control

    International Nuclear Information System (INIS)

    Garcia, H.E.; Ray, A.; Edwards, R.M.

    1994-01-01

    This paper presents a reconfigurable approach to decision and control systems for complex dynamic processes. The proposed supervisory control system is a reconfigurable hybrid architecture structured into three functional levels of hierarchy, namely, execution, supervision, and coordination. While, the bottom execution level is constituted by either reconfigurable continuously varying or discrete event systems, the top two levels are necessarily governed by reconfigurable sets of discrete event decision and control systems. Based on the process status, the set of active control and supervisory algorithm is chosen. The reconfigurable hybrid system is briefly described along with a discussion on its implementation at the Experimental Breeder Reactor 2 of Argonne National Laboratory. A process control application of this hybrid system is presented and evaluated in an in-plant experiment