WorldWideScience

Sample records for information embedding capacity

  1. Embedding capacity estimation of reversible watermarking schemes

    Indian Academy of Sciences (India)

    Estimation of the embedding capacity is an important problem specifically in reversible multi-pass watermarking and is required for analysis before any image can be watermarked. In this paper, we propose an efficient method for estimating the embedding capacity of a given cover image under multi-pass embedding, ...

  2. Embedding capacity estimation of reversible watermarking schemes

    Indian Academy of Sciences (India)

    Abstract. Estimation of the embedding capacity is an important problem specif- ically in reversible multi-pass watermarking and is required for analysis before any image can be watermarked. In this paper, we propose an efficient method for estimating the embedding capacity of a given cover image under multi-pass embed-.

  3. Embedding capacity estimation of reversible watermarking schemes

    Indian Academy of Sciences (India)

    human visual system, the embedding in this case is done based on an adpative algoithm. Predic- tion based techniques (Thodi & Rodriquez 2007; Sachnev et ...... stage and additional memory to store the total or the stage-wise expectation for every possible pixel pair combination, i.e., a total of L2 trees. 3.2 Compressed bit- ...

  4. Electric distribution systems and embedded generation capacity

    International Nuclear Information System (INIS)

    Calderaro, V.; Galdi, V.; Piccolo, A.; Siano, P.

    2006-01-01

    The main policy issues of European States are sustainable energy supply promotion and liberalization of energy markets, which introduced market competition in electricity production and created support mechanisms to encourage renewable electricity production and consumption. As a result of liberalization, any generator, including small-scale and renewable energy based units, can sell electricity on the free market. In order to meet future sustainability targets, connection of a higher number of Distributed Generation (DG) units to the electrical power system is expected, requiring changes in the design and operation of distribution electricity systems, as well as changes in electricity network regulation. In order to assist distribution system operators in planning and managing DG connections and in maximizing DG penetration and renewable sources exploitation, this paper proposed a reconfiguration methodology based on a Genetic Algorithm (GA), that was tested on a 70-bus system with DG units. The simulation results confirmed that the methodology represents a suitable tool for distribution system operators when dealing with DG capacity expansion and power loss issues, providing information regarding the potential penetration network-wide and allowing maximum exploitation of renewable generation. 35 refs., 4 tabs., 6 figs

  5. High capacity embedding with indexed data recovery using adjunctive numerical relations in multimedia signal covers

    Science.gov (United States)

    Collins, James C.; Agaian, Sos S.

    2013-05-01

    We introduce a technique for covertly embedding data throughout an audio file using redundant number system decomposition across non-standard digital bit-lines. This bit-line implementation integrates an index recoverable embedded algorithm with an extended bit level representation that achieves a high capacity data channel within an audio multimedia file. It will be shown this new steganography method has minimal aural distortive affects while preserving both first and second order cover statistics, making it less susceptible to most steganalysis attacks. Our research approach involves reviewing the common numerical methods used in common binary-based algorithms. We then describe basic concepts and challenges when attempting to implement complex embedding algorithms that are based on redundant number systems. Finally, we introduce a novel class of numerical based multiple bit-line decomposition systems, which we define as Adjunctive Numerical Representations. The system is primarily described using basic PCM techniques in uncompressed audio files however extended applications for alternate multimedia is addressed. This new embedding system will not only provide the statistical stability required for effective steganography but will also give us an improvement in the embedding capacity in this class of multimedia carrier files. This novelty of our approach is demonstrated by an ability to embed high capacity covert data while simultaneously providing a means for rapid, indexed data recovery.

  6. Reversible Data Hiding Scheme with High Embedding Capacity Using Semi-Indicator-Free Strategy

    Directory of Open Access Journals (Sweden)

    Jiann-Der Lee

    2013-01-01

    Full Text Available A novel reversible data-hiding scheme is proposed to embed secret data into a side-matched-vector-quantization- (SMVQ- compressed image and achieve lossless reconstruction of a vector-quantization- (VQ- compressed image. The rather random distributed histogram of a VQ-compressed image can be relocated to locations close to zero by SMVQ prediction. With this strategy, fewer bits can be utilized to encode SMVQ indices with very small values. Moreover, no indicator is required to encode these indices, which yields extrahiding space to hide secret data. Hence, high embedding capacity and low bit rate scenarios are deposited. More specifically, in terms of the embedding rate, the bit rate, and the embedding capacity, experimental results show that the performance of the proposed scheme is superior to those of the former data hiding schemes for VQ-based, VQ/SMVQ-based, and search-order-coding- (SOC- based compressed images.

  7. Effect of Embedment on the Vertical Bearing Capacity of Bucket Foundations in Clay

    DEFF Research Database (Denmark)

    Barari, Amin; Ibsen, Lars Bo

    2011-01-01

    the top and applying suction inside the bucket. The hydrostatic pressure difference and the deadweight cause the bucket to penetrate the soil. In the present study, results of an experimental study addressing the effect of embedment (skirt length to the diameter) on the undrained bearing capacity...

  8. Embedded Managers in Informal Learning Spaces

    Science.gov (United States)

    Raisin, Victoria; Fennewald, Joseph

    2016-01-01

    Many universities have decided to invest in updating their informal learning spaces. One decision to be made in planning the space is how to staff it. The researchers carried out a qualitative case study to better understand the perspective of learning space managers who work in offices within their assigned space. The research generated six…

  9. Embedded Design Research of Iris Information Acquisition System

    Directory of Open Access Journals (Sweden)

    Huiyan Xu

    2014-09-01

    Full Text Available In view of the limitation of traditional identification, it is easy to lose and copy keys, cards or ID cards, and it is easy to forget the password, so we designed an embedded application system based on the iris identification technology, which can realize the functions of gathering, inputting, and registering the iris information and identification. The hardware circuit was designed by using advanced RISC machines (ARM embedded microprocessor as the core. The iris sensor was used to gather the iris information, and the development of software was accomplished with the embedded OS Windows CE. The system can be used on the company entrance guard system, customs security of airport and criminal identification.

  10. Graph embedding with rich information through heterogeneous graph

    KAUST Repository

    Sun, Guolei

    2017-11-12

    Graph embedding, aiming to learn low-dimensional representations for nodes in graphs, has attracted increasing attention due to its critical application including node classification, link prediction and clustering in social network analysis. Most existing algorithms for graph embedding only rely on the topology information and fail to use the copious information in nodes as well as edges. As a result, their performance for many tasks may not be satisfactory. In this thesis, we proposed a novel and general framework for graph embedding with rich text information (GERI) through constructing a heterogeneous network, in which we integrate node and edge content information with graph topology. Specially, we designed a novel biased random walk to explore the constructed heterogeneous network with the notion of flexible neighborhood. Our sampling strategy can compromise between BFS and DFS local search on heterogeneous graph. To further improve our algorithm, we proposed semi-supervised GERI (SGERI), which learns graph embedding in an discriminative manner through heterogeneous network with label information. The efficacy of our method is demonstrated by extensive comparison experiments with 9 baselines over multi-label and multi-class classification on various datasets including Citeseer, Cora, DBLP and Wiki. It shows that GERI improves the Micro-F1 and Macro-F1 of node classification up to 10%, and SGERI improves GERI by 5% in Wiki.

  11. Embedment Effects on Vertical Bearing Capacity of Offshore Bucket Foundations on Cohesionless Soil

    DEFF Research Database (Denmark)

    Barari, Amin; Ibsen, Lars Bo; Ghalesari, Abbasali Taghavi

    2017-01-01

    application of vertical load. It was found that the drained capacity of suction caissons is 12 dependent on embedment ratio. On the other hand, predictions from conventional semi-empirical 13 depth factors were found to somewhat underestimate when applied to rough foundations. On the 14 basis of the tests......This paper presents the results from a series of physical modeling and three-dimensional finite 9 element (FE) analyses, which examined the uniaxial vertical capacity of suction caissons for 10 offshore wind turbines. The experiments were carried out in quartz sand and involved monotonic 11...

  12. Experimental studies and modeling of an information embedded power system

    Science.gov (United States)

    Carullo, Stephen Paul

    This thesis develops a model of an electrical power system, with its inherent embedded communication system, for studying the characteristics of power system measurement errors due to communication delays. This model is referred to as an "information embedded power system" to emphasize the addition of a model of the communication system, that delivers measurements to a control center, to the standard model for the energy balance within the power system. These power system measurements are delivered across an Ethernet computer control network. An experimental platform was created in order to experimentally measure and characterize measurement delay errors (MDEs) in this information embedded power system. Several stochastic system models are developed, which are composed of both the physical infrastructure of the power system as well as the embedded computer network communication infrastructure. Both white noise and colored noise models are used to characterize MDEs. This type of analysis is an extension of traditional observability approaches, which usually only assume deterministic steady-state conditions in the power system and do not consider time delays in delivering measurements. The experimental platform is used to validate the developed model.

  13. Strengthening Information Society Research Capacity Alliance ...

    International Development Research Centre (IDRC) Digital Library (Canada)

    There is a disparity between the representation of northern and southern researchers in the literature pertaining to information studies, particularly information and communication for development (ICT4D) research. An earlier project, 104921 Small Grants Program: Strengthening ICTD Research Capacity in Asia (SIRCA), ...

  14. Embedding

    DEFF Research Database (Denmark)

    Høyrup, Jens

    2016-01-01

    “Embedding” as a technical concept comes from linguistics, more precisely from grammar. The present paper investigates whether it can be applied fruitfully to certain questions that have been investigated by historians (and sometimes philosophers) of mathematics: 1. The construction of numeral...... systems, in particular place-value and quasi place-value systems. 2. The development of algebraic symbolisms. 3. The discussion whether “scientific revolutions” ever take place in mathematics, or new conceptualizations always include what preceded them. A final section investigates the relation between...... spatial and linguistic embedding and concludes that the spatio-linguistic notion of embedding can be meaningfully applied to the former two discussions, whereas the apparent embedding of older within new theories is rather an ideological mirage....

  15. System for non-disruptive high-capacity indexed data embedding and recovery using multimedia signal covers

    Science.gov (United States)

    Collins, James C.; Agaian, Sos S.

    2011-06-01

    Over the past several years there has been an apparent shift in research focus in the area of digital steganography and steganalysis - a shift from primarily image based methods to a new focus on broader multimedia techniques. More specifically the area of digital audio steganography is of prime interest. We introduce a new high capacity, covert channel data embedding and recovery system for digital audio carrier files using a key based encoding and decoding method. It will be shown that the added information file is interleaved within the carrier file and is fully indexed allowing for segmented extraction and recovery of data at chosen start and stop points in the sampled stream. The original audio quality is not affected by the addition of this covert data. The embedded information can also be secured by a binary key string or cryptographic algorithm and resists statistical analytic detection attempts. We will also describe how this new method can be used for data compression and expansion applications in the transfer and storage of digital multimedia to increase the overall data capacity and security.

  16. Embedding

    DEFF Research Database (Denmark)

    Høyrup, Jens

    2015-01-01

    to become the starting point not only for theoretical algebra, but for the whole transformation of mathematics from his time onward: the possibility of embedding, that is, of making a symbol or an element of a calculation stand not only for a single number, determined or undetermined, but for a whole...

  17. Developing Evaluation Capacity in Information and Communication ...

    International Development Research Centre (IDRC) Digital Library (Canada)

    The nuanced ways in which information and communication technologies (ICTs) interact with developing country societies necessitate thoughtful, systematic evaluation of their effects, grounded in the concepts of utility, outcome and ownership. This grant will allow Developing Evaluation Capacity in ICT4D (DECI) to train ...

  18. Effect of Embedment on the Vertical Bearing Capacity of Bucket Foundations in Clay

    DEFF Research Database (Denmark)

    Barari, Amin; Ibsen, Lars Bo

    2011-01-01

    To evaluate the undrained behaviour of bucket foundations installed on Yoldia clay, 100 tests on bucket foundations subject to vertical and moment loadings were conducted at Aalborg university geotechnical centre. Bucket foundations are tubular steel foundations that are installed by sealing...... the top and applying suction inside the bucket. The hydrostatic pressure difference and the deadweight cause the bucket to penetrate the soil. In the present study, results of an experimental study addressing the effect of embedment (skirt length to the diameter) on the undrained bearing capacity...

  19. Visual words assignment via information-theoretic manifold embedding.

    Science.gov (United States)

    Deng, Yue; Li, Yipeng; Qian, Yanjun; Ji, Xiangyang; Dai, Qionghai

    2014-10-01

    Codebook-based learning provides a flexible way to extract the contents of an image in a data-driven manner for visual recognition. One central task in such frameworks is codeword assignment, which allocates local image descriptors to the most similar codewords in the dictionary to generate histogram for categorization. Nevertheless, existing assignment approaches, e.g., nearest neighbors strategy (hard assignment) and Gaussian similarity (soft assignment), suffer from two problems: 1) too strong Euclidean assumption and 2) neglecting the label information of the local descriptors. To address the aforementioned two challenges, we propose a graph assignment method with maximal mutual information (GAMI) regularization. GAMI takes the power of manifold structure to better reveal the relationship of massive number of local features by nonlinear graph metric. Meanwhile, the mutual information of descriptor-label pairs is ultimately optimized in the embedding space for the sake of enhancing the discriminant property of the selected codewords. According to such objective, two optimization models, i.e., inexact-GAMI and exact-GAMI, are respectively proposed in this paper. The inexact model can be efficiently solved with a closed-from solution. The stricter exact-GAMI nonparametrically estimates the entropy of descriptor-label pairs in the embedding space and thus leads to a relatively complicated but still trackable optimization. The effectiveness of GAMI models are verified on both the public and our own datasets.

  20. Information storage capacity of discrete spin systems

    Energy Technology Data Exchange (ETDEWEB)

    Yoshida, Beni, E-mail: rouge@caltech.edu

    2013-11-15

    Understanding the limits imposed on information storage capacity of physical systems is a problem of fundamental and practical importance which bridges physics and information science. There is a well-known upper bound on the amount of information that can be stored reliably in a given volume of discrete spin systems which are supported by gapped local Hamiltonians. However, all the previously known systems were far below this theoretical bound, and it remained open whether there exists a gapped spin system that saturates this bound. Here, we present a construction of spin systems which saturate this theoretical limit asymptotically by borrowing an idea from fractal properties arising in the Sierpinski triangle. Our construction provides not only the best classical error-correcting code which is physically realizable as the energy ground space of gapped frustration-free Hamiltonians, but also a new research avenue for correlated spin phases with fractal spin configurations. -- Highlights: •We propose a spin model with fractal ground states and study its coding properties. •We show that the model asymptotically saturates a theoretical limit on information storage capacity. •We discuss its relations to various theoretical physics problems.

  1. Graph embedded nonparametric mutual information for supervised dimensionality reduction.

    Science.gov (United States)

    Bouzas, Dimitrios; Arvanitopoulos, Nikolaos; Tefas, Anastasios

    2015-05-01

    In this paper, we propose a novel algorithm for dimensionality reduction that uses as a criterion the mutual information (MI) between the transformed data and their corresponding class labels. The MI is a powerful criterion that can be used as a proxy to the Bayes error rate. Furthermore, recent quadratic nonparametric implementations of MI are computationally efficient and do not require any prior assumptions about the class densities. We show that the quadratic nonparametric MI can be formulated as a kernel objective in the graph embedding framework. Moreover, we propose its linear equivalent as a novel linear dimensionality reduction algorithm. The derived methods are compared against the state-of-the-art dimensionality reduction algorithms with various classifiers and on various benchmark and real-life datasets. The experimental results show that nonparametric MI as an optimization objective for dimensionality reduction gives comparable and in most of the cases better results compared with other dimensionality reduction methods.

  2. Information Processing Capacity of Dynamical Systems

    Science.gov (United States)

    Dambre, Joni; Verstraeten, David; Schrauwen, Benjamin; Massar, Serge

    2012-07-01

    Many dynamical systems, both natural and artificial, are stimulated by time dependent external signals, somehow processing the information contained therein. We demonstrate how to quantify the different modes in which information can be processed by such systems and combine them to define the computational capacity of a dynamical system. This is bounded by the number of linearly independent state variables of the dynamical system, equaling it if the system obeys the fading memory condition. It can be interpreted as the total number of linearly independent functions of its stimuli the system can compute. Our theory combines concepts from machine learning (reservoir computing), system modeling, stochastic processes, and functional analysis. We illustrate our theory by numerical simulations for the logistic map, a recurrent neural network, and a two-dimensional reaction diffusion system, uncovering universal trade-offs between the non-linearity of the computation and the system's short-term memory.

  3. Information Processing Capacity of Dynamical Systems

    Science.gov (United States)

    Dambre, Joni; Verstraeten, David; Schrauwen, Benjamin; Massar, Serge

    2012-01-01

    Many dynamical systems, both natural and artificial, are stimulated by time dependent external signals, somehow processing the information contained therein. We demonstrate how to quantify the different modes in which information can be processed by such systems and combine them to define the computational capacity of a dynamical system. This is bounded by the number of linearly independent state variables of the dynamical system, equaling it if the system obeys the fading memory condition. It can be interpreted as the total number of linearly independent functions of its stimuli the system can compute. Our theory combines concepts from machine learning (reservoir computing), system modeling, stochastic processes, and functional analysis. We illustrate our theory by numerical simulations for the logistic map, a recurrent neural network, and a two-dimensional reaction diffusion system, uncovering universal trade-offs between the non-linearity of the computation and the system's short-term memory. PMID:22816038

  4. Finite Element Analysis of the Effect on Edge Distance of the Tensile Bearing Capacity of Embedded Hanging Parts

    Directory of Open Access Journals (Sweden)

    Meng Xian Hong

    2016-01-01

    Full Text Available In order to explore the trend of tensile bearing capacity of embedded hanging parts when change the edge distance. Based on the finite element analysis software ABAQUS, the four simulation model was established. The buried depth and strength of concrete remain unchanged, but the edge distance was gradient change. By the load - displacement curve of every model known, the greater the edge distance, the greater the bearing capacity. When the edge distance reaches 1.5 times buried depth, the effect of increasing edge distance for improving the bearing capacity will be impaired.

  5. Developing Evaluation Capacity in Information and Communication ...

    International Development Research Centre (IDRC) Digital Library (Canada)

    17 août 2009 ... Case study : PAN Asian Collaboration for Evidence-based e-Health Adoption and Application (PANACeA). Études. Case study : Developing evaluation capacity (DECI); building an organization's capacity to conduct use focused evaluations using a mentoring approach - LIRNEasia's CPRsouth Program ...

  6. Information Literacy Development at a Distance: Embedded or Reality?

    Science.gov (United States)

    Chisholm, Elizabeth; Lamond, Heather M.

    2012-01-01

    A small library using two full time equivalent (FTE) professional staff integrated into the Moodle environment of over 40 postgraduate distance courses with the potential to reach over 1,800 students and getting results. How? This is not embedding as many would think of it, with the librarian an active teacher throughout the entire length of the…

  7. Strengthening Information Society Research Capacity Alliance III ...

    International Development Research Centre (IDRC) Digital Library (Canada)

    The project will also develop local research capacity by pairing emerging researchers with leading scholars on research projects. Project ID. 107708. Project status. Active. Duration. 24 months. IDRC Officer. Matthew Smith. Total funding. CA$ 711,000. Project Leader. Arul Chib. Institution. Nanyang Technological University.

  8. Building Staff Capacity through Reflecting on Collaborative Development of Embedded Academic Literacies Curricula

    Science.gov (United States)

    Thies, Linda C.

    2016-01-01

    Most Australian universities articulate some policies around the integration of graduate learning outcomes in courses. This paper draws on a Federal Government funded project that adopted a developmental approach to students' acquisition of course learning outcomes, through the embedding of academic literacies in course curricula. The project was…

  9. Visual fidelity without sacrificing capacity: an adaptive Laplacian pyramid approach to information hiding

    Science.gov (United States)

    Rabie, Tamer; Baziyad, Mohammed

    2017-11-01

    This paper investigates the improvements in hiding capacity and perceptibility of image-based steganography using a hiding scheme which utilizes a multiscale Laplacian pyramid of the cover image and the discrete cosine transform (DCT). The proposed methodology allows for an enhanced visual quality of the resulting stego image, while allowing for very high embedding payload capacities, which improves security by reducing an eavesdropper's ability to detect and successively extract or change the hidden information. The basic idea is to hide the secret data in the DCT of the lowest level of the Laplacian pyramid of the cover image. This scheme employs a curve-fitting adaptive region approach in the DCT domain for enhanced visual fidelity as well as very high capacities as compared to competing methods. This paper also compares the embedding capacities of various steganography schemes that have been recently published in the literature. Experimental results confirm that the proposed hiding scheme can maintain consistently high stego image quality, in comparison to other spatial and frequency-domain schemes, when hiding at extremely high payload capacities.

  10. Strengthening Information Society Research Capacity Alliance ...

    International Development Research Centre (IDRC) Digital Library (Canada)

    2011-09-13

    The project is expected to strengthen the body of theoretically based, methodologically sound, interdisciplinary research on information society issues. Project ID. 106618. Project status. Closed. Start Date. September 13, 2011. End Date. August 12, 2014. Duration. 24 months. IDRC Officer. Smith, Matthew. Total funding.

  11. Capacity Building For Library and Information Centre Personnel In ...

    African Journals Online (AJOL)

    The paper examined the concepts “ICT environment' and 'digitized/virtual library and information centre' and discussed the features of digitized/virtual library and information centre and the need for capacity building especially in ICT-based libraries and information centres. It highlights the skills, competencies and training ...

  12. A Reversible Data Hiding Scheme for 3D Polygonal Models Based on Histogram Shifting with High Embedding Capacity

    Science.gov (United States)

    Huang, Yao-Hsien; Tsai, Yuan-Yu

    2015-06-01

    Reversibility is the ability to recover the stego media back to the cover media without any error after correctly extracting the secret message. This study proposes a reversible data hiding scheme for 3D polygonal models based on histogram shifting. Specifically, the histogram construction is based on the geometric similarity between neighboring vertices. The distances between the neighboring vertices in a 3D model with some point in the 3D space are usually similar, especially for a high-resolution 3D model. Therefore, the difference between the above distances of the neighboring vertices has a small value for a high probability. This study uses the modified breadth-first search to traverse each vertex once in a sequential order and determine the unique referencing neighbor for each vertex. The histogram is then constructed based on the normalized distance difference of neighboring vertices. This approach significantly increases embedding capacity. Experimental results show that the proposed algorithm can achieve higher embedding capacity than existing algorithms while still maintaining acceptable model distortion. This algorithm also provides greater robustness against similarity transformation attacks and vertex reordering attacks. The proposed technique is feasible for 3D reversible data hiding.

  13. Efficient physical embedding of topologically complex information processing networks in brains and computer circuits.

    Directory of Open Access Journals (Sweden)

    Danielle S Bassett

    2010-04-01

    Full Text Available Nervous systems are information processing networks that evolved by natural selection, whereas very large scale integrated (VLSI computer circuits have evolved by commercially driven technology development. Here we follow historic intuition that all physical information processing systems will share key organizational properties, such as modularity, that generally confer adaptivity of function. It has long been observed that modular VLSI circuits demonstrate an isometric scaling relationship between the number of processing elements and the number of connections, known as Rent's rule, which is related to the dimensionality of the circuit's interconnect topology and its logical capacity. We show that human brain structural networks, and the nervous system of the nematode C. elegans, also obey Rent's rule, and exhibit some degree of hierarchical modularity. We further show that the estimated Rent exponent of human brain networks, derived from MRI data, can explain the allometric scaling relations between gray and white matter volumes across a wide range of mammalian species, again suggesting that these principles of nervous system design are highly conserved. For each of these fractal modular networks, the dimensionality of the interconnect topology was greater than the 2 or 3 Euclidean dimensions of the space in which it was embedded. This relatively high complexity entailed extra cost in physical wiring: although all networks were economically or cost-efficiently wired they did not strictly minimize wiring costs. Artificial and biological information processing systems both may evolve to optimize a trade-off between physical cost and topological complexity, resulting in the emergence of homologous principles of economical, fractal and modular design across many different kinds of nervous and computational networks.

  14. The capacity of black holes to transmit quantum information

    Science.gov (United States)

    Brádler, Kamil; Adami, Christoph

    2014-05-01

    We study the properties of the quantum information transmission channel that emerges from the quantum dynamics of particles interacting with a black hole horizon. We calculate the quantum channel capacity in two limiting cases where a single-letter capacity is known to exist: the limit of perfectly reflecting and perfectly absorbing black holes. We find that the perfectly reflecting black hole channel is closely related to the Unruh channel and that its capacity is non-vanishing, allowing for the perfect reconstruction of quantum information outside of the black hole horizon. We also find that the complementary channel (transmitting entanglement behind the horizon) is entanglement-breaking in this case, with vanishing capacity. We then calculate the quantum capacity of the black hole channel in the limit of a perfectly absorbing black hole and find that this capacity vanishes, while the capacity of the complementary channel is non-vanishing instead. Rather than inviting a new crisis for quantum physics, this finding instead is in accordance with the quantum no-cloning theorem, because it guarantees that there are no space-like surfaces that contain both the sender's quantum state and the receiver's reconstructed quantum state.

  15. The capacity of black holes to transmit quantum information

    International Nuclear Information System (INIS)

    Brádler, Kamil; Adami, Christoph

    2014-01-01

    We study the properties of the quantum information transmission channel that emerges from the quantum dynamics of particles interacting with a black hole horizon. We calculate the quantum channel capacity in two limiting cases where a single-letter capacity is known to exist: the limit of perfectly reflecting and perfectly absorbing black holes. We find that the perfectly reflecting black hole channel is closely related to the Unruh channel and that its capacity is non-vanishing, allowing for the perfect reconstruction of quantum information outside of the black hole horizon. We also find that the complementary channel (transmitting entanglement behind the horizon) is entanglement-breaking in this case, with vanishing capacity. We then calculate the quantum capacity of the black hole channel in the limit of a perfectly absorbing black hole and find that this capacity vanishes, while the capacity of the complementary channel is non-vanishing instead. Rather than inviting a new crisis for quantum physics, this finding instead is in accordance with the quantum no-cloning theorem, because it guarantees that there are no space-like surfaces that contain both the sender’s quantum state and the receiver’s reconstructed quantum state

  16. How Capacity Limits of Attention Influence Information Visualization Effectiveness.

    Science.gov (United States)

    Haroz, S; Whitney, D

    2012-12-01

    In this paper, we explore how the capacity limits of attention influence the effectiveness of information visualizations. We conducted a series of experiments to test how visual feature type (color vs. motion), layout, and variety of visual elements impacted user performance. The experiments tested users' abilities to (1) determine if a specified target is on the screen, (2) detect an odd-ball, deviant target, different from the other visible objects, and (3) gain a qualitative overview by judging the number of unique categories on the screen. Our results show that the severe capacity limits of attention strongly modulate the effectiveness of information visualizations, particularly the ability to detect unexpected information. Keeping in mind these capacity limits, we conclude with a set of design guidelines which depend on a visualization's intended use.

  17. RMT Assessments of the Market Latent Information Embedded in the Stocks' Raw, Normalized, and Partial Correlations

    OpenAIRE

    Kenett, Dror Y.; Shapira, Yoash; Ben-Jacob, Eshel

    2009-01-01

    We present here assessment of the latent market information embedded in the raw, affinity (normalized), and partial correlations. We compared the Zipf plot, spectrum, and distribution of the eigenvalues for each matrix with the results of the corresponding random matrix. The analysis was performed on stocks belonging to the New York ...

  18. Building research capacity to inform practical policymaking | CRDI ...

    International Development Research Centre (IDRC) Digital Library (Canada)

    supported program that strives to enhance the capacity of local experts in conducting high-quality and policy-engaged research. PEP was initially created with the support of IDRC in 2002 as an international but informal network of researchers and ...

  19. Informal Education: A Veritable Alternative for Building the Capacity ...

    African Journals Online (AJOL)

    Informal Education: A Veritable Alternative for Building the Capacity of Entrepreneurs for Sustainable Growth. ... Findings revealed that free and compulsory educations as well as regular visitation of counseling workers are key parameters that sustain the trainees to forge ahead in this direction. It was therefore concluded ...

  20. Human resource capacity for information management in selected ...

    African Journals Online (AJOL)

    Results: it was established that capacity building was usually undertaken through on-job trainings i.e. 85.1% (103) health workers had on-job training on filling of data collection tools and only 10% (13) had received formal classroom training on the same. Further, only 9.1% (11) health workers had received information ...

  1. Civil Service Human Resource Capacity and Information Technology

    African Journals Online (AJOL)

    Tesfaye

    2009-01-01

    Jan 1, 2009 ... resource capacity and the effective utilisation of Information Technology. In order to substantiate this, the paper elicited data from civil service employees in Ethiopia and USA, so that the gap analysis between the two countries can be discerned. In addition to this, the paper analyses the impact of IT on the ...

  2. Evaluation of protein immobilization capacity on various carbon nanotube embedded hydrogel biomaterials

    Energy Technology Data Exchange (ETDEWEB)

    Derkus, Burak, E-mail: burakderkus@gmail.com; Emregul, Kaan Cebesoy; Emregul, Emel

    2015-11-01

    This study investigates effective immobilization of proteins, an important procedure in many fields of bioengineering and medicine, using various biomaterials. Gelatin, alginate and chitosan were chosen as polymeric carriers, and applied in both their composites and nanocomposite forms in combination with carbon nanotubes (CNTs). The prepared nano/composite structures were characterized using scanning electron microscopy (SEM), Fourier-transform infrared spectroscopy (FTIR), thermal gravimetric analysis (TG) and contact angle analysis (CA). Electrochemical impedance spectroscopy analysis revealed gelatin composites in general to exhibit better immobilization performance relative to the native gelatin which can be attributed to enhanced film morphologies of the composite structures. Moreover, superior immobilization efficiencies were obtained with the addition of carbon nanotubes, due to their conducting and surface enhancement features, especially in the gelatin–chitosan structures due to the presence of structural active groups. - Highlights: • Various nanocomposite biomaterials were developed for efficient immobilization of proteins. • CNTs enhance the immobilization efficiency owing to their conducting and surface enhancement features. • Gelatin–chitosan–CNTs structure is promising immobilization matrix thanks to its effective CNTs binding capacity.

  3. RMT Assessments of the Market Latent Information Embedded in the Stocks' Raw, Normalized, and Partial Correlations

    Directory of Open Access Journals (Sweden)

    Dror Y. Kenett

    2009-01-01

    Full Text Available We present here assessment of the latent market information embedded in the raw, affinity (normalized, and partial correlations. We compared the Zipf plot, spectrum, and distribution of the eigenvalues for each matrix with the results of the corresponding random matrix. The analysis was performed on stocks belonging to the New York and Tel Aviv Stock Exchange, for the time period of January 2000 to March 2009. Our results show that in comparison to the raw correlations, the affinity matrices highlight the dominant factors of the system, and the partial correlation matrices contain more information. We propose that significant stock market information, which cannot be captured by the raw correlations, is embedded in the affinity and partial correlations. Our results further demonstrate the differences between NY and TA markets.

  4. An information capacity limitation of visual short-term memory.

    Science.gov (United States)

    Sewell, David K; Lilburn, Simon D; Smith, Philip L

    2014-12-01

    Research suggests that visual short-term memory (VSTM) has both an item capacity, of around 4 items, and an information capacity. We characterize the information capacity limits of VSTM using a task in which observers discriminated the orientation of a single probed item in displays consisting of 1, 2, 3, or 4 orthogonally oriented Gabor patch stimuli that were presented in noise for 50 ms, 100 ms, 150 ms, or 200 ms. The observed capacity limitations are well described by a sample-size model, which predicts invariance of ∑(i)(d'(i))² for displays of different sizes and linearity of (d'(i))² for displays of different durations. Performance was the same for simultaneous and sequentially presented displays, which implicates VSTM as the locus of the observed invariance and rules out explanations that ascribe it to divided attention or stimulus encoding. The invariance of ∑(i)(d'(i))² is predicted by the competitive interaction theory of Smith and Sewell (2013), which attributes it to the normalization of VSTM traces strengths arising from competition among stimuli entering VSTM. PsycINFO Database Record (c) 2014 APA, all rights reserved.

  5. Development of EPA Protocol Information Enquiry Service System Based on Embedded ARM Linux

    Science.gov (United States)

    Peng, Daogang; Zhang, Hao; Weng, Jiannian; Li, Hui; Xia, Fei

    Industrial Ethernet is a new technology for industrial network communications developed in recent years. In the field of industrial automation in China, EPA is the first standard accepted and published by ISO, and has been included in the fourth edition IEC61158 Fieldbus of NO.14 type. According to EPA standard, Field devices such as industrial field controller, actuator and other instruments are all able to realize communication based on the Ethernet standard. The Atmel AT91RM9200 embedded development board and open source embedded Linux are used to develop an information inquiry service system of EPA protocol based on embedded ARM Linux in this paper. The system is capable of designing an EPA Server program for EPA data acquisition procedures, the EPA information inquiry service is available for programs in local or remote host through Socket interface. The EPA client can access data and information of other EPA equipments on the EPA network when it establishes connection with the monitoring port of the server.

  6. Working Memory Capacity and Redundant Information Processing Efficiency

    Directory of Open Access Journals (Sweden)

    Michael John Endres

    2015-05-01

    Full Text Available Working memory capacity (WMC is typically measured by the amount of task-relevant information an individual can keep in mind while resisting distraction or interference from task irrelevant information. The current research investigated the extent to which differences in WMC were associated with performance on a novel redundant memory probes (RMP task that systematically varied the amount of to-be-remembered (targets and to-be-ignored (distractor information. The RMP task was designed to both facilitate and inhibit working memory search processes, as evidenced by differences in accuracy, response time, and Linear Ballistic Accumulator (LBA model estimates of information processing efficiency. Participants (N = 170 completed standard intelligence tests and dual-span WMC tasks, along with the RMP task. As expected, accuracy, response-time, and LBA model results indicated memory search and retrieval processes were facilitated under redundant- target conditions, but also inhibited under mixed target/distractor and redundant-distractor conditions. Repeated measures analyses also indicated that, while individuals classified as high (n = 85 and low (n = 85 WMC did not differ in the magnitude of redundancy effects, groups did differ in the efficiency of memory search and retrieval processes overall. Results suggest that redundant information reliably facilitates and inhibits the efficiency or speed of working memory search, and these effects are independent of more general limits and individual differences in the capacity or space of working memory.

  7. Information processing capacity in psychopathy: Effects of anomalous attention.

    Science.gov (United States)

    Hamilton, Rachel K B; Newman, Joseph P

    2018-03-01

    Hamilton and colleagues (2015) recently proposed that an integrative deficit in psychopathy restricts simultaneous processing, thereby leaving fewer resources available for information encoding, narrowing the scope of attention, and undermining associative processing. The current study evaluated this parallel processing deficit proposal using the Simultaneous-Sequential paradigm. This investigation marks the first a priori test of the Hamilton et al.'s theoretical framework. We predicted that psychopathy would be associated with inferior performance (as indexed by lower accuracy and longer response time) on trials requiring simultaneous processing of visual information relative to trials necessitating sequential processing. Results were consistent with these predictions, supporting the proposal that psychopathy is characterized by a reduced capacity to process multicomponent perceptual information concurrently. We discuss the potential implications of impaired simultaneous processing for the conceptualization of the psychopathic deficit. (PsycINFO Database Record (c) 2018 APA, all rights reserved).

  8. Informed Consent and Capacity to Give Consent in Mental Disorders

    Directory of Open Access Journals (Sweden)

    Zeynep Mackali

    2014-09-01

    Full Text Available Among four basic principles (respect for autonomy, beneficence, non-malfeasance, and justice which determine ethical behaviors in healthcare, informed consent is mostly related to and lsquo;respect for autonomy'. Also, it reflects patient/client's right for decision and the value given for the client and his/her autonomy. Informed consent is an information sharing process including both rational decision-making about the most appropriate method among many different options and the interaction between the clinician and the client. This concept sheds light on criteria regarding the limits of confidentiality, competency, appropriate and sufficient information sharing and voluntariness. In this theoretical review, the definitions and the content of informed consent were shared, and then a section regarding the required content of informed consent for psychotherapy process was provided. Then, the components of informed consent were discussed and the relationship between capacity to consent and mental disorders in terms of aforementioned diagnostic groups was examined. [Psikiyatride Guncel Yaklasimlar - Current Approaches in Psychiatry 2014; 6(3.000: 227-242

  9. Unfree markets: socially embedded informal health providers in northern Karnataka, India.

    Science.gov (United States)

    George, Asha; Iyer, Aditi

    2013-11-01

    The dynamics of informal health markets in marginalised regions are relevant to policy discourse in India, but are poorly understood. We examine how informal health markets operate from the viewpoint of informal providers (those without any government-recognised medical degrees, otherwise known as RMPs) by drawing upon data from a household survey in 2002, a provider census in 2004 and ongoing field observations from a research site in Koppal district, Karnataka, India. We find that despite their illegality, RMPs depend on government and private providers for their training and referral networks. Buffeted by unregulated market pressures, RMPs are driven to provide allopathic commodities regardless of need, but can also be circumspect in their practice. Though motivated by profit, their socially embedded practice at community level at times undermines their ability to ensure payment of fees for their services. In addition, RMPs feel that communities can threaten them via violence or malicious rumours, leading them to seek political favour and social protection from village elites and elected representatives. RMPs operate within negotiated quid pro quo bargains that lead to tenuous reciprocity or fragile trust between them and the communities in which they practise. In the context of this 'unfree' market, some RMPs reported being more embedded in health systems, more responsive to communities and more vulnerable to unregulated market pressures than others. Understanding the heterogeneity, nuanced motivations and the embedded social relations that mark informal providers in the health systems, markets and communities they work in, is critical for health system reforms. Copyright © 2013 Elsevier Ltd. All rights reserved.

  10. Impact and user satisfaction of a clinical information portal embedded in an electronic health record.

    Science.gov (United States)

    Tannery, Nancy H; Epstein, Barbara A; Wessel, Charles B; Yarger, Frances; LaDue, John; Klem, Mary Lou

    2011-01-01

    In 2008, a clinical information tool was developed and embedded in the electronic health record system of an academic medical center. In 2009, the initial information tool, Clinical-e, was superseded by a portal called Clinical Focus, with a single search box enabling a federated search of selected online information resources. To measure the usefulness and impact of Clinical Focus, a survey was used to gather feedback about users' experience with this clinical resource. The survey determined what type of clinicians were using this tool and assessed user satisfaction and perceived impact on patient care decision making. Initial survey results suggest the majority of respondents found Clinical Focus easy to navigate, the content easy to read, and the retrieved information relevant and complete. The majority would recommend Clinical Focus to their colleagues. Results indicate that this tool is a promising area for future development.

  11. Signalling information from embedded sensors to promote lifetime extension in electrical and electronic equipment

    International Nuclear Information System (INIS)

    Hickey, S; Fitzpatrick, C

    2007-01-01

    The work presented in this paper proposes how life cycle data attained from embedded sensors in electronic systems can be used to potentially enhance their environmental efficiency. Signalling is a means whereby sensor information can be utilised to enhance consumer perception of the value of used equipment and therefore promote lifetime extension for these systems. This can help mitigate a large portion of the environmental impact associated with electronic system manufacture. A case study of a Personal Computer (PC) is presented together with potential signals that can ultimately serve to stimulate secondary market activity for this system

  12. Signalling information from embedded sensors to promote lifetime extension in electrical and electronic equipment

    Science.gov (United States)

    Hickey, S.; Fitzpatrick, C.

    2007-07-01

    The work presented in this paper proposes how life cycle data attained from embedded sensors in electronic systems can be used to potentially enhance their environmental efficiency. Signalling is a means whereby sensor information can be utilised to enhance consumer perception of the value of used equipment and therefore promote lifetime extension for these systems. This can help mitigate a large portion of the environmental impact associated with electronic system manufacture. A case study of a Personal Computer (PC) is presented together with potential signals that can ultimately serve to stimulate secondary market activity for this system.

  13. The Effects of Embedding Information Technologies within ELT on EFL Learners’ Motivation and Interest

    Directory of Open Access Journals (Sweden)

    Shaker Al-Mohammadi

    2014-01-01

    Full Text Available In today’s globalised world, technologies have been embedded in every aspect of daily activities and discourses. The field of education made no exception and hence technologies have become an integral part of all educational systems worldwide, but with different levels and layers. The presence of information technology in English language teaching has brought about notable changes for teachers and learners alike. Accordingly, this paper investigates the impact of integrating information technologies in ELT on EFL learners’ motivation and interest. Based on an authentic comparative case study, this paper explores the influence of information technology on EFL learners’ perceptions, motivation, and interest in the context of ELT in the Tunisian higher education. The findings of this study suggest that the integration of IT in ELT heavily affects EFL students’ motivation and academic performance and hence EFL instructors should take this variable into consideration.

  14. Unsupervised Symbolization of Signal Time Series for Extraction of the Embedded Information

    Directory of Open Access Journals (Sweden)

    Yue Li

    2017-03-01

    Full Text Available This paper formulates an unsupervised algorithm for symbolization of signal time series to capture the embedded dynamic behavior. The key idea is to convert time series of the digital signal into a string of (spatially discrete symbols from which the embedded dynamic information can be extracted in an unsupervised manner (i.e., no requirement for labeling of time series. The main challenges here are: (1 definition of the symbol assignment for the time series; (2 identification of the partitioning segment locations in the signal space of time series; and (3 construction of probabilistic finite-state automata (PFSA from the symbol strings that contain temporal patterns. The reported work addresses these challenges by maximizing the mutual information measures between symbol strings and PFSA states. The proposed symbolization method has been validated by numerical simulation as well as by experimentation in a laboratory environment. Performance of the proposed algorithm has been compared to that of two commonly used algorithms of time series partitioning.

  15. Embedding security messages in existing processes: a pragmatic and effective approach to information security culture change

    CERN Document Server

    Lopienski, Sebastian

    Companies and organizations world-wide depend more and more on IT infrastructure and operations. Computer systems store vital information and sensitive data; computing services are essential for main business processes. This high dependency comes with a number of security risks, which have to be managed correctly on technological, organizational and human levels. Addressing the human aspects of information security often boils down just to procedures, training and awareness raising. On the other hand, employees and collaborators do not adopt security attitude and habits simply when told to do so – a real change in behaviour requires an established security culture. But how to introduce a security culture? This thesis outlines the need of developing or improving security culture, and discusses how this can be done. The proposed approach is to gradually build security knowledge and awareness, and influence behaviours. The way to achieve this is to make security communication pervasive by embedding security me...

  16. Sustainable Regulation of Information Sharing with Electronic Data Interchange by a Trust-Embedded Contract

    Directory of Open Access Journals (Sweden)

    Guanghua Han

    2017-06-01

    Full Text Available This paper studies the risks in demand information sharing applications by electronic soft-orders using electronic data interchange (EDI systems in e-commerce and aims to suggest a sustainable regulation mechanism with a trust-embedded contract. In a supply chain with one retailer and one supplier, the retailer solicits private forecasted demand and places soft-orders via EDI to the supplier. To ensure abundant supply, the retailer has an incentive to inflate her soft-orders, which potentially harms the credible information sharing and sustainability of business cooperation. Normally, the degree to which the supplier relies on the retailer’s order information is specified by trust, which is evaluated according to the retailer’s reputation and supplier’s intuition in this study. Based on standard game theory, we find that both the retailer’s order and the quantity of supplier prepared materials are independent of the retailer’s forecast. Therefore, EDI based information sharing in e-commerce without a regulation mechanism leads to inefficient demand information sharing. Since both the supplier and retailer are proved to faces huge of potential profit losses due to the failure of information sharing, the commerce by EDI based information sharing is full of risk and unsustainable. Therefore, a regulation mechanism that leaded by the retailer is proposed to establish ‘win-win’ sustainable cooperation. Numerical experiments highlight the value of trust, the impact of reputation and intuition in decisions, and the effectiveness of the regulation mechanism by a cost-sharing contract.

  17. 76 FR 56780 - Notice of Proposed Information Collection: Comment Request; Capacity Building for Sustainable...

    Science.gov (United States)

    2011-09-14

    ... Information Collection: Comment Request; Capacity Building for Sustainable Communities Program: Notice of Funding Availability AGENCY: Office Sustainable Housing and Communities, HUD. ACTION: Notice. SUMMARY: The... public comments on the subject proposal. The Capacity Building for Sustainable Communities Program...

  18. Building research capacity to inform practical policymaking | IDRC ...

    International Development Research Centre (IDRC) Digital Library (Canada)

    2017-08-17

    Aug 17, 2017 ... IDRC is committed to supporting cutting-edge research led by developing country experts to create lasting change. Building strong partnerships with regional researchers and organizations through research support and capacity building is integral to the success of this approach. The African Economic ...

  19. Information Capacity of Direct Detection Optical Transmission Systems

    Science.gov (United States)

    Mecozzi, Antonio; Shtaif, Mark

    2018-02-01

    We show that the spectral efficiency of a direct detection transmission system is at most 1 bit/s/Hz less than the spectral efficiency of a system employing coherent detection with the same modulation format. Correspondingly, the capacity per complex degree of freedom in systems using direct detection is lower by at most 1 bit.

  20. 2009 Capacity Building For Library and Information Centre

    African Journals Online (AJOL)

    An Information and Communication Technology. (ICT) environment can simply be referred to as an information system comprised of organized information managers and users, computer hardware and software, communication networks and data/information resources that acquires and collects, organizes and transform, ...

  1. 76 FR 71996 - Notice of Submission of Proposed Information Collection to OMB; Capacity Building for Sustainable...

    Science.gov (United States)

    2011-11-21

    ... Proposed Information Collection to OMB; Capacity Building for Sustainable Communities Program AGENCY... proposal. The Capacity Building for Sustainable Communities Program (Program), through a Notice of Funding...: Title of Proposal: Capacity Building for Sustainable Communities Program OMB Approval Number: 2501-0026...

  2. An experimental approach to estimate operator’s information processing capacity for diagnosing tasks in NPPs

    International Nuclear Information System (INIS)

    Kim, Ji Tae; Shin, Seung Ki; Kim, Jong Hyun; Seong, Poong Hyun

    2013-01-01

    Highlights: • Main control room operator’s information processing capacity is determined. • The relationship between the information processing capacity and human factors is described. • The information processing capacity results from the subjective and physiological measures are nearly identical. - Abstract: The objectives of this research are: (1) to determine information processing capacity of an operator in a main control room and (2) to describe the relationship between the information processing capacity and human factors. This research centers on the relationship, as experimentally determined, between an operator’s mental workload and information flow during accident diagnosis tasks at nuclear power plants. Based on this relationship, the operator’s information processing capacity is established. In this paper, the information processing capacity is defined as the operator’s ability to manage the amount of bits in a second when diagnosing tasks or accidents. If the operator’s performance decreases rapidly as the information flow rate (bit/s) increases, it is possible to determine the operator’s information processing capacity. The cognitive information of a diagnosis task can be quantified using an information flow model and the operator’s mental workload is measured by subjective and physiological measures. NASA-TLX (Task Load indeX) is selected as the subjective method and an eye tracking system is used as the physiological measure for the workload. In addition, the information processing capacity related to human factors is investigated. Once the information processing capacity of operators is known, then it will be possible to apply it to predict the operators’ performance, design diagnosis tasks, and design human–machine interface

  3. Supporting primary care practices in building capacity to use health information data.

    Science.gov (United States)

    Fernald, Douglas; Wearner, Robyn; Dickinson, W Perry

    2014-01-01

    Our objective was to describe essential support resources and strategies in order to advance the pace and scope of the use of health information technology (HIT) data. Primary data were collected between January 2011 and October 2012. The primary study population comprised 51 primary care practices enrolled in the Colorado Beacon Consortium in western Colorado. We used qualitative methods embedded in a mixed-method evaluation: monthly narrative reports from practices; interviews with providers and staff; and focused, group discussions with quality improvement (QI) advisors and staff from the Health Information Technology Regional Extension Center. Practices valued effective support strategies to assist with using HIT, including the following: translating rules and regulations into individual practice settings; facilitating peer-to-peer connections; providing processes and tools for practice improvement; maintaining accountability and momentum; and providing local electronic health record (EHR) technical expertise. Benefits of support included improved quality measures, operational improvements, increased provider and staff engagement, and deeper understanding of EHR data. The findings affirm the utility of practice facilitation for HIT-focused aims with personalized attention and cross-fertilization among practices for improvements. Facilitation to sustain ongoing improvements and prepare for future HIT-intensive improvement activities was highly valued. In addition to the general practice facilitator, an EHR technical expert was critical to improving practice capacity to use electronic clinical data. Collaborative learning expands the pool of mentors and teachers, who can further translate their own lessons into practical advice for their peers, yielding the emergence of a stronger sense of community among the practices. Using HIT more effectively in primary care will require sustained, focused efforts by practices as regulations, incentives and HIT evolve

  4. 76 FR 22412 - Information Collection for Tribal Energy Development Capacity Program; Comment Request

    Science.gov (United States)

    2011-04-21

    ... Office of Indian Energy and Economic Development (IEED) is submitting a proposed information collection...: New. Title: Tribal Energy Development Capacity Program Grants. Brief Description of Collection: Indian... DEPARTMENT OF THE INTERIOR Bureau of Indian Affairs Information Collection for Tribal Energy...

  5. Nurses' Interest, Readiness and Absorptive Capacity to Information Technology: A Survey in China.

    Science.gov (United States)

    Zhang, Boning; Liu, Ping; Xiao, Qian

    2017-01-01

    To investigate nurses' interest, readiness and absorptive capacity to information technology, 261 nurses were investigated using anonymous questionnaires. This study showed: 1) the top 3 information technologies were personal digital assistant (PDA), Hospital Information System (HIS) and wireless mobile nursing trolley; and 2) the mean scores of interest, readiness and absorptive capacity to information technology were 16.3, 56.7 and 46.8, respectively. Further educational programs should be provided for nurses.

  6. Highly Porous Silicon Embedded in a Ceramic Matrix: A Stable High-Capacity Electrode for Li-Ion Batteries.

    Science.gov (United States)

    Vrankovic, Dragoljub; Graczyk-Zajac, Magdalena; Kalcher, Constanze; Rohrer, Jochen; Becker, Malin; Stabler, Christina; Trykowski, Grzegorz; Albe, Karsten; Riedel, Ralf

    2017-11-28

    We demonstrate a cost-effective synthesis route that provides Si-based anode materials with capacities between 2000 and 3000 mAh·g Si -1 (400 and 600 mAh·g composite -1 ), Coulombic efficiencies above 99.5%, and almost 100% capacity retention over more than 100 cycles. The Si-based composite is prepared from highly porous silicon (obtained by reduction of silica) by encapsulation in an organic carbon and polymer-derived silicon oxycarbide (C/SiOC) matrix. Molecular dynamics simulations show that the highly porous silicon morphology delivers free volume for the accommodation of strain leading to no macroscopic changes during initial Li-Si alloying. In addition, a carbon layer provides an electrical contact, whereas the SiOC matrix significantly diminishes the interface between the electrolyte and the electrode material and thus suppresses the formation of a solid-electrolyte interphase on Si. Electrochemical tests of the micrometer-sized, glass-fiber-derived silicon demonstrate the up-scaling potential of the presented approach.

  7. Embedding an institution-wide capacity building opportunity around transition pedagogy: First Year Teaching and Learning Network Coordinators

    Directory of Open Access Journals (Sweden)

    Jennifer Clark

    2015-03-01

    Full Text Available A First Year Teaching and Learning Network was established in a regional university with a strong focus on distance education for a very diverse student cohort.  The purpose of the Network, which consisted of a Coordinator in each of nine schools, was to support staff teaching students transitioning into tertiary education. The paper explores the theoretical bases of the structure, its current method of operation, its impact so far, and future plans. The development of the Network illustrates how a university can consciously embed opportunities for staff to take ownership of transition pedagogy and thus encourage widespread capacity building amongst their peers. The experiences of the Network in its first two years provide a case study of how institutional support for the Scholarship of Teaching and Learning, in particular scholarship around capacity building, can be used as a mechanism to promote both staff and student engagement with transition pedagogy resulting in a shift from a second generation approach towards a third generation approach to transition.

  8. Capacity, information and minority games in public transport

    NARCIS (Netherlands)

    Bouman, P.C.; Kroon, L.; Vervest, P.; Maroti, G.

    2016-01-01

    Many public transport operators are faced with high peak demands. This leads to crowded vehicles and discomfort for the passengers. The increasing availability of information technologies creates new opportunities for passengers to avoid crowding and for operators to inform passengers and reallocate

  9. Stereotype Strength and Attentional Bias: Preference for Confirming versus Disconfirming Information Depends on Processing Capacity

    Science.gov (United States)

    Allen, Thomas J.; Sherman, Jeffrey W.; Conrey, Frederica R.; Stroessner, Steven J.

    2009-01-01

    In two experiments, we investigated the relationships among stereotype strength, processing capacity, and the allocation of attention to stereotype-consistent versus stereotype-inconsistent information describing a target person. The results of both experiments showed that, with full capacity, greater stereotype strength was associated with increased attention toward stereotype-consistent versus stereotype-inconsistent information. However, when capacity was diminished, greater stereotype strength was associated with increased attention toward inconsistent versus consistent information. Thus, strong stereotypes may act as self-confirming filters when processing capacity is plentiful, but as efficient information gathering devices that maximize the acquisition of novel (disconfirming) information when capacity is depleted. Implications for models of stereotyping and stereotype change are discussed. PMID:20161043

  10. Applying Human Factors Principles to Mitigate Usability Issues Related to Embedded Assumptions in Health Information Technology Design.

    Science.gov (United States)

    Gibbons, Michael C; Lowry, Svetlana Z; Patterson, Emily S

    2014-12-18

    There is growing recognition that design flaws in health information technology (HIT) lead to increased cognitive work, impact workflows, and produce other undesirable user experiences that contribute to usability issues and, in some cases, patient harm. These usability issues may in turn contribute to HIT utilization disparities and patient safety concerns, particularly among "non-typical" HIT users and their health care providers. Health care disparities are associated with poor health outcomes, premature death, and increased health care costs. HIT has the potential to reduce these disparate outcomes. In the computer science field, it has long been recognized that embedded cultural assumptions can reduce the usability, usefulness, and safety of HIT systems for populations whose characteristics differ from "stereotypical" users. Among these non-typical users, inappropriate embedded design assumptions may contribute to health care disparities. It is unclear how to address potentially inappropriate embedded HIT design assumptions once detected. The objective of this paper is to explain HIT universal design principles derived from the human factors engineering literature that can help to overcome potential usability and/or patient safety issues that are associated with unrecognized, embedded assumptions about cultural groups when designing HIT systems. Existing best practices, guidance, and standards in software usability and accessibility were subjected to a 5-step expert review process to identify and summarize those best practices, guidance, and standards that could help identify and/or address embedded design assumptions in HIT that could negatively impact patient safety, particularly for non-majority HIT user populations. An iterative consensus-based process was then used to derive evidence-based design principles from the data to address potentially inappropriate embedded cultural assumptions. Design principles that may help identify and address embedded HIT

  11. Radar mutual information and communication channel capacity of integrated radar-communication system using MIMO

    Directory of Open Access Journals (Sweden)

    Renhui Xu

    2015-12-01

    Full Text Available Integrated radar-communication system based on multiple input and multiple output (MIMO shares the hardware resource and spectrum to fulfill radar and communication functions, simultaneously. The baseband signal models of the MIMO radar and the integrated radar-communication system are set up. Then, the radar mutual information and the communication channel capacity are derived accordingly. Radar mutual information is used to evaluate the radar performance; communication channel capacity is one of the methods used to measure the communication capability. The influences of signal-to-noise ratio and the number of antennas, on the mutual information and channel capacity are presented through simulations.

  12. The value of information in explicit cross-border capacity auction regimes in electricity markets

    International Nuclear Information System (INIS)

    Richter, Jan; Viehmann, Johannes

    2014-01-01

    We study two electricity markets connected by a fixed amount of cross-border capacity. The total amount of capacity is known to all electricity traders and allocated via an auction. The capacity allocated to each bidder in the auction remains private information. We assume that traders are faced with a demand function reflecting the relationship between electricity transmitted between the markets and the spot price difference. Therefore, traders act like Bayesian–Cournot oligopolists in exercising their transmission rights when presented with incomplete information about the competitors’ capacities. Our analysis breaks down the welfare effect into three different components: Cournot behavior, capacity constraints, and incomplete information. We find that social welfare increases with the level of information with which traders are endowed. - Highlights: • We regard the utilization of explicitly auctioned cross-border capacities in electricity markets as a Bayesian Cournot game. • We analyze social welfare and find three forces diminishing it, (1) firms play a cournot game, (2) the presence of capacity constraints, (3) incomplete information. • We derive information regimes from “real world” examples and analyze their effect on social welfare

  13. 75 FR 74078 - Information Collection for Tribal Energy Development Capacity Program; Comment Request

    Science.gov (United States)

    2010-11-30

    ... collection related to funds provided under the Tribal Energy Development Capacity (TEDC) program. Indian... DEPARTMENT OF THE INTERIOR Bureau of Indian Affairs Information Collection for Tribal Energy Development Capacity Program; Comment Request AGENCY: Bureau of Indian Affairs, Interior. ACTION: Notice of...

  14. Hiding clinical information in medical images: A new high capacity and reversible data hiding technique.

    Science.gov (United States)

    Parah, Shabir A; Ahad, Farhana; Sheikh, Javaid A; Bhat, G M

    2017-02-01

    A new high capacity and reversible data hiding scheme for e-healthcare applications has been presented in this paper. Pixel to Block (PTB) conversion technique has been used as an effective and computationally efficient alternative to interpolation for the cover image generation to ensure reversibility of medical images. A fragile watermark and Block Checksum (computed for each 4×4 block) have been embedded in the cover image for facilitating tamper detection and tamper localization, and hence content authentication at receiver. The EPR, watermark data and checksum data has been embedded using Intermediate Significant Bit Substitution (ISBS) to avoid commonly used LSB removal/replacement attack. Non-linear dynamics of chaos have been put to use for encrypting the Electronic Patient Record (EPR)/clinical data and watermark data for improving the security of data embedded. The scheme has been evaluated for perceptual imperceptibility and tamper detection capability by subjecting it to various image processing and geometric attacks. Experimental results reveal that the proposed system besides being completely reversible is capable of providing high quality watermarked images for fairly high payload. Further, it has been observed that the proposed technique is able to detect and localise the tamper. A comparison of the observed results with that of some state-of-art schemes show that our scheme performs better. Copyright © 2017 Elsevier Inc. All rights reserved.

  15. Socially anxious individuals with low working memory capacity could not inhibit the goal-irrelevant information.

    Science.gov (United States)

    Moriya, Jun; Sugiura, Yoshinori

    2013-01-01

    Socially anxious individuals are interfered by distractors. Recent work has suggested that low working memory capacity and inappropriate temporary goal induce attention to distractors. We investigated the effects of working memory capacity and temporary goal on attention to distractors in social anxiety. Participants viewed a rapid serial visual presentation, in which participants reported the identity of a single target letter drawn in red. Distractors appeared before the target was presented. When the color of distractors was red (i.e., goal-relevant stimuli), low-capacity individuals were strongly interfered by the distractors compared to high-capacity individuals regardless of social anxiety. When the color of distractors was goal-irrelevant, low-capacity and high socially anxious individuals were strongly interfered by the distractors. These results suggest that socially anxious individuals with low working memory capacity could not inhibit the goal-irrelevant information and direct attention to distractors.

  16. Socially Anxious Individuals with Low Working Memory Capacity Could Not Inhibit the Goal-Irrelevant Information

    Directory of Open Access Journals (Sweden)

    Jun eMoriya

    2013-12-01

    Full Text Available Socially anxious individuals are interfered by distractors. Recent work has suggested that low working memory capacity and inappropriate temporary goal induce attentional capture to distractors. We investigated the effects of working memory capacity and temporary goal on attentional capture to distractors in social anxiety. Participants viewed a rapid serial visual presentation, in which participants reported the identity of a single target letter drawn in red. Distractors appeared before the target was presented. When the color of distractors was red (i.e., goal-relevant stimuli, low-capacity individuals were strongly interfered by the distractors compared to high-capacity individuals regardless of social anxiety. When the color of distractors was goal-irrelevant, low-capacity and high socially anxious individuals were strongly interfered by the distractors. These results suggest that socially anxious individuals with low working memory capacity could not inhibit the goal-irrelevant information and direct attention to distractors.

  17. Embedding Sustainability Instruction across Content Areas: best Classroom Practices from Informal Environmental Education

    Science.gov (United States)

    Clary, R. M.; Walker, R. M.; Wissehr, C.

    2017-12-01

    Environmental education (EE) facilitates students' scientific and environmental literacy, and addresses content areas including sustainability, ecology, and civic responsibility. However, U.S. science content compartmentalization and EE's interdisciplinary nature historically made it a fragmented curriculum within U.S. schools. To gain a better understanding of effective EE instruction that can be transferred to traditional K-12 classrooms, we researched the interactions between a recognized environmental residential camp and students and teachers from six participating schools using grounded theory methodology. Our research identified the residential learning center's objectives, methods of instruction, and objectives' alignment to the delivered curricula. Data generated included lesson plans, survey responses, and interviews. Students (n = 215) identified wilderness and geology activities as the activities they wanted to experience more; they also identified developing curiosity and a sense of discovery as the most meaningful. Whereas most student-identified meaningful experiences aligned with the center's curricular objectives within the optional units, categories emerged that were not explicitly targeted in the unit activities but were embedded throughout the curriculum in sustainable practices, data collection, and reflections. We propose that embedded activities and implicit instruction can be included across content areas within K-12 classrooms. Teacher modeling and implicit instruction will require minimal classroom time, and facilitate students' scientific and environmental literacy in topics such as sustainability and citizen responsibility.

  18. An experimental approach to estimation of human information processing capacity for diagnosis tasks in NPPs

    International Nuclear Information System (INIS)

    Kim, Ji Tae

    2006-02-01

    The objectives of this research are 1) to determine the human's information processing capacity and 2) to describe the relationship between the information processing capacity and human factors. This research centers on the relationship, as experimentally determined, between an operator's mental workload and information flow during accident diagnosis tasks at nuclear power plants (NPPs). The relationship between the information flow rate and operator's mental workload is investigated experimentally. According to this relationship, the operator's information processing capacity can be established. Once the information processing capacity of a main control room (MCR) operator in a NPP is known, it is possible to apply it 1) to predict the operator's performance, 2) to design diagnosis tasks, and 3) to design human-machine interface. In advanced MCR, an operator's mental activity is more important than his or her physical activity. The mental workload is the portion of the operator's limited capacity that is actually required to perform a particular task. A high mental workload may cause an operator to make a mistake and consequently affect that the safe operation of NPPs. Thus, to predict an operator's performance is very important for the nuclear safety. The information processing capacity is the operator's ability to manage the amount of bits per second when an operator is diagnosing tasks or accidents. We can estimate the information processing capacity using the relationship between the information flow rate and human performance. That is, if the operator's performance decreases rapidly as the information flow rate (bit/sec) is increased, it is possible to determine the operator's information processing capacity. A diagnosis task is one of the most complex and mentally demanding tasks as well as a crucial part in maintaining the safe operation of NPPs. Diagnosis tasks refer to the overall tasks of finding the root of cause of the faults or accidents. In this

  19. Capacity of Cognitive Radio with Partial Channel Distribution Information in Rayleigh Fading Environments

    Science.gov (United States)

    Xu, D.; Li, Q.

    2015-11-01

    This paper investigates the capacity of the secondary user (SU) in a cognitive radio (CR) network in Rayleigh fading environments. Different from existing works where perfect channel state information (CSI) or channel distribution information (CDI) of the interference link from the SU to the primary user (PU) is assumed to be available, this paper assumes that only partial CDI is available. Specifically, we assume the distribution parameter is unknown and estimated from a set of channel gain samples. With such partial CDI, closed-form expressions for the ergodic and outage capacities of the SU are obtained under the transmit power and the interference outage constraints. It is shown that the capacity with partial CDI is not degraded compared to that with perfect CDI if the interference outage constraint is loose. It is also shown that the capacity can be significantly improved by increasing the number of channel gain samples.

  20. Embedded Leverage

    DEFF Research Database (Denmark)

    Frazzini, Andrea; Heje Pedersen, Lasse

    find that asset classes with embedded leverage offer low risk-adjusted returns and, in the cross-section, higher embedded leverage is associated with lower returns. A portfolio which is long low-embedded-leverage securities and short high-embedded-leverage securities earns large abnormal returns...

  1. Using information theory to assess the communicative capacity of circulating microRNA.

    Science.gov (United States)

    Finn, Nnenna A; Searles, Charles D

    2013-10-11

    The discovery of extracellular microRNAs (miRNAs) and their transport modalities (i.e., microparticles, exosomes, proteins and lipoproteins) has sparked theories regarding their role in intercellular communication. Here, we assessed the information transfer capacity of different miRNA transport modalities in human serum by utilizing basic principles of information theory. Zipf Statistics were calculated for each of the miRNA transport modalities identified in human serum. Our analyses revealed that miRNA-mediated information transfer is redundant, as evidenced by negative Zipf's Statistics with magnitudes greater than one. In healthy subjects, the potential communicative capacity of miRNA in complex with circulating proteins was significantly lower than that of miRNA encapsulated in circulating microparticles and exosomes. Moreover, the presence of coronary heart disease significantly lowered the communicative capacity of all circulating miRNA transport modalities. To assess the internal organization of circulating miRNA signals, Shannon's zero- and first-order entropies were calculated. Microparticles (MPs) exhibited the lowest Shannon entropic slope, indicating a relatively high capacity for information transfer. Furthermore, compared to the other miRNA transport modalities, MPs appeared to be the most efficient at transferring miRNA to cultured endothelial cells. Taken together, these findings suggest that although all transport modalities have the capacity for miRNA-based information transfer, MPs may be the simplest and most robust way to achieve miRNA-based signal transduction in sera. This study presents a novel method for analyzing the quantitative capacity of miRNA-mediated information transfer while providing insight into the communicative characteristics of distinct circulating miRNA transport modalities. Published by Elsevier Inc.

  2. Intrinsic information Security: Embedding security issues in the design process of telematics systems

    NARCIS (Netherlands)

    Tettero, Olaf; Tettero, O.

    This book presents a systematic approach to embed information security issues in the design process of telematics systems. The approach supports both designers and user organisations. We elaborate on the activities that designers should perform to design telematics systems in which information

  3. On the capacity of Rician fading channels with full channel state information at low SNR

    KAUST Repository

    Rezki, Zouheir

    2012-06-01

    The capacity of flat Rayleigh fading channels with full channel state information (CSI) at the transmitter and at the receiver at asymptotically low SNR has been recently shown to scale essentially as SNR log (1/SNR). In this paper, we investigate the Rician fading channel capacity with full CSI, and show that the capacity of this channel scales essentially as 1/1+K SNR log (1 /SNR), where K is the Rician factor. This characterization includes perfect CSI at both the transmitter and the receiver or noisy CSI at the transmitter and perfect CSI at the receiver. We also show that one-bit CSI at the transmitter is enough to achieve this asymptotic capacity using an On-Off power control scheme. Our framework may be seen as a generalization of previous works as it captures the Rayleigh fading channel as a special case by letting K goes to zero. © 2012 IEEE.

  4. A New Cellular Architecture for Information Retrieval from Sensor Networks through Embedded Service and Security Protocols.

    Science.gov (United States)

    Shahzad, Aamir; Landry, René; Lee, Malrey; Xiong, Naixue; Lee, Jongho; Lee, Changhoon

    2016-06-14

    Substantial changes have occurred in the Information Technology (IT) sectors and with these changes, the demand for remote access to field sensor information has increased. This allows visualization, monitoring, and control through various electronic devices, such as laptops, tablets, i-Pads, PCs, and cellular phones. The smart phone is considered as a more reliable, faster and efficient device to access and monitor industrial systems and their corresponding information interfaces anywhere and anytime. This study describes the deployment of a protocol whereby industrial system information can be securely accessed by cellular phones via a Supervisory Control And Data Acquisition (SCADA) server. To achieve the study goals, proprietary protocol interconnectivity with non-proprietary protocols and the usage of interconnectivity services are considered in detail. They support the visualization of the SCADA system information, and the related operations through smart phones. The intelligent sensors are configured and designated to process real information via cellular phones by employing information exchange services between the proprietary protocol and non-proprietary protocols. SCADA cellular access raises the issue of security flaws. For these challenges, a cryptography-based security method is considered and deployed, and it could be considered as a part of a proprietary protocol. Subsequently, transmission flows from the smart phones through a cellular network.

  5. A New Cellular Architecture for Information Retrieval from Sensor Networks through Embedded Service and Security Protocols

    Directory of Open Access Journals (Sweden)

    Aamir Shahzad

    2016-06-01

    Full Text Available Substantial changes have occurred in the Information Technology (IT sectors and with these changes, the demand for remote access to field sensor information has increased. This allows visualization, monitoring, and control through various electronic devices, such as laptops, tablets, i-Pads, PCs, and cellular phones. The smart phone is considered as a more reliable, faster and efficient device to access and monitor industrial systems and their corresponding information interfaces anywhere and anytime. This study describes the deployment of a protocol whereby industrial system information can be securely accessed by cellular phones via a Supervisory Control And Data Acquisition (SCADA server. To achieve the study goals, proprietary protocol interconnectivity with non-proprietary protocols and the usage of interconnectivity services are considered in detail. They support the visualization of the SCADA system information, and the related operations through smart phones. The intelligent sensors are configured and designated to process real information via cellular phones by employing information exchange services between the proprietary protocol and non-proprietary protocols. SCADA cellular access raises the issue of security flaws. For these challenges, a cryptography-based security method is considered and deployed, and it could be considered as a part of a proprietary protocol. Subsequently, transmission flows from the smart phones through a cellular network.

  6. A New Cellular Architecture for Information Retrieval from Sensor Networks through Embedded Service and Security Protocols

    Science.gov (United States)

    Shahzad, Aamir; Landry, René; Lee, Malrey; Xiong, Naixue; Lee, Jongho; Lee, Changhoon

    2016-01-01

    Substantial changes have occurred in the Information Technology (IT) sectors and with these changes, the demand for remote access to field sensor information has increased. This allows visualization, monitoring, and control through various electronic devices, such as laptops, tablets, i-Pads, PCs, and cellular phones. The smart phone is considered as a more reliable, faster and efficient device to access and monitor industrial systems and their corresponding information interfaces anywhere and anytime. This study describes the deployment of a protocol whereby industrial system information can be securely accessed by cellular phones via a Supervisory Control And Data Acquisition (SCADA) server. To achieve the study goals, proprietary protocol interconnectivity with non-proprietary protocols and the usage of interconnectivity services are considered in detail. They support the visualization of the SCADA system information, and the related operations through smart phones. The intelligent sensors are configured and designated to process real information via cellular phones by employing information exchange services between the proprietary protocol and non-proprietary protocols. SCADA cellular access raises the issue of security flaws. For these challenges, a cryptography-based security method is considered and deployed, and it could be considered as a part of a proprietary protocol. Subsequently, transmission flows from the smart phones through a cellular network. PMID:27314351

  7. Assessment of land surface complexity in relation to information capacity and NDVI in different landform regions using landsat data

    Science.gov (United States)

    Wang, Xuhong; Zhang, Zhe; Cao, Mingming; Qin, Huijie; Cao, Yakun

    2014-05-01

    Information capacity is a grayscale digital image quality evaluation model based on multi-dimensional histogram. As local region characteristics of pixels are taken into account in the calculation, it can objectively and effectively characterize the structural feature information of these ground objects. Information capacity is related to image gray levels, while gray levels of remote sensing imagery reflect the complexity of surface landscape. Information capacity is firstly used in geo-science research in this paper, and spatial variation of information capacity in different landform areas is discussed. The results show that spatial the variation of information capacity is closely related to complexity of regional surface structure in different landform types. Generally, information capacity of mountain is the largest, information capacity of hills and plain is followed in order. Moreover, information capacity is sensitive to the change rate of vegetation coverage of different land covers. There are strong correlation between information capacity and NDVI standard deviation, and the correlation coefficient respectively is 0.8347 or 0.8648 in different experimental areas. This study shows that information capacity can effectively characterize the complexity of the regional surface structure and have great significance for quantitative research of surface feature complexity.

  8. Action-embedded transformational leadership in self-managing global information systems development teams

    NARCIS (Netherlands)

    Eseryel, U. Yeliz; Eseryel, Deniz

    While software development teams are becoming more and more distributed around the globe, most software development methodologies used by global teams prescribe self-managing teams. Transformational leadership is the key to successful information systems development and use for competitive

  9. On the low SNR capacity of MIMO fading channels with imperfect channel state information

    KAUST Repository

    Benkhelifa, Fatma

    2014-06-01

    The capacity of multiple-input multiple-output (MIMO) Rayleigh fading channels with full knowledge of channel state information (CSI) at both the transmitter and the receiver (CSI-TR) has been shown recently to scale at low signal-to-noise ratio (SNR) essentially as SNR log(1/SNR), independently of the number of transmit and receive antennas. In this paper, we investigate the ergodic capacity of MIMO Rayleigh fading channel with estimated channel state information at the transmitter (CSI-T) and possibly imperfect channel state information at the receiver (CSI-R). Our framework can be seen as a generalization of previous works as it can capture the perfect CSI-TR as a special case when the estimation error variance goes to zero. In this paper, we mainly focus on the low SNR regime, and we show that the capacity scales as (1-α) SNR log(1/SNR), where α is the estimation error variance. This characterization shows the loss of performance due to error estimation over the perfect channel state information at both the transmitter and the receiver. As a by-product of our new analysis, we show that our framework can be also extended to characterize the capacity of MIMO Rician fading channels at low SNR with possibly imperfect CSI-T and CSI-R. © 1972-2012 IEEE.

  10. On the low SNR capacity of MIMO fading channels with imperfect channel state information

    KAUST Repository

    Benkhelifa, Fatma

    2014-05-01

    The capacity of Multiple Input Multiple Output (MIMO) Rayleigh fading channels with full knowledge of channel state information (CSI) at both the transmitter and the receiver (CSI-TR) has been shown recently to scale at low Signal-to-Noise Ratio (SNR) essentially as SNR log(1=SNR), independently of the number of transmit and receive antennas. In this paper, we investigate the ergodic capacity of MIMO Rayleigh fading channel with estimated channel state information at the transmitter (CSI-T) and possibly imperfect channel state information at the receiver (CSI-R). Our framework can be seen as a generalization of previous works as it can capture the perfect CSI-TR as a special case when the estimation error variance goes to zero. In our work, we mainly focus on the low SNR regime and we show that the capacity scales as (1-α) SNR log(1=SNR), where α is the estimation error variance. This characterization shows the loss of performance due to error estimation over the perfect channel state information at both the transmitter and the receiver. As a by-product of our new analysis, we show that our framework can also be extended to characterize the capacity of MIMO Rician fading channels at low SNR with possibly imperfect CSI-T and CSI-R. © 2014 IFIP.

  11. Building Institutional Capacity for Data-Informed Decision Making. Cutting Edge Series. No. 3

    Science.gov (United States)

    Public Agenda, 2012

    2012-01-01

    "Building Institutional Capacity for Data-Informed Decision Making" is the third installment of the Cutting Edge series, which aims to help colleges engage faculty, scale successful interventions, and create a strong culture of evidence through use of data to strengthen their institutional change and student success efforts. Though the…

  12. How Employees' Perception of Information Technology Application and Their Knowledge Management Capacity Influence Organisational Performance

    Science.gov (United States)

    Kuo, Yen-Ku; Ye, Kung-Don

    2010-01-01

    This study investigates how workers' gender, work experience, designated division, and appointment affect (i) their perception of information technology (IT) within the organisation, (ii) their self-perceived capacity in knowledge management (KM), and (iii) their perception of organisational performance (OP). Furthermore, the study also examines…

  13. Some Fundamental Limits on SAW RFID Tag Information Capacity and Collision Resolution

    Science.gov (United States)

    Barton, Richard J.

    2013-01-01

    In this paper, we apply results from multi-user information theory to study the limits of information capacity and collision resolution for SAW RFID tags. In particular, we derive bounds on the achievable data rate per tag as a function of fundamental parameters such as tag time-bandwidth product, tag signal-to-noise ratio (SNR), and number of tags in the environment. We also discuss the implications of these bounds for tag waveform design and tag interrogation efficiency

  14. Information capacity and its approximations under metabolic cost in a simple homogeneous population of neurons

    Czech Academy of Sciences Publication Activity Database

    Košťál, Lubomír; Lánský, Petr

    2013-01-01

    Roč. 112, č. 3 (2013), s. 265-275 ISSN 0303-2647 R&D Projects: GA ČR(CZ) GBP304/12/G069; GA ČR(CZ) GAP103/11/0282; GA ČR(CZ) GPP103/12/ P558 Institutional support: RVO:67985823 Keywords : information capacity * metabolic cost * neuronal population Subject RIV: BD - Theory of Information Impact factor: 1.472, year: 2013

  15. Expertise and adventure: In/formalization processes within EU rule of law capacity building programs

    Directory of Open Access Journals (Sweden)

    Filippo M. Zerilli

    2017-12-01

    Full Text Available This paper explores dynamics of formalization and informalization as interlinked social processes as a contribution to a critical understanding of rule of law capacity building programs in the framework of EU enlargement process. It also challenges the assumption according to which informality would be a modality characteristic of countries of the “Global South”.

  16. Decreased integration and information capacity in stroke measured by whole brain models of resting state activity.

    Science.gov (United States)

    Adhikari, Mohit H; Hacker, Carl D; Siegel, Josh S; Griffa, Alessandra; Hagmann, Patric; Deco, Gustavo; Corbetta, Maurizio

    2017-04-01

    While several studies have shown that focal lesions affect the communication between structurally normal regions of the brain, and that these changes may correlate with behavioural deficits, their impact on brain's information processing capacity is currently unknown. Here we test the hypothesis that focal lesions decrease the brain's information processing capacity, of which changes in functional connectivity may be a measurable correlate. To measure processing capacity, we turned to whole brain computational modelling to estimate the integration and segregation of information in brain networks. First, we measured functional connectivity between different brain areas with resting state functional magnetic resonance imaging in healthy subjects (n = 26), and subjects who had suffered a cortical stroke (n = 36). We then used a whole-brain network model that coupled average excitatory activities of local regions via anatomical connectivity. Model parameters were optimized in each healthy or stroke participant to maximize correlation between model and empirical functional connectivity, so that the model's effective connectivity was a veridical representation of healthy or lesioned brain networks. Subsequently, we calculated two model-based measures: 'integration', a graph theoretical measure obtained from functional connectivity, which measures the connectedness of brain networks, and 'information capacity', an information theoretical measure that cannot be obtained empirically, representative of the segregative ability of brain networks to encode distinct stimuli. We found that both measures were decreased in stroke patients, as compared to healthy controls, particularly at the level of resting-state networks. Furthermore, we found that these measures, especially information capacity, correlate with measures of behavioural impairment and the segregation of resting-state networks empirically measured. This study shows that focal lesions affect the brain's ability to

  17. On the capacity of multiaccess fading channels with full channel state information at low power regime

    KAUST Repository

    Rezki, Zouheir

    2013-06-01

    We study the throughput capacity region of the Gaussian multiaccess (MAC) fading channel with perfect channel state information (CSI) at the receiver (CSI-R) and at the transmitters (CSI-T), at low power regime. We show that it has a multidimensional rectangle structure and thus is simply characterized by single user capacity points. More specifically, we show that at low power regime, the boundary surface of the capacity region shrinks to a single point corresponding to the sum rate maximizer and that the coordinates of this point coincide with single user capacity bounds. Inspired from this result, we propose an on-off scheme, compute its achievable rate, and provide a necessary condition on the fading channels under which this scheme achieves single user capacity bounds of the MAC channel at asymptotically low power regime. We argue that this necessary condition characterizes a class of fading that encompasses all known wireless channels, where the capacity region of the MAC channel has a simple expression in terms of users\\' average power constraints only. © 2013 IEEE.

  18. Embedding Term Similarity and Inverse Document Frequency into a Logical Model of Information Retrieval.

    Science.gov (United States)

    Losada, David E.; Barreiro, Alvaro

    2003-01-01

    Proposes an approach to incorporate term similarity and inverse document frequency into a logical model of information retrieval. Highlights include document representation and matching; incorporating term similarity into the measure of distance; new algorithms for implementation; inverse document frequency; and logical versus classical models of…

  19. Embedding Information Literacy Skills in the Psychology Curriculum: Supporting Students in Their Transition to Independent Researchers

    Science.gov (United States)

    Bohan, Jason; Friel, Niamh; Szymanek, Larissa

    2015-01-01

    Here we report on a new initiative which supported first-year psychology undergraduates in developing their information literacy skills. These skills were taught in a small-group tutorial setting with tutor guidance and peer-supported activities. We measured student's Autonomous Learning and Academic Self-Efficacy before and after the teaching…

  20. Supporting Communities of Learning Practice by the Effective Embedding of Information and Knowledge into Group Activity

    OpenAIRE

    Caballé Llobet, Santi; Feldman, Jerome; Thaw, David

    2008-01-01

    Communities of Learning Practice is an innovative paradigm focused on providing appropriate technological support to both formal and especially informal learning groups who are chiefly formed by non-technical people and who lack of the necessary resources to acquire such systems. Typically, students who are often separated by geography and/or time have the need to meet each other after classes in small study groups to carry out specific learning activities ...

  1. The data embedding method

    Energy Technology Data Exchange (ETDEWEB)

    Sandford, M.T. II; Bradley, J.N.; Handel, T.G.

    1996-06-01

    Data embedding is a new steganographic method for combining digital information sets. This paper describes the data embedding method and gives examples of its application using software written in the C-programming language. Sandford and Handel produced a computer program (BMPEMBED, Ver. 1.51 written for IBM PC/AT or compatible, MS/DOS Ver. 3.3 or later) that implements data embedding in an application for digital imagery. Information is embedded into, and extracted from, Truecolor or color-pallet images in Microsoft{reg_sign} bitmap (.BMP) format. Hiding data in the noise component of a host, by means of an algorithm that modifies or replaces the noise bits, is termed {open_quote}steganography.{close_quote} Data embedding differs markedly from conventional steganography, because it uses the noise component of the host to insert information with few or no modifications to the host data values or their statistical properties. Consequently, the entropy of the host data is affected little by using data embedding to add information. The data embedding method applies to host data compressed with transform, or {open_quote}lossy{close_quote} compression algorithms, as for example ones based on discrete cosine transform and wavelet functions. Analysis of the host noise generates a key required for embedding and extracting the auxiliary data from the combined data. The key is stored easily in the combined data. Images without the key cannot be processed to extract the embedded information. To provide security for the embedded data, one can remove the key from the combined data and manage it separately. The image key can be encrypted and stored in the combined data or transmitted separately as a ciphertext much smaller in size than the embedded data. The key size is typically ten to one-hundred bytes, and it is in data an analysis algorithm.

  2. Search for Expectancy-Inconsistent Information Reduces Uncertainty Better: The Role of Cognitive Capacity.

    Science.gov (United States)

    Strojny, Paweł; Kossowska, Małgorzata; Strojny, Agnieszka

    2016-01-01

    Motivation and cognitive capacity are key factors in people's everyday struggle with uncertainty. However, the exact nature of their interplay in various contexts still needs to be revealed. The presented paper reports on two experimental studies which aimed to examine the joint consequences of motivational and cognitive factors for preferences regarding incomplete information expansion. In Study 1 we demonstrate the interactional effect of motivation and cognitive capacity on information preference. High need for closure resulted in a stronger relative preference for expectancy-inconsistent information among non-depleted individuals, but the opposite among cognitively depleted ones. This effect was explained by the different informative value of questions in comparison to affirmative sentences and the potential possibility of assimilation of new information if it contradicts prior knowledge. In Study 2 we further investigated the obtained effect, showing that not only questions but also other kinds of incomplete information are subject to the same dependency. Our results support the expectation that, in face of incomplete information, motivation toward closure may be fulfilled efficiently by focusing on expectancy-inconsistent pieces of data. We discuss the obtained effect in the context of previous assumptions that high need for closure results in a simple processing style, advocating a more complex approach based on the character of the provided information.

  3. Understanding Sulfide Capacity of Molten Aluminosilicates via Structural Information from 'Raman' and 'NMR' Spectroscopic Methodologies

    Science.gov (United States)

    Park, Joo Hyun

    The effect of Ca-Mn substitution on the sulfide capacity of the MnO-CaO-SiO2 (-Al2O3-MgO) melts were explained from the Raman scattering data, from which the structure information for the network modifying role and sulfur stabilizing role of Ca2+ and Mn2+ ions were obtained. The effect of Ce2O3 on the sulfide capacity of the MnO-SiO2-Al2O3-Ce2O3 melts were understood based on the structure data, from which the charge compensating role of Ce3+ and the amphoteric behavior of alumina were obtained. Employing the structure analysis, the thermochemical properties such as capacity of the oxide melts with no thermodynamic data can be understood in terms of `composition-structure-property' relationship.

  4. Embedding QR codes in tumor board presentations, enhancing educational content for oncology information management.

    Science.gov (United States)

    Siderits, Richard; Yates, Stacy; Rodriguez, Arelis; Lee, Tina; Rimmer, Cheryl; Roche, Mark

    2011-01-01

    Quick Response (QR) Codes are standard in supply management and seen with increasing frequency in advertisements. They are now present regularly in healthcare informatics and education. These 2-dimensional square bar codes, originally designed by the Toyota car company, are free of license and have a published international standard. The codes can be generated by free online software and the resulting images incorporated into presentations. The images can be scanned by "smart" phones and tablets using either the iOS or Android platforms, which link the device with the information represented by the QR code (uniform resource locator or URL, online video, text, v-calendar entries, short message service [SMS] and formatted text). Once linked to the device, the information can be viewed at any time after the original presentation, saved in the device or to a Web-based "cloud" repository, printed, or shared with others via email or Bluetooth file transfer. This paper describes how we use QR codes in our tumor board presentations, discusses the benefits, the different QR codes from Web links and how QR codes facilitate the distribution of educational content.

  5. Compression embedding

    Science.gov (United States)

    Sandford, M.T. II; Handel, T.G.; Bradley, J.N.

    1998-07-07

    A method and apparatus for embedding auxiliary information into the digital representation of host data created by a lossy compression technique and a method and apparatus for constructing auxiliary data from the correspondence between values in a digital key-pair table with integer index values existing in a representation of host data created by a lossy compression technique are disclosed. The methods apply to data compressed with algorithms based on series expansion, quantization to a finite number of symbols, and entropy coding. Lossy compression methods represent the original data as ordered sequences of blocks containing integer indices having redundancy and uncertainty of value by one unit, allowing indices which are adjacent in value to be manipulated to encode auxiliary data. Also included is a method to improve the efficiency of lossy compression algorithms by embedding white noise into the integer indices. Lossy compression methods use loss-less compression to reduce to the final size the intermediate representation as indices. The efficiency of the loss-less compression, known also as entropy coding compression, is increased by manipulating the indices at the intermediate stage. Manipulation of the intermediate representation improves lossy compression performance by 1 to 10%. 21 figs.

  6. Embedded systems handbook

    CERN Document Server

    Zurawski, Richard

    2005-01-01

    Embedded systems are nearly ubiquitous, and books on individual topics or components of embedded systems are equally abundant. Unfortunately, for those designers who thirst for knowledge of the big picture of embedded systems there is not a drop to drink. Until now. The Embedded Systems Handbook is an oasis of information, offering a mix of basic and advanced topics, new solutions and technologies arising from the most recent research efforts, and emerging trends to help you stay current in this ever-changing field.With preeminent contributors from leading industrial and academic institutions

  7. Information capacity and pattern formation in a tent map network featuring statistical periodicity

    Science.gov (United States)

    Hauptmann, C.; Touchette, H.; Mackey, M. C.

    2003-02-01

    We provide quantitative support to the observation that lattices of coupled maps are “efficient” information coding devices. It has been suggested recently that lattices of coupled maps may provide a model of information coding in the nervous system because of their ability to create structured and stimulus-dependent activity patterns which have the potential to be used for storing information. In this paper, we give an upper bound to the effective number of patterns that can be used to store information in the lattice by evaluating numerically its information capacity or information rate as a function of the coupling strength between the maps. We also estimate the time taken by the lattice to establish a limiting activity pattern.

  8. Capacity of cognitive radio under imperfect secondary and cross link channel state information

    KAUST Repository

    Sboui, Lokman

    2011-09-01

    In this paper, we study the ergodic capacity of secondary user channel in a spectrum sharing scenario in which the secondary transmitter is instantaneously aware of estimated versions of the cross link (between the secondary transmitter and the primary receiver) and the secondary link Channel State Information (CSI). The secondary link optimal power profile along with the ergodic capacity are derived for a class of fading channels, under an average power constraint and an instantaneous interference outage constraint. We also show that our framework is rather general as it encompasses several previously studied spectrum sharing settings as special cases. In order to gain some insights on the capacity behavior, numerical results are shown for independent Rayleigh fading channels where it is found for instance, that at low SNR regime, only the secondary channel estimation matters and that the cross link CSI has no effect on the ergodic capacity; whereas at high SNR regime, the capacity is rather driven by the cross link CSI. © 2011 IEEE.

  9. Approximate information capacity of the perfect integrate-and-fire neuron using the temporal code

    Czech Academy of Sciences Publication Activity Database

    Košťál, Lubomír

    2012-01-01

    Roč. 1434, JAN 24 (2012), s. 136-141 ISSN 0006-8993. [International Workshop on Neural Coding. Limassol, 29.10.2010-03.11.2010] R&D Projects: GA MŠk(CZ) LC554; GA ČR(CZ) GAP103/11/0282 Institutional research plan: CEZ:AV0Z50110509 Keywords : integrate-and-fire neuron * information capacity Subject RIV: FH - Neurology Impact factor: 2.879, year: 2012

  10. Building capacity for evidence informed decision making in public health: a case study of organizational change.

    Science.gov (United States)

    Peirson, Leslea; Ciliska, Donna; Dobbins, Maureen; Mowat, David

    2012-02-20

    Core competencies for public health in Canada require proficiency in evidence informed decision making (EIDM). However, decision makers often lack access to information, many workers lack knowledge and skills to conduct systematic literature reviews, and public health settings typically lack infrastructure to support EIDM activities. This research was conducted to explore and describe critical factors and dynamics in the early implementation of one public health unit's strategic initiative to develop capacity to make EIDM standard practice. This qualitative case study was conducted in one public health unit in Ontario, Canada between 2008 and 2010. In-depth information was gathered from two sets of semi-structured interviews and focus groups (n = 27) with 70 members of the health unit, and through a review of 137 documents. Thematic analysis was used to code the key informant and document data. The critical factors and dynamics for building EIDM capacity at an organizational level included: clear vision and strong leadership, workforce and skills development, ability to access research (library services), fiscal investments, acquisition and development of technological resources, a knowledge management strategy, effective communication, a receptive organizational culture, and a focus on change management. With leadership, planning, commitment and substantial investments, a public health department has made significant progress, within the first two years of a 10-year initiative, towards achieving its goal of becoming an evidence informed decision making organization.

  11. Decline in mortality with the Belize Integrated Patient-Centred Country Wide Health Information System (BHIS) with embedded program management.

    Science.gov (United States)

    Graven, Michael; Allen, Peter; Smith, Ian; MacDonald, Noni E

    2013-10-01

    Belize deployed a country-wide fully integrated patient centred health information system with eight embedded disease management algorithms and simple analytics in 2007 for $4 (Cad)/citizen. This study evaluated BHIS uptake by health care workers, and pre and post BHIS deployment mortality in selected areas and public health care expenditures. BHIS encounter data were compared to encounter data from required Ministry of Health reports from licensed health care entities. De-identified vital statistics death data for the eight BHIS protocol disease domains and three non-protocol domains were compared from 2005 to 2011. Belize population data came from the Statistical Institute of Belize (2005-2009) and from Belize census (2010) and estimate (2011). Public health system expenditures were compared by fiscal years (2000-2012). BHIS captured over 90% healthcare encounters by year one, 95% by year two. Mortality rates decreased in the eight BHIS protocol domains (each 2005 vs. 2011, all p<0.02) vs. an increase or little change in the three domains without protocols. Hypertension related deaths dropped from 1st cause of death in 2003 to 9th by 2010. Public expenditures on healthcare steadily rose until 2009 but then declined slightly for the next 3 years. For modest investment, BHIS was well accepted nationwide and following deployment, mortality in the eight BHIS disease management algorithm domains declined significantly and expenditures on public healthcare stabilized. Copyright © 2013 Elsevier Ireland Ltd. All rights reserved.

  12. FCJ-130 Embedding response:

    DEFF Research Database (Denmark)

    Ramsgaard Thomsen, Mette; Bech, Karin

    2011-01-01

    Ubiquitous computing positions a world where computation is embedded into our surrounding environment. Rather than retrieving information and communication from distinct devices (PCs) removed from contexts and activities, ubiquitous computing proposes that the mediated can become an integral part...

  13. Politics of change: the discourses that inform organizational change and their capacity to silence.

    Science.gov (United States)

    McMillan, Kim

    2016-09-01

    Changes in healthcare organizations are inevitable and occurring at unprecedented rates. Such changes greatly impact nurses and their work, yet these experiences are rarely explored. Organizational change discourses remain grounded in perspectives that explore and explain systems, often not the people within them. Change processes in healthcare organizations informed by such organizational discourses validate only certain perspectives and forms of knowledge. This fosters exclusionary practices, limiting the capacity of certain individuals or groups of individuals to effectively contribute to change discourses and processes. The reliance on mainstream organizational discourses in healthcare organizations has left little room for the exploration of diverse perspectives on the subject of organizational change, particularly those of nurses. Michel Foucault's work challenges dominant discourse and suggest that strong reliance's on specific discourses effectively disqualify certain forms of knowledge. Foucault's writings on disqualified knowledge and parrhesia (truth telling and frank speech) facilitate the critical exploration of discourses that inform change in healthcare organizations and nurses capacities to contribute to organizational discourses. This paper explores the capacity of nurses to speak their truths within rapidly and continuously changing healthcare organizations when such changes are often driven by discourses not derived from nursing knowledge or experience. © 2016 John Wiley & Sons Ltd.

  14. Embedded engineering education

    CERN Document Server

    Kaštelan, Ivan; Temerinac, Miodrag; Barak, Moshe; Sruk, Vlado

    2016-01-01

    This book focuses on the outcome of the European research project “FP7-ICT-2011-8 / 317882: Embedded Engineering Learning Platform” E2LP. Additionally, some experiences and researches outside this project have been included. This book provides information about the achieved results of the E2LP project as well as some broader views about the embedded engineering education. It captures project results and applications, methodologies, and evaluations. It leads to the history of computer architectures, brings a touch of the future in education tools and provides a valuable resource for anyone interested in embedded engineering education concepts, experiences and material. The book contents 12 original contributions and will open a broader discussion about the necessary knowledge and appropriate learning methods for the new profile of embedded engineers. As a result, the proposed Embedded Computer Engineering Learning Platform will help to educate a sufficient number of future engineers in Europe, capable of d...

  15. Informant Report of Financial Capacity for Individuals With Chronic Acquired Brain Injury: An Assessment of Informant Accuracy.

    Science.gov (United States)

    Sunderaraman, Preeti; Cosentino, Stephanie; Lindgren, Karen; James, Angela; Schultheis, Maria

    2018-03-29

    Primarily, to investigate the association between informant report and objective performance on specific financial capacity (FC) tasks by adults with chronic, moderate to severe acquired brain injury, and to examine the nature of misestimates by the informants. Cross-sectional design. A postacute, community-based rehabilitation center. Data were obtained from 22 chronic acquired brain injury (CABI) adults, mean age of 46.6 years (SD = 8.67), mean years of education of 13.45 years (SD = 2.15), with moderate to severe acquired brain injury (86% had traumatic brain injury), with a mean postinjury period of 17.14 years (SD = 9.5). Whereas the CABI adults completed the Financial Competence Assessment Inventory interview-a combination of self-report and performance-based assessment, 22 informants completed a specifically designed parallel version of the interview. Pearson correlations and 1-sample t tests based on the discrepancy scores between informant report and CABI group's performance were used. The CABI group's performance was not associated with its informant's perceptions. One-sample t tests revealed that informants both underestimated and overestimated CABI group's performance. Results indicate lack of correspondence between self- and informant ratings. Further investigation revealed that misestimations by informants occurred in contrary directions with CABI adults' performance being inaccurately rated. These findings raise critical issues related to assuming that the informant report can be used as a "gold standard" for collecting functional data related to financial management, and the idea that obtaining objective data on financial tasks may represent a more valid method of assessing financial competency in adults with brain injury.

  16. Embedded Systems

    Indian Academy of Sciences (India)

    sumer electronic systems, they are cost sensitive. Thus their cost must be low. Robustness: Embedded systems should be robust since they operate in a harsh environment. They should endure vibrations, power supply fluctuations and excessive heat. Due to limited power supply in an embedded system, the power ...

  17. Building Data and Information Capacity in Environmental Public Health: A Best-Worst Scaling Experiment.

    Science.gov (United States)

    Wallar, Lauren E; Sargeant, Jan M; McEwen, Scott A; Mercer, Nicola J; Papadopoulos, Andrew

    2017-06-16

    Environmental public health practitioners rely on information technology (IT) to maintain and improve environmental health. However, current systems have limited capacity. A better understanding of the importance of IT features is needed to enhance data and information capacity. (1) Rank IT features according to the percentage of respondents who rated them as essential to an information management system and (2) quantify the relative importance of a subset of these features using best-worst scaling. Information technology features were initially identified from a previously published systematic review of software evaluation criteria and a list of software options from a private corporation specializing in inspection software. Duplicates and features unrelated to environmental public health were removed. The condensed list was refined by a working group of environmental public health management to a final list of 57 IT features. The essentialness of features was electronically rated by environmental public health managers. Features where 50% to 80% of respondents rated them as essential (n = 26) were subsequently evaluated using best-worst scaling. Ontario, Canada. Environmental public health professionals in local public health. Importance scores of IT features. The majority of IT features (47/57) were considered essential to an information management system by at least half of the respondents (n = 52). The highest-rated features were delivery to printer, software encryption capability, and software maintenance services. Of the 26 features evaluated in the best-worst scaling exercise, the most important features were orientation to all practice areas, off-line capability, and ability to view past inspection reports and results. The development of a single, unified environmental public health information management system that fulfills the reporting and functionality needs of system users is recommended. This system should be implemented by all public health units

  18. A theory-informed approach to mental health care capacity building for pharmacists.

    Science.gov (United States)

    Murphy, Andrea L; Gardner, David M; Kutcher, Stan P; Martin-Misener, Ruth

    2014-01-01

    Pharmacists are knowledgeable, accessible health care professionals who can provide services that improve outcomes in mental health care. Various challenges and opportunities can exist in pharmacy practice to hinder or support pharmacists' efforts. We used a theory-informed approach to development and implementation of a capacity-building program to enhance pharmacists' roles in mental health care. Theories and frameworks including the Consolidated Framework for Implementation Research, the Theoretical Domains Framework, and the Behaviour Change Wheel were used to inform the conceptualization, development, and implementation of a capacity-building program to enhance pharmacists' roles in mental health care. The More Than Meds program was developed and implemented through an iterative process. The main program components included: an education and training day; use of a train-the-trainer approach from partnerships with pharmacists and people with lived experience of mental illness; development of a community of practice through email communications, a website, and a newsletter; and use of educational outreach delivered by pharmacists. Theories and frameworks used throughout the program's development and implementation facilitated a means to conceptualize the component parts of the program as well as its overall presence as a whole from inception through evolution in implementation. Using theoretical foundations for the program enabled critical consideration and understanding of issues related to trialability and adaptability of the program. Theory was essential to the underlying development and implementation of a capacity-building program for enhancing services by pharmacists for people with lived experience of mental illness. Lessons learned from the development and implementation of this program are informing current research and evolution of the program.

  19. Ergodic Capacity of Cognitive Radio Under Imperfect Channel-State Information

    KAUST Repository

    Rezki, Zouheir

    2012-09-08

    A spectrum-sharing communication system where the secondary user is aware of the instantaneous channel-state information (CSI) of the secondary link but knows only the statistics and an estimated version of the secondary transmitter-primary receiver link is investigated. The optimum power profile and the ergodic capacity of the secondary link are derived for general fading channels [with a continuous probability density function (pdf)] under the average and peak transmit power constraints and with respect to the following two different interference constraints: 1) an interference outage constraint and 2) a signal-to-interference outage constraint. When applied to Rayleigh fading channels, our results show, for example, that the interference constraint is harmful at the high-power regime, because the capacity does not increase with the power, whereas at the low-power regime, it has a marginal impact and no-interference performance, which corresponds to the ergodic capacity under average or peak transmit power constraint in the absence of the primary user, may be achieved. © 2012 IEEE.

  20. A severe capacity limit in the consolidation of orientation information into visual short-term memory.

    Science.gov (United States)

    Becker, Mark W; Miller, James R; Liu, Taosheng

    2013-04-01

    Previous research has suggested that two color patches can be consolidated into visual short-term memory (VSTM) via an unlimited parallel process. Here we examined whether the same unlimited-capacity parallel process occurs for two oriented grating patches. Participants viewed two gratings that were presented briefly and masked. In blocks of trials, the gratings were presented either simultaneously or sequentially. In Experiments 1 and 2, the presentation of the stimuli was followed by a location cue that indicated the grating on which to base one's response. In Experiment 1, participants responded whether the target grating was oriented clockwise or counterclockwise with respect to vertical. In Experiment 2, participants indicated whether the target grating was oriented along one of the cardinal directions (vertical or horizontal) or was obliquely oriented. Finally, in Experiment 3, the location cue was replaced with a third grating that appeared at fixation, and participants indicated whether either of the two test gratings matched this probe. Despite the fact that these responses required fairly coarse coding of the orientation information, across all methods of responding we found superior performance for sequential over simultaneous presentations. These findings suggest that the consolidation of oriented gratings into VSTM is severely limited in capacity and differs from the consolidation of color information.

  1. Presentation of spatio-temporal data in the context of information capacity and visual suggestiveness

    Science.gov (United States)

    Cybulski, Paweł

    2014-12-01

    The aim of this article is to present the concept of information capacity and visual suggestiveness as a map characteristic on the example of two maps of human migration. From this viewpoint the literature study has been performed. Proposed by the author the features of cartographic visualization are an attempt to establish cartographic pragmatics and find the way to increase effectiveness of dynamic maps with large information capacity. Among the works on cartographic pragmatics, muliaspectuality of spatio-temporal data the proposed solution has not been taken so far, and refers to the map design problematic. Celem rozważań było podsumowanie wiedzy dotyczącej projektowania dynamicznych opracowań przestrzennych oraz ich klasyfi kacja ze względu na ilość zmiennych grafi cznych oraz dynamicznych, które mogą zostać użyte w procesie geowizualizacji. Zróżnicowanie ilości zmiennych grafi cznych i dynamicznych w przestrzennych wizualizacjach autor proponuje nazywać pojemnością wizualną prezentacji. Autor stawia również hipotezę, że im większą pojemność wizualną stosujemy tym bardziej sugestywne musi być to przestawienie, aby efektywność przekazywania informacji była zachowana

  2. Cumulative Impact Assessment: Approaching Environmental Capacity in Development Area Using Environmental Impact Assessment Information

    Science.gov (United States)

    Cho, N.; Lee, M. J.; Maeng, J. H.

    2017-12-01

    Environmental impact assessment estimates the impact of development as a business unit and establishes mitigation plan. If the development is done, its economic effects can spread to the nearby areas. So that various developments can be distributed at different time intervals. The impact of the new developments can be combined with existing environmental impacts and can have a larger impact. That is, Cumulative impact assessment is needed to consider the environmental capacity of the Nearby area. Cumulative impact assessments require policy tools such as environmental impact assessment information and cumulative impact estimation models. In Korea, environmental information (water quality, air quality, etc.) of the development site is measured for environmental impact assessment and monitored for a certain period (generally 5 years) after the project. In addition, by constructing the environmental information as a spatial database, it is possible to express the environmental impact on a regional basis spatially and to intuitively use it for development site selection. Utilizing a composite model of environmental impact assessment information and Remote Sensing data for cumulative impact estimation, That can be used as a policy decision support tool that provides quantitative information for development area management, such as time series effect and sprawl phenomenon.

  3. Embedded systems handbook networked embedded systems

    CERN Document Server

    Zurawski, Richard

    2009-01-01

    Considered a standard industry resource, the Embedded Systems Handbook provided researchers and technicians with the authoritative information needed to launch a wealth of diverse applications, including those in automotive electronics, industrial automated systems, and building automation and control. Now a new resource is required to report on current developments and provide a technical reference for those looking to move the field forward yet again. Divided into two volumes to accommodate this growth, the Embedded Systems Handbook, Second Edition presents a comprehensive view on this area

  4. An optimised patient information sheet did not significantly increase recruitment or retention in a falls prevention study: an embedded randomised recruitment trial.

    Science.gov (United States)

    Cockayne, Sarah; Fairhurst, Caroline; Adamson, Joy; Hewitt, Catherine; Hull, Robin; Hicks, Kate; Keenan, Anne-Maree; Lamb, Sarah E; Green, Lorraine; McIntosh, Caroline; Menz, Hylton B; Redmond, Anthony C; Rodgers, Sara; Torgerson, David J; Vernon, Wesley; Watson, Judith; Knapp, Peter; Rick, Jo; Bower, Peter; Eldridge, Sandra; Madurasinghe, Vichithranie W; Graffy, Jonathan

    2017-03-28

    Randomised controlled trials are generally regarded as the 'gold standard' experimental design to determine the effectiveness of an intervention. Unfortunately, many trials either fail to recruit sufficient numbers of participants, or recruitment takes longer than anticipated. The current embedded trial evaluates the effectiveness of optimised patient information sheets on recruitment of participants in a falls prevention trial. A three-arm, embedded randomised methodology trial was conducted within the National Institute for Health Research-funded REducing Falls with ORthoses and a Multifaceted podiatry intervention (REFORM) cohort randomised controlled trial. Routine National Health Service podiatry patients over the age of 65 were randomised to receive either the control patient information sheet (PIS) for the host trial or one of two optimised versions, a bespoke user-tested PIS or a template-developed PIS. The primary outcome was the proportion of patients in each group who went on to be randomised to the host trial. Six thousand and nine hundred patients were randomised 1:1:1 into the embedded trial. A total of 193 (2.8%) went on to be randomised into the main REFORM trial (control n = 62, template-developed n = 68; bespoke user-tested n = 63). Information sheet allocation did not improve recruitment to the trial (odds ratios for the three pairwise comparisons: template vs control 1.10 (95% CI 0.77-1.56, p = 0.60); user-tested vs control 1.01 (95% CI 0.71-1.45, p = 0.94); and user-tested vs template 0.92 (95% CI 0.65-1.31, p = 0.65)). This embedded methodology trial has demonstrated limited evidence as to the benefit of using optimised information materials on recruitment and retention rates in the REFORM study. International Standard Randomised Controlled Trials Number registry, ISRCTN68240461 . Registered on 01 July 2011.

  5. Pseudoalteromonas spp. Serve as Initial Bacterial Attractants in Mesocosms of Coastal Waters but Have Subsequent Antifouling Capacity in Mesocosms and when Embedded in Paint

    DEFF Research Database (Denmark)

    Bernbom, Nete; Ng, Yin; Møller, Stefan

    2013-01-01

    . Larger fouling organisms were observed on all plates precoated with Pseudoalteromonas; however, plates coated only with sterile growth medium were dominated by a bacterial biofilm. Suspensions of a P. piscicida strain and a P. tunicata strain were incorporated into ship paints (Hempasil x3 87500......The purpose of the present study was to determine if the monoculture antifouling effect of several pigmented pseudoalteromonads was retained in in vitro mesocosm systems using natural coastal seawater and when the bacteria were embedded in paint used on surfaces submerged in coastal waters...... attachment when used to coat stainless steel surfaces and submerged in mesocosms with natural seawater. The bacterial density on surfaces coated with sterile growth medium was 105 cells/cm2 after 7 days, whereas counts on surfaces precoated with Pseudoalteromonas were significantly higher, at 106 to 108...

  6. Hazard, Vulnerability and Capacity Mapping for Landslides Risk Analysis using Geographic Information System (GIS)

    Science.gov (United States)

    Sari, D. A. P.; Innaqa, S.; Safrilah

    2017-06-01

    This research analyzed the levels of disaster risk in the Citeureup sub-District, Bogor Regency, West Java, based on its potential hazard, vulnerability and capacity, using map to represent the results, then Miles and Huberman analytical techniques was used to analyze the qualitative interviews. The analysis conducted in this study is based on the concept of disaster risk by Wisner. The result shows that the Citeureup sub-District has medium-low risk of landslides. Of the 14 villages, three villages have a moderate risk level, namely Hambalang, Tajur, and Tangkil, or 49.58% of the total land area. Eleven villages have a low level of risk, namely Pasir Mukti, Sanja, Tarikolot, Gunung Sari, Puspasari, East Karang Asem, Citeureup, Leuwinutug, Sukahati, West Karang Asem West and Puspanegara, or 48.68% of the total land area, for high-risk areas only around 1.74%, which is part of Hambalang village. The analysis using Geographic Information System (GIS) prove that areas with a high risk potential does not necessarily have a high level of risk. The capacity of the community plays an important role to minimize the risk of a region. Disaster risk reduction strategy is done by creating a safe condition, which intensified the movement of disaster risk reduction.

  7. On the capacity of cognitive radio under limited channel state information over fading channels

    KAUST Repository

    Rezki, Zouheir

    2011-06-01

    A spectrum-sharing communication system where the secondary user is aware of the instantaneous channel state information (CSI) of the secondary link, but knows only the statistics and an estimated version of the secondary transmitter-primary receiver (ST-PR) link, is investigated. The optimum power profile and the ergodic capacity of the secondary link are derived for general fading channels (with continuous probability density function) under average and peak transmit-power constraints and with respect to two different interference constraints: an interference outage constraint and a signal-to-interference (SI) outage constraint. When applied to Rayleigh fading channels, our results show, for instance, that the interference constraint is harmful at high-power regime, whereas at low-power regime, it has a marginal impact and no-interference performance may be achieved. © 2011 IEEE.

  8. On the secrecy capacity of the broadcast wiretap channel with imperfect channel state information

    KAUST Repository

    Hyadi, Amal

    2014-12-01

    In this paper, we consider secure broadcasting over fast fading channels. Assuming imperfect main channel state information (CSI) at the transmitter, we first provide an upper and a lower bounds on the ergodic secrecy capacity when a common message is broadcasted to multiple legitimate receivers in the presence of one eavesdropper. For this case, we show that the secrecy rate is limited by the legitimate receiver having, on average, the worst main channel link. Then, we present an expression for the achievable secrecy sum-rate when each legitimate receiver is interested in an independent message. The special cases of high SNR, perfect and no-main CSI are also analyzed. Numerical results are presented to illustrate the obtained results for the case of independent but not necessarily identically distributed Rayleigh fading channels.

  9. On the capacity of cognitive radio under limited channel state information

    KAUST Repository

    Rezki, Zouheir

    2010-09-01

    A spectrum-sharing communication system where the secondary user is aware of the instantaneous channel state information (CSI) of the secondary link, but knows only the statistics of the secondary transmitter-primary receiver link, is investigated. The optimum power profile and the ergodic capacity of the secondary link are derived for general fading channels (with continuous probability density function) under average and peak transmit-power constraints and with respect to two different interference constraints: an interference outage constraint and a signal-to-interference (SI) outage constraint. When applied to Rayleigh fading channels, our results show that the interference constraint is harmful at high-power regime, whereas at lowpower regime, it has a marginal impact and no-interference performance may be achieved. © 2010 IEEE.

  10. Towards an Informed Mexican and Mexican-American Citizenry: Bridging the Gap to Increase Human Capacity and Information Dissemination

    Science.gov (United States)

    Ramirez, M. D.; Ramirez, D. M.

    2008-12-01

    The research translation and community outreach goal of The University of Arizona's (UA) Superfund Basic Research Program and U.S.-Mexico Binational Center for Environmental Sciences and Toxicology is to increase human capacity and information dissemination to diverse stakeholders, including federal, state, and local government agencies as well as northern Mexican and border community stakeholders. Due to Arizona's demographic characteristics and the UA's proximity to the U.S. - Mexico border, activities target primarily Mexican and Mexican-American populations. With this in mind, a model has been established that pulls from human capital, community-based participatory research and public participation theories. The theories applied to our target population have resulted in the creation of a successful model that is used in both research translation and community outreach work. The model contains four components: community needs (participation), science translation (information), engagement (outreach), and training (education). Examples of how this model operates for various stakeholders involved in environmental science and health issues will be discussed. A case in point of how this model has been applied effectively is the partnership with promotoras (community health advocates) to do environmental science and health trainings to increase the knowledge base of specific populations disproportionately exposed to contaminants of concern. Additional case studies and methodologies used to develop innovative communicative tools (that takes into consideration cultural idiosyncrasies) for stakeholders at all levels in Arizona, the border, and Mexico will be highlighted, such as: 1) information sheets regarding local environmental issues for communities neighboring contaminated sites, 2) SciTransfer Bulletins targeting professional level stakeholders such as Project Managers, Community Involvement Coordinators and the general public, 3) coordinating technical and

  11. Enlarging the caring capacity of the community: informal support networks and the welfare state.

    Science.gov (United States)

    Walker, A

    1987-01-01

    In common with most modern industrial societies, Great Britain is facing the unique late 20th century phenomenon of rapidly increasing numbers of people, especially very elderly people, requiring health and social care. The response in Britain has been to search for ways to enlarge the caring capacity of the "community" and, thereby, reduce the demands on public health and social services. Similar policy responses have been developed in other capitalist societies such as Canada, France, and the United States. Although a policy of "community care"--the provision of state services in people's own homes--was followed by governments of both major British political parties over the postwar period, under the right wing neo-monetarist regime of the present Thatcher administration the locus of policy has shifted toward encouraging greater reliance on the informal support networks of kin, friends, and neighbors. The reasons for this sea-change are explored and the assumptions that these networks are "natural" and necessarily the proper matrix of care are examined critically. This analysis draws on the results of recent research which indicates that informal support networks have significant limitations and that a policy based on withdrawing public services in the hope that these networks will fill the growing care gap is likely to be counterproductive. In conclusion, the author indicates the areas where further research is required to provide a sound basis for policy.

  12. Assessing organizational readiness and capacity for developing an integrated child health information system.

    Science.gov (United States)

    Wild, Ellen L; Fehrenbach, S Nicole

    2004-11-01

    The Tool for Assessment and Planning (the Tool) assists public health teams in designing child health information integration projects from planning through early implementation. The tool is a companion to Integration of Newborn Screening and Genetic Services Systems with Other Maternal and Child Health Systems: A Sourcebook for Planning and Development (the Sourcebook). The Tool and the Sourcebook focus on 9 key elements considered critical to supporting information systems integration. The 9 key elements are: leadership, project governance, project management, stakeholder involvement, organizational and technical strategies, technical support and coordination, financial support and management, policy support, and evaluation. Project teams can use the Tool to assess their organizational readiness and capacity by examining the critical components and strategies required to support success based on the 9 key elements. The questions are intended to promote discussion among project team members and to identify specific action steps. The Tool includes a planning matrix to track those action steps and to identify accountable personnel. Strategically examining the critical elements and documenting next steps increases the likelihood of a successful integration project.

  13. A tool to increase information-processing capacity for consumer water meter data

    Directory of Open Access Journals (Sweden)

    Heinz E. Jacobs

    2012-06-01

    Objective: The objective of this research article was to describe the development of Swift, a locally developed software tool for analysing water meter data from an information management perspective, which engineers in the water field generally use, and to assess critically the influence of Swift on published research and industry. This article focuses on water usage and the challenge of data interchange and extraction as issues that various industries face. Method: This article presents the first detailed report on Swift. It uses a detailed knowledge review and presents and summarises the findings chronologically. Results: The water meter data flow path used to be quite simple. The risk of breaches in confidentiality was limited. Technological advances over the years have led to additional knowledge coming from the same water meter readings with subsequent research outputs. However, there are also complicated data flow paths and increased risks. Users have used Swift to analyse more than two million consumers’ water meter readings to date. Studies have culminated in 10 peer-reviewed journal articles using the data. Seven of them were in the last five years. Conclusion: Swift-based data was the basis of various research studies in the past decade. Practical guidelines in the civil engineering fraternity for estimating water use in South Africa have incorporated knowledge from these studies. Developments after 1995 have increased the information processing capacity for water meter data.

  14. Pseudoalteromonas spp. serve as initial bacterial attractants in mesocosms of coastal waters but have subsequent antifouling capacity in mesocosms and when embedded in paint.

    Science.gov (United States)

    Bernbom, Nete; Ng, Yoke Yin; Olsen, Stefan Møller; Gram, Lone

    2013-11-01

    The purpose of the present study was to determine if the monoculture antifouling effect of several pigmented pseudoalteromonads was retained in in vitro mesocosm systems using natural coastal seawater and when the bacteria were embedded in paint used on surfaces submerged in coastal waters. Pseudoalteromonas piscicida survived on a steel surface and retained antifouling activity for at least 53 days in sterile seawater, whereas P. tunicata survived and had antifouling activity for only 1 week. However, during the first week, all Pseudoalteromonas strains facilitated rather than prevented bacterial attachment when used to coat stainless steel surfaces and submerged in mesocosms with natural seawater. The bacterial density on surfaces coated with sterile growth medium was 10(5) cells/cm(2) after 7 days, whereas counts on surfaces precoated with Pseudoalteromonas were significantly higher, at 10(6) to 10(8) cells/cm(2). However, after 53 days, seven of eight Pseudoalteromonas strains had reduced total bacterial adhesion compared to the control. P. piscicida, P. antarctica, and P. ulvae remained on the surface, at levels similar to those in the initial coating, whereas P. tunicata could not be detected. Larger fouling organisms were observed on all plates precoated with Pseudoalteromonas; however, plates coated only with sterile growth medium were dominated by a bacterial biofilm. Suspensions of a P. piscicida strain and a P. tunicata strain were incorporated into ship paints (Hempasil x3 87500 and Hempasil 77500) used on plates that were placed at the Hempel A/S test site in Jyllinge Harbor. For the first 4 months, no differences were observed between control plates and treated plates, but after 5 to 6 months, the control plates were more fouled than the plates with pseudoalteromonad-based paint. Our study demonstrates that no single laboratory assay can predict antifouling effects and that a combination of laboratory and real-life methods must be used to determine

  15. On the capacity of multiple access and broadcast fading Channels with full channel state information at low power regime

    KAUST Repository

    Rezki, Zouheir

    2013-07-01

    We study the throughput capacity region of the Gaussian multi-access (MAC) fading channel with perfect channel state information (CSI) at the receiver and at the transmitters (CSI-TR), at low power regime. We show that it has a multidimensional rectangle structure and thus is simply characterized by single user capacity points. More specifically, we show that at low power regime, the boundary surface of the capacity region shrinks to a single point corresponding to the sum-rate maximizer and that the coordinates of this point coincide with single user capacity bounds. Using the duality of Gaussian MAC and broadcast channels (BC), we provide a simple characterization of the BC capacity region at low power regime. © 2013 IEEE.

  16. Embedded Systems

    Indian Academy of Sciences (India)

    system programmers should take into consideration all possi- bilities and write programs that do not fail. Responsiveness: Embedded systems should respond to events as soon as possible. For example, a patient monitoring system should process the patient'S heart signals quickly and immedi- ately notify if any abnormality ...

  17. Embedded defects

    International Nuclear Information System (INIS)

    Barriola, M.; Vachaspati, T.; Bucher, M.

    1994-01-01

    We give a prescription for embedding classical solutions and, in particular, topological defects in field theories which are invariant under symmetry groups that are not necessarily simple. After providing examples of embedded defects in field theories based on simple groups, we consider the electroweak model and show that it contains the Z string and a one-parameter family of strings called the W(α) string. It is argued that although the members of this family are gauge equivalent when considered in isolation, each member becomes physically distinct when multistring configurations are considered. We then turn to the issue of stability of embedded defects and demonstrate the instability of a large class of such solutions in the absence of bound states or condensates. The Z string is shown to be unstable for all values of the Higgs boson mass when θ W =π/4. W strings are also shown to be unstable for a large range of parameters. Embedded monopoles suffer from the Brandt-Neri-Coleman instability. Finally, we connect the electroweak string solutions to the sphaleron

  18. A tool to increase information-processing capacity for consumer water meter data

    Directory of Open Access Journals (Sweden)

    Heinz E. Jacobs

    2012-02-01

    increased the information processing capacity for water meter data.

  19. Spatial scales of living cells and their energetic and informational capacity.

    Science.gov (United States)

    Bormashenko, Edward; Voronel, Alexander

    2017-12-04

    Physical (thermodynamic and kinetic), chemical, and biological reasoning restrict the spatial dimensions of living cells (prokaryotic and eukaryotic) and confine them to between 1 and 100 µm. Cells should necessarily be macroscopic, dissipative objects, resisting thermal fluctuations and providing sufficient informational capacity. The upper limit of the spatial dimensions of cells is supplied by their ability to withstand gravity and inertia forces under reasonable deformations. The upper limit of cell dimensions is also governed by the hierarchy of characteristic time scales, inherent for mass and heat transport. For micron-scaled cells, the "traffic time" (namely a typical time necessary for the migration of one enzyme to another) is on the order of magnitude of a millisecond, which coincides with the characteristic time scale of a single round of the catalytic enzyme cycle. The macroscopic dimensions of living cells (seen as dissipative systems) and the hierarchy of time scales of the mass transfer processes vs. those inherent for heat transport and viscous dissipation give rise to the irreversibility of biological processes.

  20. Fuel cycle covariance of plutonium and americium separations to repository capacity using information theoretic measures

    International Nuclear Information System (INIS)

    Scopatz, Anthony; Schneider, Erich; Li, Jun; Yim, Man-Sung

    2011-01-01

    A light water reactor, fast reactor symbiotic fuel cycle scenario was modeled and parameterized based on thirty independent inputs. Simultaneously and stochastically choosing different values for each of these inputs and performing the associated fuel cycle mass-balance calculation, the fuel cycle itself underwent Monte Carlo simulation. A novel information theoretic metric is postulated as a measure of system-wide covariance. This metric is the coefficient of variation of the set of uncertainty coefficients generated from 2D slices of a 3D contingency table. It is then applied to the fuel cycle, taking fast reactor used fuel plutonium and americium separations as independent variables and the capacity of a fully-loaded tuff repository as the response. This set of parameters is known from prior studies to have a strong covariance. When measured with all 435 other input parameters possible, the fast reactor plutonium and americium separations pair was found to be ranked the second most covariant. This verifies that the coefficient of variation metric captures the desired sensitivity of sensitivity effects in the nuclear fuel cycle. (author)

  1. An Information Technology Framework for the Development of an Embedded Computer System for the Remote and Non-Destructive Study of Sensitive Archaeology Sites

    Directory of Open Access Journals (Sweden)

    Iliya Georgiev

    2017-04-01

    Full Text Available The paper proposes an information technology framework for the development of an embedded remote system for non-destructive observation and study of sensitive archaeological sites. The overall concept and motivation are described. The general hardware layout and software configuration are presented. The paper concentrates on the implementation of the following informational technology components: (a a geographically unique identification scheme supporting a global key space for a key-value store; (b a common method for octree modeling for spatial geometrical models of the archaeological artifacts, and abstract object representation in the global key space; (c a broadcast of the archaeological information as an Extensible Markup Language (XML stream over the Web for worldwide availability; and (d a set of testing methods increasing the fault tolerance of the system. This framework can serve as a foundation for the development of a complete system for remote archaeological exploration of enclosed archaeological sites like buried churches, tombs, and caves. An archaeological site is opened once upon discovery, the embedded computer system is installed inside upon a robotic platform, equipped with sensors, cameras, and actuators, and the intact site is sealed again. Archaeological research is conducted on a multimedia data stream which is sent remotely from the system and conforms to necessary standards for digital archaeology.

  2. On the capacity of multiple access and broadcast fading channels with full channel state information at low SNR

    KAUST Repository

    Rezki, Zouheir

    2014-01-01

    We study the throughput capacity region of the Gaussian multi-access (MAC) fading channel with perfect channel state information (CSI) at the receiver and at the transmitters, at low power regime. We show that it has a multidimensional rectangle structure and thus is simply characterized by single user capacity points.More specifically, we show that at low power regime, the boundary surface of the capacity region shrinks to a single point corresponding to the sum rate maximizer and that the coordinates of this point coincide with single user capacity bounds. Inspired from this result, we propose an on-off scheme, compute its achievable rate, and show that this scheme achieves single user capacity bounds of the MAC channel for a wide class of fading channels at asymptotically low power regime. We argue that this class of fading encompasses all known wireless channels for which the capacity region of the MAC channel has even a simpler expression in terms of users\\' average power constraints only. Using the duality of Gaussian MAC and broadcast channels (BC), we deduce a simple characterization of the BC capacity region at low power regime and show that for a class of fading channels (including Rayleigh fading), time-sharing is asymptotically optimal. © 2014 IEEE.

  3. On the capacity of nakagami-m fading Channels with full channel state information at low SNR

    KAUST Repository

    Rezki, Zouheir

    2012-06-01

    The capacity of flat Rayleigh fading channels with full channel state information (CSI) at the transmitter and at the receiver at asymptotically low SNR has been recently shown to scale essentially as SNR log(1/SNR)}. In this paper, we investigate the Nakagami-m fading channel capacity with full CSI, and show that the capacity of this channel scales essentially as m/ Omega SNR log(1/SNR), where m is the Nakagami-m fading parameter and where Ω is the channel mean-square. We also show that one-bit CSI at the transmitter is enough to achieve this asymptotic capacity using an On-Off power control scheme. Our framework may be seen as a generalization of previous works as it captures the Rayleigh fading channel as a special case by taking m=1. © 2012 IEEE.

  4. On the low SNR capacity of maximum ratio combining over rician fading channels with full channel state information

    KAUST Repository

    Benkhelifa, Fatma

    2013-04-01

    In this letter, we study the ergodic capacity of a maximum ratio combining (MRC) Rician fading channel with full channel state information (CSI) at the transmitter and at the receiver. We focus on the low Signal-to-Noise Ratio (SNR) regime and we show that the capacity scales as L ΩK+L SNRx log(1SNR), where Ω is the expected channel gain per branch, K is the Rician fading factor, and L is the number of diversity branches. We show that one-bit CSI feedback at the transmitter is enough to achieve this capacity using an on-off power control scheme. Our framework can be seen as a generalization of recently established results regarding the fading-channels capacity characterization in the low-SNR regime. © 2012 IEEE.

  5. Native American Women Leaders' Use of Information and Communication Technologies (ICTs) for Work-Life Balance (WLB) and Capacity Building

    Science.gov (United States)

    Jensen, Crystal C.

    2013-01-01

    Native American women's leadership, information communication technologies (ICTs), work-life balance (WLB) and human capacity building (HCB) are grounded in social justice issues due to their long history of overall cultural decimation, inequitable access to technology, monetary resources, and social power (agency), and influence. Currently, there…

  6. Capacity Building: Data- and Research-Informed Development of Schools and Teaching Practices in Denmark and Norway

    Science.gov (United States)

    Qvortrup, Lars

    2016-01-01

    Based on experiences from a number of large scale data- and research-informed school development projects in Denmark and Norway, led by the author, three hypotheses are discussed: that an effective way of linking research and practice is achieved (1) using a capacity building approach, that is, to collaborate in the practical school context…

  7. Assessment of Land Surface Complexity In Relation To Information Capacity and the Fractal Dimension in Different Landform Regions Using Landsat Data

    Science.gov (United States)

    Hong, Wang Xu; Huijie, Qin; Zhe, Zhang; Fei, Li

    2014-03-01

    Remote sensing images are highly structured, and contiguous pixels of space domain have strong correlations that contain abundant information on land surface structure features and land surface electromagnetic radiation features. The information capacity model, which is a quality evaluation model based on a multi-dimensional histogram, includes local correlations within different pixels. Thus, the information capacity can illustrate land surface structural information more objectively and effectively than other single-pixel calculation models. Our results reveal that the information capacity value correlates well with the meaningful grey level of remote sensing imagery. This high correlation is related to the complexity of terrestrial surface landscapes. Therefore, information capacity, as applied to geoscience, is introduced in this study to demonstrate the spatial differentiation of information capacity of different landform regions. Generally, the information capacity of a mountain is large and is followed in decreasing order by those of the hills and the plains. Moreover, the correlation between information capacity and the fractal dimension is analysed. Based on the results of this study, it can be concluded that the level of correlation for information capacity and the fractal dimension is high, and the correlation coefficient for the basic landform areas and the loess landform areas is 0.874 and 0.825, respectively. Finally, this paper proposes that information capacity be used as a new reference index for geoscientific analysis in quantitative research on the characteristics of land surface complexity.

  8. Enhancing the Capacity of Community Organizations to Evaluate HIV/AIDS Information Outreach: A Pilot Experiment in Expert Consultation.

    Science.gov (United States)

    Dancy-Scott, Nicole; Williams-Livingston, Arletha; Plumer, Andrew; Dutcher, Gale A; Siegel, Elliot R

    2016-01-01

    The National Library of Medicine's AIDS Community Information Outreach Program (ACIOP) supports and enables access to health information on the Internet by community-based organizations. A technical assistance (TA) model was developed to enhance the capacity of ACIOP awardees to plan, evaluate, and report the results of their funded projects. This consisted of individual Consultation offered by an experienced evaluator to advise on the suitability of proposed project plans and objectives, improve measurement analytics, assist in problem resolution and outcomes reporting, and identify other improvement possibilities. Group webinars and a moderated blog for the exchange of project-specific information were also offered. Structured data collections in the form of reports, online surveys, and key informant telephone interviews provided qualitative feedback on project progress, satisfaction with the TA, and the perceived impact of the interventions on evaluation capacity building. The Model was implemented in the 2013 funding cycle with seven organizations, and the level of reported satisfaction was uniformly high. One-on-one TA was requested by four awardee organizations, and was determined to have made a meaningful difference with three. Participation in the webinars was mandatory and high overall; and was deemed to be a useful means for delivering evaluation information. In subsequent funding cycles, submission of a Logic Model will be required of awardees as a new model intervention in the expectation that it will produce stronger proposals, and enable the evaluation consultant to identify earlier intervention opportunities leading to project improvements and evaluation capacity enhancements.

  9. Improving Nigerian health policymakers' capacity to access and utilize policy relevant evidence: outcome of information and communication technology training workshop.

    Science.gov (United States)

    Uneke, Chigozie Jesse; Ezeoha, Abel Ebeh; Uro-Chukwu, Henry; Ezeonu, Chinonyelum Thecla; Ogbu, Ogbonnaya; Onwe, Friday; Edoga, Chima

    2015-01-01

    Information and communication technology (ICT) tools are known to facilitate communication and processing of information and sharing of knowledge by electronic means. In Nigeria, the lack of adequate capacity on the use of ICT by health sector policymakers constitutes a major impediment to the uptake of research evidence into the policymaking process. The objective of this study was to improve the knowledge and capacity of policymakers to access and utilize policy relevant evidence. A modified "before and after" intervention study design was used in which outcomes were measured on the target participants both before the intervention is implemented and after. A 4-point likert scale according to the degree of adequacy; 1 = grossly inadequate, 4 = very adequate was employed. This study was conducted in Ebonyi State, south-eastern Nigeria and the participants were career health policy makers. A two-day intensive ICT training workshop was organized for policymakers who had 52 participants in attendance. Topics covered included: (i). intersectoral partnership/collaboration; (ii). Engaging ICT in evidence-informed policy making; use of ICT for evidence synthesis; (iv) capacity development on the use of computer, internet and other ICT. The pre-workshop mean of knowledge and capacity for use of ICT ranged from 2.19-3.05, while the post-workshop mean ranged from 2.67-3.67 on 4-point scale. The percentage increase in mean of knowledge and capacity at the end of the workshop ranged from 8.3%-39.1%. Findings of this study suggest that policymakers' ICT competence relevant to evidence-informed policymaking can be enhanced through training workshop.

  10. Improving Nigerian health policymakers’ capacity to access and utilize policy relevant evidence: outcome of information and communication technology training workshop

    Science.gov (United States)

    Uneke, Chigozie Jesse; Ezeoha, Abel Ebeh; Uro-Chukwu, Henry; Ezeonu, Chinonyelum Thecla; Ogbu, Ogbonnaya; Onwe, Friday; Edoga, Chima

    2015-01-01

    Information and communication technology (ICT) tools are known to facilitate communication and processing of information and sharing of knowledge by electronic means. In Nigeria, the lack of adequate capacity on the use of ICT by health sector policymakers constitutes a major impediment to the uptake of research evidence into the policymaking process. The objective of this study was to improve the knowledge and capacity of policymakers to access and utilize policy relevant evidence. A modified “before and after” intervention study design was used in which outcomes were measured on the target participants both before the intervention is implemented and after. A 4-point likert scale according to the degree of adequacy; 1 = grossly inadequate, 4 = very adequate was employed. This study was conducted in Ebonyi State, south-eastern Nigeria and the participants were career health policy makers. A two-day intensive ICT training workshop was organized for policymakers who had 52 participants in attendance. Topics covered included: (i). intersectoral partnership/collaboration; (ii). Engaging ICT in evidence-informed policy making; use of ICT for evidence synthesis; (iv) capacity development on the use of computer, internet and other ICT. The pre-workshop mean of knowledge and capacity for use of ICT ranged from 2.19-3.05, while the post-workshop mean ranged from 2.67-3.67 on 4-point scale. The percentage increase in mean of knowledge and capacity at the end of the workshop ranged from 8.3%-39.1%. Findings of this study suggest that policymakers’ ICT competence relevant to evidence-informed policymaking can be enhanced through training workshop. PMID:26448807

  11. Effective capacity of Nakagami-m fading channels with full channel state information in the low power regime

    KAUST Repository

    Benkhelifa, Fatma

    2013-09-01

    The effective capacity have been introduced by Wu and Neji as a link-layer model supporting statistical delay QoS requirements. In this paper, we propose to study the effective capacity of a Nakagami-m fading channel with full channel state information (CSI) at both the transmitter and at the receiver. We focus on the low Signal-to-Noise Ratio (SNR) regime. We show that the effective capacity for any arbitrary but finite statistically delay Quality of Service (QoS) exponent θ, scales essentially as S NRlog(1/SNR) exactly as the ergodic capacity, independently of any QoS constraint. We also characterize the minimum energy required for reliable communication, and the wideband slope to show that our results are in agreement with results established recently by Gursoy et al. We also propose an on-off power control scheme that achieves the capacity asymptotically using only one bit CSI feedback at the transmitter. Finally, some numerical results are presented to show the accuracy of our asymptotic results. © 2013 IEEE.

  12. Umbrella project for Bangladesh: strengthening NGO capacity and linkages to improve reproductive health service and information. RAS/98/P55.

    Science.gov (United States)

    1999-06-01

    In Bangladesh, the UN Population Fund is working to strengthen nongovernmental organization (NGO) capacity and linkages to improve reproductive health services and information. Specifically, the aim is to strengthen the technical and human resource capacity of participating NGOs and the functional linkages between national NGOs and relevant government agencies to help harmonize and standardize the delivery of reproductive health information and services. This umbrella project collaborates with RHI-participating NGOs in a policy paper on adolescent reproductive health, and will maintain contact with the regional dimension project to collaborate its activities. Programs implemented by partner NGOs are being reviewed and monitored, and linkages among national NGOs and government agencies are being developed. The main activities of the project are enumerated.

  13. Scenario-informed multiple criteria analysis for prioritizing investments in electricity capacity expansion

    International Nuclear Information System (INIS)

    Martinez, Lauro J.; Lambert, James H.; Karvetski, Christopher W.

    2011-01-01

    Planning the expansion and energy security of electricity capacity for a national electricity utility is a complex task in almost any economy. Planning is usually an iterative activity and can involve the use of large scale planning optimization systems accompanied by assessment of uncertain scenarios emerging from economic, technological, environmental, and regulatory developments. This paper applies a multiple criteria decision analysis to prioritize investment portfolios in capacity expansion and energy security while principally studying the robustness of the prioritization to multiple uncertain and emergent scenarios. The scenarios are identified through interaction with decision makers and stakeholders. The approach finds which scenarios most affect the prioritization of the portfolios and which portfolios have the greatest upside and downside potential across scenarios. The approach fosters innovation in the use of robust and efficient technologies, renewable energy sources, and cleaner energy fuels. A demonstration is provided for assessing the performance of technology portfolios constructed from investments in nine electricity generation technologies in Mexico.

  14. Clicking to Learn: A Case Study of Embedding Radio-Frequency Based Clickers in an Introductory Management Information Systems Course

    Science.gov (United States)

    Nelson, Matthew L.; Hauck, Roslin V.

    2008-01-01

    The challenges associated with teaching a core introductory management information systems (MIS) course are well known (large class sizes serving a majority of non-MIS majors, sustaining student interests, encouraging class participation, etc.). This study offers a mechanism towards managing these challenges through the use of a simple and…

  15. Building Capacity for Trauma-Informed Care in the Child Welfare System: Initial Results of a Statewide Implementation.

    Science.gov (United States)

    Lang, Jason M; Campbell, Kimberly; Shanley, Paul; Crusto, Cindy A; Connell, Christian M

    2016-05-01

    Exposure to childhood trauma is a major public health concern and is especially prevalent among children in the child welfare system (CWS). State and tribal CWSs are increasingly focusing efforts on identifying and serving children exposed to trauma through the creation of trauma-informed systems. This evaluation of a statewide initiative in Connecticut describes the strategies used to create a trauma-informed CWS, including workforce development, trauma screening, policy change, and improved access to evidence-based trauma-focused treatments during the initial 2-year implementation period. Changes in system readiness and capacity to deliver trauma-informed care were evaluated using stratified random samples of child welfare staff who completed a comprehensive assessment prior to (N = 223) and 2 years following implementation (N = 231). Results indicated significant improvements in trauma-informed knowledge, practice, and collaboration across nearly all child welfare domains assessed, suggesting system-wide improvements in readiness and capacity to provide trauma-informed care. Variability across domains was observed, and frontline staff reported greater improvements than supervisors/managers in some domains. Lessons learned and recommendations for implementation and evaluation of trauma-informed care in child welfare and other child-serving systems are discussed. © The Author(s) 2016.

  16. Оn Information Capacity of an Algorithm of Power Distribution Restoration in a Nuclear Reactor

    Directory of Open Access Journals (Sweden)

    A. M. Zagrebayev

    2010-03-01

    Full Text Available The possibility of application of an informational approach to solving problems of power distribution control in a nuclear reactor is being investigated. The definition of the sequence of in-core detectors graduation (checking on the basis of their informational value is offered. The connection between informational properties of the restoration algorithm and its accuracy is shown.

  17. An embedded checklist in the Anesthesia Information Management System improves pre-anaesthetic induction setup: a randomised controlled trial in a simulation setting.

    Science.gov (United States)

    Wetmore, Douglas; Goldberg, Andrew; Gandhi, Nishant; Spivack, John; McCormick, Patrick; DeMaria, Samuel

    2016-10-01

    Anaesthesiologists work in a high stress, high consequence environment in which missed steps in preparation may lead to medical errors and potential patient harm. The pre-anaesthetic induction period has been identified as a time in which medical errors can occur. The Anesthesia Patient Safety Foundation has developed a Pre-Anesthetic Induction Patient Safety (PIPS) checklist. We conducted this study to test the effectiveness of this checklist, when embedded in our institutional Anesthesia Information Management System (AIMS), on resident performance in a simulated environment. Using a randomised, controlled, observer-blinded design, we compared performance of anaesthesiology residents in a simulated operating room under production pressure using a checklist in completing a thorough pre-anaesthetic induction evaluation and setup with that of residents with no checklist. The checklist was embedded in the simulated operating room's electronic medical record. Data for 38 anaesthesiology residents shows a statistically significant difference in performance in pre-anaesthetic setup and evaluation as scored by blinded raters (maximum score 22 points), with the checklist group performing better by 7.8 points (p<0.01). The effects of gender and year of residency on total score were not significant. Simulation duration (time to anaesthetic agent administration) was increased significantly by the use of the checklist. Required use of a pre-induction checklist improves anaesthesiology resident performance in a simulated environment. The PIPS checklist as an integrated part of a departmental AIMS warrant further investigation as a quality measure. Published by the BMJ Publishing Group Limited. For permission to use (where not already granted under a licence) please go to http://www.bmj.com/company/products-services/rights-and-licensing/

  18. Developing a globally applicable evidence-informed competency framework to support capacity strengthening in clinical research.

    Science.gov (United States)

    Julé, Amélie; Furtado, Tamzin; Boggs, Liam; van Loggerenberg, Francois; Ewing, Victoria; Vahedi, Manhaz; Launois, Pascal; Lang, Trudie

    2017-01-01

    Capacity development for clinical research is held back by a lack of recognition for the skills acquired through involvement in clinical trials and in other varied types of global health research studies. Although some competency frameworks and associated recognised career pathways exist for different clinical research roles, they mostly apply to a single role or study setting. Our experience supports the need for an integrated approach, looking at the many roles in parallel and at all types of clinical research beyond trials. Here, we propose a single, flexible framework which is applicable to the full global health research team, and can be used for recognising staff by highlighting acquired skills and possible progression between various roles. It can also illuminate where capacity needs strengthening and contribute to raising research engagement. Through systematic analysis of existing competency frameworks and current job descriptions covering 11 distinct, broad clinical research roles, we identified and defined 50 key competencies required by the team as a whole and throughout the study life cycle. The competencies are relevant and adaptable to studies that differ in design, geographical location or disease, and fall in five main areas-(1) Ethics, Quality and Risk Management; (2) Study and Site Management; (3) Research Operations; (4) Scientific Thinking; and (5) Professional Skills. A pilot framework and implementation tools are now available online and in paper format. They have the potential to be a new mechanism for enabling research skills development and career progression for all staff engaged in clinical research globally.

  19. Utilization of information communication technology (ICT) - Based training / learning for capacity building in radiation protection framework

    International Nuclear Information System (INIS)

    Oluyemi, I.O.D.

    2008-01-01

    Full text: Radiation protection is the science of protecting people and the environment from the harmful effects of ionizing radiation, which includes both particle radiation and high energy electromagnetic radiation. It includes occupational radiation protection, which is the protection of workers; medical radiation protection, which is the protection of patients; and public radiation protection, which is about protection of individual members of the public, and of the population as a whole. ICT has made possible the development of e-learning and several Virtual Learning Environments (VLEs) which can support a wide range of capacity building requirements, ranging from under-graduate and post-graduate programmes, continuing professional development courses, right through to short subject specific and research courses, thereby eliminating the problems of conventional forms of training / learning, some of which are: limited access, cost effectiveness and language / cultural barriers. This paper focuses on the utilization of these ICT-based training / learning for capacity building in radiation protection framework and concludes with suggestions on implementation strategies. (author)

  20. Embedded Processor Laboratory

    Data.gov (United States)

    Federal Laboratory Consortium — The Embedded Processor Laboratory provides the means to design, develop, fabricate, and test embedded computers for missile guidance electronics systems in support...

  1. The role of information and communications technology in research capacity building

    OpenAIRE

    BRENNAN, NIAMH

    2010-01-01

    PUBLISHED Belfast Reliable, accessible, high speed Internet and network connectivity is a fundamental requirement for the conduct of high quality, high-impact research today. High speed communications are part of the basic infrastructure of a modern university, supporting efficient administration, ensuring a global presence on the web and helping with managing student information systems. The focus of this chapter is on those elements of the Information and...

  2. DNA MemoChip: Long-Term and High Capacity Information Storage and Select Retrieval

    Science.gov (United States)

    Wang, Fuzhou; Kream, Richard M.

    2018-01-01

    Over the course of history, human beings have never stopped seeking effective methods for information storage. From rocks to paper, and through the past several decades of using computer disks, USB sticks, and on to the thin silicon “chips” and “cloud” storage of today, it would seem that we have reached an era of efficiency for managing innumerable and ever-expanding data. Astonishingly, when tracing this technological path, one realizes that our ancient methods of informational storage far outlast paper (10,000 vs. 1,000 years, respectively), let alone the computer-based memory devices that only last, on average, 5 to 25 years. During this time of fast-paced information generation, it becomes increasingly difficult for current storage methods to retain such massive amounts of data, and to maintain appropriate speeds with which to retrieve it, especially when in demand by a large number of users. Others have proposed that DNA-based information storage provides a way forward for information retention as a result of its temporal stability. It is now evident that DNA represents a potentially economical and sustainable mechanism for storing information, as demonstrated by its decoding from a 700,000 year-old horse genome. The fact that the human genome is present in a cell, containing also the varied mitochondrial genome, indicates DNA’s great potential for large data storage in a ‘smaller’ space. PMID:29481548

  3. DNA MemoChip: Long-Term and High Capacity Information Storage and Select Retrieval.

    Science.gov (United States)

    Stefano, George B; Wang, Fuzhou; Kream, Richard M

    2018-02-26

    Over the course of history, human beings have never stopped seeking effective methods for information storage. From rocks to paper, and through the past several decades of using computer disks, USB sticks, and on to the thin silicon "chips" and "cloud" storage of today, it would seem that we have reached an era of efficiency for managing innumerable and ever-expanding data. Astonishingly, when tracing this technological path, one realizes that our ancient methods of informational storage far outlast paper (10,000 vs. 1,000 years, respectively), let alone the computer-based memory devices that only last, on average, 5 to 25 years. During this time of fast-paced information generation, it becomes increasingly difficult for current storage methods to retain such massive amounts of data, and to maintain appropriate speeds with which to retrieve it, especially when in demand by a large number of users. Others have proposed that DNA-based information storage provides a way forward for information retention as a result of its temporal stability. It is now evident that DNA represents a potentially economical and sustainable mechanism for storing information, as demonstrated by its decoding from a 700,000 year-old horse genome. The fact that the human genome is present in a cell, containing also the varied mitochondrial genome, indicates DNA's great potential for large data storage in a 'smaller' space.

  4. Mechanisms underlying comprehension of health information in adulthood: the roles of prior knowledge and working memory capacity.

    Science.gov (United States)

    Soederberg Miller, Lisa M; Gibson, Tanja N; Applegate, Elizabeth A; de Dios, Jeannette

    2011-07-01

    Prior knowledge, working memory capacity (WMC), and conceptual integration (attention allocated to integrating concepts in text) are critical within many contexts; however, their impact on the acquisition of health information (i.e. learning) is relatively unexplored.We examined how these factors impact learning about nutrition within a cross-sectional study of adults ages 18 to 81. Results showed that conceptual integration mediated the effects of knowledge and WMC on learning, confirming that attention to concepts while reading is important for learning about health. We also found that when knowledge was controlled, age declines in learning increased, suggesting that knowledge mitigates the effects of age on learning about nutrition.

  5. 76 FR 4994 - Agency Information Collection: Activity Under OMB Review; Report of Traffic and Capacity...

    Science.gov (United States)

    2011-01-27

    ... T-100 System AGENCY: Bureau of Transportation Statistics (BTS), DOT. ACTION: Notice. SUMMARY: In..., Room E36-303, RITA, BTS, 1200 New Jersey Avenue, SE., Washington, DC 20590-0001, Telephone Number (202... statistical agency to clearly identify information it collects for non-statistical purposes. BTS hereby...

  6. 76 FR 39153 - Agency Information Collection; Activity Under OMB Review; Report of Traffic and Capacity...

    Science.gov (United States)

    2011-07-05

    ... Transportation Statistics (BTS), DOT. ACTION: Notice. SUMMARY: In compliance with the Paperwork Reduction Act of... Seguin, Office of Airline Information, RTS-42, Room E34-418, RITA, BTS, 1200 New Jersey Avenue, SE... Management and Budget, 725-17th Street, NW., Washington, DC 20503, Attention: RITA/BTS Desk Officer...

  7. Optimal nonlinear information processing capacity in delay-based reservoir computers

    Science.gov (United States)

    Grigoryeva, Lyudmila; Henriques, Julie; Larger, Laurent; Ortega, Juan-Pablo

    2015-09-01

    Reservoir computing is a recently introduced brain-inspired machine learning paradigm capable of excellent performances in the processing of empirical data. We focus in a particular kind of time-delay based reservoir computers that have been physically implemented using optical and electronic systems and have shown unprecedented data processing rates. Reservoir computing is well-known for the ease of the associated training scheme but also for the problematic sensitivity of its performance to architecture parameters. This article addresses the reservoir design problem, which remains the biggest challenge in the applicability of this information processing scheme. More specifically, we use the information available regarding the optimal reservoir working regimes to construct a functional link between the reservoir parameters and its performance. This function is used to explore various properties of the device and to choose the optimal reservoir architecture, thus replacing the tedious and time consuming parameter scannings used so far in the literature.

  8. Polymorphic Embedding of DSLs

    DEFF Research Database (Denmark)

    Hofer, Christian; Ostermann, Klaus; Rendel, Tillmann

    2008-01-01

    propose polymorphic embedding of DSLs, where many different interpretations of a DSL can be provided as reusable components, and show how polymorphic embedding can be realized in the programming language Scala. With polymorphic embedding, the static type-safety, modularity, composability and rapid...... prototyping of pure embedding are reconciled with the flexibility attainable by external toolchains....

  9. The human resource information system: a rapid appraisal of Pakistan's capacity to employ the tool.

    Science.gov (United States)

    Kumar, Ramesh; Shaikh, Babar Tasneem; Ahmed, Jamil; Khan, Zulfiqar; Mursalin, Sayed; Memon, Mahmood Iqbal; Zareen, Shagufta

    2013-09-10

    Human resources are an important building block of the health system. During the last decade, enormous investment has gone into the information systems to manage human resources, but due to the lack of a clear vision, policy, and strategy, the results of these efforts have not been very visible. No reliable information portal captures the actual state of human resources in Pakistan's health sector. The World Health Organization (WHO) has provided technical support for the assessment of the existing system and development of a comprehensive Human Resource Information System (HRIS) in Pakistan. The questions in the WHO-HRIS Assessment tool were distributed into five thematic groups. Purposively selected (n=65) representatives from the government, private sector, and development partners participated in this cross sectional study, based on their programmatic affiliations. Fifty-five percent of organizations and departments have an independent Human Resources (HR) section managed by an establishment branch and are fully equipped with functional computers. Forty-five organizations (70%) had HR rules, regulations and coordination mechanisms, yet these are not implemented. Data reporting is mainly in paper form, on prescribed forms (51%), registers (3%) or even plain papers (20%). Data analysis does not give inputs to the decision making process and dissemination of information is quite erratic. Most of the organizations had no feedback mechanism for cross checking the HR data, rendering it unreliable. Pakistan is lacking appropriate HRIS management. The current HRIS indeed has a multitude of problems. In the wake of 2011 reforms within the health sector, provinces are even in a greater need for planning their respective health department services and must work on the deficiencies and inefficiencies of their HRIS so that the gaps and HR needs are better aligned for reaching the 2015 UN Millennium Development Goals (MDGs) targets.

  10. HIV Strategic Information in Non-European Union Countries in the World Health Organization European Region: Capacity Development Needs.

    Science.gov (United States)

    Bozicevic, Ivana; Handanagic, Senad; Cakalo, Jurja Ivana; Rinder Stengaard, Annemarie; Rutherford, George

    2017-06-23

    Capacity building of the national HIV strategic information system is a core component of the response to the HIV epidemic as it enables understanding of the evolving nature of the epidemic, which is critical for program planning and identification of the gaps and deficiencies in HIV programs. The study aims to describe the results of the assessment of the needs for further development of capacities in HIV strategic information systems in the non-European Union (EU) countries in the World Health Organization European Region (EUR). Self-administered questionnaires were distributed to national AIDS programs. The first questionnaire was sent to all countries (N=18) to find out, among other issues, the priority level for strengthening a range of HIV surveillance areas and their key gaps and weaknesses. The second questionnaire was sent to 15 countries to more specifically determine capacities for the analysis of the HIV care cascade. Responses to the first questionnaire were received from 10 countries, whereas 13 countries responded to the second questionnaire. Areas that were most frequently marked as being of high to moderate priority for strengthening were national electronic patient monitoring systems, evaluation of HIV interventions and impact analysis, implementation science, and data analysis. Key weaknesseses were lack of electronic reporting of HIV cases, problems with timeliness and completeness of reporting in HIV cases, under-estimates of the reported number of HIV-related deaths, and limited CD4 count testing at the time of HIV diagnosis. Migrant populations, internally displaced persons, and refugees were most commonly mentioned as groups not covered by surveillance, followed by clients of sex workers and men who have sex with men. The majority of countries reported that they were able to provide the number of people diagnosed with HIV who know their HIV status, which is important for the analysis of cross-sectional and longitudinal HIV care cascades

  11. Biometric feature embedding using robust steganography technique

    Science.gov (United States)

    Rashid, Rasber D.; Sellahewa, Harin; Jassim, Sabah A.

    2013-05-01

    This paper is concerned with robust steganographic techniques to hide and communicate biometric data in mobile media objects like images, over open networks. More specifically, the aim is to embed binarised features extracted using discrete wavelet transforms and local binary patterns of face images as a secret message in an image. The need for such techniques can arise in law enforcement, forensics, counter terrorism, internet/mobile banking and border control. What differentiates this problem from normal information hiding techniques is the added requirement that there should be minimal effect on face recognition accuracy. We propose an LSB-Witness embedding technique in which the secret message is already present in the LSB plane but instead of changing the cover image LSB values, the second LSB plane will be changed to stand as a witness/informer to the receiver during message recovery. Although this approach may affect the stego quality, it is eliminating the weakness of traditional LSB schemes that is exploited by steganalysis techniques for LSB, such as PoV and RS steganalysis, to detect the existence of secrete message. Experimental results show that the proposed method is robust against PoV and RS attacks compared to other variants of LSB. We also discussed variants of this approach and determine capacity requirements for embedding face biometric feature vectors while maintain accuracy of face recognition.

  12. The frequency response, coherence, and information capacity of two neuronal models.

    Science.gov (United States)

    Stein, R B; French, A S; Holden, A V

    1972-03-01

    Two neuronal models are analyzed in which subthreshold inputs are integrated either without loss (perfect integrator) or with a decay which follows an exponential time course (leaky integrator). Linear frequency response functions for these models are compared using sinusoids, Poisson-distributed impulses, or gaussian white noise as inputs. The responses of both models show the nonlinear behavior characteristic of a rectifier for sinusoidal inputs of sufficient amplitude. The leaky integrator shows another nonlinearity in which responses become phase locked to cyclic stimuli. Addition of white noise reduces the distortions due to phase locking. Both models also show selective attenuation of high-frequency components with white noise inputs. Input, output, and cross-spectra are computed using inputs having a broad frequency spectrum. Measures of the coherence and information transmission between the input and output of the models are also derived. Steady inputs, which produce a constant "carrier" rate, and intrinsic sources, which produce variability in the discharge of neurons, may either increase or decrease coherence; however, information transmission using inputs with a broad spectrum is generally increased by steady inputs and reduced by intrinsic variability.

  13. Strengthening capacity for local evidence to inform local responders to HIV in a remote Solomon Island health service

    Directory of Open Access Journals (Sweden)

    David MacLaren

    2015-04-01

    Full Text Available Background: Documenting specific knowledge and attitudes about HIV in the culturally diverse nation of Solomon Islands is essential to inform locally targeted public health responses. As part of a large capacity-strengthening project at Atoifi Adventist Hospital in East Kwaio, Solomon Islands, researchers, using a ‘learn-by-doing’ process, worked with participants in public health research methods. Methods: Overall, 43 people attended research capacity building workshops in 2011; eight joined the HIV study group. A cross-sectional survey including semi-structured interviews on HIV was conducted by the group. In February 2014, a hospital administrator was interviewed about how the 2011 study informed local HIV responses. Results: Of the 53 survey participants, 64% self-assessed as having little or no HIV knowledge, but 90% knew HIV could be transmitted between men and women during sex. Less than 50% knew HIV could be transmitted between two men having sex, 45% thought HIV could be transmitted by mosquitoes and 55% agreed condoms help protect from HIV. Most participants reported negative attitudes towards people with HIV. Three years later the health administrator reported ad hoc responses to HIV because of low HIV prevalence, increasing noncommunicable diseases, staff turnover and resource shortages. Discussion: This HIV study was used to strengthen research skills in local health professionals and community members in Solomon Islands. It showed that community members require accurate information about HIV transmission and that entrenched stigma is an issue. Although results provided local evidence for local response, ongoing health system challenges and little local HIV transmission meant HIV services remain rudimentary.

  14. Essays in energy policy and planning modeling under uncertainty: Value of information, optimistic biases, and simulation of capacity markets

    Science.gov (United States)

    Hu, Ming-Che

    Optimization and simulation are popular operations research and systems analysis tools for energy policy modeling. This dissertation addresses three important questions concerning the use of these tools for energy market (and electricity market) modeling and planning under uncertainty. (1) What is the value of information and cost of disregarding different sources of uncertainty for the U.S. energy economy? (2) Could model-based calculations of the performance (social welfare) of competitive and oligopolistic market equilibria be optimistically biased due to uncertainties in objective function coefficients? (3) How do alternative sloped demand curves perform in the PJM capacity market under economic and weather uncertainty? How does curve adjustment and cost dynamics affect the capacity market outcomes? To address the first question, two-stage stochastic optimization is utilized in the U.S. national MARKAL energy model; then the value of information and cost of ignoring uncertainty are estimated for three uncertainties: carbon cap policy, load growth and natural gas prices. When an uncertainty is important, then explicitly considering those risks when making investments will result in better performance in expectation (positive expected cost of ignoring uncertainty). Furthermore, eliminating the uncertainty would improve strategies even further, meaning that improved forecasts of future conditions are valuable ( i.e., a positive expected value of information). Also, the value of policy coordination shows the difference between a strategy developed under the incorrect assumption of no carbon cap and a strategy correctly anticipating imposition of such a cap. For the second question, game theory models are formulated and the existence of optimistic (positive) biases in market equilibria (both competitive and oligopoly markets) are proved, in that calculated social welfare and producer profits will, in expectation, exceed the values that will actually be received

  15. Informational Capacity of the Financial Statements of Brazilian Banks: An Analysis from the Perspective of Liquidity Risk

    Directory of Open Access Journals (Sweden)

    Orleans Silva Martins

    2012-12-01

    Full Text Available This study aims to analyze the financial statements of Brazilian banks, from the perspective of liquidity risk by exploring whether the Statements of Cash Flows and Notes to these companies meet the requirements concerning the dissemination of liquidity risk demands by IFRS 7 and the principles of the Basel Committee. Additionally, we investigated whether the coefficients of box cover these companies, calculated from the DFC, show some respect to compliance with those requirements. For that, was raised a theoretical framework about liquidity and liquidity risk, and the role of DFC and Notes before the disclosure of information relating to liquidity. Accordingly, an exploratory study was conducted with the 28 companies that comprise the Banks segment of the BM&F Bovespa, through its financial statements for the year 2009. The main results indicate a low capacity of these informative statements about the situation and liquidity risk, given that only 60.71% of the requirements contained in the standards were met. Still, we conclude that the mere fact that it has good cash coverage ratios is not a necessary condition to be among the companies that meet the disclosure requirements of the situation and liquidity risk, or vice versa. Thus, even when companies have good liquidity indicators, the information required by the IASB and the BCBS has not been disclosed in its financial statements.

  16. Building capacity for in-situ phenological observation data to support integrated biodiversity information at local to national scales

    Science.gov (United States)

    Weltzin, J. F.

    2016-12-01

    Earth observations from a variety of platforms and across a range of scales are required to support research, natural resource management, and policy- and decision-making in a changing world. Integrated earth observation data provides multi-faceted information critical to decision support, vulnerability and change detection, risk assessments, early warning and modeling, simulation and forecasting in the natural resource societal benefit area. The USA National Phenology Network (USA-NPN; www.usanpn.org) is a national-scale science and monitoring initiative focused on phenology - the study of seasonal life-cycle events such as leafing, flowering, reproduction, and migration - as a tool to understand the response of biodiversity to environmental variation and change. USA-NPN provides a hierarchical, national monitoring framework that enables other organizations to leverage the capacity of the Network for their own applications - minimizing investment and duplication of effort - while promoting interoperability and sustainability. Over the last decade, the network has focused on the development of a centralized database for in-situ (ground based) observations of plants and animals, now with 8 M records for the period 1954-present. More recently, we have developed a workflow for the production and validation of spatially gridded phenology products based on models that couple the organismal data with climatological and meteorological data at daily time-steps and relatively fine spatial resolutions ( 2.5 km to 4 km). These gridded data are now ripe for integration with other modeled or earth observation gridded data, e.g., indices of drought impact or land surface reflectance. This greatly broadens capacity to scale organismal observational data to landscapes and regions, and enables novel investigations of biophysical interactions at unprecedented scales, e.g., continental-scale migrations. Sustainability emerges from identification of stakeholder needs, segmentation of

  17. Unsteady Flame Embedding

    KAUST Repository

    El-Asrag, Hossam A.

    2011-01-01

    Direct simulation of all the length and time scales relevant to practical combustion processes is computationally prohibitive. When combustion processes are driven by reaction and transport phenomena occurring at the unresolved scales of a numerical simulation, one must introduce a dynamic subgrid model that accounts for the multiscale nature of the problem using information available on a resolvable grid. Here, we discuss a model that captures unsteady flow-flame interactions- including extinction, re-ignition, and history effects-via embedded simulations at the subgrid level. The model efficiently accounts for subgrid flame structure and incorporates detailed chemistry and transport, allowing more accurate prediction of the stretch effect and the heat release. In this chapter we first review the work done in the past thirty years to develop the flame embedding concept. Next we present a formulation for the same concept that is compatible with Large Eddy Simulation in the flamelet regimes. The unsteady flame embedding approach (UFE) treats the flame as an ensemble of locally one-dimensional flames, similar to the flamelet approach. However, a set of elemental one-dimensional flames is used to describe the turbulent flame structure directly at the subgrid level. The calculations employ a one-dimensional unsteady flame model that incorporates unsteady strain rate, curvature, and mixture boundary conditions imposed by the resolved scales. The model is used for closure of the subgrid terms in the context of large eddy simulation. Direct numerical simulation (DNS) data from a flame-vortex interaction problem is used for comparison. © Springer Science+Business Media B.V. 2011.

  18. The Contribution of Information Acquisition and Management Capacity to Administrators' Decision-Making Effectiveness in Tertiary Institutions in South-Western Nigeria

    Science.gov (United States)

    Fabunmi, Martins; Erwat, Eseza Akiror

    2008-01-01

    This study investigated through empirical methods the extent to which information acquisition and information management capacity of administrators in tertiary institutions in South-Western Nigeria contributed to their decision-making effectiveness. It adopted the ex post facto survey research design, using the random sampling technique to select…

  19. Conceptualizing Embedded Configuration

    DEFF Research Database (Denmark)

    Oddsson, Gudmundur Valur; Hvam, Lars; Lysgaard, Ole

    2006-01-01

    Installing and servicing complex electromechanical systems is more tedious than is necessary. By putting the product knowledge into the product itself, which then would allow automation in constructing the product from modules, could solve that. It would support personnel in aftersales installation...... and services. The general idea can be named embedded configuration. In this article we intend to conceptualize embedded configuration, what it is and is not. The difference between embedded configuration, sales configuration and embedded software is explained. We will look at what is needed to make embedded...... configuration systems. That will include requirements to product modelling techniques. An example with consumer electronics will illuminate the elements of embedded configuration in settings that most can relate to. The question of where embedded configuration would be relevant is discussed, and the current...

  20. Evidence-informed capacity building for setting health priorities in low- and middle-income countries: A framework and recommendations for further research [version 1; referees: 2 approved

    Directory of Open Access Journals (Sweden)

    Ryan Li

    2017-03-01

    Full Text Available Priority-setting in health is risky and challenging, particularly in resource-constrained settings. It is not simply a narrow technical exercise, and involves the mobilisation of a wide range of capacities among stakeholders – not only the technical capacity to “do” research in economic evaluations. Using the Individuals, Nodes, Networks and Environment (INNE framework, we identify those stakeholders, whose capacity needs will vary along the evidence-to-policy continuum. Policymakers and healthcare managers require the capacity to commission and use relevant evidence (including evidence of clinical and cost-effectiveness, and of social values; academics need to understand and respond to decision-makers’ needs to produce relevant research. The health system at all levels will need institutional capacity building to incentivise routine generation and use of evidence. Knowledge brokers, including priority-setting agencies (such as England’s National Institute for Health and Care Excellence, and Health Interventions and Technology Assessment Program, Thailand and the media can play an important role in facilitating engagement and knowledge transfer between the various actors. Especially at the outset but at every step, it is critical that patients and the public understand that trade-offs are inherent in priority-setting, and careful efforts should be made to engage them, and to hear their views throughout the process. There is thus no single approach to capacity building; rather a spectrum of activities that recognises the roles and skills of all stakeholders. A range of methods, including formal and informal training, networking and engagement, and support through collaboration on projects, should be flexibly employed (and tailored to specific needs of each country to support institutionalisation of evidence-informed priority-setting. Finally, capacity building should be a two-way process; those who build capacity should also attend to

  1. The anterior-ventrolateral temporal lobe contributes to boosting visual working memory capacity for items carrying semantic information.

    Science.gov (United States)

    Chiou, Rocco; Lambon Ralph, Matthew A

    2018-04-01

    Working memory (WM) is a buffer that temporarily maintains information, be it visual or auditory, in an active state, caching its contents for online rehearsal or manipulation. How the brain enables long-term semantic knowledge to affect the WM buffer is a theoretically significant issue awaiting further investigation. In the present study, we capitalise on the knowledge about famous individuals as a 'test-case' to study how it impinges upon WM capacity for human faces and its neural substrate. Using continuous theta-burst transcranial stimulation combined with a psychophysical task probing WM storage for varying contents, we provide compelling evidence that (1) faces (regardless of familiarity) continued to accrue in the WM buffer with longer encoding time, whereas for meaningless stimuli (colour shades) there was little increment; (2) the rate of WM accrual was significantly more efficient for famous faces, compared to unknown faces; (3) the right anterior-ventrolateral temporal lobe (ATL) causally mediated this superior WM storage for famous faces. Specifically, disrupting the ATL (a region tuned to semantic knowledge including person identity) selectively hinders WM accrual for celebrity faces while leaving the accrual for unfamiliar faces intact. Further, this 'semantically-accelerated' storage is impervious to disruption of the right middle frontal gyrus and vertex, supporting the specific and causative contribution of the right ATL. Our finding advances the understanding of the neural architecture of WM, demonstrating that it depends on interaction with long-term semantic knowledge underpinned by the ATL, which causally expands the WM buffer when visual content carries semantic information. Copyright © 2018 The Authors. Published by Elsevier Inc. All rights reserved.

  2. Embedded data representations

    DEFF Research Database (Denmark)

    Willett, Wesley; Jansen, Yvonne; Dragicevic, Pierre

    2017-01-01

    We introduce embedded data representations, the use of visual and physical representations of data that are deeply integrated with the physical spaces, objects, and entities to which the data refers. Technologies like lightweight wireless displays, mixed reality hardware, and autonomous vehicles ......-situated, situated, and embedded data displays, including both visualizations and physicalizations. Based on our observations, we identify a variety of design challenges for embedded data representation, and suggest opportunities for future research and applications....

  3. Embedding beyond electrostatics

    DEFF Research Database (Denmark)

    Nåbo, Lina J.; Olsen, Jógvan Magnus Haugaard; Holmgaard List, Nanna

    2016-01-01

    We study excited states of cholesterol in solution and show that, in this specific case, solute wave-function confinement is the main effect of the solvent. This is rationalized on the basis of the polarizable density embedding scheme, which in addition to polarizable embedding includes non-electrostatic...... repulsion that effectively confines the solute wave function to its cavity. We illustrate how the inclusion of non-electrostatic repulsion results in a successful identification of the intense π → π∗ transition, which was not possible using an embedding method that only includes electrostatics....... This underlines the importance of non-electrostatic repulsion in quantum-mechanical embedding-based methods....

  4. Railway capacity

    OpenAIRE

    Lavrič, Tadeja

    2012-01-01

    In the first part of the thesis, the concepts of railway capacity and capacity consumption are defined. Experts have in the past defined railway capacity in many different ways. This thesis outlines some definitions of railway capacity and capacity consumption, including the definition of railway capacity in accordance with the UIC code 406 (2004), given by the International Union of Railways in order to standardize the definition of railway capacity. Capacity and capacity consumption are dir...

  5. Feature-based component model for design of embedded systems

    Science.gov (United States)

    Zha, Xuan Fang; Sriram, Ram D.

    2004-11-01

    An embedded system is a hybrid of hardware and software, which combines software's flexibility and hardware real-time performance. Embedded systems can be considered as assemblies of hardware and software components. An Open Embedded System Model (OESM) is currently being developed at NIST to provide a standard representation and exchange protocol for embedded systems and system-level design, simulation, and testing information. This paper proposes an approach to representing an embedded system feature-based model in OESM, i.e., Open Embedded System Feature Model (OESFM), addressing models of embedded system artifacts, embedded system components, embedded system features, and embedded system configuration/assembly. The approach provides an object-oriented UML (Unified Modeling Language) representation for the embedded system feature model and defines an extension to the NIST Core Product Model. The model provides a feature-based component framework allowing the designer to develop a virtual embedded system prototype through assembling virtual components. The framework not only provides a formal precise model of the embedded system prototype but also offers the possibility of designing variation of prototypes whose members are derived by changing certain virtual components with different features. A case study example is discussed to illustrate the embedded system model.

  6. Quantum Embedding Theories.

    Science.gov (United States)

    Sun, Qiming; Chan, Garnet Kin-Lic

    2016-12-20

    In complex systems, it is often the case that the region of interest forms only one part of a much larger system. The idea of joining two different quantum simulations-a high level calculation on the active region of interest, and a low level calculation on its environment-formally defines a quantum embedding. While any combination of techniques constitutes an embedding, several rigorous formalisms have emerged that provide for exact feedback between the embedded system and its environment. These three formulations: density functional embedding, Green's function embedding, and density matrix embedding, respectively, use the single-particle density, single-particle Green's function, and single-particle density matrix as the quantum variables of interest. Many excellent reviews exist covering these methods individually. However, a unified presentation of the different formalisms is so far lacking. Indeed, the various languages commonly used, functional equations for density functional embedding, diagrammatics for Green's function embedding, and entanglement arguments for density matrix embedding, make the three formulations appear vastly different. In this Account, we introduce the basic equations of all three formulations in such a way as to highlight their many common intellectual strands. While we focus primarily on a straightforward theoretical perspective, we also give a brief overview of recent applications and possible future developments. The first section starts with density functional embedding, where we introduce the key embedding potential via the Euler equation. We then discuss recent work concerning the treatment of the nonadditive kinetic potential, before describing mean-field density functional embedding and wave function in density functional embedding. We finish the section with extensions to time-dependence and excited states. The second section is devoted to Green's function embedding. Here, we use the Dyson equation to obtain equations that

  7. Study of the Use of Data Systems to Increase Building Leader Capacity and Inform Principal Practice in K-12 Public Schools

    Science.gov (United States)

    DeAngelo, Salvatore, Jr.

    2013-01-01

    The intention of this qualitative study was to explore the effects that instructional data systems have on a building level leader's capacity to evaluate student growth and inform principal practice. Principal leadership practices were examined through the lens of Kouzes and Postners' five practices of exemplary leadership (Kouzes & Posner,…

  8. Corrosion Monitors for Embedded Evaluation

    Energy Technology Data Exchange (ETDEWEB)

    Robinson, Alex L. [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Pfeifer, Kent B. [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Casias, Adrian L. [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Howell, Stephen W. [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Sorensen, Neil R. [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Missert, Nancy A. [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States)

    2017-05-01

    We have developed and characterized novel in-situ corrosion sensors to monitor and quantify the corrosive potential and history of localized environments. Embedded corrosion sensors can provide information to aid health assessments of internal electrical components including connectors, microelectronics, wires, and other susceptible parts. When combined with other data (e.g. temperature and humidity), theory, and computational simulation, the reliability of monitored systems can be predicted with higher fidelity.

  9. Embedded multiprocessors scheduling and synchronization

    CERN Document Server

    Sriram, Sundararajan

    2009-01-01

    Techniques for Optimizing Multiprocessor Implementations of Signal Processing ApplicationsAn indispensable component of the information age, signal processing is embedded in a variety of consumer devices, including cell phones and digital television, as well as in communication infrastructure, such as media servers and cellular base stations. Multiple programmable processors, along with custom hardware running in parallel, are needed to achieve the computation throughput required of such applications. Reviews important research in key areas related to the multiprocessor implementation of multi

  10. Polarizable Density Embedding

    DEFF Research Database (Denmark)

    Reinholdt, Peter; Kongsted, Jacob; Olsen, Jógvan Magnus Haugaard

    2017-01-01

    and diffuse basis sets that are otherwise questionable-due to electron spill-out effects-in standard embedding models. Based on our analysis, we find the PDE model to be robust and much more systematic than less sophisticated focused embedding models, and thus outline the PDE model as a very efficient...

  11. Embeddings of Heyting Algebras

    NARCIS (Netherlands)

    Jongh, D.H.J. de; Visser, A.

    In this paper we study embeddings of Heyting Algebras. It is pointed out that such embeddings are naturally connected with Derived Rules. We compare the Heyting Algebras embeddable in the Heyting Algebra of the Intuitionistic Propositional Calculus (IPC), i.e. the free Heyting Algebra on countably

  12. Properties of Vector Embeddings in Social Networks

    Directory of Open Access Journals (Sweden)

    Fatemeh Salehi Rizi

    2017-09-01

    Full Text Available Embedding social network data into a low-dimensional vector space has shown promising performance for many real-world applications, such as node classification, node clustering, link prediction and network visualization. However, the information contained in these vector embeddings remains abstract and hard to interpret. Methods for inspecting embeddings usually rely on visualization methods, which do not work on a larger scale and do not give concrete interpretations of vector embeddings in terms of preserved network properties (e.g., centrality or betweenness measures. In this paper, we study and investigate network properties preserved by recent random walk-based embedding procedures like node2vec, DeepWalk or LINE. We propose a method that applies learning to rank in order to relate embeddings to network centralities. We evaluate our approach with extensive experiments on real-world and artificial social networks. Experiments show that each embedding method learns different network properties. In addition, we show that our graph embeddings in combination with neural networks provide a computationally efficient way to approximate the Closeness Centrality measure in social networks.

  13. Embedded Linux in het onderwijs

    NARCIS (Netherlands)

    Dr Ruud Ermers

    2008-01-01

    Embedded Linux wordt bij steeds meer grote bedrijven ingevoerd als embedded operating system. Binnen de opleiding Technische Informatica van Fontys Hogeschool ICT is Embedded Linux geïntroduceerd in samenwerking met het lectoraat Architectuur van Embedded Systemen. Embedded Linux is als vakgebied

  14. Brauer type embedding problems

    CERN Document Server

    Ledet, Arne

    2005-01-01

    This monograph is concerned with Galois theoretical embedding problems of so-called Brauer type with a focus on 2-groups and on finding explicit criteria for solvability and explicit constructions of the solutions. The advantage of considering Brauer type embedding problems is their comparatively simple condition for solvability in the form of an obstruction in the Brauer group of the ground field. This book presupposes knowledge of classical Galois theory and the attendant algebra. Before considering questions of reducing the embedding problems and reformulating the solvability criteria, the

  15. STEGO TRANSFORMATION OF SPATIAL DOMAIN OF COVER IMAGE ROBUST AGAINST ATTACKS ON EMBEDDED MESSAGE

    Directory of Open Access Journals (Sweden)

    Kobozeva A.

    2014-04-01

    Full Text Available One of the main requirements to steganografic algorithm to be developed is robustness against disturbing influences, that is, to attacks against the embedded message. It was shown that guaranteeing the stego algorithm robustness does not depend on whether the additional information is embedded into the spatial or transformation domain of the cover image. Given the existing advantages of the spatial domain of the cover image in organization of embedding and extracting processes, a sufficient condition for ensuring robustness of such stego transformation was obtained in this work. It was shown that the amount of brightness correction related to the pixels of the cover image block is similar to the amount of correction related to the maximum singular value of the corresponding matrix of the block in case of embedding additional data that ensures robustness against attacks on the embedded message. Recommendations were obtained for selecting the size of the cover image block used in stego transformation as one of the parameters determining the calculation error of stego message. Given the inversely correspondence between the stego capacity of the stego channel being organized and the size of the cover image block, l=8 value was recommended.

  16. Electronics for embedded systems

    CERN Document Server

    Bindal, Ahmet

    2017-01-01

    This book provides semester-length coverage of electronics for embedded systems, covering most common analog and digital circuit-related issues encountered while designing embedded system hardware. It is written for students and young professionals who have basic circuit theory background and want to learn more about passive circuits, diode and bipolar transistor circuits, the state-of-the-art CMOS logic family and its interface with older logic families such as TTL, sensors and sensor physics, operational amplifier circuits to condition sensor signals, data converters and various circuits used in electro-mechanical device control in embedded systems. The book also provides numerous hardware design examples by integrating the topics learned in earlier chapters. The last chapter extensively reviews the combinational and sequential logic design principles to be able to design the digital part of embedded system hardware.

  17. Smart Multicore Embedded Systems

    DEFF Research Database (Denmark)

    This book provides a single-source reference to the state-of-the-art of high-level programming models and compilation tool-chains for embedded system platforms. The authors address challenges faced by programmers developing software to implement parallel applications in embedded systems, where very...... specificities of various embedded systems from different industries. Parallel programming tool-chains are described that take as input parameters both the application and the platform model, then determine relevant transformations and mapping decisions on the concrete platform, minimizing user intervention...... and hiding the difficulties related to the correct and efficient use of memory hierarchy and low level code generation. Describes tools and programming models for multicore embedded systems Emphasizes throughout performance per watt scalability Discusses realistic limits of software parallelization Enables...

  18. Embedded Fragments Registry (EFR)

    Data.gov (United States)

    Department of Veterans Affairs — In 2009, the Department of Defense estimated that approximately 40,000 service members who served in OEF/OIF may have embedded fragment wounds as the result of small...

  19. Crop advisors as climate information brokers: Building the capacity of US farmers to adapt to climate change

    Directory of Open Access Journals (Sweden)

    Maria Carmen Lemos

    2014-01-01

    Full Text Available This paper examines the role of crop advisors as brokers of climate information to support US corn farmers to adapt to climatic change. It uses quantitative data collected from a broad survey of crop advisors in the US Corn Belt to examine the factors that shape advisors’ use of (and willingness to provide climate information to their clients. Building upon a general model of climate information usability we argue that advisors’ willingness to provide climate advice to farmers is influenced by three main factors: their information seeking habits and behavior, their experience with innovation in the past, and how climate information interplays with other kinds of information that they provide—especially agronomic advice. We find that advisors’ willingness to provide climate related information depends both on factors at the individual and organizational level and on the type of advice they provide. First, at the individual and organizational levels, advisors who work in supportive organizations and who collaborate with other advisors are more likely to provide climate information. Second, advisors are more likely to provide climate information if it does not interfere with their main profit making business (e.g. provision of agronomic advice. Third, there is a significant positive relationship between trust in a greater number or sources of information and use of climate information. Fourth, the way advisors perceive short- and long-term risk also influences their willingness to provide climate information; the more concerned they are about long-term climate-related risks to farming, the more likely they are to provide (or want to provide advice based on climate information. Differently from other empirical work in the literature, our analytical model suggests that neither negative experiences with climate information in the past nor the high level of uncertainty characteristic of climate information appear to influence advisors

  20. Enhancing the Capacity of Policy-Makers to Develop Evidence-Informed Policy Brief on Infectious Diseases of Poverty in Nigeria

    Directory of Open Access Journals (Sweden)

    Chigozie Jesse Uneke

    2015-09-01

    Full Text Available Background The lack of effective use of research evidence in policy-making is a major challenge in most low- and middle-income countries (LMICs. There is need to package research data into effective policy tools that will help policy-makers to make evidence-informed policy regarding infectious diseases of poverty (IDP. The objective of this study was to assess the usefulness of training workshops and mentoring to enhance the capacity of Nigerian health policy-makers to develop evidence-informed policy brief on the control of IDP. Methods A modified “before and after” intervention study design was used in which outcomes were measured on the target participants both before the intervention is implemented and after. A 4-point Likert scale according to the degree of adequacy; 1 = “grossly inadequate,” 4 = “very adequate” was employed. The main parameter measured was participants’ perceptions of their own knowledge/understanding. This study was conducted at subnational level and the participants were the career health policy-makers drawn from Ebonyi State in the South-Eastern Nigeria. A oneday evidence-to-policy workshop was organized to enhance the participants’ capacity to develop evidence-informed policy brief on IDP in Ebonyi State. Topics covered included collaborative initiative; preparation and use of policy briefs; policy dialogue; ethics in health policy-making; and health policy and politics. Results The preworkshop mean of knowledge and capacity ranged from 2.49-3.03, while the postworkshop mean ranged from 3.42–3.78 on 4-point scale. The percentage increase in mean of knowledge and capacity at the end of the workshop ranged from 20.10%–45%. Participants were divided into 3 IDP mentorship groups (malaria, schistosomiasis, lymphatic filariasis [LF] and were mentored to identify potential policy options/recommendations for control of the diseases for the policy briefs. These policy options were subjected to research

  1. A Systematic Approach for Determining Vertical Pile Depth of Embedment in Cohensionless Soils to Withstand Lateral Barge Train Impact Loads

    Science.gov (United States)

    2017-01-30

    will lose moment capacity there as well. Soil -Structure Interaction (SSI) software will be needed to determine the load that causes a moment failure...Cohesionless Soils to Withstand Lateral Barge Train Impact Loads In fo rm at io n an d Te ch no lo gy L ab or at or y Barry C. White and...Pile Depth of Embedment in Cohesionless Soils to Withstand Lateral Barge Train Impact Loads Barry C. White and Robert M. Ebeling Information

  2. Ontologiczne aspekty ucieleśnienia i realizacji informacji w umyśle (Ontological aspects of how information is embodied and embedded within the mind

    Directory of Open Access Journals (Sweden)

    Marek Hetmański

    2010-06-01

    Full Text Available The main aim of this paper is to explain how one can talk about information asfunctioning ontologically within the mind. From the cybernetic point of view,coding is essential to such functioning-transforming information from one systemof symbols of signs into another. Information coding takes place within the body(brain, in human use of instruments and tools, as well as in the manifold relationsbetween humans and the environment. Using the work of Arbib, Gibson, Batesonand Dennett, this paper present a model of the manifold functioning of informationwithin the human mind, with particular stress placed upon its signifi cance forpractical-cognitive behaviour.

  3. A high capacity reversible watermarking scheme for relational databases based on mapping difference expansion

    Science.gov (United States)

    Qing, Yin; Zhu, Yuesheng; Yang, Fan; Jiang, Yifeng

    2017-07-01

    The watermarking technique can be used to protect the copyright of relational databases by hiding the ownership information into the relational databases. Difference expansion (DE) technique is one of the common reversible watermarking techniques for numerical relational databases. However, most previous schemes based on DE suffer the problem of low embedding capacity when the difference values between different attributes are relatively large. In this paper, we propose a novel reversible watermarking scheme to solve the above problem. In the scheme, a mapping difference expansion (MDE) method is proposed to convert the differences between attributes to small mapping differences. Based on the MDE, an attribute and tuple selection algorithm is designed to select the suitable data for watermarking, which can increase embedding capacity and reduce distortion. In addition, the majority voting technique is utilized to enhance the robustness of watermarking with the high embedding capacity. The experimental results have shown that the proposed scheme can provide higher embedding capacity, lower distortion and stronger robustness than other schemes.

  4. NASA's Indigenous Capacity Building Initiative: Balancing Traditional Knowledge and Existing Remote Sensing Training to Inform Management Decisions

    Science.gov (United States)

    McCullum, A. J. K.; Schmidt, C.; Palacios, S. L.; Ly, V.

    2017-12-01

    NASA's Indigenous Capacity Building Initiative is aimed to provide remote sensing training, mentoring, and research opportunities to the indigenous community. A key programmatic goal is the co-production of place-based trainings where participants have the opportunity to address specific natural resource research and management issues facing their tribal lands. Three primary strategies have been adopted to engage with our tribal partners, these include: (1) the use of existing tribal networks and conferences such as the National Tribal GIS Conference, (2) coordination with other federal agencies such as the Bureau of Indian Affairs (BIA) and tribal liaisons at regional Climate Science Centers, and (3) connecting with tribes directly. Regional partner visits with tribes, such as meetings with the Samish Indian Nation, are integral to cultivate trusting, collaborative, and sustained partnerships and an understanding of how Earth Observations can be applied to the unique set of challenges and goals each tribe faces. As the program continues to grow, we aim to increase our incorporation of Traditional Ecological Knowledge (TEK) into technical methods and to develop trainings tailored to thematic areas of interest to specific tribes. Engagement and feedback are encouraged to refine our approaches to increase capacity within the indigenous community to utilize NASA Earth Observations.

  5. Smart multicore embedded systems

    CERN Document Server

    Bertels, Koen; Karlsson, Sven; Pacull, François

    2014-01-01

    This book provides a single-source reference to the state-of-the-art of high-level programming models and compilation tool-chains for embedded system platforms. The authors address challenges faced by programmers developing software to implement parallel applications in embedded systems, where very often they are forced to rewrite sequential programs into parallel software, taking into account all the low level features and peculiarities of the underlying platforms. Readers will benefit from these authors’ approach, which takes into account both the application requirements and the platform specificities of various embedded systems from different industries. Parallel programming tool-chains are described that take as input parameters both the application and the platform model, then determine relevant transformations and mapping decisions on the concrete platform, minimizing user intervention and hiding the difficulties related to the correct and efficient use of memory hierarchy and low level code generati...

  6. Early experience with formalin-fixed paraffin-embedded (FFPE) based commercial clinical genomic profiling of gliomas-robust and informative with caveats.

    Science.gov (United States)

    Movassaghi, Masoud; Shabihkhani, Maryam; Hojat, Seyed A; Williams, Ryan R; Chung, Lawrance K; Im, Kyuseok; Lucey, Gregory M; Wei, Bowen; Mareninov, Sergey; Wang, Michael W; Ng, Denise W; Tashjian, Randy S; Magaki, Shino; Perez-Rosendahl, Mari; Yang, Isaac; Khanlou, Negar; Vinters, Harry V; Liau, Linda M; Nghiemphu, Phioanh L; Lai, Albert; Cloughesy, Timothy F; Yong, William H

    2017-08-01

    Commercial targeted genomic profiling with next generation sequencing using formalin-fixed paraffin embedded (FFPE) tissue has recently entered into clinical use for diagnosis and for the guiding of therapy. However, there is limited independent data regarding the accuracy or robustness of commercial genomic profiling in gliomas. As part of patient care, FFPE samples of gliomas from 71 patients were submitted for targeted genomic profiling to one commonly used commercial vendor, Foundation Medicine. Genomic alterations were determined for the following grades or groups of gliomas; Grade I/II, Grade III, primary glioblastomas (GBMs), recurrent primary GBMs, and secondary GBMs. In addition, FFPE samples from the same patients were independently assessed with conventional methods such as immunohistochemistry (IHC), Quantitative real-time PCR (qRT-PCR), or Fluorescence in situ hybridization (FISH) for three genetic alterations: IDH1 mutations, EGFR amplification, and EGFRvIII expression. A total of 100 altered genes were detected by the aforementioned targeted genomic profiling assay. The number of different genomic alterations was significantly different between the five groups of gliomas and consistent with the literature. CDKN2A/B, TP53, and TERT were the most common genomic alterations seen in primary GBMs, whereas IDH1, TP53, and PIK3CA were the most common in secondary GBMs. Targeted genomic profiling demonstrated 92.3%-100% concordance with conventional methods. The targeted genomic profiling report provided an average of 5.5 drugs, and listed an average of 8.4 clinical trials for the 71 glioma patients studied but only a third of the trials were appropriate for glioma patients. In this limited comparison study, this commercial next generation sequencing based-targeted genomic profiling showed a high concordance rate with conventional methods for the 3 genetic alterations and identified mutations expected for the type of glioma. While it may not be feasible to

  7. Promoting Recruitment using Information Management Efficiently (PRIME): a stepped-wedge, cluster randomised trial of a complex recruitment intervention embedded within the REstart or Stop Antithrombotics Randomised Trial.

    Science.gov (United States)

    Maxwell, Amy E; Parker, Richard A; Drever, Jonathan; Rudd, Anthony; Dennis, Martin S; Weir, Christopher J; Al-Shahi Salman, Rustam

    2017-12-28

    Few interventions are proven to increase recruitment in clinical trials. Recruitment to RESTART, a randomised controlled trial of secondary prevention after stroke due to intracerebral haemorrhage, has been slower than expected. Therefore, we sought to investigate an intervention to boost recruitment to RESTART. We conducted a stepped-wedge, cluster randomised trial of a complex intervention to increase recruitment, embedded within the RESTART trial. The primary objective was to investigate if the PRIME complex intervention (a recruitment co-ordinator who conducts a recruitment review, provides access to bespoke stroke audit data exports, and conducts a follow-up review after 6 months) increases the recruitment rate to RESTART. We included 72 hospital sites located in England, Wales, or Scotland that were active in RESTART in June 2015. All sites began in the control state and were allocated using block randomisation stratified by hospital location (Scotland versus England/Wales) to start the complex intervention in one of 12 different months. The primary outcome was the number of patients randomised into RESTART per month per site. We quantified the effect of the complex intervention on the primary outcome using a negative binomial, mixed model adjusting for site, December/January months, site location, and background time trends in recruitment rate. We recruited and randomised 72 sites and recorded their monthly recruitment to RESTART over 24 months (March 2015 to February 2017 inclusive), providing 1728 site-months of observations for the primary analysis. The adjusted rate ratio for the number of patients randomised per month after allocation to the PRIME complex intervention versus control time before allocation to the PRIME complex intervention was 1.06 (95% confidence interval 0.55 to 2.03, p = 0.87). Although two thirds of respondents to the 6-month follow-up questionnaire agreed that the audit reports were useful, only six patients were reported to

  8. A novel edge based embedding in medical images based on unique key generated using sudoku puzzle design.

    Science.gov (United States)

    Santhi, B; Dheeptha, B

    2016-01-01

    The field of telemedicine has gained immense momentum, owing to the need for transmitting patients' information securely. This paper puts forth a unique method for embedding data in medical images. It is based on edge based embedding and XOR coding. The algorithm proposes a novel key generation technique by utilizing the design of a sudoku puzzle to enhance the security of the transmitted message. The edge blocks of the cover image alone, are utilized to embed the payloads. The least significant bit of the pixel values are changed by XOR coding depending on the data to be embedded and the key generated. Hence the distortion in the stego image is minimized and the information is retrieved accurately. Data is embedded in the RGB planes of the cover image, thus increasing its embedding capacity. Several measures including peak signal noise ratio (PSNR), mean square error (MSE), universal image quality index (UIQI) and correlation coefficient (R) are the image quality measures that have been used to analyze the quality of the stego image. It is evident from the results that the proposed technique outperforms the former methodologies.

  9. Pullout capacity of batter pile in sand.

    Science.gov (United States)

    Nazir, Ashraf; Nasr, Ahmed

    2013-03-01

    Many offshore structures are subjected to overturning moments due to wind load, wave pressure, and ship impacts. Also most of retaining walls are subjected to horizontal forces and bending moments, these forces are due to earth pressure. For foundations in such structures, usually a combination of vertical and batter piles is used. Little information is available in the literature about estimating the capacity of piles under uplift. In cases where these supporting piles are not vertical, the behavior under axial pullout is not well established. In order to delineate the significant variables affecting the ultimate uplift shaft resistance of batter pile in dry sand, a testing program comprising 62 pullout tests was conducted. The tests are conducted on model steel pile installed in loose, medium, and dense sand to an embedded depth ratio, L/d, vary from 7.5 to 30 and with various batter angles of 0°, 10°, 20°, and 30°. Results indicate that the pullout capacity of a batter pile constructed in dense and/or medium density sand increases with the increase of batter angle attains maximum value and then decreases, the maximum value of Pα occurs at batter angle approximately equal to 20°, and it is about 21-31% more than the vertical pile capacity, while the pullout capacity for batter pile that constructed in loose sand decreases with the increase of pile inclination. The results also indicated that the circular pile is more resistant to pullout forces than the square and rectangular pile shape. The rough model piles tested is experienced 18-75% increase in capacity compared with the smooth model piles. The suggested relations for the pullout capacity of batter pile regarding the vertical pile capacity are well predicted.

  10. Pullout capacity of batter pile in sand

    Directory of Open Access Journals (Sweden)

    Ashraf Nazir

    2013-03-01

    Full Text Available Many offshore structures are subjected to overturning moments due to wind load, wave pressure, and ship impacts. Also most of retaining walls are subjected to horizontal forces and bending moments, these forces are due to earth pressure. For foundations in such structures, usually a combination of vertical and batter piles is used. Little information is available in the literature about estimating the capacity of piles under uplift. In cases where these supporting piles are not vertical, the behavior under axial pullout is not well established. In order to delineate the significant variables affecting the ultimate uplift shaft resistance of batter pile in dry sand, a testing program comprising 62 pullout tests was conducted. The tests are conducted on model steel pile installed in loose, medium, and dense sand to an embedded depth ratio, L/d, vary from 7.5 to 30 and with various batter angles of 0°, 10°, 20°, and 30°. Results indicate that the pullout capacity of a batter pile constructed in dense and/or medium density sand increases with the increase of batter angle attains maximum value and then decreases, the maximum value of Pα occurs at batter angle approximately equal to 20°, and it is about 21–31% more than the vertical pile capacity, while the pullout capacity for batter pile that constructed in loose sand decreases with the increase of pile inclination. The results also indicated that the circular pile is more resistant to pullout forces than the square and rectangular pile shape. The rough model piles tested is experienced 18–75% increase in capacity compared with the smooth model piles. The suggested relations for the pullout capacity of batter pile regarding the vertical pile capacity are well predicted.

  11. Using Social Modeling to Inform Community College Student Behavior: A Case Study Examining Embedded Interventions in a Basic Skills Math Class

    Science.gov (United States)

    Esposito-Noy, Celia

    2013-01-01

    The purpose of this study was to examine the experiences of students enrolled in a basic skills math class at a California community college and the role of the peer model in informing their college-going behaviors. There is significant interest in increasing the number of students who complete basic skills courses and make progress towards a…

  12. Embedded-monolith armor

    Science.gov (United States)

    McElfresh, Michael W.; Groves, Scott E; Moffet, Mitchell L.; Martin, Louis P.

    2016-07-19

    A lightweight armor system utilizing a face section having a multiplicity of monoliths embedded in a matrix supported on low density foam. The face section is supported with a strong stiff backing plate. The backing plate is mounted on a spall plate.

  13. Isometric embeddings of polyhedra

    Science.gov (United States)

    Minemyer, Barry

    An indefinite metric polyhedron is a triple (X, T, g) where X is a topological space, T is a simplicial triangulation of X with edge set E, and g is a function from E to the reals. g assigns to each k-dimensional simplex S a unique quadratic form on Rk, denoted by G(S). An indefinite metric polyhedron is called a Euclidean polyhedron if the form G(S) is positive definite for every simplex S. Rpq denotes R p + q endowed with the inner product of signature (p, q). Our first result is that every compact n-dimensional indefinite metric polyhedron with vertex set V admits a simplicial isometric embedding into Rqq where q = max{d, 2n + 1} and d = max{deg(v) | v is in V}. We can use the compact case to extend to the non-compact case, but only if we assume that d = max{deg(v) | v is in V} is less than infinity. Specifically, every (non-compact) indefinite metric polyhedron admits a simplicial isometric embedding into Rpp where p = 2q(d3 - d2 + d + 1) and q and d are defined as above. Finally we use results of Akopyan and Greene to prove that every n-dimensional indefinite metric polyhedron admits a piecewise linear isometric embedding into Rn2n. In Chapter 2 we prove that every short (1-Lipschitz) map from an n-dimensional Euclidean polyhedron into EN is epsilon close to a pl isometric embedding (for anyepsilon > 0) provided N ≥ 3n. We can relax the dimensionality of the Euclidean space to 2n + 1 if we allow our map to be continuous instead of pl. These results are extensions of a result due to Akopyan. We provide a detailed proof of Akopyan's Theorem, as the only currently available proof is in Russian. The remaining results in this work are applications of our continuous isometric embedding theorem above. This result is used to prove that every Pro-Euclidean space of rank at most n admits an isometric embedding into E2n + 1. The result, as well as a theorem due to Bridson, also allows for an approximate isometric embedding theorem for geodesic metric spaces with

  14. Evaluation of guardrail embedded lighting system in Trinidad, Colorado.

    Science.gov (United States)

    2014-02-01

    This report provides information on the design considerations of the embedded highway lighting : design on Interstate-25 in Trinidad, Colorado, in terms of visibility. The information is based on : visibility characterizations of small targets using ...

  15. From generative fit to generative capacity: exploring an emerging dimension of information systems design and task performance

    NARCIS (Netherlands)

    Avital, M.; Te'eni, D.

    2009-01-01

    Information systems (IS) research has been long concerned with improving task-related performance. The concept of fit is often used to explain how system design can improve performance and overall value. So far, the literature has focused mainly on performance evaluation criteria that are based on

  16. Discriminative graph embedding for label propagation.

    Science.gov (United States)

    Nguyen, Canh Hao; Mamitsuka, Hiroshi

    2011-09-01

    In many applications, the available information is encoded in graph structures. This is a common problem in biological networks, social networks, web communities and document citations. We investigate the problem of classifying nodes' labels on a similarity graph given only a graph structure on the nodes. Conventional machine learning methods usually require data to reside in some Euclidean spaces or to have a kernel representation. Applying these methods to nodes on graphs would require embedding the graphs into these spaces. By embedding and then learning the nodes on graphs, most methods are either flexible with different learning objectives or efficient enough for large scale applications. We propose a method to embed a graph into a feature space for a discriminative purpose. Our idea is to include label information into the embedding process, making the space representation tailored to the task. We design embedding objective functions that the following learning formulations become spectral transforms. We then reformulate these spectral transforms into multiple kernel learning problems. Our method, while being tailored to the discriminative tasks, is efficient and can scale to massive data sets. We show the need of discriminative embedding on some simulations. Applying to biological network problems, our method is shown to outperform baselines.

  17. The human resource information system: a rapid appraisal of Pakistan’s capacity to employ the tool

    Science.gov (United States)

    2013-01-01

    Background Human resources are an important building block of the health system. During the last decade, enormous investment has gone into the information systems to manage human resources, but due to the lack of a clear vision, policy, and strategy, the results of these efforts have not been very visible. No reliable information portal captures the actual state of human resources in Pakistan’s health sector. The World Health Organization (WHO) has provided technical support for the assessment of the existing system and development of a comprehensive Human Resource Information System (HRIS) in Pakistan. Methods The questions in the WHO-HRIS Assessment tool were distributed into five thematic groups. Purposively selected (n=65) representatives from the government, private sector, and development partners participated in this cross sectional study, based on their programmatic affiliations. Results Fifty-five percent of organizations and departments have an independent Human Resources (HR) section managed by an establishment branch and are fully equipped with functional computers. Forty-five organizations (70%) had HR rules, regulations and coordination mechanisms, yet these are not implemented. Data reporting is mainly in paper form, on prescribed forms (51%), registers (3%) or even plain papers (20%). Data analysis does not give inputs to the decision making process and dissemination of information is quite erratic. Most of the organizations had no feedback mechanism for cross checking the HR data, rendering it unreliable. Conclusion Pakistan is lacking appropriate HRIS management. The current HRIS indeed has a multitude of problems. In the wake of 2011 reforms within the health sector, provinces are even in a greater need for planning their respective health department services and must work on the deficiencies and inefficiencies of their HRIS so that the gaps and HR needs are better aligned for reaching the 2015 UN Millennium Development Goals (MDGs) targets

  18. Post-upgrade testing on a radiotherapy oncology information system with an embedded record and verify system following the IAEA Human Health Report No. 7 recommendations.

    Science.gov (United States)

    Nyathi, Thulani; Colyer, Christopher; Bhardwaj, Anup Kumar; Rijken, James; Morton, Jason

    2016-06-01

    Record and verify (R&V) systems have proven that their application in radiotherapy clinics leads to a significant reduction in mis-treatments of patients. The purpose of this technical note is to share our experience of acceptance testing, commissioning and setting up a quality assurance programme for the MOSAIQ® oncology information system and R&V system after upgrading from software version 2.41 to 2.6 in a multi-vendor, multi-site environment. Testing was guided primarily by the IAEA Human Report No. 7 recommendations, but complemented by other departmental workflow specific tests. To the best of our knowledge, this is the first time successful implementation of the IAEA Human Health Report Series No. 7 recommendations have been reported in the literature. Copyright © 2016 Associazione Italiana di Fisica Medica. Published by Elsevier Ltd. All rights reserved.

  19. Public and private maternal health service capacity and patient flows in southern Tanzania: using a geographic information system to link hospital and national census data

    Directory of Open Access Journals (Sweden)

    Patrik Tabatabai

    2014-01-01

    Full Text Available Background: Strategies to improve maternal health in low-income countries are increasingly embracing partnership approaches between public and private stakeholders in health. In Tanzania, such partnerships are a declared policy goal. However, implementation remains challenging as unfamiliarity between partners and insufficient recognition of private health providers prevail. This hinders cooperation and reflects the need to improve the evidence base of private sector contribution. Objective: To map and analyse the capacities of public and private hospitals to provide maternal health care in southern Tanzania and the population reached with these services. Design: A hospital questionnaire was applied in all 16 hospitals (public n=10; private faith-based n=6 in 12 districts of southern Tanzania. Areas of inquiry included selected maternal health service indicators (human resources, maternity/delivery beds, provider-fees for obstetric services and patient turnover (antenatal care, births. Spatial information was linked to the 2002 Population Census dataset and a geographic information system to map patient flows and socio-geographic characteristics of service recipients. Results: The contribution of faith-based organizations (FBOs to hospital maternal health services is substantial. FBO hospitals are primarily located in rural areas and their patient composition places a higher emphasis on rural populations. Also, maternal health service capacity was more favourable in FBO hospitals. We approximated that 19.9% of deliveries in the study area were performed in hospitals and that the proportion of c-sections was 2.7%. Mapping of patient flows demonstrated that women often travelled far to seek hospital care and where catchment areas of public and FBO hospitals overlap. Conclusions: We conclude that the important contribution of FBOs to maternal health services and capacity as well as their emphasis on serving rural populations makes them promising

  20. Public and private maternal health service capacity and patient flows in Southern Tanzania: using a geographic information system to link hospital and national census data.

    Science.gov (United States)

    Tabatabai, Patrik; Henke, Stefanie; Sušac, Katharina; Kisanga, Oberlin M E; Baumgarten, Inge; Kynast-Wolf, Gisela; Ramroth, Heribert; Marx, Michael

    2014-01-01

    Strategies to improve maternal health in low-income countries are increasingly embracing partnership approaches between public and private stakeholders in health. In Tanzania, such partnerships are a declared policy goal. However, implementation remains challenging as unfamiliarity between partners and insufficient recognition of private health providers prevail. This hinders cooperation and reflects the need to improve the evidence base of private sector contribution. To map and analyse the capacities of public and private hospitals to provide maternal health care in southern Tanzania and the population reached with these services. A hospital questionnaire was applied in all 16 hospitals (public n=10; private faith-based n=6) in 12 districts of southern Tanzania. Areas of inquiry included selected maternal health service indicators (human resources, maternity/delivery beds), provider-fees for obstetric services and patient turnover (antenatal care, births). Spatial information was linked to the 2002 Population Census dataset and a geographic information system to map patient flows and socio-geographic characteristics of service recipients. The contribution of faith-based organizations (FBOs) to hospital maternal health services is substantial. FBO hospitals are primarily located in rural areas and their patient composition places a higher emphasis on rural populations. Also, maternal health service capacity was more favourable in FBO hospitals. We approximated that 19.9% of deliveries in the study area were performed in hospitals and that the proportion of c-sections was 2.7%. Mapping of patient flows demonstrated that women often travelled far to seek hospital care and where catchment areas of public and FBO hospitals overlap. We conclude that the important contribution of FBOs to maternal health services and capacity as well as their emphasis on serving rural populations makes them promising partners in health programming. Inclusive partnerships could increase

  1. Co-emergence of multi-scale cortical activities of irregular firing, oscillations and avalanches achieves cost-efficient information capacity.

    Directory of Open Access Journals (Sweden)

    Dong-Ping Yang

    2017-02-01

    Full Text Available The brain is highly energy consuming, therefore is under strong selective pressure to achieve cost-efficiency in both cortical connectivities and activities. However, cost-efficiency as a design principle for cortical activities has been rarely studied. Especially it is not clear how cost-efficiency is related to ubiquitously observed multi-scale properties: irregular firing, oscillations and neuronal avalanches. Here we demonstrate that these prominent properties can be simultaneously observed in a generic, biologically plausible neural circuit model that captures excitation-inhibition balance and realistic dynamics of synaptic conductance. Their co-emergence achieves minimal energy cost as well as maximal energy efficiency on information capacity, when neuronal firing are coordinated and shaped by moderate synchrony to reduce otherwise redundant spikes, and the dynamical clusterings are maintained in the form of neuronal avalanches. Such cost-efficient neural dynamics can be employed as a foundation for further efficient information processing under energy constraint.

  2. Structuring Problem Analysis for Embedded Systems Modelling

    NARCIS (Netherlands)

    Marincic, J.; Mader, Angelika H.; Wieringa, Roelf J.; Lucas, Yan

    Our interest is embedded systems validation as part of the model-driven approach. To design a model, the modeller needs to obtain knowledge about the system and decide what is relevant to model and how. A part of the modelling activities is inherently informal - it cannot be formalised in such a way

  3. Is Embedded Librarianship Right for Your Institution?

    Science.gov (United States)

    Muir, Gordon; Heller-Ross, Holly

    2010-01-01

    Embedded librarians, connected with students and faculty inside the classroom, lab and studio, have new opportunities for preparing students for research and for collaborating with faculty on course-integrated information literacy, research assignment design, teaching, assignment interpretation, and timely student assistance. What makes embedded…

  4. Audio Steganography with Embedded Text

    Science.gov (United States)

    Teck Jian, Chua; Chai Wen, Chuah; Rahman, Nurul Hidayah Binti Ab.; Hamid, Isredza Rahmi Binti A.

    2017-08-01

    Audio steganography is about hiding the secret message into the audio. It is a technique uses to secure the transmission of secret information or hide their existence. It also may provide confidentiality to secret message if the message is encrypted. To date most of the steganography software such as Mp3Stego and DeepSound use block cipher such as Advanced Encryption Standard or Data Encryption Standard to encrypt the secret message. It is a good practice for security. However, the encrypted message may become too long to embed in audio and cause distortion of cover audio if the secret message is too long. Hence, there is a need to encrypt the message with stream cipher before embedding the message into the audio. This is because stream cipher provides bit by bit encryption meanwhile block cipher provide a fixed length of bits encryption which result a longer output compare to stream cipher. Hence, an audio steganography with embedding text with Rivest Cipher 4 encryption cipher is design, develop and test in this project.

  5. Robust Multivariable Estimation of the Relevant Information Coming from a Wheel Speed Sensor and an Accelerometer Embedded in a Car under Performance Tests

    Directory of Open Access Journals (Sweden)

    Wilmar Hernandez

    2005-11-01

    Full Text Available In the present paper, in order to estimate the response of both a wheel speedsensor and an accelerometer placed in a car under performance tests, robust and optimalmultivariable estimation techniques are used. In this case, the disturbances and noisescorrupting the relevant information coming from the sensors’ outputs are so dangerous thattheir negative influence on the electrical systems impoverish the general performance of thecar. In short, the solution to this problem is a safety related problem that deserves our fullattention. Therefore, in order to diminish the negative effects of the disturbances and noiseson the car’s electrical and electromechanical systems, an optimum observer is used. Theexperimental results show a satisfactory improvement in the signal-to-noise ratio of therelevant signals and demonstrate the importance of the fusion of several intelligent sensordesign techniques when designing the intelligent sensors that today’s cars need.

  6. Embedded librarianship what every academic librarian should know

    CERN Document Server

    Russo, Michael F

    2013-01-01

    Is the embedded librarian an equal partner in the course, or is the librarian perceived as a "value-added" extra? What is the place of technology in this effort? Is there a line librarians should not cross? Taking into account both theory and practice to discuss multiple facets of the subject, Embedded Librarianship: What Every Academic Librarian Should Know thoroughly examines these questions and more from the perspectives of experienced embedded librarian contributors who have worked in higher education settings. The chapters illuminate the benefits and challenges of embedding, explain the planning required to set up an embedded course, identify the different forms of embedding, and consider information literacy instruction in various contexts. Readers who will benefit from this work include not only academic librarians but any professor who wants their students to be able to do better research in their fields.

  7. Introduction to embedded system design using field programmable gate arrays

    CERN Document Server

    Dubey, Rahul

    2009-01-01

    Offers information on the use of field programmable gate arrays (FPGAs) in the design of embedded systems. This text considers a hypothetical robot controller as an embedded application and weaves around it related concepts of FPGA-based digital design. It is suitable for both students and designers who have worked with microprocessors.

  8. The development of entrepreneurial capacity and business activity of students of educational establishments using information and communication technologies

    Directory of Open Access Journals (Sweden)

    L. A. Danchenok

    2016-01-01

    Full Text Available The article is devoted to problems of organizational and methodical process modeling of the entrepreneurial potential and business activity of students of educational institutions through the use of Smart-technologies. It is noted that the successful implementation of enterprise and business projects are the basis of economic development of society, with the main factor for the development of entrepreneurship in the country in the long term is to develop the entrepreneurial mindset of young people. Entrepreneurial younger generation reserve created for the period of study, will provide the subsequent decades of business operation, incomenot only to the owner, but also the composition of personnel of the company and, in general, the country. The specifics of perception of the new generation of knowledge, learning and the formation of professional skills is that their effectiveness depends, sometimes completely determined by the degree of use of information and communication technologies, not only in the preparation and implementation of knowledge by the learners, but also in the work themselves teachers. Therefore, an effective and modern instrument for achieving the development goals of the business potential and business students to provide such forms of work with students, which would stimulate their interest in entrepreneurship through the active use of information technologies. The organizational and methodological training model and a set of measures aimed at developing the entrepreneurial potential and business activity of the young generation. To a large extent the elements of our model successfully implemented in REU them. GV Plekhanov at the Faculty of “Marketing Business School and Entrepreneurship”, to carry out training business technologies in relevant areas of knowledge for the information society and the modern state of the economy – business intelligence, innovation and creative business, crisis and risk management

  9. Embedded and real-time operating systems

    CERN Document Server

    Wang, K C

    2017-01-01

    This book covers the basic concepts and principles of operating systems, showing how to apply them to the design and implementation of complete operating systems for embedded and real-time systems. It includes all the foundational and background information on ARM architecture, ARM instructions and programming, toolchain for developing programs, virtual machines for software implementation and testing, program execution image, function call conventions, run-time stack usage and link C programs with assembly code. It describes the design and implementation of a complete OS for embedded systems in incremental steps, explaining the design principles and implementation techniques. For Symmetric Multiprocessing (SMP) embedded systems, the author examines the ARM MPcore processors, which include the SCU and GIC for interrupts routing and interprocessor communication and synchronization by Software Generated Interrupts (SGIs). Throughout the book, complete working sample systems demonstrate the design principles and...

  10. IDE Support of String-Embedded Languages

    Directory of Open Access Journals (Sweden)

    S. Grigorev

    2014-01-01

    Full Text Available Complex information systems are often implemented by using more than one programming language. Sometimes this variety takes a form of one host and one or few string-embedded languages. Textual representation of clauses in a string-embedded language is built at run time by a host program and then analyzed, compiled or interpreted by a dedicated runtime component (database, web browser etc. Most general-purpose programming languages may play the role of the host; one of the most evident examples of the string-embedded language is the dynamic SQL which was specified in ISO SQL standard and is supported by the majority of DBMS. Standard IDE functionality such as code completion or syntax highlighting can really helps the developers who use this technique. There are several tools providing this functionality, but they all process only one concrete string-embedded language and cannot be easily extended for supporting another language. We present a platform which allows to easily create tools for string-embedded language processing.

  11. Design of a Community Ownership and Preparedness Index: using data to inform the capacity development of community-based groups.

    Science.gov (United States)

    Thomas, Tom; Narayanan, Pradeep; Wheeler, Tisha; Kiran, Usha; Joseph, M J; Ramanathan, T V

    2012-10-01

    Community mobilisation is an important component of a participatory approach to health and development interventions. However, it is challenging to define, measure and assess community participation and ownership of a programme, especially at scale. An iterative cross-sectional survey was designed for implementation across a representative sample of community-based groups, using a weighted index that captured both qualitative and quantitative data in a standardised form. These data were aggregated at the level of individual groups, as well as state-wide or across the whole programme. Community participation in the survey is a primary feature of the methodology and was integral to the process of designing the index and administering the survey. The survey provided programme management and communities with objective tools for monitoring community mobilisation across a large-scale and complex intervention covering 32 districts in India. The implementation of the survey engaged communities in an open discussion of their goals and capabilities and helped them to challenge the power dynamics between themselves and other stakeholders. It is possible to translate the theoretical premises of participatory development into a tool that both measures and fosters meaningful participation. The active participation of community members in the collection and analysis of data on their mobilisation suggests that monitoring of participation can be undertaken to inform a scaled-up programme and can be a useful intervention in its own right.

  12. Embedded Academic Librarianship: A Review of the Literature

    Directory of Open Access Journals (Sweden)

    Stephanie J. Schulte

    2012-12-01

    Full Text Available Objectives – The purpose of this review is to examine the development of embedded librarianship, its multiple meanings, and activities in practice. The review will also report on published outcomes and future research needs of embedded librarian programs.Methods – A search of current literature was conducted and summarized searching PubMed, CINAHL, Library, Information Science & Technology Abstracts (EBSCO, Academic Search Complete, and ERIC (EBSCO through August 23, 2012. Articles wereselected for inclusion in the review if they reported research findings related to embedded librarianship, if they provided unique case reports about embedded librarian programs, or if they provided substantive editorial comments on the topic. Relevant study findings were assessed for quality and presented in tabular and narrative form.Results – Currently, there is disparity in how embedded librarianship is being definedand used in common practice, ranging from embedding an online component into asingle course to full physical and cultural integration into an academic college orbusiness unit of an organization. Activities of embedded librarians include creatingcourse integrated instruction modules for either face-to-face or online courses, providingin depth research assistance to students or faculty, and co-locating within colleges orcustomer units via office hours for a few hours to all hours per week. Several case reports exist in the recent literature. Few high quality research studies reporting outcomes of librarians or library programs labeled as embedded exist at this point. Some evidence suggests that embedded librarians are effective with regards to student learning of information literacy objectives. Surveys suggest that both students and faculty appreciate embedded librarian services.Conclusion – Most published accounts discuss librarians embedding content and ready access to services in an online course management system. A few notable cases

  13. Embedded software verification and debugging

    CERN Document Server

    Winterholer, Markus

    2017-01-01

    This book provides comprehensive coverage of verification and debugging techniques for embedded software, which is frequently used in safety critical applications (e.g., automotive), where failures are unacceptable. Since the verification of complex systems needs to encompass the verification of both hardware and embedded software modules, this book focuses on verification and debugging approaches for embedded software with hardware dependencies. Coverage includes the entire flow of design, verification and debugging of embedded software and all key approaches to debugging, dynamic, static, and hybrid verification. This book discusses the current, industrial embedded software verification flow, as well as emerging trends with focus on formal and hybrid verification and debugging approaches. Includes in a single source the entire flow of design, verification and debugging of embedded software; Addresses the main techniques that are currently being used in the industry for assuring the quality of embedded softw...

  14. Embedded microcontroller interfacing

    CERN Document Server

    Gupta, Gourab Sen

    2010-01-01

    Mixed-Signal Embedded Microcontrollers are commonly used in integrating analog components needed to control non-digital electronic systems. They are used in automatically controlled devices and products, such as automobile engine control systems, wireless remote controllers, office machines, home appliances, power tools, and toys. Microcontrollers make it economical to digitally control even more devices and processes by reducing the size and cost, compared to a design that uses a separate microprocessor, memory, and input/output devices. In many undergraduate and post-graduate courses, teachi

  15. Embedment of Employee?

    DEFF Research Database (Denmark)

    Buhl, Henrik

    1998-01-01

    and an empirical case study. My starting point will be a case study of a Danish ABB company which will form the framework of my discussion and reflect my present experience. This analysis will emphasize the possibilities of making employee participation a permanent part of the company at all levels.......The purpose of the paper is to discuss the influence of different approaches and work life conditions on the conception of embedment of employee participation. The discussion is based on three connected approaches: a theoretical research, a research into participation in working life...

  16. Informing the scale-up of Kenya’s nursing workforce: a mixed methods study of factors affecting pre-service training capacity and production

    Science.gov (United States)

    2014-01-01

    Background Given the global nursing shortage and investments to scale-up the workforce, this study evaluated trends in annual student nurse enrolment, pre-service attrition between enrolment and registration, and factors that influence nurse production in Kenya. Methods This study used a mixed methods approach with data from the Regulatory Human Resources Information System (tracks initial student enrolment through registration) and the Kenya Health Workforce Information System (tracks deployment and demographic information on licensed nurses) for the quantitative analyses and qualitative data from key informant interviews with nurse training institution educators and/or administrators. Trends in annual student nurse enrolment from 1999 to 2010 were analyzed using regulatory and demographic data. To assess pre-service attrition between training enrolment and registration with the nursing council, data for a cohort that enrolled in training from 1999 to 2004 and completed training by 2010 was analyzed. Multivariate logistic regression was used to test for factors that significantly affected attrition. To assess the capacity of nurse training institutions for scale-up, qualitative data was obtained through key informant interviews. Results From 1999 to 2010, 23,350 students enrolled in nurse training in Kenya. While annual new student enrolment doubled between 1999 (1,493) and 2010 (3,030), training institutions reported challenges in their capacity to accommodate the increased numbers. Key factors identified by the nursing faculty included congestion at clinical placement sites, limited clinical mentorship by qualified nurses, challenges with faculty recruitment and retention, and inadequate student housing, transportation and classroom space. Pre-service attrition among the cohort that enrolled between 1999 and 2004 and completed training by 2010 was found to be low (6%). Conclusion To scale-up the nursing workforce in Kenya, concurrent investments in expanding the

  17. Learning optimal embedded cascades.

    Science.gov (United States)

    Saberian, Mohammad Javad; Vasconcelos, Nuno

    2012-10-01

    The problem of automatic and optimal design of embedded object detector cascades is considered. Two main challenges are identified: optimization of the cascade configuration and optimization of individual cascade stages, so as to achieve the best tradeoff between classification accuracy and speed, under a detection rate constraint. Two novel boosting algorithms are proposed to address these problems. The first, RCBoost, formulates boosting as a constrained optimization problem which is solved with a barrier penalty method. The constraint is the target detection rate, which is met at all iterations of the boosting process. This enables the design of embedded cascades of known configuration without extensive cross validation or heuristics. The second, ECBoost, searches over cascade configurations to achieve the optimal tradeoff between classification risk and speed. The two algorithms are combined into an overall boosting procedure, RCECBoost, which optimizes both the cascade configuration and its stages under a detection rate constraint, in a fully automated manner. Extensive experiments in face, car, pedestrian, and panda detection show that the resulting detectors achieve an accuracy versus speed tradeoff superior to those of previous methods.

  18. Geothermal Plant Capacity Factors

    Energy Technology Data Exchange (ETDEWEB)

    Greg Mines; Jay Nathwani; Christopher Richard; Hillary Hanson; Rachel Wood

    2015-01-01

    The capacity factors recently provided by the Energy Information Administration (EIA) indicated this plant performance metric had declined for geothermal power plants since 2008. Though capacity factor is a term commonly used by geothermal stakeholders to express the ability of a plant to produce power, it is a term frequently misunderstood and in some instances incorrectly used. In this paper we discuss how this capacity factor is defined and utilized by the EIA, including discussion on the information that the EIA requests from operations in their 923 and 860 forms that are submitted both monthly and annually by geothermal operators. A discussion is also provided regarding the entities utilizing the information in the EIA reports, and how those entities can misinterpret the data being supplied by the operators. The intent of the paper is to inform the facility operators as the importance of the accuracy of the data that they provide, and the implications of not providing the correct information.

  19. A high-capacity steganography scheme for JPEG2000 baseline system.

    Science.gov (United States)

    Zhang, Liang; Wang, Haili; Wu, Renbiao

    2009-08-01

    Hiding capacity is very important for efficient covert communications. For JPEG2000 compressed images, it is necessary to enlarge the hiding capacity because the available redundancy is very limited. In addition, the bitstream truncation makes it difficult to hide information. In this paper, a high-capacity steganography scheme is proposed for the JPEG2000 baseline system, which uses bit-plane encoding procedure twice to solve the problem due to bitstream truncation. Moreover, embedding points and their intensity are determined in a well defined quantitative manner via redundancy evaluation to increase hiding capacity. The redundancy is measured by bit, which is different from conventional methods which adjust the embedding intensity by multiplying a visual masking factor. High volumetric data is embedded into bit-planes as low as possible to keep message integrality, but at the cost of an extra bit-plane encoding procedure and slightly changed compression ratio. The proposed method can be easily integrated into the JPEG2000 image coder, and the produced stego-bitstream can be decoded normally. Simulation shows that the proposed method is feasible, effective, and secure.

  20. The Innovative Capacity of Institutional Entrepreneurs

    OpenAIRE

    Boxenbaum, Eva; Battilana, Julie

    2006-01-01

    The notion of institutional entrepreneur (DiMaggio, 1988) has given rise to a controversy in neo-institutional theory around the ability of actors to distance themselves from institutional pressures, envision alternative institutional patterns, and act strategically to change institutions in which they are embedded. This paper empirically examines the ability of embedded actors to envision alternative institutional patterns, that is, their innovative capacity. We analyze the role that an indi...

  1. Poincaré Embeddings for Learning Hierarchical Representations

    CERN Multimedia

    CERN. Geneva

    2018-01-01

    Abstracts: Representation learning has become an invaluable approach for learning from symbolic data such as text and graphs. However, while complex symbolic datasets often exhibit a latent hierarchical structure, state-of-the-art methods typically do not account for this property. In this talk, I will discuss a new approach for learning hierarchical representations of symbolic data by embedding them into hyperbolic space -- or more precisely into an n-dimensional Poincaré ball. Due to the underlying hyperbolic geometry, this allows us to learn parsimonious representations of symbolic data by simultaneously capturing hierarchy and similarity. We introduce an efficient algorithm to learn the embeddings based on Riemannian optimization and show experimentally that Poincaré embeddings outperform Euclidean embeddings significantly on data with latent hierarchies, both in terms of representation capacity and in terms of generalization ability.      &...

  2. Embedded Systems Design: Optimization Challenges

    DEFF Research Database (Denmark)

    Pop, Paul

    2005-01-01

    Summary form only given. Embedded systems are everywhere: from alarm clocks to PDAs, from mobile phones to cars, almost all the devices we use are controlled by embedded systems. Over 99% of the microprocessors produced today are used in embedded systems, and recently the number of embedded systems...... in use has become larger than the number of humans on the planet. The complexity of embedded systems is growing at a very high pace and the constraints in terms of functionality, performance, low energy consumption, reliability, cost and time-to-market are getting tighter. Therefore, the task...... of designing such systems is becoming increasingly important and difficult at the same time. New automated design optimization techniques are needed, which are able to: successfully manage the complexity of embedded systems, meet the constraints imposed by the application domain, shorten the time...

  3. High Information Capacity Quantum Imaging

    Science.gov (United States)

    2014-09-19

    distribution over [0, T ]. In fact, it is effective to treat the conditional distribution of Ti given Si as impulsive. It is shown in [10] that the rank ...signal and idler: |Ψ〉 = ∫ d2qs d 2qiẼ( qs + qi)W̃ ( qs − qi)↠qs â†qi |0〉. (23) Here, Ẽ is the momentum space pump profile, and W̃ is the phase-matching...function given by [134] W̃ ( qs − qi) = √ 2L π2k sinc ( | qs − qi|2L 4k ) (24) × exp ( −i | qs − qi| 2L 4k ) , where L is the thickness of the crystal

  4. Embedded Systems Design with FPGAs

    CERN Document Server

    Pnevmatikatos, Dionisios; Sklavos, Nicolas

    2013-01-01

    This book presents methodologies for modern applications of embedded systems design, using field programmable gate array (FPGA) devices.  Coverage includes state-of-the-art research from academia and industry on a wide range of topics, including advanced electronic design automation (EDA), novel system architectures, embedded processors, arithmetic, dynamic reconfiguration and applications. Describes a variety of methodologies for modern embedded systems design;  Implements methodologies presented on FPGAs; Covers a wide variety of applications for reconfigurable embedded systems, including Bioinformatics, Communications and networking, Application acceleration, Medical solutions, Experiments for high energy physics, Astronomy, Aerospace, Biologically inspired systems and Computational fluid dynamics (CFD).

  5. Advances in embedded computer vision

    CERN Document Server

    Kisacanin, Branislav

    2014-01-01

    This illuminating collection offers a fresh look at the very latest advances in the field of embedded computer vision. Emerging areas covered by this comprehensive text/reference include the embedded realization of 3D vision technologies for a variety of applications, such as stereo cameras on mobile devices. Recent trends towards the development of small unmanned aerial vehicles (UAVs) with embedded image and video processing algorithms are also examined. The authoritative insights range from historical perspectives to future developments, reviewing embedded implementation, tools, technolog

  6. Communicating embedded systems networks applications

    CERN Document Server

    Krief, Francine

    2013-01-01

    Embedded systems become more and more complex and require having some knowledge in various disciplines such as electronics, data processing, telecommunications and networks. Without detailing all the aspects related to the design of embedded systems, this book, which was written by specialists in electronics, data processing and telecommunications and networks, gives an interesting point of view of communication techniques and problems in embedded systems. This choice is easily justified by the fact that embedded systems are today massively communicating and that telecommunications and network

  7. Embedded sensor systems

    CERN Document Server

    Agrawal, Dharma Prakash

    2017-01-01

    This inspiring textbook provides an introduction to wireless technologies for sensors, explores potential use of sensors for numerous applications, and utilizes probability theory and mathematical methods as a means of embedding sensors in system design. It discusses the need for synchronization and underlying limitations, inter-relation between given coverage and connectivity to number of sensors needed, and the use of geometrical distance to determine location of the base station for data collection and explore use of anchor nodes for relative position determination of sensors. The book explores energy conservation, communication using TCP, the need for clustering and data aggregation, and residual energy determination and energy harvesting. It covers key topics of sensor communication like mobile base stations and relay nodes, delay-tolerant sensor networks, and remote sensing and possible applications. The book defines routing methods and do performance evaluation for random and regular sensor topology an...

  8. Weaving versus blending: a quantitative assessment of the information carrying capacities of two alternative methods for conveying multivariate data with color.

    Science.gov (United States)

    Hagh-Shenas, Haleh; Kim, Sunghee; Interrante, Victoria; Healey, Christopher

    2007-01-01

    In many applications, it is important to understand the individual values of, and relationships between, multiple related scalar variables defined across a common domain. Several approaches have been proposed for representing data in these situations. In this paper we focus on strategies for the visualization of multivariate data that rely on color mixing. In particular, through a series of controlled observer experiments, we seek to establish a fundamental understanding of the information-carrying capacities of two alternative methods for encoding multivariate information using color: color blending and color weaving. We begin with a baseline experiment in which we assess participants' abilities to accurately read numerical data encoded in six different basic color scales defined in the L*a*b* color space. We then assess participants' abilities to read combinations of 2, 3, 4 and 6 different data values represented in a common region of the domain, encoded using either color blending or color weaving. In color blending a single mixed color is formed via linear combination of the individual values in L*a*b* space, and in color weaving the original individual colors are displayed side-by-side in a high frequency texture that fills the region. A third experiment was conducted to clarify some of the trends regarding the color contrast and its effect on the magnitude of the error that was observed in the second experiment. The results indicate that when the component colors are represented side-by-side in a high frequency texture, most participants' abilities to infer the values of individual components are significantly improved, relative to when the colors are blended. Participants' performance was significantly better with color weaving particularly when more than 2 colors were used, and even when the individual colors subtended only 3 minutes of visual angle in the texture. However, the information-carrying capacity of the color weaving approach has its limits. We

  9. Using information communication technologies to increase the institutional capacity of local health organisations in Africa: a case study of the Kenya Civil Society Portal for Health.

    Science.gov (United States)

    Juma, Charles; Sundsmo, Aaron; Maket, Boniface; Powell, Richard; Aluoch, Gilbert

    2015-01-01

    Achieving the healthcare components of the United Nations' Millennium Development Goals is significantly premised on effective service delivery by civil society organisations (CSOs). However, many CSOs across Africalack the necessary capacity to perform this role robustly. This paper reports on an evaluation of the use, and perceived impact, of aknowledge management tool upon institutional strengthening among CSOs working in Kenya's health sector. Three methods were used: analytics data; user satisfaction surveys; and a furtherkey informant survey. Satisfaction with the portal was consistently high, with 99% finding the quality and relevance of the content very good or good for institutional strengthening standards, governance, and planning and resource mobilisation. Critical facilitators to the success of knowledge management for CSO institutional strengthening were identified as people/culture (developed resources and organisational narratives) and technology (easily accessible, enabling information exchange, tools/resources available, access to consultants/partners). Critical barriers were identified as people/culture (database limitations, materials limitations, and lack of active users), and process (limited access, limited interactions, and limited approval process). This pilot study demonstrated the perceived utility of a web-based knowledge management portal among developing nations' CSOs, with widespread satisfaction across multiple domains, which increased over time. Providing increased opportunities for collective mutual learning, promoting a culture of data use for decision making, and encouraging all health organisations to be learning institutions should be a priority for those interested in promoting sustainable long-term solutions for Africa.

  10. Intelligence for embedded systems a methodological approach

    CERN Document Server

    Alippi, Cesare

    2014-01-01

    Addressing current issues of which any engineer or computer scientist should be aware, this monograph is a response to the need to adopt a new computational paradigm as the methodological basis for designing pervasive embedded systems with sensor capabilities. The requirements of this paradigm are to control complexity, to limit cost and energy consumption, and to provide adaptation and cognition abilities allowing the embedded system to interact proactively with the real world. The quest for such intelligence requires the formalization of a new generation of intelligent systems able to exploit advances in digital architectures and in sensing technologies. The book sheds light on the theory behind intelligence for embedded systems with specific focus on: ·        robustness (the robustness of a computational flow and its evaluation); ·        intelligence (how to mimic the adaptation and cognition abilities of the human brain), ·        the capacity to learn in non-stationary and evolv...

  11. Embedding potentials for excited states of embedded species

    International Nuclear Information System (INIS)

    Wesolowski, Tomasz A.

    2014-01-01

    Frozen-Density-Embedding Theory (FDET) is a formalism to obtain the upper bound of the ground-state energy of the total system and the corresponding embedded wavefunction by means of Euler-Lagrange equations [T. A. Wesolowski, Phys. Rev. A 77(1), 012504 (2008)]. FDET provides the expression for the embedding potential as a functional of the electron density of the embedded species, electron density of the environment, and the field generated by other charges in the environment. Under certain conditions, FDET leads to the exact ground-state energy and density of the whole system. Following Perdew-Levy theorem on stationary states of the ground-state energy functional, the other-than-ground-state stationary states of the FDET energy functional correspond to excited states. In the present work, we analyze such use of other-than-ground-state embedded wavefunctions obtained in practical calculations, i.e., when the FDET embedding potential is approximated. Three computational approaches based on FDET, that assure self-consistent excitation energy and embedded wavefunction dealing with the issue of orthogonality of embedded wavefunctions for different states in a different manner, are proposed and discussed

  12. Embedded Librarians: Just-in-Time or Just-in-Case? A Research Study

    Science.gov (United States)

    Heathcock, Kristin

    2015-01-01

    Embedded librarians in online courses provide a wealth of service and information to students. Though students indicate that these services are valuable, the librarians providing embedded services frequently note that these projects are very time consuming. This study examines the provision of a less time-intensive model of embedded librarianship…

  13. Building capacity for information and communication technology use in global health research and training in China: a qualitative study among Chinese health sciences faculty members.

    Science.gov (United States)

    Wang, Jie; Abdullah, Abu S; Ma, Zhenyu; Fu, Hua; Huang, Kaiyong; Yu, Hongping; Wang, Jiaji; Cai, Le; He, Huimin; Xiao, Jian; Quintiliani, Lisa; Friedman, Robert H; Yang, Li

    2017-06-28

    The demand to use information and communications technology (ICT) in education and research has grown fast among researchers and educators working in global health. However, access to ICT resources and the capacity to use them in global health research remains limited among developing country faculty members. In order to address the global health needs and to design an ICT-related training course, we herein explored the Chinese health science faculty members' perceptions and learning needs for ICT use. Nine focus groups discussions (FGDs) were conducted during December 2015 to March 2016, involving 63 faculty members working in areas of health sciences from six universities in China. All FGDs were audio recorded and analysed thematically. The findings suggest that the understandings of ICT were not clear among many researchers; some thought that the concept of ICT was too wide and ambiguous. Most participants were able to cite examples of ICT application in their research and teaching activities. Positive attitudes and high needs of ICT use and training were common among most participants. Recommendations for ICT training included customised training programmes focusing on a specific specialty, maintaining a balance between theories and practical applications, more emphasis on the application of ICT, and skills in finding the required information from the bulk information available in the internet. Suggestions regarding the format and offering of training included short training programmes, flexible timing, lectures with practicum opportunities, and free of charge or with very minimal cost to the participants. Two participants suggested the linking of ICT-related training courses with faculty members' year-end assessment and promotion. This study among health sciences faculty members in China demonstrated a high level of need and interest in learning about ICT use in research and training. The results have important implications for the design and implementation of

  14. Leadership capacity in two Brazilian regional tourism organisations

    DEFF Research Database (Denmark)

    Valente, Flavio Jose; Dredge, Dianne; Lohmann, Gui

    2014-01-01

    Purpose – This paper examines the leadership practices of two Brazilian regional tourism organisations (RTOs) using an exploratory case study. Design/methodology/approach – The research adopts an embedded case study approach, permitting the comparison of the leadership phenomenon in the ‘‘Instituto...... Estrada Real’’ (the IER) and the ‘‘Associac¸a˜o Circuito do Ouro’’ (the ACO). Semi-structured interviews (n=14) were undertaken to gather information from the RTOs’ executives and actors/followers influenced directly by RTO leadership in order to obtain their perceptions about leadership practice....... Findings – Four leadership themes emerged: capacity to produce results, capacity to mobilise followers, articulation and communication of goals and actions, and articulation of roles and responsibilities. The findings are discussed in regards to the hierarchical and market governance structures of the two...

  15. Nullspace embeddings for outerplanar graphs

    NARCIS (Netherlands)

    L. Lovász (László); A. Schrijver (Alexander)

    2017-01-01

    textabstractWe study relations between geometric embeddings of graphs and the spectrum of associated matrices, focusing on outerplanar embeddings of graphs. For a simple connected graph G=(V,E), we define a "good" G-matrix as a V×V matrix with negative entries corresponding to adjacent nodes, zero

  16. Nullspace embeddings for outerplanar graphs

    NARCIS (Netherlands)

    L. Lovász (László); A. Schrijver (Alexander); M. Loebl (Martin); J. Nešetřil (Jaroslav); R. Thomas (Robin)

    2017-01-01

    htmlabstractWe study relations between geometric embeddings of graphs and the spectrum of associated matrices, focusing on outerplanar embeddings of graphs. For a simple connected graph G = (V, E), we define a "good” G-matrix as a V × V matrix with negative

  17. Nullspace embeddings for outerplanar graphs

    NARCIS (Netherlands)

    Lovász, L.; Schrijver, A.; Loebl, M.; Nešetřil, J.; Thomas, R.

    2017-01-01

    We study relations between geometric embeddings of graphs and the spectrum of associated matrices, focusing on outerplanar embeddings of graphs. For a simple connected graph G = (V, E), we define a “good” G-matrix as a V × V matrix with negative entries corresponding to adjacent nodes, zero entries

  18. Stylistic Embedding in Yoruba Literature.

    Science.gov (United States)

    Olabode, Afolabi

    The process of embedding, a term used in generative grammar to refer to a construction in which a sentence is included within another sentence, is examined as it occurs in Yoruba literature. Examples are drawn from Yoruba praise poetry, in both written and oral form and within Yoruba novels. Forms of embedding identified include those to draw…

  19. Carrying Capacity

    DEFF Research Database (Denmark)

    Schroll, Henning; Andersen, Jan; Kjærgård, Bente

    2012-01-01

    A spatial planning act was introduced inIndonesia 1992 and renewed in 2008. It emphasised the planning role of decentralised authorities. The spatial planning act covers both spatial and environmental issues. It defines the concept of carrying capacity and includes definitions of supportive....../cities. Four different sectors (water, food production, waste, and forests) were selected as core areas for decentralised spatial planning. Indicators for SCC and ACC were identified and assessed with regard to relevance and quantifiability. For each of the indicators selected, a legal threshold or guiding...... was introduced inIndonesia 1992 and renewed in 2008. It emphasised the planning role of decentralised authorities. The spatial planning act covers both spatial and environmental issues. It defines the concept of carrying capacity and includes definitions of supportive carrying capacity (SCC) and assimilative...

  20. Embedded human computer interaction.

    Science.gov (United States)

    Baber, Christopher; Baumann, Konrad

    2002-05-01

    In this paper, human interaction with embedded or ubiquitous technology is considered. The techniques focus on the use of what might be termed "everyday" objects and actions as a means of controlling (or otherwise interacting with) technology. While this paper is not intended to be an exhaustive review, it does present a view of the immediate future of human-computer interaction (HCI) in which users move beyond the desktop to where interacting with technology becomes merged with other activity. At one level this places HCI in the context of other forms of personal and domestic technologies. At another level, this raises questions as to how people will interact with technologies of the future. Until now, HCI had often relied on people learning obscure command sets or learning to recognise words and objects on their computer screen. The most significant advance in HCI (the invention of the WIMP interface) is already some 40 years old. Thus, the future of HCI might be one in which people are encouraged (or at least allowed) to employ the skills that they have developed during their lives in order to interact with technology, rather than being forced to learn and perfect new skills.

  1. Evaluation of depth of field in SEM images in terms of the information-passing capacity (IPC) and contrast gradient in SEM image

    International Nuclear Information System (INIS)

    Sato, Mitsugu; Ishitani, Tohru; Watanabe, Shunya; Nakagawa, Mine

    2004-01-01

    The depth of field (DoF) in scanning electron microscope (SEM) images has been determined by estimating the change of image sharpness or resolution near the exact focus position. The image sharpness or resolution along the optical axis is determined by calculating the information-passing capacity (IPC) of an optical system taking into account the effect of pixel size of the image. The change of image sharpness near the exact focus position is determined by measuring the slope gradient of the line profile in SEM images obtained at various focal positions of beam. The change of image sharpness along the optical axis determined by the IPC agrees well with those determined by the slope gradient of line profiles in SEM images when a Gaussian distribution having radius 0.86L p (L p : pixel size in image) at which the intensity has fallen to 1/e of the maximum is applied to the IPC calculation for each pixel intensity. The change of image sharpness near the exact focus position has also been compared with those determined by the CG (Contrast-to-Gradient) method. The CG method slightly underestimates the change of image sharpness compared with those determined by the IPC method

  2. Station Capacity

    DEFF Research Database (Denmark)

    Landex, Alex

    2011-01-01

    the probability of conflicts and the minimum headway times into account. The last method analyzes how optimal platform tracks are used by examining the arrival and departure pattern of the trains. The developed methods can either be used separately to analyze specific characteristics of the capacity of a station...

  3. OLP embedment design method research for AP1000 nuclear plant

    International Nuclear Information System (INIS)

    Li Cheng; Li Shaoping; Liu Jianwei

    2013-01-01

    Background: One of the most advanced nuclear power technology, the first AP1000 reactor is under construction in China. Modularization is one of the main characteristics for AP1000 nuclear plant building. Module wall with steel face plate is used instead of reinforced concrete structure wall. A number of OLP embedments need to be installed into the module wall to connect other structures such as pipes, equipment, operation platforms and any other component attached to the module wall. Therefore, the design of embedment is very important in AP1000 structural design. Purpose: A finite element analysis method and tool for embedment design is needed for convenience. Methods: This paper applies the self-developed GTStrudl command template and VBA macro program for embedment capacity calculation and evaluation based on Microsoft Excel to the embedment design. Results: A Microsoft Excel template for embedment design is developed. Conclusions: The analysis method and template brings reasonable results and may provide some help and use for reference for the engineering practice. (authors)

  4. Wavelet techniques for reversible data embedding into images

    NARCIS (Netherlands)

    L. Kamstra; H.J.A.M. Heijmans (Henk)

    2004-01-01

    textabstractThe proliferation of digital information in our society has enticed a lot of research into data embedding techniques that add information to digital content like images, audio and video. This additional information can be used for various purposes and different applications place

  5. Embedded systems circuits and programming

    CERN Document Server

    Sanchez, Julio

    2012-01-01

    During the development of an engineered product, developers often need to create an embedded system--a prototype--that demonstrates the operation/function of the device and proves its viability. Offering practical tools for the development and prototyping phases, Embedded Systems Circuits and Programming provides a tutorial on microcontroller programming and the basics of embedded design. The book focuses on several development tools and resources: Standard and off-the-shelf components, such as input/output devices, integrated circuits, motors, and programmable microcontrollers The implementat

  6. Tensor Train Neighborhood Preserving Embedding

    Science.gov (United States)

    Wang, Wenqi; Aggarwal, Vaneet; Aeron, Shuchin

    2018-05-01

    In this paper, we propose a Tensor Train Neighborhood Preserving Embedding (TTNPE) to embed multi-dimensional tensor data into low dimensional tensor subspace. Novel approaches to solve the optimization problem in TTNPE are proposed. For this embedding, we evaluate novel trade-off gain among classification, computation, and dimensionality reduction (storage) for supervised learning. It is shown that compared to the state-of-the-arts tensor embedding methods, TTNPE achieves superior trade-off in classification, computation, and dimensionality reduction in MNIST handwritten digits and Weizmann face datasets.

  7. Embedded Systems Design: Optimization Challenges

    DEFF Research Database (Denmark)

    Pop, Paul

    2005-01-01

    -to-market, and reduce development and manufacturing costs. In this paper, the author introduces several embedded systems design problems, and shows how they can be formulated as optimization problems. Solving such challenging design optimization problems are the key to the success of the embedded systems design...... of designing such systems is becoming increasingly important and difficult at the same time. New automated design optimization techniques are needed, which are able to: successfully manage the complexity of embedded systems, meet the constraints imposed by the application domain, shorten the time...

  8. Covariance tracking: architecture optimizations for embedded systems

    Science.gov (United States)

    Romero, Andrés; Lacassagne, Lionel; Gouiffès, Michèle; Zahraee, Ali Hassan

    2014-12-01

    Covariance matching techniques have recently grown in interest due to their good performances for object retrieval, detection, and tracking. By mixing color and texture information in a compact representation, it can be applied to various kinds of objects (textured or not, rigid or not). Unfortunately, the original version requires heavy computations and is difficult to execute in real time on embedded systems. This article presents a review on different versions of the algorithm and its various applications; our aim is to describe the most crucial challenges and particularities that appeared when implementing and optimizing the covariance matching algorithm on a variety of desktop processors and on low-power processors suitable for embedded systems. An application of texture classification is used to compare different versions of the region descriptor. Then a comprehensive study is made to reach a higher level of performance on multi-core CPU architectures by comparing different ways to structure the information, using single instruction, multiple data (SIMD) instructions and advanced loop transformations. The execution time is reduced significantly on two dual-core CPU architectures for embedded computing: ARM Cortex-A9 and Cortex-A15 and Intel Penryn-M U9300 and Haswell-M 4650U. According to our experiments on covariance tracking, it is possible to reach a speedup greater than ×2 on both ARM and Intel architectures, when compared to the original algorithm, leading to real-time execution.

  9. IMPROVEMENTS IN EPOXY RESIN EMBEDDING METHODS

    Science.gov (United States)

    Luft, John H.

    1961-01-01

    Epoxy embedding methods of Glauert and Kushida have been modified so as to yield rapid, reproducible, and convenient embedding methods for electron microscopy. The sections are robust and tissue damage is less than with methacrylate embedding. PMID:13764136

  10. Exerting Capacity.

    Science.gov (United States)

    Leger, J Michael; Phillips, Carolyn A

    2017-05-01

    Patient safety has been at the forefront of nursing research since the release of the Institute of Medicine's report estimating the number of preventable adverse events in hospital settings; yet no research to date has incorporated the perspectives of bedside nurses using classical grounded theory (CGT) methodology. This CGT study explored the perceptions of bedside registered nurses regarding patient safety in adult acute care hospitals. Data analysis used three techniques unique to CGT-the constant comparative method, coding, and memoing-to explore the values, realities, and beliefs of bedside nurses about patient safety. The analysis resulted in a substantive theory, Exerting Capacity, which explained how bedside nurses balance the demands of keeping their patients safe. Exerting Capacity has implications for health care organization leaders, nursing leaders, and bedside nurses; it also has indications for future research into the concept of patient safety.

  11. Embedded System for Biometric Identification

    OpenAIRE

    Rosli, Ahmad Nasir Che

    2010-01-01

    This chapter describes the design and implementation of an Embedded System for Biometric Identification from hardware and software perspectives. The first part of the chapter describes the idea of biometric identification. This includes the definition of

  12. Bandwidth Extension of Telephone Speech Aided by Data Embedding

    Directory of Open Access Journals (Sweden)

    David Malah

    2007-01-01

    Full Text Available A system for bandwidth extension of telephone speech, aided by data embedding, is presented. The proposed system uses the transmitted analog narrowband speech signal as a carrier of the side information needed to carry out the bandwidth extension. The upper band of the wideband speech is reconstructed at the receiving end from two components: a synthetic wideband excitation signal, generated from the narrowband telephone speech and a wideband spectral envelope, parametrically represented and transmitted as embedded data in the telephone speech. We propose a novel data embedding scheme, in which the scalar Costa scheme is combined with an auditory masking model allowing high rate transparent embedding, while maintaining a low bit error rate. The signal is transformed to the frequency domain via the discrete Hartley transform (DHT and is partitioned into subbands. Data is embedded in an adaptively chosen subset of subbands by modifying the DHT coefficients. In our simulations, high quality wideband speech was obtained from speech transmitted over a telephone line (characterized by spectral magnitude distortion, dispersion, and noise, in which side information data is transparently embedded at the rate of 600 information bits/second and with a bit error rate of approximately 3⋅10−4. In a listening test, the reconstructed wideband speech was preferred (at different degrees over conventional telephone speech in 92.5% of the test utterances.

  13. Bandwidth Extension of Telephone Speech Aided by Data Embedding

    Directory of Open Access Journals (Sweden)

    Sagi Ariel

    2007-01-01

    Full Text Available A system for bandwidth extension of telephone speech, aided by data embedding, is presented. The proposed system uses the transmitted analog narrowband speech signal as a carrier of the side information needed to carry out the bandwidth extension. The upper band of the wideband speech is reconstructed at the receiving end from two components: a synthetic wideband excitation signal, generated from the narrowband telephone speech and a wideband spectral envelope, parametrically represented and transmitted as embedded data in the telephone speech. We propose a novel data embedding scheme, in which the scalar Costa scheme is combined with an auditory masking model allowing high rate transparent embedding, while maintaining a low bit error rate. The signal is transformed to the frequency domain via the discrete Hartley transform (DHT and is partitioned into subbands. Data is embedded in an adaptively chosen subset of subbands by modifying the DHT coefficients. In our simulations, high quality wideband speech was obtained from speech transmitted over a telephone line (characterized by spectral magnitude distortion, dispersion, and noise, in which side information data is transparently embedded at the rate of 600 information bits/second and with a bit error rate of approximately . In a listening test, the reconstructed wideband speech was preferred (at different degrees over conventional telephone speech in of the test utterances.

  14. Hardware Support for Embedded Java

    DEFF Research Database (Denmark)

    Schoeberl, Martin

    2012-01-01

    The general Java runtime environment is resource hungry and unfriendly for real-time systems. To reduce the resource consumption of Java in embedded systems, direct hardware support of the language is a valuable option. Furthermore, an implementation of the Java virtual machine in hardware enables...... worst-case execution time analysis of Java programs. This chapter gives an overview of current approaches to hardware support for embedded and real-time Java....

  15. Molecular Properties through Polarizable Embedding

    DEFF Research Database (Denmark)

    Olsen, Jógvan Magnus Haugaard; Kongsted, Jacob

    2011-01-01

    We review the theory related to the calculation of electric and magnetic molecular properties through polarizable embedding. In particular, we derive the expressions for the response functions up to the level of cubic response within the density functional theory-based polarizable embedding (PE......-DFT) formalism. In addition, we discuss some illustrative applications related to the calculation of nuclear magnetic resonance parameters, nonlinear optical properties, and electronic excited states in solution....

  16. A Foundation for Embedded Languages

    DEFF Research Database (Denmark)

    Rhiger, Morten

    2003-01-01

    Recent work on embedding object languages into Haskell use "phantom types" (i.e., parameterized types whose parameter does not occur on the right-hand side of the type definition) to ensure that the embedded object-language terms are simply typed. But is it a safe assumption that only simply...... be answered affirmatively for an idealized Haskell-like language and discuss to which extent Haskell can be used as a meta-language....

  17. Unsupervised Document Embedding With CNNs

    OpenAIRE

    Liu, Chundi; Zhao, Shunan; Volkovs, Maksims

    2017-01-01

    We propose a new model for unsupervised document embedding. Leading existing approaches either require complex inference or use recurrent neural networks (RNN) that are difficult to parallelize. We take a different route and develop a convolutional neural network (CNN) embedding model. Our CNN architecture is fully parallelizable resulting in over 10x speedup in inference time over RNN models. Parallelizable architecture enables to train deeper models where each successive layer has increasin...

  18. Algorithmic complexity of quantum capacity

    Science.gov (United States)

    Oskouei, Samad Khabbazi; Mancini, Stefano

    2018-04-01

    We analyze the notion of quantum capacity from the perspective of algorithmic (descriptive) complexity. To this end, we resort to the concept of semi-computability in order to describe quantum states and quantum channel maps. We introduce algorithmic entropies (like algorithmic quantum coherent information) and derive relevant properties for them. Then we show that quantum capacity based on semi-computable concept equals the entropy rate of algorithmic coherent information, which in turn equals the standard quantum capacity. Thanks to this, we finally prove that the quantum capacity, for a given semi-computable channel, is limit computable.

  19. Capacity Building

    International Nuclear Information System (INIS)

    Molloy, Brian; Mallick, Shahid

    2014-01-01

    Outcomes & Recommendations: • Significant increase needed in the nuclear workforce both to replace soon-to-retire current generation and to staff large numbers of new units planned • Key message, was the importance of an integrated approach to workforce development. • IAEA and other International Organisations were asked to continue to work on Knowledge Management, Networks and E&T activities • IAEA requested to conduct Global Survey of HR needs – survey initiated but only 50% of operating countries (30% of capacity) took part, so results inconclusive

  20. Competence building capacity shortage

    International Nuclear Information System (INIS)

    Doorman, Gerard; Wangensteen, Ivar; Bakken, Bjoern

    2005-02-01

    1990 and if the availability of Danish import and hydropower is normal. Finally, an analysis was done of Capacity Subscription, a model where consumers pay for the capacity they use during system peak load. It was shown how this model can be embedded in the Nordic market solution. However, given the present situation which is not seen as critical, a prospective introduction of this model would lie some years into the future. Further research with respect to technological solutions and market communication should be undertaken to learn more about these central issues for this model. (author)

  1. Capacity and Capacity Utilization in Fishing Industries

    OpenAIRE

    Kirkley, James E; Squires, Dale

    1999-01-01

    Excess capacity of fishing fleets is one of the most pressing problems facing the world's fisheries and the sustainable harvesting of resource stocks. Considerable confusion persists over the definition and measurement of capacity and capacity utilization in fishing. Fishing capacity and capacity utilization, rather than capital (or effort) utilization, provide the appropriate framework. This paper provides both technological-economic and economic definitions of capacity and excess capacity i...

  2. Embedded Linux projects using Yocto project cookbook

    CERN Document Server

    González, Alex

    2015-01-01

    If you are an embedded developer learning about embedded Linux with some experience with the Yocto project, this book is the ideal way to become proficient and broaden your knowledge with examples that are immediately applicable to your embedded developments. Experienced embedded Yocto developers will find new insight into working methodologies and ARM specific development competence.

  3. Do aging and dual-tasking impair the capacity to store and retrieve visuospatial information needed to guide perturbation-evoked reach-to-grasp reactions?

    Directory of Open Access Journals (Sweden)

    Kenneth C Cheng

    Full Text Available A recent study involving young adults showed that rapid perturbation-evoked reach-to-grasp balance-recovery reactions can be guided successfully with visuospatial-information (VSI retained in memory despite: 1 a reduction in endpoint accuracy due to recall-delay (time between visual occlusion and perturbation-onset, PO and 2 slowing of the reaction when performing a concurrent cognitive task during the recall-delay interval. The present study aimed to determine whether this capacity is compromised by effects of aging. Ten healthy older adults were tested with the previous protocol and compared with the previously-tested young adults. Reactions to recover balance by grasping a small handhold were evoked by unpredictable antero-posterior platform-translation (barriers deterred stepping reactions, while using liquid-crystal goggles to occlude vision post-PO and for varying recall-delay times (0-10 s prior to PO (the handhold was moved unpredictably to one of four locations 2 s prior to vision-occlusion. Subjects also performed a spatial- or non-spatial-memory cognitive task during the delay-time in a subset of trials. Results showed that older adults had slower reactions than the young across all experimental conditions. Both age groups showed similar reduction in medio-lateral end-point accuracy when recall-delay was longest (10 s, but differed in the effect of recall delay on vertical hand elevation. For both age groups, engaging in either the non-spatial or spatial-memory task had similar (slowing effects on the arm reactions; however, the older adults also showed a dual-task interference effect (poorer cognitive-task performance that was specific to the spatial-memory task. This provides new evidence that spatial working memory plays a role in the control of perturbation-evoked balance-recovery reactions. The delays in completing the reaction that occurred when performing either cognitive task suggest that such dual-task situations in daily

  4. Trusted computing for embedded systems

    CERN Document Server

    Soudris, Dimitrios; Anagnostopoulos, Iraklis

    2015-01-01

    This book describes the state-of-the-art in trusted computing for embedded systems. It shows how a variety of security and trusted computing problems are addressed currently and what solutions are expected to emerge in the coming years. The discussion focuses on attacks aimed at hardware and software for embedded systems, and the authors describe specific solutions to create security features. Case studies are used to present new techniques designed as industrial security solutions. Coverage includes development of tamper resistant hardware and firmware mechanisms for lightweight embedded devices, as well as those serving as security anchors for embedded platforms required by applications such as smart power grids, smart networked and home appliances, environmental and infrastructure sensor networks, etc. ·         Enables readers to address a variety of security threats to embedded hardware and software; ·         Describes design of secure wireless sensor networks, to address secure authen...

  5. Embedding methods: application and development

    Science.gov (United States)

    Cheng, Jin; Libisch, Florian; Carter, Emily

    2013-03-01

    Correlated-wavefunction/density functional theory (CW/DFT) embedding methods aim to combine the formally exact correlation treatment in CW methods with the high efficiency of DFT. By partitioning a system into a cluster and its environment, each part can be treated independently. Different embedding schemes have been proposed. The density-based scheme searches for a global embedding potential mediating the interaction on the DFT level. The potential can then be used in CW calculations, e.g., to investigate hot-electron assisted H2 dissociation on Al and Au surfaces. Experimentally, optical excitations of plasmons efficiently create the required hot electrons. The embedded CW calculations validates that the hot electrons play a key role. However, this method neglects the back-action of the cluster on the environment. To solve this problem, a potential-based scheme has been proposed [J. Chem. Phys., 135, 194104 (2011)] that allows for a self-consistent combination of different ab-initio methods. Such an embedding potential thus goes beyond the DFT level. The heterogeneity involved poses various numerical challenges. We report on efforts to construct appropriate basis sets and pseudopotentials as well as to optimize the numerical procedure.

  6. Design Methodologies for Secure Embedded Systems

    CERN Document Server

    Biedermann, Alexander

    2011-01-01

    Embedded systems have been almost invisibly pervading our daily lives for several decades. They facilitate smooth operations in avionics, automotive electronics, or telecommunication. New problems arise by the increasing employment, interconnection, and communication of embedded systems in heterogeneous environments: How secure are these embedded systems against attacks or breakdowns? Therefore, how can embedded systems be designed to be more secure? And how can embedded systems autonomically react to threats? Facing these questions, Sorin A. Huss is significantly involved in the exploration o

  7. Embedded Processor Oriented Compiler Infrastructure

    Directory of Open Access Journals (Sweden)

    DJUKIC, M.

    2014-08-01

    Full Text Available In the recent years, research of special compiler techniques and algorithms for embedded processors broaden the knowledge of how to achieve better compiler performance in irregular processor architectures. However, industrial strength compilers, besides ability to generate efficient code, must also be robust, understandable, maintainable, and extensible. This raises the need for compiler infrastructure that provides means for convenient implementation of embedded processor oriented compiler techniques. Cirrus Logic Coyote 32 DSP is an example that shows how traditional compiler infrastructure is not able to cope with the problem. That is why the new compiler infrastructure was developed for this processor, based on research. in the field of embedded system software tools and experience in development of industrial strength compilers. The new infrastructure is described in this paper. Compiler generated code quality is compared with code generated by the previous compiler for the same processor architecture.

  8. Embedded digital oilfield model

    Science.gov (United States)

    Korovin, Iakov S.; Boldyreff, Anton S.

    2017-10-01

    In modern hard conditions for the whole worldwide oil production industry the problem of increasing volumes of produced oil has recently become vital. This problem concerns the existing oilfields cause due to low crude oil prices the possibilities to drill new ones has almost disappeared. In this paper, we describe a novel approach of oil production enhancement, based on online procedures of all oil field data processing. The essence is that we have developed a dynamic oilfield model that allows to simultaneously handle the information, stored in tNavigator, Schlumberger ECLIPSE 100/300 and other `popular' formats in parallel. The model is developed on the basis of convolutional neural networks. An example of successful industrial experiment is depicted.

  9. Certifiable Java for Embedded Systems

    DEFF Research Database (Denmark)

    Schoeberl, Martin; Dalsgaard, Andreas Engelbredt; Hansen, Rene Rydhof

    2014-01-01

    The Certifiable Java for Embedded Systems (CJ4ES) project aimed to develop a prototype development environment and platform for safety-critical software for embedded applications. There are three core constituents: A profile of the Java programming language that is tailored for safety......-critical applications, a predictable Java processor built with FPGA technology, and an Eclipse based application development environment that binds the profile and the platform together and provides analyses that help to provide evidence that can be used as part of a safety case. This paper summarizes key contributions...

  10. Morphware - Fremtidens Embedded System Platform

    DEFF Research Database (Denmark)

    Madsen, Jan

    2006-01-01

    FPGA'er bliver i stigende grad brugt som komponenter i embedded systemer. Faldende priser, større kapacitet og en større felksibilitet har gjort FPGA'en til en attraktiv og konkurrencedygtig teknologi der tillader en stadig stigende grad af system integration, hvor traditionel hardware og software...... kombineres og rekonfigureres. Muligheden for at rekonfigurere systemet, og specielt rekonfigurerer det medens det kører, giver nogle helt nye muligheder for at designe og programmere embedded systemer. Dette foredrag vil give et indblik i disse nye og fremtidige muligheder....

  11. Implementation of an embedded computer

    OpenAIRE

    Pikl, Bojan

    2011-01-01

    The goal of this thesis is to describe a production of an embedded computer. The thesis describes development and production of an embedded computer for the medical diode laser DL30 that is being developed in Robomed d.o.o.. The first part of the thesis describes the choice of hardware devices. I mostly describe the technologies that one can buy on the market. Moreover for every part of the computer installed and developed there is an argument why we selected that exact part. The second part ...

  12. Knowledge Engineering for Embedded Configuration

    DEFF Research Database (Denmark)

    Oddsson, Gudmundur Valur

    2008-01-01

    usability of the installation. In our case, we have rationalized that this should be done with embedded configuration, and the expected result is enhanced usability. The suggested method is deeply rooted in system theory. It draws on the emergent properties expected from the system, and tries to embed...... step can be said to be two-fold: first, to construct a system based on this philosophy and to show that it actually leads to the expected results. And second, to further develop the modelling tools and methods for supporting the making of embedded configuration systems, or in essence, a distributed...

  13. Homogeneous Spaces and Equivariant Embeddings

    CERN Document Server

    Timashev, DA

    2011-01-01

    Homogeneous spaces of linear algebraic groups lie at the crossroads of algebraic geometry, theory of algebraic groups, classical projective and enumerative geometry, harmonic analysis, and representation theory. By standard reasons of algebraic geometry, in order to solve various problems on a homogeneous space it is natural and helpful to compactify it keeping track of the group action, i.e. to consider equivariant completions or, more generally, open embeddings of a given homogeneous space. Such equivariant embeddings are the subject of this book. We focus on classification of equivariant em

  14. A Foundation for Embedded Languages

    DEFF Research Database (Denmark)

    Rhiger, Morten

    2002-01-01

    Recent work on embedding object languages into Haskell use "phantom types" (i.e., parameterized types whose parameter does not occur on the right-hand side of the type definition) to ensure that the embedded object-language terms are simply typed. But is it a safe assumption that only simply-typed...... terms can be represented in Haskell using phantom types? And conversely, can all simply-typed terms be represented in Haskell under the restrictions imposed by phantom types? In this article we investigate the conditions under which these assumptions are true: We show that these questions can...

  15. Research on embedded automobile collision avoidance system

    Directory of Open Access Journals (Sweden)

    TAO Feng

    2016-08-01

    Full Text Available Taking ARM embedded Linux operating system as the development platform,combined with AVR microcontroller,while optimizing the ranging algorithm and using air ultrasonic transducer,the measurement range of which can be up to 50 meter,this paper designs a high-precision,range far,low price,various models suitable automobile collision avoidance warning system.The system adopts Forlinx OK6410 development board for the master.AVR microcontroller is responsible for taking the data of traveling distance between vehicles,and with the ARM development board via RS232 communication transfers vehicle′s distance and speed information to the ARM development boards.The system uses the established collision avoidance model to get alarm information.Experiments show that the system can accurately send out alarm information within a certain range.It is innovative and practical.

  16. Spatially Embedded Inequality

    DEFF Research Database (Denmark)

    Holck, Lotte

    2016-01-01

    Purpose: – The purpose of this paper is to apply a spatial approach to organizational inequality to explore why unequal opportunity structures persist in an organization despite its commitment to diversity and employing highly skilled ethnic minority employees. Design/methodology/approach: – The ......Purpose: – The purpose of this paper is to apply a spatial approach to organizational inequality to explore why unequal opportunity structures persist in an organization despite its commitment to diversity and employing highly skilled ethnic minority employees. Design......’s distinction between structure and agency informs the analysis of how minority agency not only reproduces but also challenges organizational opportunity structures. Findings: – The analysis demonstrates how substructures of inequality stabilize in spatial routines enacted in an ethnic zoning of the workplace....../implications: – The reliance on a single case study restricts the generalizability of the findings but highlights fruitful areas for future research. Practical implications: – The study sensitizes HRM practitioners to the situated quality of workplace diversity and to develop a broader scope of HRM practices to address...

  17. Dimensionality reduction by supervised neighbor embedding using laplacian search.

    Science.gov (United States)

    Zheng, Jianwei; Zhang, Hangke; Cattani, Carlo; Wang, Wanliang

    2014-01-01

    Dimensionality reduction is an important issue for numerous applications including biomedical images analysis and living system analysis. Neighbor embedding, those representing the global and local structure as well as dealing with multiple manifolds, such as the elastic embedding techniques, can go beyond traditional dimensionality reduction methods and find better optima. Nevertheless, existing neighbor embedding algorithms can not be directly applied in classification as suffering from several problems: (1) high computational complexity, (2) nonparametric mappings, and (3) lack of class labels information. We propose a supervised neighbor embedding called discriminative elastic embedding (DEE) which integrates linear projection matrix and class labels into the final objective function. In addition, we present the Laplacian search direction for fast convergence. DEE is evaluated in three aspects: embedding visualization, training efficiency, and classification performance. Experimental results on several benchmark databases present that the proposed DEE exhibits a supervised dimensionality reduction approach which not only has strong pattern revealing capability, but also brings computational advantages over standard gradient based methods.

  18. Dimensionality Reduction by Supervised Neighbor Embedding Using Laplacian Search

    Directory of Open Access Journals (Sweden)

    Jianwei Zheng

    2014-01-01

    Full Text Available Dimensionality reduction is an important issue for numerous applications including biomedical images analysis and living system analysis. Neighbor embedding, those representing the global and local structure as well as dealing with multiple manifolds, such as the elastic embedding techniques, can go beyond traditional dimensionality reduction methods and find better optima. Nevertheless, existing neighbor embedding algorithms can not be directly applied in classification as suffering from several problems: (1 high computational complexity, (2 nonparametric mappings, and (3 lack of class labels information. We propose a supervised neighbor embedding called discriminative elastic embedding (DEE which integrates linear projection matrix and class labels into the final objective function. In addition, we present the Laplacian search direction for fast convergence. DEE is evaluated in three aspects: embedding visualization, training efficiency, and classification performance. Experimental results on several benchmark databases present that the proposed DEE exhibits a supervised dimensionality reduction approach which not only has strong pattern revealing capability, but also brings computational advantages over standard gradient based methods.

  19. NOISE SECURES SECRET DATA! BY ACT AS A REFERENCE FOR EMBEDDING

    Directory of Open Access Journals (Sweden)

    J. Jayaseelan

    2014-03-01

    Full Text Available Data Security is that the most crucial think about a communication network. Data security is achieved by cryptography and data concealing. Steganography is one of the info concealing technique; here any form of signal is concealing by exploitation a picture, audio or video. In an exceedingly spatial domain steganography, most typically the info is embedded into a LSB’s of the cover image pixels. As a result of it maintain the standard of the stego image as like as cover image instead of embedded into MSB’s. To embedding into a LSB’s of cover image (R, G, B plane researchers are using different types of pixel indicating methods, random embedding, edge based embedding in spatial domain or applying completely different reworks in transform domain. In this paper, for spatial domain steganography noise based embedding technique is proposed; it is entirely different from the out there techniques. In this paper two copies of JPEG, PNG, GIF, or BMP etc., images are used. One is taken as a reference image and noise is added onto that. Supported this reference image knowledge is embedded into the LSB’s of cover image. Proposed system using salt and pepper noise for data embedding, it is an ON, OFF noise. Based on added salt, pepper, and no noise portions of reference image completely different range of bits are embedded into the cover image. The result is analyzed by using MSE, PSNR and capacity performance metrics.

  20. Embedding Sensors During Additive Manufacturing

    Energy Technology Data Exchange (ETDEWEB)

    Sbriglia, Lexey Raylene [Los Alamos National Lab. (LANL), Los Alamos, NM (United States)

    2015-08-10

    This PowerPoint presentation had the following headings: Fused deposition modeling (FDM); Open source 3D printing; Objectives; Vibration analysis; Equipment; Design; Material choices; Failure causes, such as tension, bubbling; Potential solutions; Simulations; Embedding the sensors; LabView programming; Alternate data acquisition; Problem and proposed solution; and, Conclusions

  1. Embedded, everywhere: a research agenda for networked systems of embedded computers

    National Research Council Canada - National Science Library

    Committee on Networked Systems of Embedded Computers; National Research Council Staff; Division on Engineering and Physical Sciences; Computer Science and Telecommunications Board; National Academy of Sciences

    2001-01-01

    .... Embedded, Everywhere explores the potential of networked systems of embedded computers and the research challenges arising from embedding computation and communications technology into a wide variety of applicationsâ...

  2. An Improved Information Hiding Method Based on Sparse Representation

    Directory of Open Access Journals (Sweden)

    Minghai Yao

    2015-01-01

    Full Text Available A novel biometric authentication information hiding method based on the sparse representation is proposed for enhancing the security of biometric information transmitted in the network. In order to make good use of abundant information of the cover image, the sparse representation method is adopted to exploit the correlation between the cover and biometric images. Thus, the biometric image is divided into two parts. The first part is the reconstructed image, and the other part is the residual image. The biometric authentication image cannot be restored by any one part. The residual image and sparse representation coefficients are embedded into the cover image. Then, for the sake of causing much less attention of attackers, the visual attention mechanism is employed to select embedding location and embedding sequence of secret information. Finally, the reversible watermarking algorithm based on histogram is utilized for embedding the secret information. For verifying the validity of the algorithm, the PolyU multispectral palmprint and the CASIA iris databases are used as biometric information. The experimental results show that the proposed method exhibits good security, invisibility, and high capacity.

  3. Embedded Systems for Smart Appliances and Energy Management

    CERN Document Server

    Neumann, Peter; Mahlknecht, Stefan

    2013-01-01

    This book provides a comprehensive introduction to embedded systems for smart appliances and energy management, bringing together for the first time a multidisciplinary blend of topics from embedded systems, information technology and power engineering.  Coverage includes challenges for future resource distribution grids, energy management in smart appliances, micro energy generation, demand response management, ultra-low power stand by, smart standby and communication networks in home and building automation.   Provides a comprehensive, multidisciplinary introduction to embedded systems for smart appliances and energy management; Equips researchers and engineers with information required to succeed in designing energy management for smart appliances; Includes coverage of resource distribution grids, energy management in smart appliances, micro energy generation, demand response management, ultra-low power stand by, smart standby and communication networks in home and building automation.  

  4. North American fertilizer capacity data

    Energy Technology Data Exchange (ETDEWEB)

    1993-02-01

    This listing of fertilizer producers and their production capacities was compiled in February 1993 with the cooperation of the US and Canadian fertilizer industry. TVA does not guarantee the completeness or accuracy of the information. Capacity is only an indicator of supply. Nameplate capacity differs from planned production levels or actual production because plants often operate above or below design capacity. Unless reported otherwise, plant capacities are based on 340 days per year of operation. No adjustment is made for partial year operation. Information is given on the following types of fertilizers: ammonia, ammonium nitrate, nitrogen solutions, urea, ammonium sulfate, phosphate rock, wet-process phosphoric acid, ammonium phosphates, concentrated superphosphates, potash, nitric acid, superphosphoric acid, upgraded phosphoric acids, normal superphosphate, elemental phosphorus, potassium sulfate, and sulfate of potash/magnesia.

  5. Embedding Data Stewardship in Geoscience Australia

    Science.gov (United States)

    Bastrakova, I.; Fyfe, S.

    2013-12-01

    Ten years of technological innovation now enable vast amounts of data to be collected, managed, processed and shared. At the same time, organisations have witnessed government legislative and policy requirements for open access to public sector data, and a demand for flexibility in access to data by both machine-to-machine and human consumption. Geoscience Australia (GA) has adopted Data Stewardship as an organisation-wide initiative to improve the way we manage and share our data. The benefits to GA including: - Consolidated understanding of GA's data assets and their value to the Agency; - Recognition of the significant role of data custodianship and data management; - Well-defined governance, policies, standards, practices and accountabilities that promote the accessibility, quality and interoperability of GA's data; - Integration of disparate data sets into cohesive information products available online in real time and equally accessible to researchers, government, industry and the public. Although the theory behind data stewardship is well-defined and accepted and the benefits are generally well-understood, practical implementation requires an organisation to prepare for a long-term commitment of resources, both financial and human. Fundamentally this involves: 1. Raising awareness in the organisation of the need for data stewardship and the challenges this entails; 2. Establishing a data stewardship framework including a data governance office to set policy and drive organisational change; and 3. Embedding the functions and a culture of data stewardship into business as usual operations. GA holds a vast amount of data ranging from petabytes of Big Data to significant quantities of relatively small ';long tail' geoscientific observations and measurements. Over the past four years, GA has undertaken strategic activities that prepare us for Data Stewardship: - Organisation-wide audits of GA's data holdings and identification of custodians for each dataset

  6. An embedded object approach to embedded system development

    OpenAIRE

    Vallius, T. (Tero)

    2009-01-01

    Abstract Building an embedded system from an idea to a product is a slow and expensive process requiring a lot of expertise. Depending on the developer’s expertise, the required quantity and price level of the final product, and the time and money available for development, the developer can build a device from different granularity of components, ranging from ready-made platforms, kits, and modules to individual components. Generally, solutions requiring less expertise, time and money pro...

  7. Embedding Affective Learning Outcomes in Library Instruction

    Directory of Open Access Journals (Sweden)

    Ellysa Stern Cahoy

    2012-12-01

    Full Text Available While information literacy in higher education has long been focused on cognitive learning outcomes, attention must be paid to students’ affective, emotional needs throughout the research process. This article identifies models for embedding affective learning outcomes within information literacy instruction, and provides strategies to help librarians discover, articulate, and address students’ self-efficacy, motivation, emotions and attitudes. Worksheets to assist in creating affective learning outcomes are included to bring structure to an area of learning that is often challenging to articulate and measure. Also included in the article are the results of a recent survey of instruction librarians’ familiarity and inclusion of affective learning outcomes within teaching and learning initiatives.

  8. Communicating knowledge: Making embedded configuration work

    DEFF Research Database (Denmark)

    Oddsson, Gudmundur Valur; Hvam, Lars

    2007-01-01

    is to “split-up” the product knowledge and encapsulate it into each subsystem. Then, when the subsystems are assembled, the configuration of each subsystem can either be done automatically or with minimum input. The concept could be called: embedded configuration. This article will try to connect three aspects...... of making distributed knowledge system, the encapsulation of product knowledge, its subsequent encoding into product models, and finally, the communication of knowledge between the subsystems. There are two main reasons for focusing on communication, namely the encapsulation of knowledge...... and the communication between machines. One has to identify the information needed from outside for each subsystem to work. That information should also aid in finding the “services” that the subsystem can offer the overall system. Communication between subsystems has to be made explicit. A protocol has to be in place...

  9. Poincare ball embeddings of the optical geometry

    International Nuclear Information System (INIS)

    Abramowicz, M A; Bengtsson, I; Karas, V; Rosquist, K

    2002-01-01

    It is shown that the optical geometry of the Reissner-Nordstroem exterior metric can be embedded in a hyperbolic space all the way down to its outer horizon. The adopted embedding procedure removes a breakdown of flat-space embeddings which occurs outside the horizon, at and below the Buchdahl-Bondi limit (R/M=9/4 in the Schwarzschild case). In particular, the horizon can be captured in the optical geometry embedding diagram. Moreover, by using the compact Poincare ball representation of the hyperbolic space, the embedding diagram can cover the whole extent of radius from spatial infinity down to the horizon. Attention is drawn to the advantages of such embeddings in an appropriately curved space: this approach gives compact embeddings and it clearly distinguishes the case of an extremal black hole from a non-extremal one in terms of the topology of the embedded horizon

  10. Early auditory evoked potential is modulated by selective attention and related to individual differences in visual working memory capacity.

    Science.gov (United States)

    Giuliano, Ryan J; Karns, Christina M; Neville, Helen J; Hillyard, Steven A

    2014-12-01

    A growing body of research suggests that the predictive power of working memory (WM) capacity for measures of intellectual aptitude is due to the ability to control attention and select relevant information. Crucially, attentional mechanisms implicated in controlling access to WM are assumed to be domain-general, yet reports of enhanced attentional abilities in individuals with larger WM capacities are primarily within the visual domain. Here, we directly test the link between WM capacity and early attentional gating across sensory domains, hypothesizing that measures of visual WM capacity should predict an individual's capacity to allocate auditory selective attention. To address this question, auditory ERPs were recorded in a linguistic dichotic listening task, and individual differences in ERP modulations by attention were correlated with estimates of WM capacity obtained in a separate visual change detection task. Auditory selective attention enhanced ERP amplitudes at an early latency (ca. 70-90 msec), with larger P1 components elicited by linguistic probes embedded in an attended narrative. Moreover, this effect was associated with greater individual estimates of visual WM capacity. These findings support the view that domain-general attentional control mechanisms underlie the wide variation of WM capacity across individuals.

  11. Early Auditory Evoked Potential Is Modulated by Selective Attention and Related to Individual Differences in Visual Working Memory Capacity

    Science.gov (United States)

    Giuliano, Ryan J.; Karns, Christina M.; Neville, Helen J.; Hillyard, Steven A.

    2015-01-01

    A growing body of research suggests that the predictive power of working memory (WM) capacity for measures of intellectual aptitude is due to the ability to control attention and select relevant information. Crucially, attentional mechanisms implicated in controlling access to WM are assumed to be domain-general, yet reports of enhanced attentional abilities in individuals with larger WM capacities are primarily within the visual domain. Here, we directly test the link between WM capacity and early attentional gating across sensory domains, hypothesizing that measures of visual WM capacity should predict an individual’s capacity to allocate auditory selective attention. To address this question, auditory ERPs were recorded in a linguistic dichotic listening task, and individual differences in ERP modulations by attention were correlated with estimates of WM capacity obtained in a separate visual change detection task. Auditory selective attention enhanced ERP amplitudes at an early latency (ca. 70–90 msec), with larger P1 components elicited by linguistic probes embedded in an attended narrative. Moreover, this effect was associated with greater individual estimates of visual WM capacity. These findings support the view that domain-general attentional control mechanisms underlie the wide variation of WM capacity across individuals. PMID:25000526

  12. Embedding Complementarity in HCI Methods

    DEFF Research Database (Denmark)

    Nielsen, Janni; Yssing, Carsten; Tweddell Levinsen, Karin

    2007-01-01

    Differences in cultural contexts constitute differences in cognition, and research has shown that different cultures may use different cognitive tools for perception and reasoning. The cultural embeddings are significant in relation to HCI, because the cultural context is also embedded...... in the techniques and the tools that we apply. We lack a framework for discussing what and who we are, when we talk about a person as the user of an ICT system that has to be designed, developed and implemented. As a framework, we suggest a theory of complementary positions that insists on solid accounts from all...... observer posi-tions in relation to perspective, standpoint and focus. We need to develop com-plementary theories that embed complexity, and we need to reflect critically upon forty years of dominance by rationalistic, empirical understandings of the user as illustrated in the literature and practice within...

  13. A survey of embedded solitons

    International Nuclear Information System (INIS)

    Fujioka, J.; Espinosa C, A.; Rodriguez, R.F.

    2006-01-01

    At the end of the nineties a brand-new type of soliton was discovered: the embedded solitons. Initially they were found in optical systems, and afterwards they were also found in hydrodynamic models, liquid crystal theory and discrete systems. These peculiar solitary waves are interesting because they exist under conditions in which, until recently, the propagation ol solitons was thought to be impossible. At first these nonlinear waves were believed to be necessarily isolated and unstable, but later on it was found that they can be stable and may exist in families. This paper explains what these embedded solitons are, in which models they have been found, and what variants exist (stable, unstable, continuous, discrete, etc.) (Author)

  14. The embedded operating system project

    Science.gov (United States)

    Campbell, R. H.

    1984-01-01

    This progress report describes research towards the design and construction of embedded operating systems for real-time advanced aerospace applications. The applications concerned require reliable operating system support that must accommodate networks of computers. The report addresses the problems of constructing such operating systems, the communications media, reconfiguration, consistency and recovery in a distributed system, and the issues of realtime processing. A discussion is included on suitable theoretical foundations for the use of atomic actions to support fault tolerance and data consistency in real-time object-based systems. In particular, this report addresses: atomic actions, fault tolerance, operating system structure, program development, reliability and availability, and networking issues. This document reports the status of various experiments designed and conducted to investigate embedded operating system design issues.

  15. Graph Embedded Extreme Learning Machine.

    Science.gov (United States)

    Iosifidis, Alexandros; Tefas, Anastasios; Pitas, Ioannis

    2016-01-01

    In this paper, we propose a novel extension of the extreme learning machine (ELM) algorithm for single-hidden layer feedforward neural network training that is able to incorporate subspace learning (SL) criteria on the optimization process followed for the calculation of the network's output weights. The proposed graph embedded ELM (GEELM) algorithm is able to naturally exploit both intrinsic and penalty SL criteria that have been (or will be) designed under the graph embedding framework. In addition, we extend the proposed GEELM algorithm in order to be able to exploit SL criteria in arbitrary (even infinite) dimensional ELM spaces. We evaluate the proposed approach on eight standard classification problems and nine publicly available datasets designed for three problems related to human behavior analysis, i.e., the recognition of human face, facial expression, and activity. Experimental results denote the effectiveness of the proposed approach, since it outperforms other ELM-based classification schemes in all the cases.

  16. Perturbation Theory of Embedded Eigenvalues

    DEFF Research Database (Denmark)

    Engelmann, Matthias

    We study problems connected to perturbation theory of embedded eigenvalues in two different setups. The first part deals with second order perturbation theory of mass shells in massive translation invariant Nelson type models. To this end an expansion of the eigenvalues w.r.t. fiber parameter up...... project gives a general and systematic approach to analytic perturbation theory of embedded eigenvalues. The spectral deformation technique originally developed in the theory of dilation analytic potentials in the context of Schrödinger operators is systematized by the use of Mourre theory. The group...... of dilations is thereby replaced by the unitary group generated y the conjugate operator. This then allows to treat the perturbation problem with the usual Kato theory....

  17. An Embedded Reconfigurable Logic Module

    Science.gov (United States)

    Tucker, Jerry H.; Klenke, Robert H.; Shams, Qamar A. (Technical Monitor)

    2002-01-01

    A Miniature Embedded Reconfigurable Computer and Logic (MERCAL) module has been developed and verified. MERCAL was designed to be a general-purpose, universal module that that can provide significant hardware and software resources to meet the requirements of many of today's complex embedded applications. This is accomplished in the MERCAL module by combining a sub credit card size PC in a DIMM form factor with a XILINX Spartan I1 FPGA. The PC has the ability to download program files to the FPGA to configure it for different hardware functions and to transfer data to and from the FPGA via the PC's ISA bus during run time. The MERCAL module combines, in a compact package, the computational power of a 133 MHz PC with up to 150,000 gate equivalents of digital logic that can be reconfigured by software. The general architecture and functionality of the MERCAL hardware and system software are described.

  18. Sustainable embedded software lifecycle planning

    OpenAIRE

    Lee, Dong-Hyun; In, Hoh Peter; Lee, Keun; Park, Sooyong; Hinchey, Mike

    2012-01-01

    peer-reviewed Time-to-market is a crucial factor in increasing market share in the consumer electronics (CE) market. Furthermore, fierce competition in the market tends to sharply lower the prices of brand-new CE products as soon as they are released. Software-intensive embedded system design methods such as hardware/software co-design have been studied with the goal of reducing development lead-time by designing hardware and software simultaneously. Many researchers, however, concentra...

  19. Characterization of Embedded BPM Collimators

    CERN Document Server

    VALENTINO, Gianluca

    2015-01-01

    During LS1, 16 tertiary collimators (TCTs) and 2 secondary collimators (TCSGs) in IR6 were replaced by new embedded BPM collimators. The BPM functionality allows the possibility to align the collimators more quickly and therefore be able to respond faster to machine configuration changes, as well as a direct monitoring of the beam orbit at the collimators. Following an initial commissioning phase, an MD was carried out to test the new collimators and acquisition electronics with beam in the LHC.

  20. Bilipschitz embedding of homogeneous fractals

    OpenAIRE

    Lü, Fan; Lou, Man-Li; Wen, Zhi-Ying; Xi, Li-Feng

    2014-01-01

    In this paper, we introduce a class of fractals named homogeneous sets based on some measure versions of homogeneity, uniform perfectness and doubling. This fractal class includes all Ahlfors-David regular sets, but most of them are irregular in the sense that they may have different Hausdorff dimensions and packing dimensions. Using Moran sets as main tool, we study the dimensions, bilipschitz embedding and quasi-Lipschitz equivalence of homogeneous fractals.

  1. Secret data embedding scheme modifying the frequency of ...

    Indian Academy of Sciences (India)

    Keywords. Image histogram; information security; data hiding; watermarking. Abstract. The main purpose of this presented work is to develop a data embedding method based on a new digital image histogram modification approach. The proposed scheme fundamentally is concerned about the frequency of occurrence of ...

  2. Embedding Marketing in International Campus Development: Lessons from UK Universities

    Science.gov (United States)

    Lewis, Vicky

    2016-01-01

    This paper provides recommendations for embedding a market- and marketing-informed approach within the development process for a new international campus. It includes a brief outline of the current global profile of international campuses (as one form of transnational education) before highlighting the role of marketing at key stages of campus…

  3. Gender Beliefs and Embedded Gendered Values in Preschool

    Science.gov (United States)

    Emilson, Anette; Folkesson, Anne-Mari; Lindberg, Ingeborg Moqvist

    2016-01-01

    The aim of this study is to explore practitioners' gender beliefs and how gendered values are embedded in Swedish preschool practice. The research question is: What beliefs about gender and the associated values, can be identified in practitioners' talk when they discuss gender issues? The study is informed by Bronwyn Davies' theoretical ideas…

  4. Model-Based Application Development for Massively Parallel Embedded Systems

    NARCIS (Netherlands)

    Jacobs, J.W.M.

    2008-01-01

    The development of embedded systems in information-rich contexts is governed by some intertwined trends. The increase of both volume of data to be processed and the related processing functionality feeds the growing complexity of applications. Independently, the processing hardware that is needed to

  5. Increasing Bellevue School District's elementary teachers' capacity for teaching inquiry-based science: Using ideas from contemporary learning theory to inform professional development

    Science.gov (United States)

    Maury, Tracy Anne

    This Capstone project examined how leaders in the Bellevue School District can increase elementary teachers' capacity for teaching inquiry-based science through the use of professional learning activities that are grounded in ideas from human learning theory. A framework for professional development was constructed and from that framework, a set of professional learning activities were developed as a means to support teacher learning while project participants piloted new curriculum called the Isopod Habitat Challenge. Teachers in the project increased their understanding of the learning theory principles of preconceptions and metacognition. Teachers did not increase their understanding of the principle of learning with understanding, although they did articulate the significance of engaging children in student-led inquiry cycles. Data from the curriculum revision and professional development project coupled with ideas from learning theory, cognition and policy implementation, and learning community literatures suggest Bellevue's leaders can encourage peer-to-peer interaction, link professional development to teachers' daily practice, and capitalize on technology as ways to increase elementary teachers' capacity for teaching inquiry-based science. These lessons also have significance for supporting teacher learning and efficacy in other subject areas and at other levels in the system.

  6. Embedding graphs in Lorentzian spacetime.

    Directory of Open Access Journals (Sweden)

    James R Clough

    Full Text Available Geometric approaches to network analysis combine simply defined models with great descriptive power. In this work we provide a method for embedding directed acyclic graphs (DAG into Minkowski spacetime using Multidimensional scaling (MDS. First we generalise the classical MDS algorithm, defined only for metrics with a Riemannian signature, to manifolds of any metric signature. We then use this general method to develop an algorithm which exploits the causal structure of a DAG to assign space and time coordinates in a Minkowski spacetime to each vertex. As in the causal set approach to quantum gravity, causal connections in the discrete graph correspond to timelike separation in the continuous spacetime. The method is demonstrated by calculating embeddings for simple models of causal sets and random DAGs, as well as real citation networks. We find that the citation networks we test yield significantly more accurate embeddings that random DAGs of the same size. Finally we suggest a number of applications in citation analysis such as paper recommendation, identifying missing citations and fitting citation models to data using this geometric approach.

  7. Embedding of the radiation cosmos

    International Nuclear Information System (INIS)

    Wang, J.Z.

    1986-01-01

    The embedding of the Friedmann manifold into a higher dimensional Minkowski space is investigated. As solutions of the Friedmann equation with vanishing cosmological term, Friedmann models describe a first expanding, then contracting universe and predict a big bang singularity. For cosmic time t → 0, R(t) → 0, there is an infinite scalar, curvature in the matter cosmos, and an infinite eigenvalue corresponding to the unique timelike eigenvector of the energy-momentum tensor in the radiation cosmos. The big bang, therefore, is an intrinsic singularity of the space time. To investigate the singularity one resorts to the embedding of the Friedmann manifold into a higher dimensional Minkowski space. For the matter cosmos such an investigation has already been done (Lauro and Schucking, 1984). However, the matter cosmos is not a suitable model to discuss the very early universe where the radiation dominates. Geometric properties, such as the Riemann tensor, the Guassian curvature and the global behavior of the geodesics of the embedded manifold, are discussed in detail

  8. Embedding initial data for black hole collisions

    OpenAIRE

    Romano, Joseph D.; Price, Richard H.

    1994-01-01

    We discuss isometric embedding diagrams for the visualization of initial data for the problem of the head-on collision of two black holes. The problem of constructing the embedding diagrams is explicitly presented for the best studied initial data, the Misner geometry. We present a partial solution of the embedding diagrams and discuss issues related to completing the solution.

  9. Isometric embeddings in cosmology and astrophysics

    Indian Academy of Sciences (India)

    In purely geometric embedding theory, a given spacetime (or 'brane') is embedded in a higher-dimensional spacetime (or 'bulk'), and the bulk field equations solved. This is dual to the ... The embedding will be unique for all Ricci equivalent tensors S and R: Rab(xγ ) = ...... I V Lavrinenko, H Lü and C N Pope, Class. Quant.

  10. Seismic capacity of switchgear

    International Nuclear Information System (INIS)

    Bandyopadhyay, K.; Hofmayer, C.; Kassir, M.; Pepper, S.

    1989-01-01

    As part of a component fragility program sponsored by the USNRC, BNL has collected existing information on the seismic capacity of switchgear assemblies from major manufacturers. Existing seismic test data for both low and medium voltage switchgear assemblies have been evaluated and the generic results are presented in this paper. The failure modes are identified and the corresponding generic lower bound capacity levels are established. The test response spectra have been used as a measure of the test vibration input. The results indicate that relays chatter at a very low input level at the base of the switchgear cabinet. This change of state of devices including relays have been observed. Breaker tripping occurs at a higher vibration level. Although the structural failure of internal elements have been noticed, the overall switchgear cabinet structure withstands a high vibration level. 5 refs., 2 figs., 2 tabs

  11. Embedded Data Processor and Portable Computer Technology testbeds

    Science.gov (United States)

    Alena, Richard; Liu, Yuan-Kwei; Goforth, Andre; Fernquist, Alan R.

    1993-01-01

    Attention is given to current activities in the Embedded Data Processor and Portable Computer Technology testbed configurations that are part of the Advanced Data Systems Architectures Testbed at the Information Sciences Division at NASA Ames Research Center. The Embedded Data Processor Testbed evaluates advanced microprocessors for potential use in mission and payload applications within the Space Station Freedom Program. The Portable Computer Technology (PCT) Testbed integrates and demonstrates advanced portable computing devices and data system architectures. The PCT Testbed uses both commercial and custom-developed devices to demonstrate the feasibility of functional expansion and networking for portable computers in flight missions.

  12. Software test attacks to break mobile and embedded devices

    CERN Document Server

    Hagar, Jon Duncan

    2013-01-01

    Address Errors before Users Find Them Using a mix-and-match approach, Software Test Attacks to Break Mobile and Embedded Devices presents an attack basis for testing mobile and embedded systems. Designed for testers working in the ever-expanding world of ""smart"" devices driven by software, the book focuses on attack-based testing that can be used by individuals and teams. The numerous test attacks show you when a software product does not work (i.e., has bugs) and provide you with information about the software product under test. The book guides you step by step starting with the basics. It

  13. Information

    International Nuclear Information System (INIS)

    Boyard, Pierre.

    1981-01-01

    The fear for nuclear energy and more particularly for radioactive wastes is analyzed in the sociological context. Everybody agree on the information need, information is available but there is a problem for their diffusion. Reactions of the public are analyzed and journalists, scientists and teachers have a role to play [fr

  14. A high capacity 3D steganography algorithm.

    Science.gov (United States)

    Chao, Min-Wen; Lin, Chao-hung; Yu, Cheng-Wei; Lee, Tong-Yee

    2009-01-01

    In this paper, we present a very high-capacity and low-distortion 3D steganography scheme. Our steganography approach is based on a novel multilayered embedding scheme to hide secret messages in the vertices of 3D polygon models. Experimental results show that the cover model distortion is very small as the number of hiding layers ranges from 7 to 13 layers. To the best of our knowledge, this novel approach can provide much higher hiding capacity than other state-of-the-art approaches, while obeying the low distortion and security basic requirements for steganography on 3D models.

  15. System Level Modelling and Performance Estimation of Embedded Systems

    DEFF Research Database (Denmark)

    Tranberg-Hansen, Anders Sejer

    The advances seen in the semiconductor industry within the last decade have brought the possibility of integrating evermore functionality onto a single chip forming functionally highly advanced embedded systems. These integration possibilities also imply that as the design complexity increases, so...... an efficient system level design methodology, a modelling framework for performance estimation and design space exploration at the system level is required. This thesis presents a novel component based modelling framework for system level modelling and performance estimation of embedded systems. The framework...... is performed by having the framework produce detailed quantitative information about the system model under investigation. The project is part of the national Danish research project, Danish Network of Embedded Systems (DaNES), which is funded by the Danish National Advanced Technology Foundation. The project...

  16. Virtually embedded the librarian in an online environment

    CERN Document Server

    McCaffrey, Erin

    2014-01-01

    The rise of online education at institutions of higher learning, together with the increasing cost of higher education, lead some to suggest that online (or distance) education will eventually become the dominant form of higher learning. This has particular significance for librarians. This casebook, a blueprint for embedding academic librarians in online environments, from undergraduate to science-based graduate schools to MOOCs is the first to explore how librarians can play a key role in the virtual academic landscape. The authors, academic librarians representing a broad range of colleges and universities, look at the evolution of the embedded librarian from physical to virtual, suggest how to develop and implement unique programs in and out of the classroom, and explain how to scale programs once they are embedded. This book is suitable for professional collections in academic libraries of all sizes and types. It is also suitable for collections in schools of library and information science.

  17. Effect of embedment on the plastic behaviour of Bucket Foundations

    DEFF Research Database (Denmark)

    Ibsen, Lars Bo; Barari, Amin; Larsen, Kim André

    2015-01-01

    studies have indicated the possibility of defining foundation response using plasticity theory. Results of multiple loading tests addressing the effect of embedment on the strain-hardening behavior of shallow bucket foundations under combined loading are reported. The kinematic mechanisms accompanying pre......A series of comprehensive research and development projects has validated the novel concept of the bucket foundation as an alternative to piled foundations, and bucket foundations are rapidly becoming a viable option for offshore wind farms and marginal fields. Within the last decade, experimental......-failure are presented. It is argued that the drained capacity of offshore bucket foundations and the ratio of plastic increments are largely influenced by embedment depth and the preload ratio V/Vpeak....

  18. The biokinetics of uranium migrating from embedded DU fragments

    International Nuclear Information System (INIS)

    Leggett, R.W.; Pellmar, T.C.

    2003-01-01

    Military uses of depleted uranium (DU) munitions have resulted in casualties with embedded DU fragments. Assessment of radiological or chemical health risks from these fragments requires a model relating urinary U to the rate of migration of U from the fragments, and its accumulation in systemic tissues. A detailed biokinetic model for U has been published by the International Commission on Radiological Protection (ICRP), but its applicability to U migrating from embedded DU fragments is uncertain. Recently, ) conducted a study at the Armed Forces Radiobiology Research Institute (AFRRI) on the redistribution and toxicology of U in rats with implanted DU pellets, simulating embedded fragments. This paper compares the biokinetic data from that study with the behavior of commonly studied forms of U in rats (e.g., intravenously injected U nitrate). The comparisons indicate that the biokinetics of U migrating from embedded DU is similar to that of commonly studied forms of U with regard to long-term accumulation in kidneys, bone, and liver. The results provide limited support for the application of the ICRP's model to persons with embedded DU fragments. Additional information is needed with regard to the short-term behavior of migrating U and its accumulation in lymph nodes, brain, testicles, and other infrequently studied U repositories

  19. Permutation entropy with vector embedding delays

    Science.gov (United States)

    Little, Douglas J.; Kane, Deb M.

    2017-12-01

    Permutation entropy (PE) is a statistic used widely for the detection of structure within a time series. Embedding delay times at which the PE is reduced are characteristic timescales for which such structure exists. Here, a generalized scheme is investigated where embedding delays are represented by vectors rather than scalars, permitting PE to be calculated over a (D -1 ) -dimensional space, where D is the embedding dimension. This scheme is applied to numerically generated noise, sine wave and logistic map series, and experimental data sets taken from a vertical-cavity surface emitting laser exhibiting temporally localized pulse structures within the round-trip time of the laser cavity. Results are visualized as PE maps as a function of embedding delay, with low PE values indicating combinations of embedding delays where correlation structure is present. It is demonstrated that vector embedding delays enable identification of structure that is ambiguous or masked, when the embedding delay is constrained to scalar form.

  20. Quantum reading capacity

    International Nuclear Information System (INIS)

    Pirandola, Stefano; Braunstein, Samuel L; Lupo, Cosmo; Mancini, Stefano; Giovannetti, Vittorio

    2011-01-01

    The readout of a classical memory can be modelled as a problem of quantum channel discrimination, where a decoder retrieves information by distinguishing the different quantum channels encoded in each cell of the memory (Pirandola 2011 Phys. Rev. Lett. 106 090504). In the case of optical memories, such as CDs and DVDs, this discrimination involves lossy bosonic channels and can be remarkably boosted by the use of nonclassical light (quantum reading). Here we generalize these concepts by extending the model of memory from single-cell to multi-cell encoding. In general, information is stored in a block of cells by using a channel-codeword, i.e. a sequence of channels chosen according to a classical code. Correspondingly, the readout of data is realized by a process of ‘parallel’ channel discrimination, where the entire block of cells is probed simultaneously and decoded via an optimal collective measurement. In the limit of a large block we define the quantum reading capacity of the memory, quantifying the maximum number of readable bits per cell. This notion of capacity is nontrivial when we suitably constrain the physical resources of the decoder. For optical memories (encoding bosonic channels), such a constraint is energetic and corresponds to fixing the mean total number of photons per cell. In this case, we are able to prove a separation between the quantum reading capacity and the maximum information rate achievable by classical transmitters, i.e. arbitrary classical mixtures of coherent states. In fact, we can easily construct nonclassical transmitters that are able to outperform any classical transmitter, thus showing that the advantages of quantum reading persist in the optimal multi-cell scenario. (paper)

  1. Better business case for embedded energy

    International Nuclear Information System (INIS)

    Wallace, Paula

    2014-01-01

    The first customer-led rule change to reform the National Energy Market has been successful, making it easier for clean energy to connect to the national electricity grid. The rule change was adopted by the Australian Energy Market Commission (AEMC) recently and will come into effect from October 1. Led by ClimateWorks Australia, the Property Council of Australia and Seed Advisory, these reforms will make it cheaper and faster to connect co/trigeneration plants and renewable energy to the electricity grid. Some see the reforms unleashing a wave of embedded generation projects on commercial buildings and precincts, seeking energy savings and higher sustainability ratings. However, the benefits that can be assumed at this stage are, greater information from electricity network operators to avoid delays, and known fees and charges so that financial feasibility can be calculated up front.

  2. Embedded random matrix ensembles in quantum physics

    CERN Document Server

    Kota, V K B

    2014-01-01

    Although used with increasing frequency in many branches of physics, random matrix ensembles are not always sufficiently specific to account for important features of the physical system at hand. One refinement which retains the basic stochastic approach but allows for such features consists in the use of embedded ensembles.  The present text is an exhaustive introduction to and survey of this important field. Starting with an easy-to-read introduction to general random matrix theory, the text then develops the necessary concepts from the beginning, accompanying the reader to the frontiers of present-day research. With some notable exceptions, to date these ensembles have primarily been applied in nuclear spectroscopy. A characteristic example is the use of a random two-body interaction in the framework of the nuclear shell model. Yet, topics in atomic physics, mesoscopic physics, quantum information science and statistical mechanics of isolated finite quantum systems can also be addressed using these ensemb...

  3. Embedding Color Watermarks in Color Images

    Directory of Open Access Journals (Sweden)

    Wu Tung-Lin

    2003-01-01

    Full Text Available Robust watermarking with oblivious detection is essential to practical copyright protection of digital images. Effective exploitation of the characteristics of human visual perception to color stimuli helps to develop the watermarking scheme that fills the requirement. In this paper, an oblivious watermarking scheme that embeds color watermarks in color images is proposed. Through color gamut analysis and quantizer design, color watermarks are embedded by modifying quantization indices of color pixels without resulting in perceivable distortion. Only a small amount of information including the specification of color gamut, quantizer stepsize, and color tables is required to extract the watermark. Experimental results show that the proposed watermarking scheme is computationally simple and quite robust in face of various attacks such as cropping, low-pass filtering, white-noise addition, scaling, and JPEG compression with high compression ratios.

  4. Simulation and Embedded Smart Control

    DEFF Research Database (Denmark)

    Conrad, Finn; Fan, Zhun; Sørensen, Torben

    2006-01-01

    The paper presents results obtained from a Danish mechatronic research program focusing on intelligent motion control, simulation and embedded smart controllers for hydraulic actuators and robots as well as results from the EU projects. A mechatronic test facility with digital controllers...... for a hydraulic robot was implemented. The controllers apply digital signal processors (DSPs), and Field Programmable Gate Array, short named as FPGA, respectively. The DSP controller utilizes the dSPACE System that is suitable for real-time experimentation, evaluation and validation of control laws...

  5. Professional Windows Embedded Compact 7

    CERN Document Server

    Phung, Samuel; Joubert, Thierry; Hall, Mike

    2011-01-01

    Learn to program an array of customized devices and solutions As a compact, highly efficient, scalable operating system, Windows Embedded Compact 7 (WEC7) is one of the best options for developing a new generation of network-enabled, media-rich, and service-oriented devices. This in-depth resource takes you through the benefits and capabilities of WEC7 so that you can start using this performance development platform today. Divided into several major sections, the book begins with an introduction and then moves on to coverage of OS design, application development, advanced application developm

  6. CSTI High Capacity Power

    International Nuclear Information System (INIS)

    Winter, J.M.

    1989-01-01

    The SP-100 program was established in 1983 by DOD, DOE, and NASA as a joint program to develop the technology necessary for space nuclear power systems for military and civil application. During FY-86 and 87, the NASA SP-100 Advanced Technology Program was devised to maintain the momentum of promising technology advancement efforts started during Phase 1 of SP-100 and to strengthen, in key areas, the chances for successful development and growth capability of space nuclear reactor power systems for future space applications. In FY-88, the Advanced Technology Program was incorporated into NASA's new Civil Space Technology Initiative (CSTI). The CSTI Program was established to provide the foundation for technology development in automation and robotics, information, propulsion, and power. The CSTI High Capacity Power Program builds on the technology efforts of the SP-100 program, incorporates the previous NASA SP-100 Advanced Technology project, and provides a bridge to NASA Project Pathfinder. The elements of CSTI High Capacity Power development include Conversion Systems, Thermal Management, Power Management, System Diagnostics, and Environmental Interactions. Technology advancement in all areas, including materials, is required to assure the high reliability and 7 to 10 year lifetime demanded for future space nuclear power systems. The overall program will develop and demonstrate the technology base required to provide a wide range of modular power systems as well as allowing mission independence from solar and orbital attitude requirements. Several recent advancements in CSTI High Capacity power development will be discussed

  7. Enhancing Research Ethics Review Systems in Egypt: The Focus of an International Training Program Informed by an Ecological Developmental Approach to Enhancing Research Ethics Capacity.

    Science.gov (United States)

    Edwards, Hillary Anne; Hifnawy, Tamer; Silverman, Henry

    2015-12-01

    Recently, training programs in research ethics have been established to enhance individual and institutional capacity in research ethics in the developing world. However, commentators have expressed concern that the efforts of these training programs have placed 'too great an emphasis on guidelines and research ethics review', which will have limited effect on ensuring ethical conduct in research. What is needed instead is a culture of ethical conduct supported by national and institutional commitment to ethical practices that are reinforced by upstream enabling conditions (strong civil society, public accountability, and trust in basic transactional processes), which are in turn influenced by developmental conditions (basic freedoms of political freedoms, economic facilities, social opportunities, transparency guarantees, and protective security). Examining this more inclusive understanding of the determinants of ethical conduct enhances at once both an appreciation of the limitations of current efforts of training programs in research ethics and an understanding of what additional training elements are needed to enable trainees to facilitate national and institutional policy changes that enhance research practices. We apply this developmental model to a training program focused in Egypt to describe examples of such additional training activities. © 2014 John Wiley & Sons Ltd.

  8. The Development and Validation of an Information Literacy Model for Hong Kong Students: Key Issues in the Professional Development of Teachers for Capacity Building

    Science.gov (United States)

    Kong, Siu Cheung

    2007-01-01

    An information literacy (IL) framework has been proposed for Hong Kong students to adapt to the emergence of the knowledge-based society, digital culture and globalisation. The aims of the study reported herein were to validate the proposed IL model and collect the views of practitioners and representative stakeholders on the possibility of its…

  9. A high capacity multiple watermarking scheme based on Fourier descriptor and Sudoku

    Science.gov (United States)

    Zhang, Li; Zheng, Huimin

    2015-12-01

    Digital watermark is a type of technology to hide some significant information which is mainly used to protect digital data. A high capacity multiple watermarking method is proposed, which adapts the Fourier descriptor to pre-process the watermarks, while a Sudoku puzzle is used as a reference matrix in embedding process and a key in extraction process. It can dramatically reduce the required capacity by applying Fourier descriptor. Meanwhile, the security of watermarks can be guaranteed due to the Sudoku puzzle. Unlike previous algorithms applying Sudoku puzzle in spatial domain, the proposed algorithm works in transformed domain by applying LWT2.In addition, the proposed algorithm can detect the temper location accurately. The experimental results demonstrated that the goals mentioned above have been achieved.

  10. Embedded mean-field theory.

    Science.gov (United States)

    Fornace, Mark E; Lee, Joonho; Miyamoto, Kaito; Manby, Frederick R; Miller, Thomas F

    2015-02-10

    We introduce embedded mean-field theory (EMFT), an approach that flexibly allows for the embedding of one mean-field theory in another without the need to specify or fix the number of particles in each subsystem. EMFT is simple, is well-defined without recourse to parameters, and inherits the simple gradient theory of the parent mean-field theories. In this paper, we report extensive benchmarking of EMFT for the case where the subsystems are treated using different levels of Kohn-Sham theory, using PBE or B3LYP/6-31G* in the high-level subsystem and LDA/STO-3G in the low-level subsystem; we also investigate different levels of density fitting in the two subsystems. Over a wide range of chemical problems, we find EMFT to perform accurately and stably, smoothly converging to the high-level of theory as the active subsystem becomes larger. In most cases, the performance is at least as good as that of ONIOM, but the advantages of EMFT are highlighted by examples that involve partitions across multiple bonds or through aromatic systems and by examples that involve more complicated electronic structure. EMFT is simple and parameter free, and based on the tests provided here, it offers an appealing new approach to a multiscale electronic structure.

  11. Drilling azimuth gamma embedded design

    Directory of Open Access Journals (Sweden)

    Zhou Yi Ren

    2016-01-01

    Full Text Available Embedded drilling azimuth gamma design, the use of radioactive measuring principle embedded gamma measurement while drilling a short section analysis. Monte Carlo method, in response to the density of horizontal well logging numerical simulation of 16 orientation, the orientation of horizontal well analysed, calliper, bed boundary location, space, different formation density, formation thickness, and other factors inclined strata dip the impact by simulating 137Cs sources under different formation conditions of the gamma distribution, to determine the orientation of drilling density tool can detect window size and space, draw depth of the logging methods. The data 360° azimuth imaging, image processing method to obtain graph, display density of the formation, dip and strata thickness and other parameters, the logging methods obtain real-time geo-steering. To establish a theoretical basis for the orientation density logging while drilling method implementation and application of numerical simulation in-depth study of the MWD azimuth and density log response factors of horizontal wells.

  12. Testing framework for embedded languages

    Science.gov (United States)

    Leskó, Dániel; Tejfel, Máté

    2012-09-01

    Embedding a new programming language into an existing one is a widely used technique, because it fastens the development process and gives a part of a language infrastructure for free (e.g. lexical, syntactical analyzers). In this paper we are presenting a new advantage of this development approach regarding to adding testing support for these new languages. Tool support for testing is a crucial point for a newly designed programming language. It could be done in the hard way by creating a testing tool from scratch, or we could try to reuse existing testing tools by extending them with an interface to our new language. The second approach requires less work, and also it fits very well for the embedded approach. The problem is that the creation of such interfaces is not straightforward at all, because the existing testing tools were mostly not designed to be extendable and to be able to deal with new languages. This paper presents an extendable and modular model of a testing framework, in which the most basic design decision was to keep the - previously mentioned - interface creation simple and straightforward. Other important aspects of our model are the test data generation, the oracle problem and the customizability of the whole testing phase.

  13. The embodied embedded character of system 1 processing.

    Science.gov (United States)

    Bellini-Leite, Samuel de Castro

    2013-01-01

    In the last thirty years, a relatively large group of cognitive scientists have begun characterising the mind in terms of two distinct, relatively autonomous systems. To account for paradoxes in empirical results of studies mainly on reasoning, Dual Process Theories were developed. Such Dual Process Theories generally agree that System 1 is rapid, automatic, parallel, and heuristic-based and System 2 is slow, capacity-demanding, sequential, and related to consciousness. While System 2 can still be decently understood from a traditional cognitivist approach, I will argue that it is essential for System 1 processing to be comprehended in an Embodied Embedded approach to Cognition.

  14. Novel Variants of a Histogram Shift-Based Reversible Watermarking Technique for Medical Images to Improve Hiding Capacity

    Directory of Open Access Journals (Sweden)

    Vishakha Kelkar

    2017-01-01

    Full Text Available In telemedicine systems, critical medical data is shared on a public communication channel. This increases the risk of unauthorised access to patient’s information. This underlines the importance of secrecy and authentication for the medical data. This paper presents two innovative variations of classical histogram shift methods to increase the hiding capacity. The first technique divides the image into nonoverlapping blocks and embeds the watermark individually using the histogram method. The second method separates the region of interest and embeds the watermark only in the region of noninterest. This approach preserves the medical information intact. This method finds its use in critical medical cases. The high PSNR (above 45 dB obtained for both techniques indicates imperceptibility of the approaches. Experimental results illustrate superiority of the proposed approaches when compared with other methods based on histogram shifting techniques. These techniques improve embedding capacity by 5–15% depending on the image type, without affecting the quality of the watermarked image. Both techniques also enable lossless reconstruction of the watermark and the host medical image. A higher embedding capacity makes the proposed approaches attractive for medical image watermarking applications without compromising the quality of the image.

  15. Capacity-building and Participatory Research Development of a Community-based Nutrition and Exercise Lifestyle Intervention Program (NELIP for Pregnant and Postpartum Aboriginal Women:Information Gathered from Talking Circles.

    Directory of Open Access Journals (Sweden)

    Katie Big-Canoe

    2011-05-01

    Full Text Available Objectives were to gather information from Talking Circles of Aboriginal women who participated in a maternal Nutrition and Exercise Lifestyle Intervention Program (NELIP to identify strategies to bring NELIP into the community. Twelve First Nations women participated. Several main themes were identified regarding health: balance, knowledge/education and time management. Benefits of the NELIP were improvement in health, stamina, stress, and a healthy baby, no gestational diabetes and a successful home birth, with social support as an important contributing factor for success. Suggestions for improvement for the NELIP included group walking, and incorporating more traditional foods into the meal plan. The information gathered is the first step in determining strategies using participatory research and capacity-building to develop a community-based NELIP for pregnant Aboriginal women.

  16. Flexible Architecture for FPGAs in Embedded Systems

    Science.gov (United States)

    Clark, Duane I.; Lim, Chester N.

    2012-01-01

    Commonly, field-programmable gate arrays (FPGAs) being developed in cPCI embedded systems include the bus interface in the FPGA. This complicates the development because the interface is complicated and requires a lot of development time and FPGA resources. In addition, flight qualification requires a substantial amount of time be devoted to just this interface. Another complication of putting the cPCI interface into the FPGA being developed is that configuration information loaded into the device by the cPCI microprocessor is lost when a new bit file is loaded, requiring cumbersome operations to return the system to an operational state. Finally, SRAM-based FPGAs are typically programmed via specialized cables and software, with programming files being loaded either directly into the FPGA, or into PROM devices. This can be cumbersome when doing FPGA development in an embedded environment, and does not have an easy path to flight. Currently, FPGAs used in space applications are usually programmed via multiple space-qualified PROM devices that are physically large and require extra circuitry (typically including a separate one-time programmable FPGA) to enable them to be used for this application. This technology adds a cPCI interface device with a simple, flexible, high-performance backend interface supporting multiple backend FPGAs. It includes a mechanism for programming the FPGAs directly via the microprocessor in the embedded system, eliminating specialized hardware, software, and PROM devices and their associated circuitry. It has a direct path to flight, and no extra hardware and minimal software are required to support reprogramming in flight. The device added is currently a small FPGA, but an advantage of this technology is that the design of the device does not change, regardless of the application in which it is being used. This means that it needs to be qualified for flight only once, and is suitable for one-time programmable devices or an application

  17. Dissecting psychiatric spectrum disorders by generative embedding

    Directory of Open Access Journals (Sweden)

    Kay H. Brodersen

    2014-01-01

    Full Text Available This proof-of-concept study examines the feasibility of defining subgroups in psychiatric spectrum disorders by generative embedding, using dynamical system models which infer neuronal circuit mechanisms from neuroimaging data. To this end, we re-analysed an fMRI dataset of 41 patients diagnosed with schizophrenia and 42 healthy controls performing a numerical n-back working-memory task. In our generative-embedding approach, we used parameter estimates from a dynamic causal model (DCM of a visual–parietal–prefrontal network to define a model-based feature space for the subsequent application of supervised and unsupervised learning techniques. First, using a linear support vector machine for classification, we were able to predict individual diagnostic labels significantly more accurately (78% from DCM-based effective connectivity estimates than from functional connectivity between (62% or local activity within the same regions (55%. Second, an unsupervised approach based on variational Bayesian Gaussian mixture modelling provided evidence for two clusters which mapped onto patients and controls with nearly the same accuracy (71% as the supervised approach. Finally, when restricting the analysis only to the patients, Gaussian mixture modelling suggested the existence of three patient subgroups, each of which was characterised by a different architecture of the visual–parietal–prefrontal working-memory network. Critically, even though this analysis did not have access to information about the patients' clinical symptoms, the three neurophysiologically defined subgroups mapped onto three clinically distinct subgroups, distinguished by significant differences in negative symptom severity, as assessed on the Positive and Negative Syndrome Scale (PANSS. In summary, this study provides a concrete example of how psychiatric spectrum diseases may be split into subgroups that are defined in terms of neurophysiological mechanisms specified by a

  18. Selected Texas and US refinery data: taxes, operating costs, capacity, prospects for growth and other information relevant to refinery tax considerations

    Energy Technology Data Exchange (ETDEWEB)

    Holloway, M.L.; White, D.; Clemons, O.

    1977-03-23

    This report provides selected background information relevant to the refinery tax question, but does not discuss economic impacts or the appropriateness of the tax in Texas. The design of tax structures for state and local revenues is a complex matter involving not only technical and legal questions but questions of stability of tax sources, economic effects of the distribution of tax loads among industries and among consumer groups, questions of equity and many others. The consideration of imposing a refinery tax on Texas refining operations is not exception and this report attempts to recognize such complexities.

  19. The Battle River Project: school division implementation of the health-promoting schools approach: assessment for learning: using student health and school capacity measures to inform action and direct policy in a local school district.

    Science.gov (United States)

    Gleddie, Douglas L; Hobin, Erin P

    2011-03-01

    The Battle River Project (BRP) is a school division-level intervention in rural Alberta, Canada, built upon the health-promoting schools approach to health promotion. Using self-reported school and student-level data from administrators and students, the central aim of the BRP is to examine: 'How can the school environment and health behaviours (healthy eating, physical activity and mental wellness) of children and youth be improved when a health-promoting schools model, the Ever Active Schools program, is implemented with school division support?' Evidence used to inform school level changes included students' demographic, behavioral, and psychosocial variables linked to school environment data, comprised of school demographics and administrator-assessed quality of policies, facilities, and programs related to physical activity. Each participating school and the division were provided with a tailored report of their schools' results to reflect, plan and implement for positive health behavior change. The main lesson learned was that sharing school-specific evidence can operate as a catalyst for embedding health promoting policy and practices within the school and division culture.

  20. Cross functional organisational embedded system development

    OpenAIRE

    Lennon, Sophie

    2015-01-01

    peer-reviewed Embedded system development is continuing to grow. Medical, automotive and Internet of Things are just some of the market segments. There is a tight coupling between hardware and software when developing an embedded system, often needing to meet strict performance targets, standards requirements and aggressive schedules. Embedded software developers need to consider hardware requirements in far greater detail as they can have a significant impact on the quality and value of t...

  1. Homomorphic embeddings in n-groups

    Directory of Open Access Journals (Sweden)

    Mona Cristescu

    2013-06-01

    Full Text Available We prove that an cancellative n-groupoid A can be homotopic embedded in an n-group if and only if in A are satisfied all n-ary Malcev conditions. Now we shall prove that in the presence of associative law we obtain homomorphic embeddings. Furthermore, if A has a lateral identity a such embeddings is assured by a subset of n-ary Malcev conditions - unary Malcev conditions.

  2. Equivariant embeddings into smooth toric varieties

    OpenAIRE

    Hausen, Juergen

    2000-01-01

    We characterize embeddability of algebraic varieties into smooth toric varieties and prevarieties. Our embedding results hold also in an equivariant context and thus generalize a well known embedding theorem of Sumihiro on quasiprojective G-varieties. The main idea is to reduce the embedding problem to the affine case. This is done by constructing equivariant affine conoids, a tool which extends the concept of an equivariant affine cone over a projective G-variety to a more general framework.

  3. Enhancing Preschoolers' Executive Functions through Embedding Cognitive Activities in Shared Book Reading

    Science.gov (United States)

    Howard, S. J.; Powell, T.; Vasseleu, E.; Johnstone, S.; Melhuish, E.

    2017-01-01

    Given evidence that early executive functioning sets the stage for a broad range of subsequent outcomes, researchers have sought to identify ways to foster these cognitive capacities. The current series of studies sought to design, develop, and provide evidence for the efficacy of embedding cognitive activities in a commonplace activity--shared…

  4. Embedded Fiber Optic Sensors for Integral Armor

    National Research Council Canada - National Science Library

    Fink, Bruce

    2000-01-01

    This report describes the work performed with Production Products Manufacturing & Sales (PPMS), Inc., under the "Liquid Molded Composite Armor Smart Structures Using Embedded Sensors" Small Business Innovative Research...

  5. Embedding complementarity in HCI methods and techniques

    DEFF Research Database (Denmark)

    Nielsen, Janni; Yssing, Carsten; Tweddell Levinsen, Karin

    2006-01-01

    Differences in cultural contexts constitute differences in cognition, and research has shown that different cultures may use different cognitive tools for perception and reasoning. The cultural embeddings are significant in relation to HCI, because the cultural context is also embedded in the tec......Differences in cultural contexts constitute differences in cognition, and research has shown that different cultures may use different cognitive tools for perception and reasoning. The cultural embeddings are significant in relation to HCI, because the cultural context is also embedded...... the HCI paradigm in system development....

  6. Embedded Diagnostics & Prognostics Wireless Sensing Platforms

    National Research Council Canada - National Science Library

    Ousachi, Mark; Scott, Andrew; Yee, David; Hosmer, Thomas; Daniszewski, Dave

    2004-01-01

    An embedded diagnostics and prognostics architecture affects several aspects associated with military ground vehicles such as improved safety, reduction in maintenance times, weapon system readiness...

  7. Aspect Suite Automation for Embedded Mission Systems

    National Research Council Canada - National Science Library

    Ellis, Brian J; Stankovic, John A

    2005-01-01

    .... The toolkit focuses on using language independent notions of aspects to deal with distributed embedded system issues that include application domain specific code, middleware, the OS, prescriptive...

  8. The embedded operating system project

    Science.gov (United States)

    Campbell, R. H.

    1985-01-01

    The design and construction of embedded operating systems for real-time advanced aerospace applications was investigated. The applications require reliable operating system support that must accommodate computer networks. Problems that arise in the construction of such operating systems, reconfiguration, consistency and recovery in a distributed system, and the issues of real-time processing are reported. A thesis that provides theoretical foundations for the use of atomic actions to support fault tolerance and data consistency in real-time object-based system is included. The following items are addressed: (1) atomic actions and fault-tolerance issues; (2) operating system structure; (3) program development; (4) a reliable compiler for path Pascal; and (5) mediators, a mechanism for scheduling distributed system processes.

  9. Evolution of Deeply Embedded Protostars

    DEFF Research Database (Denmark)

    Frimann, Søren

    to the resolution of the simulation. We also study the distribution of protostellar luminosities in the simulation, and find that both median and spread matches the observed distribution well. Both of these tests are important benchmarks of the simulation since they show that the overall evolution of the protostars...... of this comparison is both to benchmark the simulations by testing if observational results can be reproduced, and to use the simulations to aid in the interpretation of the observations. The research deals with the earliest stages of star formation – the protostellar phase – where the protostars are still embedded...... in the simulation matches the observational results. We also study the occurrence of circumstellar disks in the same simulation and find that they are ubiquitous at all stages of the protostellar evolution. A special emphasis is put on the study of protostellar accretion, which may have important physical...

  10. Embedded EZ-Source Inverters

    DEFF Research Database (Denmark)

    Blaabjerg, Frede; Loh, Poh Chiang; Gao, F.

    2008-01-01

    Z-source inverters are recent topological options proposed for buck-boost energy conversion with a number of possible voltage and current-type circuitries already reported in the literature. Comparing them, a common feature noted is their inclusion of a LC impedance network, placed between the dc...... input source and inverter bridge. This impedance network allows the output end of a voltage-type Z-source inverter to be shorted for voltage-boosting without causing a large current flow, and the terminal current of a current-type inverter to be interrupted for current boosting without introducing over......-voltage oscillations to the system. Therefore, Z-source inverters are in effect safer and less complex, and can be implemented using only passive elements with no additional active semiconductor needed. Believing in the prospects of Z-source inverters, this paper contributes by introducing a new family of embedded EZ-source...

  11. Strategic analytics: towards fully embedding evidence in healthcare decision-making.

    Science.gov (United States)

    Garay, Jason; Cartagena, Rosario; Esensoy, Ali Vahit; Handa, Kiren; Kane, Eli; Kaw, Neal; Sadat, Somayeh

    2015-01-01

    Cancer Care Ontario (CCO) has implemented multiple information technology solutions and collected health-system data to support its programs. There is now an opportunity to leverage these data and perform advanced end-to-end analytics that inform decisions around improving health-system performance. In 2014, CCO engaged in an extensive assessment of its current data capacity and capability, with the intent to drive increased use of data for evidence-based decision-making. The breadth and volume of data at CCO uniquely places the organization to contribute to not only system-wide operational reporting, but more advanced modelling of current and future state system management and planning. In 2012, CCO established a strategic analytics practice to assist the agency's programs contextualize and inform key business decisions and to provide support through innovative predictive analytics solutions. This paper describes the organizational structure, services and supporting operations that have enabled progress to date, and discusses the next steps towards the vision of embedding evidence fully into healthcare decision-making. Copyright © 2014 Longwoods Publishing.

  12. Multichannel analyzer embedded in FPGA

    International Nuclear Information System (INIS)

    Garcia D, A.; Hernandez D, V. M.; Vega C, H. R.; Ordaz G, O. O.; Bravo M, I.

    2017-10-01

    Ionizing radiation has different applications, so it is a very significant and useful tool, which in turn can be dangerous for living beings if they are exposed to uncontrolled doses. However, due to its characteristics, it cannot be perceived by any of the senses of the human being, so that in order to know the presence of it, radiation detectors and additional devices are required to quantify and classify it. A multichannel analyzer is responsible for separating the different pulse heights that are generated in the detectors, in a certain number of channels; according to the number of bits of the analog to digital converter. The objective of the work was to design and implement a multichannel analyzer and its associated virtual instrument, for nuclear spectrometry. The components of the multichannel analyzer were created in VHDL hardware description language and packaged in the Xilinx Vivado design suite, making use of resources such as the ARM processing core that the System on Chip Zynq contains and the virtual instrument was developed on the LabView programming graphics platform. The first phase was to design the hardware architecture to be embedded in the FPGA and for the internal control of the multichannel analyzer the application was generated for the ARM processor in C language. For the second phase, the virtual instrument was developed for the management, control and visualization of the results. The data obtained as a result of the development of the system were observed graphically in a histogram showing the spectrum measured. The design of the multichannel analyzer embedded in FPGA was tested with two different radiation detection systems (hyper-pure germanium and scintillation) which allowed determining that the spectra obtained are similar in comparison with the commercial multichannel analyzers. (Author)

  13. Capacity Building in Land Management

    DEFF Research Database (Denmark)

    Enemark, Stig; Ahene, Rexford

    2003-01-01

    There is a significant need for capacity building in the interdisciplinary area of land management especially in developing countries and countries in transition, to deal with the complex issues of building efficient land information systems and sustainable institutional infrastructures. Capacity...... development in this area. Furthermore, capacity building should ensure that the focus is on building sound institutions and governance rather than just high-level IT-infrastructures.    This overall approach to capacity building in land management is used for implementing a new land policy reform in Malawi...... building in land management is not only a question of establishing a sufficient technological level or sufficient economic resources. It is mainly a question of understanding the interdisciplinary and cross-sectoral nature of land administration systems, and understanding the need for human resource...

  14. The Driving Forces of Subsidiary Absorptive Capacity

    DEFF Research Database (Denmark)

    Schleimer, Stephanie C.; Pedersen, Torben

    2013-01-01

    The study investigates how a multinational corporation (MNC) can promote the absorptive capacity of its subsidiaries. The focus is on what drives the MNC subsidiary's ability to absorb marketing strategies that are initiated by the MNC parent, as well as how the subsidiary enacts on this absorptive...... capacity in order to compete in its focal market. The dual embeddedness of MNC subsidiaries plays a key role in this investigation, as subsidiaries belong to the MNC network and are simultaneously embedded in their host country environment. We argue that subsidiary absorptive capacity is formed...... as a purposeful response to this dual embeddedness. An analysis of marketing strategy absorptions undertaken by 213 subsidiaries reveals that MNCs can assist their subsidiaries to compete in competitive and dynamic focal markets by forming specific organizational mechanisms that are conducive to the development...

  15. Adaptive GDDA-BLAST: fast and efficient algorithm for protein sequence embedding.

    Directory of Open Access Journals (Sweden)

    Yoojin Hong

    2010-10-01

    Full Text Available A major computational challenge in the genomic era is annotating structure/function to the vast quantities of sequence information that is now available. This problem is illustrated by the fact that most proteins lack comprehensive annotations, even when experimental evidence exists. We previously theorized that embedded-alignment profiles (simply "alignment profiles" hereafter provide a quantitative method that is capable of relating the structural and functional properties of proteins, as well as their evolutionary relationships. A key feature of alignment profiles lies in the interoperability of data format (e.g., alignment information, physio-chemical information, genomic information, etc.. Indeed, we have demonstrated that the Position Specific Scoring Matrices (PSSMs are an informative M-dimension that is scored by quantitatively measuring the embedded or unmodified sequence alignments. Moreover, the information obtained from these alignments is informative, and remains so even in the "twilight zone" of sequence similarity (<25% identity. Although our previous embedding strategy was powerful, it suffered from contaminating alignments (embedded AND unmodified and high computational costs. Herein, we describe the logic and algorithmic process for a heuristic embedding strategy named "Adaptive GDDA-BLAST." Adaptive GDDA-BLAST is, on average, up to 19 times faster than, but has similar sensitivity to our previous method. Further, data are provided to demonstrate the benefits of embedded-alignment measurements in terms of detecting structural homology in highly divergent protein sequences and isolating secondary structural elements of transmembrane and ankyrin-repeat domains. Together, these advances allow further exploration of the embedded alignment data space within sufficiently large data sets to eventually induce relevant statistical inferences. We show that sequence embedding could serve as one of the vehicles for measurement of low

  16. Does aging impair the capacity to use stored visuospatial information or online visual control to guide reach-to-grasp reactions evoked by unpredictable balance perturbation?

    Science.gov (United States)

    Cheng, Kenneth C; McKay, Sandra M; King, Emily C; Maki, Brian E

    2012-11-01

    Rapid reach-to-grasp reactions are a prevalent response to sudden loss of balance and play an important role in preventing falls. A previous study indicated that young adults are able to guide functionally effective grasping reactions using visuospatial information (VSI) stored in working memory. The present study addressed whether healthy older adults are also able to use "stored" VSI in this manner or are more dependent on "online" visual control. Liquid-crystal goggles were used to force reliance on either stored or online VSI while reaching to grasp a small handhold in response to unpredictable platform perturbations. A motor-driven device varied the handhold location unpredictably for each trial. Twelve healthy older adults (65-79 years) were compared with 12 young adults (19-29 years) tested in a previous study. Reach-to-grasp reactions were slower and more variable in older adults, regardless of the nature of the available VSI. When forced to rely on stored VSI, both age groups showed a reduction in reach accuracy; however, a tendency to undershoot the handhold was exacerbated in the older adults. Forced reliance on online VSI led to similar delays in both age groups; however, the older adults were more likely to reach with the "wrong" limb (contralateral to the handhold) and/or raise both arms initially (possibly to "buy" more time for final limb selection). Situations that force the central nervous system to rely on either stored or online VSI tend to exacerbate age-related reductions in speed and accuracy of reach-to-grasp balance-recovery reactions. Further work is needed to determine if this increases risk of falling in daily life.

  17. Comparison between the Classic Sensor Embedding Method and the Monitoring Patch Embedding Method for Composites Instrumentation

    Science.gov (United States)

    Torres, M.; Collombet, F.; Douchin, B.; Crouzeix, L.; Grunevald, Y.-H.

    2014-10-01

    In this paper, the classic embedding technique, with bared sensors, and a recent proposal, the monitoring patch, are compared with the aim to improve the composites in-core instrumentation. The monitoring patch emerges with the need to industrialize sensors integration inside composite structures; thus, a complete evaluation of its mechanical performance has to be done. Numerical and experimental campaigns are carried out on elementary carbon-epoxy coupons to evaluate the benefits and disadvantages of this procedure compared with the typical interlayer sensor embedding. The results show that the use of monitoring patch does not affect significantly the mechanical performance of instrumented coupons. An instrumentation transfer function (ITF) is proposed to link the information that electronic devices can detect, the mechanical phenomena around these electronic devices and the measurements data acquired by global or local techniques (DIC, FEM, gauges). A good correlation between the strain data acquired and the strain values calculated by FEM confirms the approach of the ITF to evaluate the influence of the monitoring patch on the measured signal.

  18. Value Relevance of Embedded Value and IFRS 4 Insurance Contracts

    OpenAIRE

    Rebecca Chung-Fern Wu; Audrey Wen-Hsin Hsu

    2011-01-01

    In light of the recent exodus of foreign insurers from Taiwan and the local insurers’ outcries against the International Financial Reporting Standard (IFRS) 4 Insurance Contracts, we examine the value relevance of financial statements for life insurance firms, with particular interests to the embedded value (EV) disclosure. We find that the EV of equity has an incremental information role for book value of equity, which indicates that the accounting mismatching problem in the insurance indust...

  19. Embedded Java security security for mobile devices

    CERN Document Server

    Debbabi, Mourad; Talhi, Chamseddine

    2007-01-01

    Java brings more functionality and versatility to the world of mobile devices, but it also introduces new security threats. This book contains a presentation of embedded Java security and presents the main components of embedded Java. It gives an idea of the platform architecture and is useful for researchers and practitioners.

  20. Multithreading for Embedded Reconfigurable Multicore Systems

    NARCIS (Netherlands)

    Zaykov, P.G.

    2014-01-01

    In this dissertation, we address the problem of performance efficient multithreading execution on heterogeneous multicore embedded systems. By heterogeneous multicore embedded systems we refer to those, which have real-time requirements and consist of processor tiles with General Purpose Processor

  1. Embedding methods for phi4-interaction

    International Nuclear Information System (INIS)

    Hanckowiak, J.

    1985-01-01

    The idea of embedding a given theory in a class of similar theories is applied to quantum field theory in the case of phi 4 -interaction to derive different equations for the generating functional. The number of possible embeddings has been restricted by demanding that for the defined projections of the generating functional a closed system of equations be obtained

  2. Teaching Embedded System Concepts for Technological Literacy

    Science.gov (United States)

    Winzker, M.; Schwandt, A.

    2011-01-01

    A basic understanding of technology is recognized as important knowledge even for students not connected with engineering and computer science. This paper shows that embedded system concepts can be taught in a technological literacy course. An embedded system teaching block that has been used in an electronics module for non-engineers is…

  3. Embedded Systems Design with 8051 Microcontrollers

    DEFF Research Database (Denmark)

    Karakahayov, Zdravko; Winther, Ole; Christensen, Knud Smed

    Textbook on embedded microcontrollers. Example microcontroller family: Intel 8051 with special emphasis on Philips 80C552. Structure, design examples and programming in C and assembler. Hardware - software codesign. EProm emulator.......Textbook on embedded microcontrollers. Example microcontroller family: Intel 8051 with special emphasis on Philips 80C552. Structure, design examples and programming in C and assembler. Hardware - software codesign. EProm emulator....

  4. Isometric embeddings in cosmology and astrophysics

    Indian Academy of Sciences (India)

    Recent interest in higher-dimensional cosmological models has prompted some signifi-cant work on the mathematical technicalities of how one goes about embedding spacetimes into some higher-dimensional space. We survey results in the literature (existence theorems and simple explicit embeddings); briefly outline our ...

  5. Embedded Picture Mnemonics to Learn Letters

    Science.gov (United States)

    Shmidman, Adina; Ehri, Linnea

    2010-01-01

    Can embedded mnemonics ease the task of learning a foreign alphabet? English-speaking preschoolers (N = 36, M = 5;2 years) were taught 10 Hebrew letter-sound relations. Experimental letters were learned with mnemonics that embedded letter shapes in drawings of objects whose shapes resembled the letters and whose English names began with the…

  6. An investigation of embeddings for spherically symmetric ...

    Indian Academy of Sciences (India)

    Abstract. Embeddings into higher dimensions are very important in the study of higher- dimensional theories of our Universe and in high-energy physics. Theorems which have been developed recently guarantee the existence of embeddings of pseudo-Riemannian manifolds into. Einstein spaces and more general ...

  7. TTCN-3 for Distributed Testing Embedded Software

    NARCIS (Netherlands)

    Blom, Stefan; Deiß, Thomas; Ioustinova, Natalia; Kontio, Ari; van de Pol, Jan Cornelis; Rennoch, Axel; Sidorova, Natalia; Virbitskaite, I.; Voronkov, A.

    TTCN-3 is a standardized language for specifying and executing test suites that is particularly popular for testing embedded systems. Prior to testing embedded software in a target environment, the software is usually tested in the host environment. Executing in the host environment often affects

  8. The Mekong Fish Network: expanding the capacity of the people and institutions of the Mekong River Basin to share information and conduct standardized fisheries monitoring

    Science.gov (United States)

    Patricio, Harmony C.; Ainsley, Shaara M.; Andersen, Matthew E.; Beeman, John W.; Hewitt, David A.

    2012-01-01

    The Mekong River is one of the most biologically diverse rivers in the world, and it supports the most productive freshwater fisheries in the world. Millions of people in the Lower Mekong River Basin (LMB) countries of the Union of Myanmar (Burma), Lao People’s Democratic Republic, the Kingdom of Thailand, the Kingdom of Cambodia, and the Socialist Republic of Vietnam rely on the fisheries of the basin to provide a source of protein. The Mekong Fish Network Workshop was convened in Phnom Penh, Cambodia, in February 2012 to discuss the potential for coordinating fisheries monitoring among nations and the utility of establishing standard methods for short- and long-term monitoring and data sharing throughout the LMB. The concept for this network developed out of a frequently cited need for fisheries researchers in the LMB to share their knowledge with other scientists and decisionmakers. A fish monitoring network could be a valuable forum for researchers to exchange ideas, store data, or access general information regarding fisheries studies in the LMB region. At the workshop, representatives from governments, nongovernmental organizations, and universities, as well as participating foreign technical experts, cited a great need for more international cooperation and technical support among them. Given the limited staff and resources of many institutions in the LMB, the success of the proposed network would depend on whether it could offer tools that would provide benefits to network participants. A potential tool discussed at the workshop was a user-friendly, Web-accessible portal and database that could help streamline data entry and storage at the institutional level, as well as facilitate communication and data sharing among institutions. The workshop provided a consensus to establish pilot standardized data collection and database efforts that will be further reviewed by the workshop participants. Overall, workshop participants agreed that this is the type of

  9. Absorptive capacity and smart companies

    Directory of Open Access Journals (Sweden)

    Patricia Moro González

    2014-12-01

    Full Text Available Purpose: The current competitive environment is substantially modifying the organizations’ learning processes due to a global increase of available information allowing this to be transformed into knowledge. This opportunity has been exploited since the nineties by the tools of “Business Analytics” and “Business Intelligence” but, nevertheless, being integrated in the study of new organizational capacities engaged in the process of creating intelligence inside organizations is still an outstanding task. The review of the concept of absorptive capacity and a detailed study from the perspective of this new reality will be the main objective of study of this paper.Design/methodology/approach: By comparing classical absorptive capacity and absorptive capacity from the point of view of information management tools in each one of the three stages of the organizational learning cycle, some gaps of the former are overcome/fulfilled. The academic/bibliographical references provided in this paper have been obtained from ISI web of knowledge, Scopus and Dialnet data bases, supporting the state of affairs on absorptive capacity and thereafter filtering by "Business Intelligence" and "Business Analytics". Specialized websites and Business Schools` Publications there have also been included, crowning the content on information management tools used that are currently used in the strategic consulting.Findings: Our contribution to the literature is the development of "smart absorptive capacity". This is a new capacity emerging from the reformulation of the classical concept of absorptive capacity wherein some aspects of its definition that might have been omitted are emphasized. The result of this new approach is the creation of a new Theoretical Model of Organizational Intelligence, which aims to explain, within the framework of the Resources and Capabilities Theory, the competitive advantage achieved by the so-called smart companies

  10. Depth factors for undrained bearing capacity of circular footing by numerical approach

    Directory of Open Access Journals (Sweden)

    Sadok Benmebarek

    2017-08-01

    Full Text Available The undrained vertical bearing capacity of embedded foundation has been extensively studied using analytical and numerical methods. Through comparing the results of a circular embedded foundation in the literature, a significant difference between the bearing capacity factors and depth factors is observed. Based on the previous research findings, numerical computations using FLAC code are carried out in this study to evaluate the undrained bearing capacity of circular foundations with embedment ratios up to five for different base and side foundation roughness conditions. Unlike the foundation base, the roughness of the foundation side has a significant effect on the bearing capacity. The comparison of the present results with numerical studies available in the literature shows that the discrepancy is related to the procedures used to simulate the foundation side interface conditions and to the estimation of the bearing capacity.

  11. Graphical Model Debugger Framework for Embedded Systems

    DEFF Research Database (Denmark)

    Zeng, Kebin

    2010-01-01

    Model Driven Software Development has offered a faster way to design and implement embedded real-time software by moving the design to a model level, and by transforming models to code. However, the testing of embedded systems has remained at the code level. This paper presents a Graphical Model...... Debugger Framework, providing an auxiliary avenue of analysis of system models at runtime by executing generated code and updating models synchronously, which allows embedded developers to focus on the model level. With the model debugger, embedded developers can graphically test their design model...... and check the running status of the system, which offers a debugging capability on a higher level of abstraction. The framework intends to contribute a tool to the Eclipse society, especially suitable for model-driven development of embedded systems....

  12. Maximizing the optical network capacity.

    Science.gov (United States)

    Bayvel, Polina; Maher, Robert; Xu, Tianhua; Liga, Gabriele; Shevchenko, Nikita A; Lavery, Domaniç; Alvarado, Alex; Killey, Robert I

    2016-03-06

    Most of the digital data transmitted are carried by optical fibres, forming the great part of the national and international communication infrastructure. The information-carrying capacity of these networks has increased vastly over the past decades through the introduction of wavelength division multiplexing, advanced modulation formats, digital signal processing and improved optical fibre and amplifier technology. These developments sparked the communication revolution and the growth of the Internet, and have created an illusion of infinite capacity being available. But as the volume of data continues to increase, is there a limit to the capacity of an optical fibre communication channel? The optical fibre channel is nonlinear, and the intensity-dependent Kerr nonlinearity limit has been suggested as a fundamental limit to optical fibre capacity. Current research is focused on whether this is the case, and on linear and nonlinear techniques, both optical and electronic, to understand, unlock and maximize the capacity of optical communications in the nonlinear regime. This paper describes some of them and discusses future prospects for success in the quest for capacity. © 2016 The Authors.

  13. Field tests on partial embedment effects (embedment effect tests on soil-structure interaction)

    International Nuclear Information System (INIS)

    Kurimoto, O.; Tsunoda, T.; Inoue, T.; Izumi, M.; Kusakabe, K.; Akino, K.

    1993-01-01

    A series of Model Tests of Embedment Effect on Reactor Buildings has been carried out by the Nuclear Power Engineering Corporation (NUPEC), under the sponsorship of the Ministry of International Trade and lndustry (MITI) of Japan. The nuclear reactor buildings are partially embedded due to conditions for the construction or building arrangement in Japan. It is necessary to verify the partial embedment effects by experiments and analytical studies in order to incorporate the effects in the seismic design. Forced vibration tests, therefore, were performed using a model with several types of embedment. Correlated simulation analyses were also performed and the characteristics of partial embedment effects on soil-structure interaction were evaluated. (author)

  14. In Vivo Microscopy Reveals Extensive Embedding of Capillaries within the Sarcolemma of Skeletal Muscle Fibers

    Science.gov (United States)

    Glancy, Brian; Hsu, Li-Yueh; Dao, Lam; Bakalar, Matthew; French, Stephanie; Chess, David J.; Taylor, Joni L.; Picard, Martin; Aponte, Angel; Daniels, Mathew P.; Esfahani, Shervin; Cushman, Samuel; Balaban, Robert S.

    2013-01-01

    Objective To provide insight into mitochondrial function in vivo, we evaluated the 3D spatial relationship between capillaries, mitochondria, and muscle fibers in live mice. Methods 3D volumes of in vivo murine Tibialis anterior muscles were imaged by multi-photon microscopy (MPM). Muscle fiber type, mitochondrial distribution, number of capillaries, and capillary-to-fiber contact were assessed. The role of myoglobin-facilitated diffusion was examined in myoglobin knockout mice. Distribution of GLUT4 was also evaluated in the context of the capillary and mitochondrial network. Results MPM revealed that 43.6 ± 3.3% of oxidative fiber capillaries had ≥ 50% of their circumference embedded in a groove in the sarcolemma, in vivo. Embedded capillaries were tightly associated with dense mitochondrial populations lateral to capillary grooves and nearly absent below the groove. Mitochondrial distribution, number of embedded capillaries, and capillary-to-fiber contact were proportional to fiber oxidative capacity and unaffected by myoglobin knockout. GLUT4 did not preferentially localize to embedded capillaries. Conclusions Embedding capillaries in the sarcolemma may provide a regulatory mechanism to optimize delivery of oxygen to heterogeneous groups of muscle fibers. We hypothesize that mitochondria locate to paravascular regions due to myofibril voids created by embedded capillaries, not to enhance the delivery of oxygen to the mitochondria. PMID:25279425

  15. Total iron binding capacity

    Science.gov (United States)

    ... page: //medlineplus.gov/ency/article/003489.htm Total iron binding capacity To use the sharing features on this page, please enable JavaScript. Total iron binding capacity (TIBC) is a blood test to ...

  16. Responsibility and Capacities

    DEFF Research Database (Denmark)

    Ryberg, Jesper

    2014-01-01

    That responsible moral agency presupposes certain mental capacities, constitutes a widely accepted view among theorists. Moreover, it is often assumed that degrees in the development of the relevant capacities co-vary with degrees of responsibility. In this article it is argued that, the move from...... the view that responsibility requires certain mental capacities to the position that degrees of responsibility co-vary with degrees of the development of the mental capacities, is premature....

  17. A comparative analysis of information acquisition, information ...

    African Journals Online (AJOL)

    A comparative analysis of information acquisition, information management capacity and administrators' decision-making effectiveness in tertiary institutions in ... communication facilities as well as modernise their methods of storage and processing of information by computerising their management information systems.

  18. Entrepreneurial networks as culturally embedded phenomena

    Directory of Open Access Journals (Sweden)

    Vlatka Skokic

    2015-06-01

    Full Text Available Entrepreneurship research concerning networks has largely focused on network structure, content and governance. We believe that further research is required in order to gain a richer understanding of why specific network forms and types originated. The purpose of this paper is to explore the existence, importance, values and meanings of both the informal and formal networks and networking behaviours of small-scale hotel owner-managers embedded in the socio-economic context of Croatia. In order to gain richer and more detailed understanding of entrepreneurial networks and to understand the influence of socio-economic setting on entrepreneurial networking, we have employed qualitative, in-depth study with small hotel owners. Results suggest that entrepreneurs do not establish strong personal and firm-to-firm ties, but rather focus on formal associations. Reported findings identify socio-cultural factors apparently unique to the context of former socialist economy which have the potential to explain the reported networking behaviour. The adopted research approach brings another dimension to existing theoretical underpinnings, which can encourage researchers to extend or revise theories with new contextual variables.

  19. Embedded Systems Programming: Accessing Databases from Esterel

    Directory of Open Access Journals (Sweden)

    2009-03-01

    Full Text Available A current limitation in embedded controller design and programming is the lack of database support in development tools such as Esterel Studio. This article proposes a way of integrating databases and Esterel by providing two application programming interfaces (APIs which enable the use of relational databases inside Esterel programs. As databases and Esterel programs are often executed on different machines, result sets returned as responses to database queries may be processed either locally and according to Esterel’s synchrony hypothesis, or remotely along several of Esterel’s execution cycles. These different scenarios are reflected in the design and usage rules of the two APIs presented in this article, which rely on Esterel’s facilities for extending the language by external data types, external functions, and procedures, as well as tasks. The APIs’ utility is demonstrated by means of a case study modelling an automated warehouse storage system, which is constructed using Lego Mindstorms robotics kits. The robot’s controller is programmed in Esterel in a way that takes dynamic ordering information and the warehouse’s floor layout into account, both of which are stored in a MySQL database.

  20. Embedded Systems Programming: Accessing Databases from Esterel

    Directory of Open Access Journals (Sweden)

    White David

    2008-01-01

    Full Text Available Abstract A current limitation in embedded controller design and programming is the lack of database support in development tools such as Esterel Studio. This article proposes a way of integrating databases and Esterel by providing two application programming interfaces (APIs which enable the use of relational databases inside Esterel programs. As databases and Esterel programs are often executed on different machines, result sets returned as responses to database queries may be processed either locally and according to Esterel's synchrony hypothesis, or remotely along several of Esterel's execution cycles. These different scenarios are reflected in the design and usage rules of the two APIs presented in this article, which rely on Esterel's facilities for extending the language by external data types, external functions, and procedures, as well as tasks. The APIs' utility is demonstrated by means of a case study modelling an automated warehouse storage system, which is constructed using Lego Mindstorms robotics kits. The robot's controller is programmed in Esterel in a way that takes dynamic ordering information and the warehouse's floor layout into account, both of which are stored in a MySQL database.

  1. Stretch Moduli of Ribonucleotide Embedded Short DNAs

    Science.gov (United States)

    Chiu, Hsiang-Chih; Koh, Kyung Duk; Riedo, Elisa; Storici, Francesca

    2013-03-01

    Understanding the mechanical properties of DNA is essential to comprehending the dynamics of many cellular functions. DNA deformations are involved in many mechanisms when genetic information needs to be stored and used. In addition, recent studies have found that Ribonucleotides (rNMPs) are among the most common non-standard nucleotides present in DNA. The presences of rNMPs in DNA might cause mutation, fragility or genotoxicity of chromosome but how they influence the structure and mechanical properties of DNA remains unclear. By means of Atomic Force Microscopy (AFM) based single molecule spectroscopy, we measure the stretch moduli of double stranded DNAs (dsDNA) with 30 base pairs and 5 equally embedded rNMPs. The dsDNAs are anchored on gold substrate via thiol chemistry, while the AFM tip is used to pick up and stretch the dsDNA from its free end through biotin-streptavidin bonding. Our preliminary results indicate that the inclusion of rNMPs in dsDNA might significantly change its stretch modulus, which might be important in some biological processes.

  2. CDMA systems capacity engineering

    CERN Document Server

    Kim, Kiseon

    2004-01-01

    This new hands-on resource tackles capacity planning and engineering issues that are crucial to optimizing wireless communication systems performance. Going beyond the system physical level and investigating CDMA system capacity at the service level, this volume is the single-source for engineering and analyzing systems capacity and resources.

  3. The art of designing embedded systems

    CERN Document Server

    Ganssle, Jack G

    2000-01-01

    Art of Designing Embedded Systems is apart primer and part reference, aimed at practicing embedded engineers, whether working on the code or the hardware design. Embedded systems suffer from a chaotic, ad hoc development process. This books lays out a very simple seven-step plan to get firmware development under control. There are no formal methodologies to master; the ideas are immediately useful. Most designers are unaware that code complexity grows faster than code size. This book shows a number of ways to linearize the complexity/size curve and get products out faster

  4. Secure smart embedded devices, platforms and applications

    CERN Document Server

    Markantonakis, Konstantinos

    2013-01-01

    New generations of IT users are increasingly abstracted from the underlying devices and platforms that provide and safeguard their services. As a result they may have little awareness that they are critically dependent on the embedded security devices that are becoming pervasive in daily modern life. Secure Smart Embedded Devices, Platforms and Applications provides a broad overview of the many security and practical issues of embedded devices, tokens, and their operation systems, platforms and main applications. It also addresses a diverse range of industry/government initiatives and consider

  5. Embedded Solenoid Transformer for Power Conversion

    DEFF Research Database (Denmark)

    2015-01-01

    A resonant power converter for operation in the radio frequency range, preferably in the VHF, comprises at least one PCB-embedded transformer. The transformer is configured for radio frequency operation and comprises a printed circuit board defining a horizontal plane, the printed circuit board...... comprising at least two horizontal conductive layers separated by an isolating layer, a first embedded solenoid forming a primary winding of the transformer and a second embedded solenoid being arranged parallel to the first solenoid and forming a secondary winding of the transformer, wherein the first...

  6. Technology report on Railway Embedded Network solutions

    OpenAIRE

    WAHL, M; BERNOCCHI, M; JUST, P; WEISS, AH; GOIKOETXEA, J; BILLION, J; NEMORIN, J

    2007-01-01

    Deliverable D3D.3.1 Technology report on Railway Embedded Network solutions is a deliverable of Work Package SP3D_WP3 ICOM Specification & Telecom Interfaces of Onboard and Train Train Networks. It takes place within the InteGRail Task 3D_03.1 State of the Art in Embedded Networks. The objectives of this deliverable are: - to consider which embedded communication network technologies are already into ser-vice within the trains; - to analyse Ethernet-based technologies; - to evaluate how Ethe...

  7. Developing Evaluation and Communication Capacity in Information ...

    International Development Research Centre (IDRC) Digital Library (Canada)

    It will result in a trained cadre of regional mentors who are able to facilitate advanced methodologies in both evaluation and communications. Participating flagship project teams will develop their evaluation and communication skills, and gain opportunities for policy and practice change. More will be learned about practical ...

  8. Developing Evaluation and Communication Capacity in Information ...

    International Development Research Centre (IDRC) Digital Library (Canada)

    One of IDRC's main goals is ensuring that high-quality research contributes to change in policy and practice. Meeting that objective can be challenging, given the complex interactions among stakeholders, researchers, and communicators. Evaluation and communication are essential to ensuring that research has an impact ...

  9. Pairwise sparsity preserving embedding for unsupervised subspace learning and classification.

    Science.gov (United States)

    Zhang, Zhao; Yan, Shuicheng; Zhao, Mingbo

    2013-12-01

    Two novel unsupervised dimensionality reduction techniques, termed sparse distance preserving embedding (SDPE) and sparse proximity preserving embedding (SPPE), are proposed for feature extraction and classification. SDPE and SPPE perform in the clean data space recovered by sparse representation and enhanced Euclidean distances over noise removed data are employed to measure pairwise similarities of points. In extracting informative features, SDPE and SPPE aim at preserving pairwise similarities between data points in addition to preserving the sparse characteristics. This paper calculates the sparsest representation of all vectors jointly by a convex optimization. The sparsest codes enable certain local information of data to be preserved, and can endow SDPE and SPPE a natural discriminating power, adaptive neighborhood and robust characteristic against noise and errors in delivering low-dimensional embeddings. We also mathematically show SDPE and SPPE can be effectively extended for discriminant learning in a supervised manner. The validity of SDPE and SPPE is examined by extensive simulations. Comparison with other related state-of-the-art unsupervised algorithms show that promising results are delivered by our techniques.

  10. AdS2 models in an embedding superspace

    International Nuclear Information System (INIS)

    McKeon, D.G.C.; Sherry, T.N.

    2003-01-01

    An embedding superspace, whose bosonic part is the flat (2+1)-dimensional embedding space for AdS 2 , is introduced. Superfields and several supersymmetric models are examined in the embedded AdS 2 superspace

  11. Real-time depth processing for embedded platforms

    Science.gov (United States)

    Rahnama, Oscar; Makarov, Aleksej; Torr, Philip

    2017-05-01

    Obtaining depth information of a scene is an important requirement in many computer-vision and robotics applications. For embedded platforms, passive stereo systems have many advantages over their active counterparts (i.e. LiDAR, Infrared). They are power efficient, cheap, robust to lighting conditions and inherently synchronized to the RGB images of the scene. However, stereo depth estimation is a computationally expensive task that operates over large amounts of data. For embedded applications which are often constrained by power consumption, obtaining accurate results in real-time is a challenge. We demonstrate a computationally and memory efficient implementation of a stereo block-matching algorithm in FPGA. The computational core achieves a throughput of 577 fps at standard VGA resolution whilst consuming less than 3 Watts of power. The data is processed using an in-stream approach that minimizes memory-access bottlenecks and best matches the raster scan readout of modern digital image sensors.

  12. Information, Information, Information

    Science.gov (United States)

    Pratt, John

    2013-01-01

    According to researchers at the University of Southern California (Washington Post, 2011), the world's storage capacity for digital data increased from 0.2 billion gigabytes in 1986 to 276 billion gigabytes by 2007 (at the same time analogue storage capacity increased from 2.6 to 18.9 billion gigabytes). This huge growth is often seen in…

  13. Liquid-phase plasma synthesis of silicon quantum dots embedded in carbon matrix for lithium battery anodes

    International Nuclear Information System (INIS)

    Graphical abstract: - Highlights: • Silicon quantum dots embedded in carbon matrix (SiQDs/C) were fabricated. • SiQDs/C exhibits excellent battery performance as anode materials with high specific capacity. • The good performance was attributed to the marriage of small sized SiQDs and carbon. - Abstract: Silicon quantum dots embedded in carbon matrix (SiQDs/C) nanocomposites were prepared by a novel liquid-phase plasma assisted synthetic process. The SiQDs/C nanocomposites were demonstrated to show high specific capacity, good cycling life and high coulmbic efficiency as anode materials for lithium-ion battery

  14. Liquid-phase plasma synthesis of silicon quantum dots embedded in carbon matrix for lithium battery anodes

    Energy Technology Data Exchange (ETDEWEB)

    Wei, Ying [Institute of Functional Nano and Soft Materials (FUNSOM) and Jiangsu Key Laboratory for Carbon-Based Functional Materials and Devices, Soochow University, Suzhou (China); College of Chemistry and Chemical Engineering, Bohai University, Jinzhou 121000 (China); Yu, Hang; Li, Haitao; Ming, Hai; Pan, Keming; Huang, Hui [Institute of Functional Nano and Soft Materials (FUNSOM) and Jiangsu Key Laboratory for Carbon-Based Functional Materials and Devices, Soochow University, Suzhou (China); Liu, Yang, E-mail: yangl@suda.edu.cn [Institute of Functional Nano and Soft Materials (FUNSOM) and Jiangsu Key Laboratory for Carbon-Based Functional Materials and Devices, Soochow University, Suzhou (China); Kang, Zhenhui, E-mail: zhkang@suda.edu.cn [Institute of Functional Nano and Soft Materials (FUNSOM) and Jiangsu Key Laboratory for Carbon-Based Functional Materials and Devices, Soochow University, Suzhou (China)

    2013-10-15

    Graphical abstract: - Highlights: • Silicon quantum dots embedded in carbon matrix (SiQDs/C) were fabricated. • SiQDs/C exhibits excellent battery performance as anode materials with high specific capacity. • The good performance was attributed to the marriage of small sized SiQDs and carbon. - Abstract: Silicon quantum dots embedded in carbon matrix (SiQDs/C) nanocomposites were prepared by a novel liquid-phase plasma assisted synthetic process. The SiQDs/C nanocomposites were demonstrated to show high specific capacity, good cycling life and high coulmbic efficiency as anode materials for lithium-ion battery.

  15. Metapopulation capacity of evolving fluvial landscapes

    Science.gov (United States)

    Bertuzzo, Enrico; Rodriguez-Iturbe, Ignacio; Rinaldo, Andrea

    2015-04-01

    The form of fluvial landscapes is known to attain stationary network configurations that settle in dynamically accessible minima of total energy dissipation by landscape-forming discharges. Recent studies have highlighted the role of the dendritic structure of river networks in controlling population dynamics of the species they host and large-scale biodiversity patterns. Here, we systematically investigate the relation between energy dissipation, the physical driver for the evolution of river networks, and the ecological dynamics of their embedded biota. To that end, we use the concept of metapopulation capacity, a measure to link landscape structures with the population dynamics they host. Technically, metapopulation capacity is the leading eigenvalue λM of an appropriate "landscape" matrix subsuming whether a given species is predicted to persist in the long run. λM can conveniently be used to rank different landscapes in terms of their capacity to support viable metapopulations. We study how λM changes in response to the evolving network configurations of spanning trees. Such sequence of configurations is theoretically known to relate network selection to general landscape evolution equations through imperfect searches for dynamically accessible states frustrated by the vagaries of Nature. Results show that the process shaping the metric and the topological properties of river networks, prescribed by physical constraints, leads to a progressive increase in the corresponding metapopulation capacity and therefore on the landscape capacity to support metapopulations—with implications on biodiversity in fluvial ecosystems.

  16. An embedded underground navigation system

    CSIR Research Space (South Africa)

    Hlophe, K

    2011-11-01

    Full Text Available Platform pose (localization and orientation) information is a key requirement for autonomous mobile systems. The severe natural conditions and complex terrain of underground mines diminish the capability of most pose estimation systems, especially...

  17. Power for Vehicle Embedded MEMS Sensors Project

    Data.gov (United States)

    National Aeronautics and Space Administration — Embedded wireless sensors of the future will enable flight vehicle systems to be "highly aware" of onboard health and performance parameters, as well as the external...

  18. Costs and benefits of embedded generation

    International Nuclear Information System (INIS)

    1999-11-01

    This project sought to evaluate the costs and benefits of embedded generation in the light of the UK government's consultation paper on the future of green generation, the government's aim to increase the levels of generation from renewable energy sources and cogeneration, the current Review of the Electricity Trading Arrangements, and the form of the Distribution Price Control. Definitions are given for embedded, centrally dispatched, and pooled generation, and licensed suppliers, and commercial and economic values. The commercial and economic value of embedded generation is examined in terms of generation prices, costs to electrical suppliers, losses (electrical, transmission, distribution), and effects on the national grid and distribution network. Diagrams showing the cost elements of trading through the Pool and the elements that are avoided by non-Pool embedded generator trading are presented

  19. Drill Embedded Nanosensors for Planetary Subsurface Exploration

    Data.gov (United States)

    National Aeronautics and Space Administration — We have developed a carbon nanotube (CNT) sensor for water vapor detection under Martian Conditions and the miniaturized electronics can be embedded in the drill bit...

  20. Verification and Performance Analysis for Embedded Systems

    DEFF Research Database (Denmark)

    Larsen, Kim Guldstrand

    2009-01-01

    This talk provides a thorough tutorial of the UPPAAL tool suite for, modeling, simulation, verification, optimal scheduling, synthesis, testing and performance analysis of embedded and real-time systems....

  1. Joint embeddings of scene graphs and images

    OpenAIRE

    Belilovsky, Eugene; Blaschko, Matthew; Kiros, Jamie Ryan; Urtasun, Raquel; Zemel, Richard

    2017-01-01

    Belilovsky E., Blaschko M., Kiros J.R., Urtasun R., Zemel R., ''Joint embeddings of scene graphs and images'', 5th international conference on learning representations workshop track - ICLR 2017, 5 pp., April 24-26, 2017, Toulon, France.

  2. Apparatuses And Systems For Embedded Thermoelectric Generators

    KAUST Repository

    Hussain, Muhammad M.

    2013-08-08

    An apparatus and a system for embedded thermoelectric generators are disclosed. In one embodiment, the apparatus is embedded in an interface where the ambient temperatures on two sides of the interface are different. In one embodiment, the apparatus is fabricated with the interface in integrity as a unitary piece. In one embodiment, the apparatus includes a first thermoelectric material embedded through the interface. The apparatus further includes a second thermoelectric material embedded through the interface. The first thermoelectric material is electrically coupled to the second thermoelectric material. In one embodiment, the apparatus further includes an output structure coupled to the first thermoelectric material and the second thermoelectric material and configured to output a voltage.

  3. A Randomized Model for Communicating Embedded Systems

    NARCIS (Netherlands)

    Bujorianu, M.C.; Bujorianu, L.M.

    2008-01-01

    Nowadays, there is an intense research activity in designing systems that operate in real life, physical environments. This research is spanned by various areas in computer science and engineering: embedded systems, reactive systems, wireless communications, hybrid systems, stochastic processes,

  4. Embedding Moodle into Ubiquitous Computing Environments

    NARCIS (Netherlands)

    Glahn, Christian; Specht, Marcus

    2010-01-01

    Glahn, C., & Specht, M. (2010). Embedding Moodle into Ubiquitous Computing Environments. In M. Montebello, et al. (Eds.), 9th World Conference on Mobile and Contextual Learning (MLearn2010) (pp. 100-107). October, 19-22, 2010, Valletta, Malta.

  5. Multidimensional artificial field embedding with spatial sensitivity

    CSIR Research Space (South Africa)

    Lunga, D

    2013-06-01

    Full Text Available to existing graph embedding tools. Robust parameter estimation is often difficult when the image pixels contain several hundreds of bands. In addition, finding a corresponding high quality lower dimensional coordinate system to map signature relations remains...

  6. Embedded Face Detection and Recognition

    Directory of Open Access Journals (Sweden)

    Göksel Günlü

    2012-10-01

    Full Text Available The need to increase security in open or public spaces has in turn given rise to the requirement to monitor these spaces and analyse those images on-site and on-time. At this point, the use of smart cameras – of which the popularity has been increasing – is one step ahead. With sensors and Digital Signal Processors (DSPs, smart cameras generate ad hoc results by analysing the numeric images transmitted from the sensor by means of a variety of image-processing algorithms. Since the images are not transmitted to a distance processing unit but rather are processed inside the camera, it does not necessitate high-bandwidth networks or high processor powered systems; it can instantaneously decide on the required access. Nonetheless, on account of restricted memory, processing power and overall power, image processing algorithms need to be developed and optimized for embedded processors. Among these algorithms, one of the most important is for face detection and recognition. A number of face detection and recognition methods have been proposed recently and many of these methods have been tested on general-purpose processors. In smart cameras – which are real-life applications of such methods – the widest use is on DSPs. In the present study, the Viola-Jones face detection method – which was reported to run faster on PCs – was optimized for DSPs; the face recognition method was combined with the developed sub-region and mask-based DCT (Discrete Cosine Transform. As the employed DSP is a fixed-point processor, the processes were performed with integers insofar as it was possible. To enable face recognition, the image was divided into sub-regions and from each sub-region the robust coefficients against disruptive elements – like face expression, illumination, etc. – were selected as the features. The discrimination of the selected features was enhanced via LDA (Linear Discriminant Analysis and then employed for recognition. Thanks to its

  7. Thinking about Community Capacity Building & Asset Mapping.

    Science.gov (United States)

    Community Building Resources, Spruce Grove (Alberta).

    This book describes the mindshift that is the key to successful community capacity building and to the development of social and economic structures that nurture local sustainability. Its focus is how the development of community, through community capacity building, connects, animates, and informs citizens. Chapter I introduces community building…

  8. Capacity building for sustainable energy development

    International Nuclear Information System (INIS)

    Rogner, Hans-Holger

    2006-01-01

    Capacity Building for Sustainable Energy Development - Mission: To build capacity in Member States (MS) for comprehensive energy system, economic and environmental analyses to assist in: - making informed policy decisions for sustainable energy development; - assessing the role of nuclear power; - understanding environmental and climate change issues related to energy production and use

  9. Operating system concepts for embedded multicores

    OpenAIRE

    Horst, Oliver; Schmidt, Adriaan

    2014-01-01

    Currently we can see an increasing adoption of multi-core platforms in the area of embedded systems. While these new hardware platforms offer the potential to satisfy the ever increasing demand for computational power, they pose considerable challenges with regard to software development. This affects the application software itself, but also the system design and architecture. Here, we address the consequences for operating system architecture in embedded systems. After dis-cussing current a...

  10. Embedded Lattice and Properties of Gram Matrix

    Directory of Open Access Journals (Sweden)

    Futa Yuichi

    2017-03-01

    Full Text Available In this article, we formalize in Mizar [14] the definition of embedding of lattice and its properties. We formally define an inner product on an embedded module. We also formalize properties of Gram matrix. We formally prove that an inverse of Gram matrix for a rational lattice exists. Lattice of Z-module is necessary for lattice problems, LLL (Lenstra, Lenstra and Lov´asz base reduction algorithm [16] and cryptographic systems with lattice [17].

  11. "You're just one of the group when you're embedded": report from a mixed-method investigation of the research-embedded health librarian experience.

    Science.gov (United States)

    Greyson, Devon; Surette, Soleil; Dennett, Liz; Chatterley, Trish

    2013-10-01

    Embedded librarianship has received much attention in recent years. A model of embeddedness rarely discussed to date is that of research-embedded health librarians (REHLs). This study explores the characteristics of Canadian REHLs and the situations in which they are employed. The authors employed a sequential, mixed-method design. An online survey provided descriptive statistics about REHLs' positions and work experiences. This informed a series of focus group interviews that expanded upon the survey. Through constant comparison, we conducted qualitative descriptive analysis of the interviews. Based on twenty-nine survey responses and four group interviews, we created a portrait of a "typical" REHL and discovered themes relevant to REHL work. REHLs may identify more strongly as researchers than as librarians, with corresponding professional needs and rewards. REHLs value "belonging" to the research team, involvement in full project lifecycles, and in-depth relationships with nonlibrarian colleagues. Despite widely expressed job satisfaction, many REHLs struggle with isolation from library and information science peers and relative lack of job security. REHLs differ from non-embedded health librarians, as well as from other types of embedded librarians. REHLs' work also differs from just a decade or two ago, prior to widespread Internet access to digital resources. Given that research-embedded librarianship appears to be a distinct and growing subset of health librarianship, libraries, master's of library and information science programs, and professional associations will need to respond to the support and education needs of REHLs or risk losing them to the health research field.

  12. The effects of magnetic nanoparticles embedded with SA/PVA and pH on chemical-mechanical polishing wastewater and magnetic particle regeneration and recycle

    Directory of Open Access Journals (Sweden)

    Chung-Fu Huang

    2017-12-01

    Full Text Available Experiments were conducted using sodium alginate (SA and polyvinyl alcohol (PVA as embedded materials for Fe3O4 magnetic nanoparticles (MNPs. The materials provided excellent protection to the embedded MNPs in low-pH conditions. This study observed and compared the adsorption capacity of the unaltered and embedded MNPs. At pH 3 and without additional magnetic fields, the wastewater turbidity removal rate of the embedded MNPs reached a maximum of 95%, similar to that of the unaltered MNPs. Moreover, this study examined the recyclability and reusability of the unaltered and embedded MNPs and discovered that the embedded MNPs could be reused up to seven times. Overall, the use of SA/PVA prevented MNPs from disintegrating and contaminating the wastewater through the dissolution of Fe ions. SA and PVA also increased the reusability of the unaltered MNPs.

  13. Accurate basis set truncation for wavefunction embedding

    Science.gov (United States)

    Barnes, Taylor A.; Goodpaster, Jason D.; Manby, Frederick R.; Miller, Thomas F.

    2013-07-01

    Density functional theory (DFT) provides a formally exact framework for performing embedded subsystem electronic structure calculations, including DFT-in-DFT and wavefunction theory-in-DFT descriptions. In the interest of efficiency, it is desirable to truncate the atomic orbital basis set in which the subsystem calculation is performed, thus avoiding high-order scaling with respect to the size of the MO virtual space. In this study, we extend a recently introduced projection-based embedding method [F. R. Manby, M. Stella, J. D. Goodpaster, and T. F. Miller III, J. Chem. Theory Comput. 8, 2564 (2012)], 10.1021/ct300544e to allow for the systematic and accurate truncation of the embedded subsystem basis set. The approach is applied to both covalently and non-covalently bound test cases, including water clusters and polypeptide chains, and it is demonstrated that errors associated with basis set truncation are controllable to well within chemical accuracy. Furthermore, we show that this approach allows for switching between accurate projection-based embedding and DFT embedding with approximate kinetic energy (KE) functionals; in this sense, the approach provides a means of systematically improving upon the use of approximate KE functionals in DFT embedding.

  14. Theory of Mind and embedding of perspective: A psychological test of a literary "sweet spot"

    Science.gov (United States)

    Whalen, D H; Zunshine, Lisa; Holquist, Michael

    2012-01-01

    Theory of Mind (ToM) has been proposed to explain social interactions, with real people but also with fictional characters, by interpreting their mind as well as our own. "Perspective embedding" exploits ToM by placing events in characters' minds (e.g., "he remembered she was home"). Three levels of embedment, common in literature, may be a "sweet spot" that provides enough information about a character's motivation, but not a confusing over-abundance. Here, we use short vignettes with 1 or 3 characters and 0-5 levels of perspective embedding in two reading studies to see whether these preferences might be related to processing ease. Self-paced readers were fastest with one level of embedment, increasingly slower as embedment increased; vignettes without embedment were approximately as slow as level 4. With both self-paced and imposed timing, error rates on probe questions increased only at the fifth level. Readers seem to prefer literary texts in which ToM operations are obvious due to embedding of perspectives within the narrative but still somewhat challenging.

  15. Expansion Techniques of Embedding Audio Watermark Data Rate for Constructing Ubiquitous Acoustic Spaces

    Science.gov (United States)

    Modegi, Toshio

    We are proposing “Ubiquitous Acoustic Spaces”, where each sound source can emit some address information with audio signals and make us automatically access to its related cyber space, using handheld devices such as cellphones. In order to realize this concept, we have considered three types of extraction methods, which were an acoustic modulation, an audio fingerprint, and an audio watermark technique. Then we have proposed a novel audio watermarking technique, which enables contactless asynchronous detection of embedded audio watermarks through speaker and microphone devices. However its embedding data rate was around 10 [bps], which was not sufficient for embedding generally used URL address texts. Therefore, we have extended the embedding frequency range and proposed a duplicated embedding algorithm, which uses both previously proposed frequency division method and temporal division method together. By these improvements, possible embedding data rate could be extended to 61.5 [bps], and we could extract watermarks through public telephone networks, even from a cell phone sound source. In this paper, we describe abstracts of our improved watermark embedding and extracting algorithms, and experimental results of watermark extraction precision on several audio signal capturing conditions.

  16. CESAR cost-efficient methods and processes for safety-relevant embedded systems

    CERN Document Server

    Wahl, Thomas

    2013-01-01

    The book summarizes the findings and contributions of the European ARTEMIS project, CESAR, for improving and enabling interoperability of methods, tools, and processes to meet the demands in embedded systems development across four domains - avionics, automotive, automation, and rail. The contributions give insight to an improved engineering and safety process life-cycle for the development of safety critical systems. They present new concept of engineering tools integration platform to improve the development of safety critical embedded systems and illustrate capacity of this framework for end-user instantiation to specific domain needs and processes. They also advance state-of-the-art in component-based development as well as component and system validation and verification, with tool support. And finally they describe industry relevant evaluated processes and methods especially designed for the embedded systems sector as well as easy adoptable common interoperability principles for software tool integratio...

  17. Strengthening Agricultural Research Capacity for Viable Extension ...

    African Journals Online (AJOL)

    Strengthening Agricultural Research Capacity for Viable Extension Policies in Nigeria: An Exploration of Ricoeur's Hermeneutic Theory for Analysing Extension Research. ... Progressively more, researchers use hermeneutic philosophy to inform the conduct of interpretive research. Analogy between the philosophical ...

  18. Capacity Statement for Railways

    DEFF Research Database (Denmark)

    Landex, Alex

    2007-01-01

    The subject “Railway capacity” is a combination of the capacity consumption and how the capacity is utilized. The capacity utilization of railways can be divided into 4 core elements: The number of trains; the average speed; the heterogeneity of the operation; and the stability. This article desc...... trains. This is due to network effects in the railway system and due to the fact that more trains results in lower punctuality....

  19. The French capacity mechanism

    International Nuclear Information System (INIS)

    2014-01-01

    The French capacity mechanism has been design to ensure security of supply in the context of the energy transition. This energy transition challenges the electricity market design with several features: peak load growth, the development of renewables, demand response,... To ensure security of supply in this context, a capacity mechanism is being implemented in France. It is a market wide capacity obligation on electricity suppliers, based on market principles. Suppliers are responsible for forecasting their obligation, which corresponds to their contribution to winter peak load, and must procure enough capacity certificates to meet their obligations. Capacity certificates are granted to capacities through a certification process, which assesses their contribution to security of supply on the basis of availability commitments. This certification process is technology neutral and performance based, associated with controls and penalties in case of non compliance. Demand Side is fully integrated in the market, either through the reduction of suppliers' capacity obligation or direct participation after certification. In addition to the expected benefits in terms of security of supply, the French capacity market will foster the development of demand response. The participation of foreign capacities will require adaptations which are scheduled in a road-map, and could pave the way for further European integration of energy policies. (authors)

  20. Runtime reconfiguration in networked embedded systems design and testing practices

    CERN Document Server

    Exarchakos, George

    2016-01-01

    This book focuses on the design and testing of large-scale, distributed signal processing systems, with a special emphasis on systems architecture, tooling and best practices. Architecture modeling, model checking, model-based evaluation and model-based design optimization occupy central roles. Target systems with resource constraints on processing, communication or energy supply require non-trivial methodologies to model their non-functional requirements, such as timeliness, robustness, lifetime and “evolution” capacity. Besides the theoretical foundations of the methodology, an engineering process and toolchain are described. Real-world cases illustrate the theory and practice tested by the authors in the course of the European project ARTEMIS DEMANES. The book can be used as a “cookbook” for designers and practitioners working with complex embedded systems like sensor networks for the structural integrity monitoring of steel bridges, and distributed micro-climate control systems for greenhouses and...

  1. Food consumption and waste and the embedded carbon, water and ecological footprints of households in China.

    Science.gov (United States)

    Song, Guobao; Li, Mingjing; Semakula, Henry Musoke; Zhang, Shushen

    2015-10-01

    Strategies for reducing food waste and developing sustainable diets require information about the impacts of consumption behavior and waste generation on climatic, water, and land resources. We quantified the carbon, water, and ecological footprints of 17,110 family members of Chinese households, covering 1935 types of foods, by combining survey data with available life-cycle assessment data sets. We also summarized the patterns of both food consumption and waste generation and analyzed the factors influencing the observed trends. The average person wasted (consumed) 16 (415) kg of food at home annually, equivalent to 40 (1080) kg CO2e, 18 (673) m(3), and 173 (4956) gm(2) for the carbon, water and ecological footprints, respectively. The generation of food waste was highly correlated with consumption for various food groups. For example, vegetables, rice, and wheat were consumed the most and accounted for the most waste. In addition to the three plant-derived food groups, pork and aquatic products also contributed greatly to embedded footprints. The data obtained in this study could be used for assessing national food security or the carrying capacity of resources. Copyright © 2015 Elsevier B.V. All rights reserved.

  2. Gaussian Embeddings for Collaborative Filtering

    OpenAIRE

    Dos Santos , Ludovic; Piwowarski , Benjamin; Gallinari , Patrick

    2017-01-01

    International audience; Most collaborative ltering systems, such as matrix factorization, use vector representations for items and users. Those representations are deterministic, and do not allow modeling the uncertainty of the learned representation, which can be useful when a user has a small number of rated items (cold start), or when there is connict-ing information about the behavior of a user or the ratings of an item. In this paper, we leverage recent works in learning Gaussian embeddi...

  3. Semi-Supervised Tensor-Based Graph Embedding Learning and Its Application to Visual Discriminant Tracking.

    Science.gov (United States)

    Hu, Weiming; Gao, Jin; Xing, Junliang; Zhang, Chao; Maybank, Stephen

    2017-01-01

    An appearance model adaptable to changes in object appearance is critical in visual object tracking. In this paper, we treat an image patch as a two-order tensor which preserves the original image structure. We design two graphs for characterizing the intrinsic local geometrical structure of the tensor samples of the object and the background. Graph embedding is used to reduce the dimensions of the tensors while preserving the structure of the graphs. Then, a discriminant embedding space is constructed. We prove two propositions for finding the transformation matrices which are used to map the original tensor samples to the tensor-based graph embedding space. In order to encode more discriminant information in the embedding space, we propose a transfer-learning- based semi-supervised strategy to iteratively adjust the embedding space into which discriminative information obtained from earlier times is transferred. We apply the proposed semi-supervised tensor-based graph embedding learning algorithm to visual tracking. The new tracking algorithm captures an object's appearance characteristics during tracking and uses a particle filter to estimate the optimal object state. Experimental results on the CVPR 2013 benchmark dataset demonstrate the effectiveness of the proposed tracking algorithm.

  4. Heat Capacity Analysis Report

    International Nuclear Information System (INIS)

    Findikakis, A.

    2004-01-01

    The purpose of this report is to provide heat capacity values for the host and surrounding rock layers for the waste repository at Yucca Mountain. The heat capacity representations provided by this analysis are used in unsaturated zone (UZ) flow, transport, and coupled processes numerical modeling activities, and in thermal analyses as part of the design of the repository to support the license application. Among the reports that use the heat capacity values estimated in this report are the ''Multiscale Thermohydrologic Model'' report, the ''Drift Degradation Analysis'' report, the ''Ventilation Model and Analysis Report, the Igneous Intrusion Impacts on Waste Packages and Waste Forms'' report, the ''Dike/Drift Interactions report, the Drift-Scale Coupled Processes (DST and TH Seepage) Models'' report, and the ''In-Drift Natural Convection and Condensation'' report. The specific objective of this study is to determine the rock-grain and rock-mass heat capacities for the geologic stratigraphy identified in the ''Mineralogic Model (MM3.0) Report'' (BSC 2004 [DIRS 170031], Table 1-1). This report provides estimates of the heat capacity for all stratigraphic layers except the Paleozoic, for which the mineralogic abundance data required to estimate the heat capacity are not available. The temperature range of interest in this analysis is 25 C to 325 C. This interval is broken into three separate temperature sub-intervals: 25 C to 95 C, 95 C to 114 C, and 114 C to 325 C, which correspond to the preboiling, trans-boiling, and postboiling regimes. Heat capacity is defined as the amount of energy required to raise the temperature of a unit mass of material by one degree (Nimick and Connolly 1991 [DIRS 100690], p. 5). The rock-grain heat capacity is defined as the heat capacity of the rock solids (minerals), and does not include the effect of water that exists in the rock pores. By comparison, the rock-mass heat capacity considers the heat capacity of both solids and pore

  5. Embedded computer systems for control applications in EBR-II

    International Nuclear Information System (INIS)

    Carlson, R.B.; Start, S.E.

    1993-01-01

    The purpose of this paper is to describe the embedded computer systems approach taken at Experimental Breeder Reactor II (EBR-II) for non-safety related systems. The hardware and software structures for typical embedded systems are presented The embedded systems development process is described. Three examples are given which illustrate typical embedded computer applications in EBR-II

  6. Embedding operational research into national disease control programme: lessons from 10 years of experience in Indonesia

    Directory of Open Access Journals (Sweden)

    Yodi Mahendradhata

    2014-10-01

    Full Text Available There is growing recognition that operational research (OR should be embedded into national disease control programmes. However, much of the current OR capacity building schemes are still predominantly driven by international agencies with limited integration into national disease control programmes. We demonstrated that it is possible to achieve a more sustainable capacity building effort across the country by establishing an OR group within the national tuberculosis (TB control programme in Indonesia. Key challenges identified include long-term financial support, limited number of scientific publications, and difficulties in documenting impact on programmatic performance. External evaluation has expressed concerns in regard to utilisation of OR in policy making. Efforts to address this concern have been introduced recently and led to indications of increased utilisation of research evidence in policy making by the national TB control programme. Embedding OR in national disease control programmes is key in establishing an evidence-based disease control programme.

  7. Autonomous Multicamera Tracking on Embedded Smart Cameras

    Directory of Open Access Journals (Sweden)

    Bischof Horst

    2007-01-01

    Full Text Available There is currently a strong trend towards the deployment of advanced computer vision methods on embedded systems. This deployment is very challenging since embedded platforms often provide limited resources such as computing performance, memory, and power. In this paper we present a multicamera tracking method on distributed, embedded smart cameras. Smart cameras combine video sensing, processing, and communication on a single embedded device which is equipped with a multiprocessor computation and communication infrastructure. Our multicamera tracking approach focuses on a fully decentralized handover procedure between adjacent cameras. The basic idea is to initiate a single tracking instance in the multicamera system for each object of interest. The tracker follows the supervised object over the camera network, migrating to the camera which observes the object. Thus, no central coordination is required resulting in an autonomous and scalable tracking approach. We have fully implemented this novel multicamera tracking approach on our embedded smart cameras. Tracking is achieved by the well-known CamShift algorithm; the handover procedure is realized using a mobile agent system available on the smart camera network. Our approach has been successfully evaluated on tracking persons at our campus.

  8. Diverse Power Iteration Embeddings and Its Applications

    Energy Technology Data Exchange (ETDEWEB)

    Huang H.; Yoo S.; Yu, D.; Qin, H.

    2014-12-14

    Abstract—Spectral Embedding is one of the most effective dimension reduction algorithms in data mining. However, its computation complexity has to be mitigated in order to apply it for real-world large scale data analysis. Many researches have been focusing on developing approximate spectral embeddings which are more efficient, but meanwhile far less effective. This paper proposes Diverse Power Iteration Embeddings (DPIE), which not only retains the similar efficiency of power iteration methods but also produces a series of diverse and more effective embedding vectors. We test this novel method by applying it to various data mining applications (e.g. clustering, anomaly detection and feature selection) and evaluating their performance improvements. The experimental results show our proposed DPIE is more effective than popular spectral approximation methods, and obtains the similar quality of classic spectral embedding derived from eigen-decompositions. Moreover it is extremely fast on big data applications. For example in terms of clustering result, DPIE achieves as good as 95% of classic spectral clustering on the complex datasets but 4000+ times faster in limited memory environment.

  9. Embedded Web Technology: Applying World Wide Web Standards to Embedded Systems

    Science.gov (United States)

    Ponyik, Joseph G.; York, David W.

    2002-01-01

    Embedded Systems have traditionally been developed in a highly customized manner. The user interface hardware and software along with the interface to the embedded system are typically unique to the system for which they are built, resulting in extra cost to the system in terms of development time and maintenance effort. World Wide Web standards have been developed in the passed ten years with the goal of allowing servers and clients to intemperate seamlessly. The client and server systems can consist of differing hardware and software platforms but the World Wide Web standards allow them to interface without knowing about the details of system at the other end of the interface. Embedded Web Technology is the merging of Embedded Systems with the World Wide Web. Embedded Web Technology decreases the cost of developing and maintaining the user interface by allowing the user to interface to the embedded system through a web browser running on a standard personal computer. Embedded Web Technology can also be used to simplify an Embedded System's internal network.

  10. IMB3-Miner: Mining Induced/Embedded Subtrees by Constraining the Level of Embedding

    NARCIS (Netherlands)

    Tan, H.; Dillon, T.S.; Hadzic, F.; Chang, E.; Feng, L.

    Tree mining has recently attracted a lot of interest in areas such as Bioinformatics, XML mining, Web mining, etc. We are mainly concerned with mining frequent induced and embedded subtrees. While more interesting patterns can be obtained when mining embedded subtrees, unfortunately mining such

  11. Prospects for OPEC capacity

    International Nuclear Information System (INIS)

    Adelman, M.A.

    1995-01-01

    OPEC capacity is not exogenous, but responds to demand. Price increases have not been caused by capacity shortages. OPEC nations find it hard to set aside even very small portions of their revenues for oil investment, despite its extreme profitability. Foreign investors face high risks. Production sharing makes their after-tax return even more unstable. (author)

  12. Role of efflux pumps in the antibiotic resistance of bacteria embedded in a biofilm

    OpenAIRE

    Soto, Sara M.

    2013-01-01

    Biofilms are complex microbial associations anchored to abiotic or biotic surfaces, embedded in extracellular matrix produced by the biofilms themselves where they interact with each other and the environment. One of the main properties of biofilms is their capacity to be more resistant to antimicrobial agents than planktonic cells. Efflux pumps have been reported as one of the mechanisms responsible for the antimicrobial resistance in biofilm structures. Evidence of the role of efflux pump i...

  13. Isometric embeddings of 2-spheres by embedding flow for applications in numerical relativity

    International Nuclear Information System (INIS)

    Jasiulek, Michael; Korzyński, Mikołaj

    2012-01-01

    We present a numerical method for solving Weyl's embedding problem which consists in finding a global isometric embedding of a positively curved and positive-definite spherical 2-metric into the Euclidean 3-space. The method is based on a construction introduced by Weingarten and was used in Nirenberg's proof of Weyl's conjecture. The target embedding results as the endpoint of an embedding flow in R 3 beginning at the unit sphere's embedding. We employ spectral methods to handle functions on the surface and to solve various (non)linear elliptic PDEs. The code requires no additional input or steering from the operator and its convergence is guaranteed by the Nirenberg arguments. Possible applications in 3 + 1 numerical relativity range from quasi-local mass and momentum measures to coarse-graining in inhomogeneous cosmological models. (paper)

  14. Locally Linear Embedding for dimensionality reduction in QSAR

    Science.gov (United States)

    L'Heureux, P.-J.; Carreau, J.; Bengio, Y.; Delalleau, O.; Yue, S. Y.

    2004-07-01

    Current practice in Quantitative Structure Activity Relationship (QSAR) methods usually involves generating a great number of chemical descriptors and then cutting them back with variable selection techniques. Variable selection is an effective method to reduce the dimensionality but may discard some valuable information. This paper introduces Locally Linear Embedding (LLE), a local non-linear dimensionality reduction technique, that can statistically discover a low-dimensional representation of the chemical data. LLE is shown to create more stable representations than other non-linear dimensionality reduction algorithms, and to be capable of capturing non-linearity in chemical data.

  15. Laser assisted embedding of nanoparticles into metallic materials

    International Nuclear Information System (INIS)

    Lin Dong; Suslov, Sergey; Ye Chang; Liao Yiliang; Liu, C. Richard; Cheng, Gary J.

    2012-01-01

    This paper reports a methodology of half-embedding nanoparticles into metallic materials. Transparent and opaque nanoparticles are chosen to demonstrate the process of laser assisted nanoparticle embedding. Dip coating method is used to coat transparent or opaque nanoparticle on the surface of metallic material. Nanoparticles are embedded into substrate by laser irradiation. In this study, the mechanism and process of nanoparticle embedding are investigated. It is found both transparent and opaque nanoparticles embedding are with high densities and good uniformities.

  16. Polarizable Density Embedding Coupled Cluster Method

    DEFF Research Database (Denmark)

    Hršak, Dalibor; Olsen, Jógvan Magnus Haugaard; Kongsted, Jacob

    2018-01-01

    by an embedding potential consisting of a set of fragment densities obtained from calculations on isolated fragments with a quantum-chemistry method such as Hartree-Fock (HF) or Kohn-Sham density functional theory (KS-DFT) and dressed with a set of atom-centered anisotropic dipole-dipole polarizabilities......). In the PDE-CC method, the smaller, but chemically important core region is described with a high-level CC method. The environment surrounding the core region can be separated into two levels of description: an inner and an outer region. The effect of the inner region on the core region is described......We present the theory and implementation of the polarizable density embedding (PDE) model in combination with coupled cluster (CC) theory (PDE-CC). This model has been implemented in the Dalton quantum chemistry program by adapting the CC code to the polarizable embedding library (PElib...

  17. Design Technology for Heterogeneous Embedded Systems

    CERN Document Server

    O'Connor, Ian; Piguet, Christian

    2012-01-01

    Designing technology to address the problem of heterogeneous embedded systems, while remaining compatible with standard “More Moore” flows, i.e. capable of handling simultaneously both silicon complexity and system complexity, represents one of the most important challenges facing the semiconductor industry today. While the micro-electronics industry has built its own specific design methods to focus mainly on the management of complexity through the establishment of abstraction levels, the emergence of device heterogeneity requires new approaches enabling the satisfactory design of physically heterogeneous embedded systems for the widespread deployment of such systems. This book, compiled largely from a set of contributions from participants of past editions of the Winter School on Heterogeneous Embedded Systems Design Technology (FETCH), proposes a broad and holistic overview of design techniques used to tackle the various facets of heterogeneity in terms of technology and opportunities at the physical ...

  18. Heterogeneous Multicore Processor Technologies for Embedded Systems

    CERN Document Server

    Uchiyama, Kunio; Kasahara, Hironori; Nojiri, Tohru; Noda, Hideyuki; Tawara, Yasuhiro; Idehara, Akio; Iwata, Kenichi; Shikano, Hiroaki

    2012-01-01

    To satisfy the higher requirements of digitally converged embedded systems, this book describes heterogeneous multicore technology that uses various kinds of low-power embedded processor cores on a single chip. With this technology, heterogeneous parallelism can be implemented on an SoC, and greater flexibility and superior performance per watt can then be achieved. This book defines the heterogeneous multicore architecture and explains in detail several embedded processor cores including CPU cores and special-purpose processor cores that achieve highly arithmetic-level parallelism. The authors developed three multicore chips (called RP-1, RP-2, and RP-X) according to the defined architecture with the introduced processor cores. The chip implementations, software environments, and applications running on the chips are also explained in the book. Provides readers an overview and practical discussion of heterogeneous multicore technologies from both a hardware and software point of view; Discusses a new, high-p...

  19. Determining the age of young embedded clusters

    Science.gov (United States)

    Stead, J. J.; Hoare, M. G.

    2011-12-01

    A new Monte Carlo method has been developed in order to derive ages of young embedded clusters in massive star-forming regions where there is strong differential reddening. After foreground and infrared excess source candidates are removed, each cluster candidate star is individually dereddened. Simulated clusters are constructed using isochrones, an initial mass function, realistic photometric errors, simulated background field populations and extinction distributions. These synthetic clusters are then dereddened in the same way as the real data, obtained from a deep near-infrared survey, and used to derive the ages of three embedded clusters. Results were found to be consistent with those determined using spectrophotometric methods. This new method provides way to determine the ages of embedded clusters when only photometric data are available and there is strong differential reddening.

  20. Spatially Partitioned Embedded Runge--Kutta Methods

    KAUST Repository

    Ketcheson, David I.

    2013-10-30

    We study spatially partitioned embedded Runge--Kutta (SPERK) schemes for partial differential equations (PDEs), in which each of the component schemes is applied over a different part of the spatial domain. Such methods may be convenient for problems in which the smoothness of the solution or the magnitudes of the PDE coefficients vary strongly in space. We focus on embedded partitioned methods as they offer greater efficiency and avoid the order reduction that may occur in nonembedded schemes. We demonstrate that the lack of conservation in partitioned schemes can lead to nonphysical effects and propose conservative additive schemes based on partitioning the fluxes rather than the ordinary differential equations. A variety of SPERK schemes are presented, including an embedded pair suitable for the time evolution of fifth-order weighted nonoscillatory spatial discretizations. Numerical experiments are provided to support the theory.

  1. Dimensionality Reduction of Laplacian Embedding for 3D Mesh Reconstruction

    Science.gov (United States)

    Mardhiyah, I.; Madenda, S.; Salim, R. A.; Wiryana, I. M.

    2016-06-01

    Laplacian eigenbases are the important thing that we have to process from 3D mesh information. The information of geometric 3D mesh are include vertices locations and the connectivity of graph. Due to spectral analysis, geometric 3D mesh for large and sparse graphs with thousands of vertices is not practical to compute all the eigenvalues and eigenvector. Because of that, in this paper we discuss how to build 3D mesh reconstruction by reducing dimensionality on null eigenvalue but retain the corresponding eigenvector of Laplacian Embedding to simplify mesh processing. The result of reducing information should have to retained the connectivity of graph. The advantages of dimensionality reduction is for computational eficiency and problem simplification. Laplacian eigenbases is the point of dimensionality reduction for 3D mesh reconstruction. In this paper, we show how to reconstruct geometric 3D mesh after approximation step of 3D mesh by dimensionality reduction. Dimensionality reduction shown by Laplacian Embedding matrix. Furthermore, the effectiveness of 3D mesh reconstruction method will evaluated by geometric error, differential error, and final error. Numerical approximation error of our result are small and low complexity of computational.

  2. Feasibility study on embedded transport core calculations

    International Nuclear Information System (INIS)

    Ivanov, B.; Zikatanov, L.; Ivanov, K.

    2007-01-01

    The main objective of this study is to develop an advanced core calculation methodology based on embedded diffusion and transport calculations. The scheme proposed in this work is based on embedded diffusion or SP 3 pin-by-pin local fuel assembly calculation within the framework of the Nodal Expansion Method (NEM) diffusion core calculation. The SP 3 method has gained popularity in the last 10 years as an advanced method for neutronics calculation. NEM is a multi-group nodal diffusion code developed, maintained and continuously improved at the Pennsylvania State University. The developed calculation scheme is a non-linear iteration process, which involves cross-section homogenization, on-line discontinuity factors generation, and boundary conditions evaluation by the global solution passed to the local calculation. In order to accomplish the local calculation, a new code has been developed based on the Finite Elements Method (FEM), which is capable of performing both diffusion and SP 3 calculations. The new code will be used in the framework of the NEM code in order to perform embedded pin-by-pin diffusion and SP 3 calculations on fuel assembly basis. The development of the diffusion and SP 3 FEM code is presented first following by its application to several problems. Description of the proposed embedded scheme is provided next as well as the obtained preliminary results of the C3 MOX benchmark. The results from the embedded calculations are compared with direct pin-by-pin whole core calculations in terms of accuracy and efficiency followed by conclusions made about the feasibility of the proposed embedded approach. (authors)

  3. Density Functional Theory Embedding for Correlated Wavefunctions

    Science.gov (United States)

    2014-01-01

    agua , and A. Aguado, J. Chem. Phys. 129, 184104 (2008). [32] O. Roncero, A. Zanchet, P. Villarreal, and A. Aguado, J. Chem. Phys. 131, 234110 (2009...Morrison, and R. G. Parr, J. Chem. Phys. 50, 2138 (1994). [32] O. Roncero, M. P. de Lara-Castells, P. Villarreal, F. Flores, J. Ortega, M. Pani- agua , and A...systems with low-lying virtual orbitals, such as transition metal complexes. 67 3.3.1 Embedding for Open-Shell Systems For an open-shell embedded

  4. Application of invariant embedding to reactor physics

    CERN Document Server

    Shimizu, Akinao; Parsegian, V L

    1972-01-01

    Application of Invariant Embedding to Reactor Physics describes the application of the method of invariant embedding to radiation shielding and to criticality calculations of atomic reactors. The authors intend to show how this method has been applied to realistic problems, together with the results of applications which will be useful to shielding design. The book is organized into two parts. Part A deals with the reflection and transmission of gamma rays by slabs. The chapters in this section cover topics such as the reflection and transmission problem of gamma rays; formulation of the probl

  5. Embedding Complementarity in HCI Methods and Techniques

    DEFF Research Database (Denmark)

    Nielsen, Janni; Yssing, Carsten; Tweddell Levinsen, Karin

    Differences in cultural contexts constitute differences in cognition, and research has shown that different cultures may use different cognitive tools for perception and reasoning. The cultural embeddings are significant in relation to HCI, because the cultural context is also embedded...... in the techniques and the tools that we apply. We lack a framework for discussing what and who we are, when we talk about a person as the user of an ICT system that has to be designed, developed and implemented. As a framework, we suggest a theory of complementary positions that insists on solid accounts from all...... the HCI paradigm in system development....

  6. Tools for Embedded Computing Systems Software

    Science.gov (United States)

    1978-01-01

    A workshop was held to assess the state of tools for embedded systems software and to determine directions for tool development. A synopsis of the talk and the key figures of each workshop presentation, together with chairmen summaries, are presented. The presentations covered four major areas: (1) tools and the software environment (development and testing); (2) tools and software requirements, design, and specification; (3) tools and language processors; and (4) tools and verification and validation (analysis and testing). The utility and contribution of existing tools and research results for the development and testing of embedded computing systems software are described and assessed.

  7. Embedded Operating System for MicroBlaze

    Directory of Open Access Journals (Sweden)

    M. Šimek

    2006-01-01

    Full Text Available This paper presents a work in progress on experiments with embedded operating systems for the MicroBlaze processor. Modern embedded systems based on a configurable platform incorporating a similar processor core are gaining importance with the ongoing effort to minimize cost and development time. After an overview of the configurable platform based on this processor core, we devote our attention to uClinux OS. This OS has been successfully ported for the MicroBlaze processor, and we present our current experience with it. At the end of the paper we discuss several possible booting strategies and recommend further development of U-BOOT. 

  8. Model-based testing for embedded systems

    CERN Document Server

    Zander, Justyna; Mosterman, Pieter J

    2011-01-01

    What the experts have to say about Model-Based Testing for Embedded Systems: "This book is exactly what is needed at the exact right time in this fast-growing area. From its beginnings over 10 years ago of deriving tests from UML statecharts, model-based testing has matured into a topic with both breadth and depth. Testing embedded systems is a natural application of MBT, and this book hits the nail exactly on the head. Numerous topics are presented clearly, thoroughly, and concisely in this cutting-edge book. The authors are world-class leading experts in this area and teach us well-used

  9. Physical Activity Recognition from Smartphone Embedded Sensors

    DEFF Research Database (Denmark)

    Prudêncio, João; Aguiar, Ana; Roetter, Daniel Enrique Lucani

    2013-01-01

    The ubiquity of smartphones has motivated efforts to use the embedded sensors to detect various aspects of user context to transparently provide personalized and contextualized services to the user. One relevant piece of context is the physical activity of the smartphone user. In this paper, we...... propose a novel set of features for distinguishing five physical activities using only sensors embedded in the smartphone. Specifically, we introduce features that are normalized using the orientation sensor such that horizontal and vertical movements are explicitly computed. We evaluate a neural network...

  10. Embedded adhesive connection for laminated glass plates

    DEFF Research Database (Denmark)

    Hansen, Jens Zangenberg; Poulsen, S.H.; Bagger, A.

    2012-01-01

    The structural behavior of a new connection design, the embedded adhesive connection, used for laminated glass plates is investigated. The connection consists of an aluminum plate encapsulated in-between two adjacent triple layered laminated glass plates. Fastening between glass and aluminum...... is ensured using a structural adhesive. At first, the elastic and viscoelastic material properties of the adhesive are identified where the influence of load-rate and failure properties are also examined. Through an inverse analysis using the finite element method, the experimental observations...... usage in a design situation. The embedded connection shows promising potential as a future fastening system for load-carrying laminated glass plates....

  11. The art of programming embedded systems

    CERN Document Server

    Ganssle, Jack

    1992-01-01

    Embedded systems are products such as microwave ovens, cars, and toys that rely on an internal microprocessor. This book is oriented toward the design engineer or programmer who writes the computer code for such a system. There are a number of problems specific to the embedded systems designer, and this book addresses them and offers practical solutions.Key Features* Offers cookbook routines, algorithms, and design techniques* Includes tips for handling debugging management and testing* Explores the philosophy of tightly coupling software and hardware in programming and dev

  12. Communicating embedded systems software and design

    CERN Document Server

    Jard, Claude

    2013-01-01

    The increased complexity of embedded systems coupled with quick design cycles to accommodate faster time-to-market requires increased system design productivity that involves both model-based design and tool-supported methodologies. Formal methods are mathematically-based techniques and provide a clean framework in which to express requirements and models of the systems, taking into account discrete, stochastic and continuous (timed or hybrid) parameters with increasingly efficient tools. This book deals with these formal methods applied to communicating embedded systems by presenting the

  13. Excited States in Solution through Polarizable Embedding

    DEFF Research Database (Denmark)

    Olsen, Jógvan Magnus; Aidas, Kestutis; Kongsted, Jacob

    2010-01-01

    We present theory and implementation of an advanced quantum mechanics/molecular mechanics (QM/MM) approach using a fully self-consistent polarizable embedding (PE) scheme. It is a polarizable layered model designed for effective yet accurate inclusion of an anisotropic medium in a quantum...... a nonequilibrium formulation of the environmental response. In our formulation of polarizable embedding we explicitly take into account the full self-consistent many-body environmental response from both ground and excited states. The PE-DFT method can be applied to any molecular system, e.g., proteins...

  14. Available transmission capacity assessment

    Directory of Open Access Journals (Sweden)

    Škokljev Ivan

    2012-01-01

    Full Text Available Effective power system operation requires the analysis of vast amounts of information. Power market activities expose power transmission networks to high-level power transactions that threaten normal, secure operation of the power system. When there are service requests for a specific sink/source pair in a transmission system, the transmission system operator (TSO must allocate the available transfer capacity (ATC. It is common that ATC has a single numerical value. Additionally, the ATC must be calculated for the base case configuration of the system, while generation dispatch and topology remain unchanged during the calculation. Posting ATC on the internet should benefit prospective users by aiding them in formulating their requests. However, a single numerical value of ATC offers little for prospect for analysis, planning, what-if combinations, etc. A symbolic approach to the power flow problem (DC power flow and ATC offers a numerical computation at the very end, whilst the calculation beforehand is performed by using symbols for the general topology of the electrical network. Qualitative analysis of the ATC using only qualitative values, such as increase, decrease or no change, offers some new insights into ATC evaluation, multiple transactions evaluation, value of counter-flows and their impact etc. Symbolic analysis in this paper is performed after the execution of the linear, symbolic DC power flow. As control variables, the mathematical model comprises linear security constraints, ATC, PTDFs and transactions. The aim is to perform an ATC sensitivity study on a five nodes/seven lines transmission network, used for zonal market activities tests. A relatively complicated environment with twenty possible bilateral transactions is observed.

  15. Vedr.: Military capacity building

    DEFF Research Database (Denmark)

    Larsen, Josefine Kühnel; Struwe, Lars Bangert

    2013-01-01

    Military capacity building has increasingly become an integral part of Danish defence. Military capacity is a new way of thinking Danish defence and poses a new set of challenges and opportunities for the Danish military and the Political leadership. On the 12th of december, PhD. Candidate Josefine...... Kühnel Larsen and researcher Lars Bangert Struwe of CMS had organized a seminar in collaboration with Royal Danish Defense Colleg and the East African Security Governance Network. The seminar focused on some of the risks involved in Military capacity building and how these risks are dealt with from...

  16. Embedding librarianship in learning management systems a how-to-do-it manual for librarians

    CERN Document Server

    Tumbleson, Beth E

    2014-01-01

    Information literacy instruction is best when it is integrated into actual research, and in higher education that means embedding librarianship into the learning management system (LMS). This new How-To-Do-It Manual is geared towards academic librarians already working with classes in an LMS as well as those considering how to begin a pilot. Tumbleson and Burke, who surveyed 280 librarians for information on related activities, also use their own first-hand experience implementing an embedded librarianship program at their university to offer guidance and encouragement.

  17. Design of remote weather monitor system based on embedded web database

    International Nuclear Information System (INIS)

    Gao Jiugang; Zhuang Along

    2010-01-01

    The remote weather monitoring system is designed by employing the embedded Web database technology and the S3C2410 microprocessor as the core. The monitoring system can simultaneously monitor the multi-channel sensor signals, and can give a dynamic Web pages display of various types of meteorological information on the remote computer. It gives a elaborated introduction of the construction and application of the Web database under the embedded Linux. Test results show that the client access the Web page via the GPRS or the Internet, acquires data and uses an intuitive graphical way to display the value of various types of meteorological information. (authors)

  18. Improving emotion recognition systems by embedding cardiorespiratory coupling

    International Nuclear Information System (INIS)

    Valenza, Gaetano; Lanatá, Antonio; Scilingo, Enzo Pasquale

    2013-01-01

    This work aims at showing improved performances of an emotion recognition system embedding information gathered from cardiorespiratory (CR) coupling. Here, we propose a novel methodology able to robustly identify up to 25 regions of a two-dimensional space model, namely the well-known circumplex model of affect (CMA). The novelty of embedding CR coupling information in an autonomic nervous system-based feature space better reveals the sympathetic activations upon emotional stimuli. A CR synchrogram analysis was used to quantify such a coupling in terms of number of heartbeats per respiratory period. Physiological data were gathered from 35 healthy subjects emotionally elicited by means of affective pictures of the international affective picture system database. In this study, we finely detected five levels of arousal and five levels of valence as well as the neutral state, whose combinations were used for identifying 25 different affective states in the CMA plane. We show that the inclusion of the bivariate CR measures in a previously developed system based only on monovariate measures of heart rate variability, respiration dynamics and electrodermal response dramatically increases the recognition accuracy of a quadratic discriminant classifier, obtaining more than 90% of correct classification per class. Finally, we propose a comprehensive description of the CR coupling during sympathetic elicitation adapting an existing theoretical nonlinear model with external driving. The theoretical idea behind this model is that the CR system is comprised of weakly coupled self-sustained oscillators that, when exposed to an external perturbation (i.e. sympathetic activity), becomes synchronized and less sensible to input variations. Given the demonstrated role of the CR coupling, this model can constitute a general tool which is easily embedded in other model-based emotion recognition systems. (paper)

  19. Improving emotion recognition systems by embedding cardiorespiratory coupling.

    Science.gov (United States)

    Valenza, Gaetano; Lanatá, Antonio; Scilingo, Enzo Pasquale

    2013-04-01

    This work aims at showing improved performances of an emotion recognition system embedding information gathered from cardiorespiratory (CR) coupling. Here, we propose a novel methodology able to robustly identify up to 25 regions of a two-dimensional space model, namely the well-known circumplex model of affect (CMA). The novelty of embedding CR coupling information in an autonomic nervous system-based feature space better reveals the sympathetic activations upon emotional stimuli. A CR synchrogram analysis was used to quantify such a coupling in terms of number of heartbeats per respiratory period. Physiological data were gathered from 35 healthy subjects emotionally elicited by means of affective pictures of the international affective picture system database. In this study, we finely detected five levels of arousal and five levels of valence as well as the neutral state, whose combinations were used for identifying 25 different affective states in the CMA plane. We show that the inclusion of the bivariate CR measures in a previously developed system based only on monovariate measures of heart rate variability, respiration dynamics and electrodermal response dramatically increases the recognition accuracy of a quadratic discriminant classifier, obtaining more than 90% of correct classification per class. Finally, we propose a comprehensive description of the CR coupling during sympathetic elicitation adapting an existing theoretical nonlinear model with external driving. The theoretical idea behind this model is that the CR system is comprised of weakly coupled self-sustained oscillators that, when exposed to an external perturbation (i.e. sympathetic activity), becomes synchronized and less sensible to input variations. Given the demonstrated role of the CR coupling, this model can constitute a general tool which is easily embedded in other model-based emotion recognition systems.

  20. Bearing capacity of shell strip footing on reinforced sand

    OpenAIRE

    W.R. Azzam; A.M. Nasr

    2015-01-01

    In this paper, the ultimate load capacities of shell foundations on unreinforced and reinforced sand were determined by laboratory model tests. A series of loading tests were carried out on model shell footing with and without single layer of reinforcement. The tests were done for shell foundation at different shell embedment depth and subgrade density. The results were compared with those for flat foundations without reinforcement. The model test results were verified using finite element an...

  1. Real-time Kernel Implementation Practice Program for Embedded Software Engineers' Education and its Evaluation

    Science.gov (United States)

    Yoshida, Toshio; Matsumoto, Masahide; Seo, Katsuhiko; Chino, Shinichiro; Sugino, Eiji; Sawamoto, Jun; Koizumi, Hisao

    A real-time kernel (henceforth RTK) is in the center place of embedded software technology, and the understanding of RTK is indispensable for the embedded system design. To implement RTK, it is necessary to understand languages that describe RTK software program code, system programming manners, software development tools, CPU on that RTK runs and the interface between software and hardware, etc. in addition to understanding of RTK itself. This means RTK implementation process largely covers embedded software implementation process. Therefore, it is thought that RTK implementation practice program is very effective as a means of the acquisition of common embedded software skill in addition to deeper acquisition of RTK itself. In this paper, we propose to apply RTK implementing practice program to embedded software engineers educational program. We newly developed very small and step-up type RTK named μK for educational use, and held a seminar that used μK as a teaching material for the students of information science and engineers of the software house. As a result, we confirmed that RTK implementation practice program is very effective for the acquisition of embedded software common skill.

  2. Capacity at Railway Stations

    DEFF Research Database (Denmark)

    Landex, Alex

    2011-01-01

    zone(s) the possible conflicts with other trains (also in the opposite direction) are taken into account leading to more trustworthy results. Although the UIC 406 methodology proposes that the railway network should be divided into line sections when trains turn around and when the train order...... is changed, this paper recommends that the railway lines are not always be divided. In case trains turn around on open (single track) line, the capacity consumption may be too low if a railway line is divided. The same can be the case if only few trains are overtaken at an overtaking station. For dead end......Stations do have other challenges regarding capacity than open lines as it is here the traffic is dispatched. The UIC 406 capacity method that can be used to analyse the capacity consumption can be exposed in different ways at stations which may lead to different results. Therefore, stations need...

  3. Visual attention capacity

    DEFF Research Database (Denmark)

    Habekost, Thomas; Starrfelt, Randi

    2009-01-01

    Psychophysical studies have identified two distinct limitations of visual attention capacity: processing speed and apprehension span. Using a simple test, these cognitive factors can be analyzed by Bundesen's Theory of Visual Attention (TVA). The method has strong specificity and sensitivity...

  4. Embedded Evaluation: Blending Training and Assessment

    Science.gov (United States)

    McCowan, Richard J.; McCowan, Sheila C.

    1999-01-01

    This paper describes an evaluation model called embedded training evaluation (ETE) which can be used to evaluate different types of training ranging from basic skills through constructed learning. The model was developed for the New York State Child Welfare/Child Protection Services Common Core training program. ETE is particularly effective in…

  5. Code Compression Schems for Embedded Processors

    Science.gov (United States)

    Horti, Deepa; Jamge, S. B.

    2010-11-01

    Code density is a major requirement in embedded system design since it not only reduces the need for the scarce re-source memory but also implicitly improves further important design parameters like power consumption and performance. Within this paper we have introduced a novel and an efficient approach that belongs to statistical compression schemes as well as dictionary based compression schemes.

  6. On Embedding a Semigroup in a Group

    Indian Academy of Sciences (India)

    ias

    algebra textbook, as well as one on number theory, and also had an interest in the history of mathematics”. Mal- cev gave an example to show that there are cancella- tive semigroups which cannot be embedded in a group. Commenting on Sushkevich's persistence with his erro- neous ideas even after being proved wrong ...

  7. Concurrent Design of Embedded Control Software

    NARCIS (Netherlands)

    Groothuis, M.A.; Frijns, Raymond; Voeten, Jeroen; Broenink, Johannes F.; Margaria, T.; Padberg, J.; Taentzer, G.; Levendovszky, T.; Lengyel, L.; Karsai, G.; Hardebolle, C.

    2009-01-01

    Embedded software design for mechatronic systems is becoming an increasingly time-consuming and error-prone task. In order to cope with the heterogeneity and complexity, a systematic model-driven design approach is needed, where several parts of the system can be designed concurrently. There is

  8. Are Central European countries’ financial institutions embedded?

    NARCIS (Netherlands)

    Jong, E. de; Hooijdonk, C.J.J. van

    2010-01-01

    The fall of the Iron Curtain in 1989 was one of the causes of an increased interest in the relation between economics and culture. An important idea of this literature is that social and economic systems will function properly if they are embedded in a corresponding value system. Although some

  9. Securing Embedded Software using Software Dynamic Translation

    Science.gov (United States)

    2007-02-01

    including disruption of critical services , financial loss, and loss of life. Because critically functionality in embedded systems is increasingly...SeuigEbdddSfwr 4usin Sofwar Dynamic Tanslatio lac W, Daido an -o i Unvrst of Virginia~ Proble " Emedde sytemskeybuilingblocs o naton’ Threat model

  10. The Embedding Theorems of Whitney and Nash

    Indian Academy of Sciences (India)

    IAS Admin

    We begin by briefly motivating the idea of a manifold and then discuss the embedding the- orems of Whitney and Nash that allow us to view these objects inside appropriately large Eu- clidean spaces. 1. Introduction. Let us begin by motivating the concept of a manifold. Start with the unit circle C in the plane given by x2.

  11. Web Service Architecture Framework for Embedded Devices

    Science.gov (United States)

    Yanzick, Paul David

    2009-01-01

    The use of Service Oriented Architectures, namely web services, has become a widely adopted method for transfer of data between systems across the Internet as well as the Enterprise. Adopting a similar approach to embedded devices is also starting to emerge as personal devices and sensor networks are becoming more common in the industry. This…

  12. Embedding Fonts in MetaPost Output

    Science.gov (United States)

    2016-04-19

    files. This article addresses a specific technique for performing such an embedding. 1 Introduction MetaPost is one of the most elegant means for gen...other with the process described in Sec- tion 3. Both figures will be defined in a MetaPost source file .1 In order to use LATEX to process the text

  13. Integrated Design Tools for Embedded Control Systems

    NARCIS (Netherlands)

    Jovanovic, D.S.; Hilderink, G.H.; Broenink, Johannes F.; Karelse, F.

    2001-01-01

    Currently, computer-based control systems are still being implemented using the same techniques as 10 years ago. The purpose of this project is the development of a design framework, consisting of tools and libraries, which allows the designer to build high reliable heterogeneous real-time embedded

  14. Approximate Orthogonal Sparse Embedding for Dimensionality Reduction.

    Science.gov (United States)

    Lai, Zhihui; Wong, Wai Keung; Xu, Yong; Yang, Jian; Zhang, David

    2016-04-01

    Locally linear embedding (LLE) is one of the most well-known manifold learning methods. As the representative linear extension of LLE, orthogonal neighborhood preserving projection (ONPP) has attracted widespread attention in the field of dimensionality reduction. In this paper, a unified sparse learning framework is proposed by introducing the sparsity or L1-norm learning, which further extends the LLE-based methods to sparse cases. Theoretical connections between the ONPP and the proposed sparse linear embedding are discovered. The optimal sparse embeddings derived from the proposed framework can be computed by iterating the modified elastic net and singular value decomposition. We also show that the proposed model can be viewed as a general model for sparse linear and nonlinear (kernel) subspace learning. Based on this general model, sparse kernel embedding is also proposed for nonlinear sparse feature extraction. Extensive experiments on five databases demonstrate that the proposed sparse learning framework performs better than the existing subspace learning algorithm, particularly in the cases of small sample sizes.

  15. On Verification Modelling of Embedded Systems

    NARCIS (Netherlands)

    Brinksma, Hendrik; Mader, Angelika H.

    Computer-aided verification of embedded systems hinges on the availability of good verification models of the systems at hand. Such models must be much simpler than full design models or specifications to be of practical value, because of the unavoidable combinatorial complexities in the

  16. Sharp embeddings of Besov-type spaces

    Czech Academy of Sciences Publication Activity Database

    Gurka, P.; Opic, Bohumír

    2007-01-01

    Roč. 208, č. 1 (2007), s. 1-43 ISSN 0377-0427 R&D Projects: GA ČR GA201/05/2033 Institutional research plan: CEZ:AV0Z10190503 Keywords : Besov spaces with slowly varying smoothness * Lorentz-Karamata spaces * sharp embeddings Subject RIV: BA - General Mathematics Impact factor: 0.943, year: 2007

  17. The Embedding Theorems of Whitney and Nash

    Indian Academy of Sciences (India)

    We begin by briefly motivating the idea of amanifold and then discuss the embedding theorems of Whitney and Nash that allow us toview these objects inside appropriately large Euclidean spaces. Resonance – Journal of Science Education. Current Issue : Vol. 23, Issue 2. Current Issue Volume 23 | Issue 2. February 2018.

  18. The Embedding Theorems of Whitney and Nash

    Indian Academy of Sciences (India)

    We begin by briefly motivating the idea of amanifold and then discuss the embedding theorems of Whitney and Nash that allow us toview these objects inside appropriately large Euclidean spaces. Resonance – Journal of Science Education. Current Issue : Vol. 23, Issue 4. Current Issue Volume 23 | Issue 4. April 2018.

  19. Adaptive Embedded Digital System for Plasma Diagnostics

    Science.gov (United States)

    González, Angel; Rodríguez, Othoniel; Mangual, Osvaldo; Ponce, Eduardo; Vélez, Xavier

    2014-05-01

    An Adaptive Embedded Digital System to perform plasma diagnostics using electrostatic probes was developed at the Plasma Engineering Laboratory at Polytechnic University of Puerto Rico. The system will replace the existing instrumentation at the Laboratory, using reconfigurable hardware to minimize the equipment and software needed to perform diagnostics. The adaptability of the design resides on the possibility of replacing the computational algorithm on the fly, allowing to use the same hardware for different probes. The system was prototyped using Very High Speed Integrated Circuits Hardware Description Language (VHDL) into an Field Programmable Gate Array (FPGA) board. The design of the Embedded Digital System includes a Zero Phase Digital Filter, a Derivative Unit, and a Computational Unit designed using the VHDL-2008 Support Library. The prototype is able to compute the Plasma Electron Temperature and Density from a Single Langmuir probe. The system was tested using real data previously acquired from a single Langmuir probe. The plasma parameters obtained from the embedded system were compared with results computed using matlab yielding excellent matching. The new embedded system operates on 4096 samples versus 500 on the previous system, and completes its computations in 26 milliseconds compared with about 15 seconds on the previous system.

  20. An investigation of embeddings for spherically symmetric ...

    Indian Academy of Sciences (India)

    These results provide a technique that can be used to determine solutions for such embeddings. Here we consider local isometric ... Jothi Moodley1 Gareth Amery1. Astrophysics and Cosmology Research Unit, School of Mathematical Sciences, University of KwaZulu-Natal, Private Bag X54001, Durban 4000, South Africa ...