WorldWideScience

Sample records for information embedding capacity

  1. Improved Secret Image Sharing Scheme in Embedding Capacity without Underflow and Overflow.

    Science.gov (United States)

    Pang, Liaojun; Miao, Deyu; Li, Huixian; Wang, Qiong

    2015-01-01

    Computational secret image sharing (CSIS) is an effective way to protect a secret image during its transmission and storage, and thus it has attracted lots of attentions since its appearance. Nowadays, it has become a hot topic for researchers to improve the embedding capacity and eliminate the underflow and overflow situations, which is embarrassing and difficult to deal with. The scheme, which has the highest embedding capacity among the existing schemes, has the underflow and overflow problems. Although the underflow and overflow situations have been well dealt with by different methods, the embedding capacities of these methods are reduced more or less. Motivated by these concerns, we propose a novel scheme, in which we take the differential coding, Huffman coding, and data converting to compress the secret image before embedding it to further improve the embedding capacity, and the pixel mapping matrix embedding method with a newly designed matrix is used to embed secret image data into the cover image to avoid the underflow and overflow situations. Experiment results show that our scheme can improve the embedding capacity further and eliminate the underflow and overflow situations at the same time.

  2. Graph embedding with rich information through heterogeneous graph

    KAUST Repository

    Sun, Guolei

    2017-11-12

    Graph embedding, aiming to learn low-dimensional representations for nodes in graphs, has attracted increasing attention due to its critical application including node classification, link prediction and clustering in social network analysis. Most existing algorithms for graph embedding only rely on the topology information and fail to use the copious information in nodes as well as edges. As a result, their performance for many tasks may not be satisfactory. In this thesis, we proposed a novel and general framework for graph embedding with rich text information (GERI) through constructing a heterogeneous network, in which we integrate node and edge content information with graph topology. Specially, we designed a novel biased random walk to explore the constructed heterogeneous network with the notion of flexible neighborhood. Our sampling strategy can compromise between BFS and DFS local search on heterogeneous graph. To further improve our algorithm, we proposed semi-supervised GERI (SGERI), which learns graph embedding in an discriminative manner through heterogeneous network with label information. The efficacy of our method is demonstrated by extensive comparison experiments with 9 baselines over multi-label and multi-class classification on various datasets including Citeseer, Cora, DBLP and Wiki. It shows that GERI improves the Micro-F1 and Macro-F1 of node classification up to 10%, and SGERI improves GERI by 5% in Wiki.

  3. Study on the bearing capacity of embedded chute on shield tunnel segment

    Science.gov (United States)

    Fanzhen, Zhang; Jie, Bu; Zhibo, Su; Qigao, Hu

    2018-05-01

    The method of perforation and steel implantation is often used to fix and install pipeline, cables and other facilities in the shield tunnel, which would inevitably do damage to the precast segments. In order to reduce the damage and the resulting safety and durability problems, embedded chute was set at the equipment installation in one shield tunnel. Finite element models of segment concrete and steel are established in this paper. When water-soil pressure calculated separately and calculated together, the mechanical property of segment is studied. The bearing capacity and deformation of segment are analysed before and after embedding the chute. Research results provide a reference for similar shield tunnel segment engineering.

  4. Embedded Design Research of Iris Information Acquisition System

    Directory of Open Access Journals (Sweden)

    Huiyan Xu

    2014-09-01

    Full Text Available In view of the limitation of traditional identification, it is easy to lose and copy keys, cards or ID cards, and it is easy to forget the password, so we designed an embedded application system based on the iris identification technology, which can realize the functions of gathering, inputting, and registering the iris information and identification. The hardware circuit was designed by using advanced RISC machines (ARM embedded microprocessor as the core. The iris sensor was used to gather the iris information, and the development of software was accomplished with the embedded OS Windows CE. The system can be used on the company entrance guard system, customs security of airport and criminal identification.

  5. Finite Element Analysis of the Effect on Edge Distance of the Tensile Bearing Capacity of Embedded Hanging Parts

    Directory of Open Access Journals (Sweden)

    Meng Xian Hong

    2016-01-01

    Full Text Available In order to explore the trend of tensile bearing capacity of embedded hanging parts when change the edge distance. Based on the finite element analysis software ABAQUS, the four simulation model was established. The buried depth and strength of concrete remain unchanged, but the edge distance was gradient change. By the load - displacement curve of every model known, the greater the edge distance, the greater the bearing capacity. When the edge distance reaches 1.5 times buried depth, the effect of increasing edge distance for improving the bearing capacity will be impaired.

  6. Depressive thoughts limit working memory capacity in dysphoria.

    Science.gov (United States)

    Hubbard, Nicholas A; Hutchison, Joanna L; Turner, Monroe; Montroy, Janelle; Bowles, Ryan P; Rypma, Bart

    2016-01-01

    Dysphoria is associated with persistence of attention on mood-congruent information. Longer time attending to mood-congruent information for dysphoric individuals (DIs) detracts from goal-relevant information processing and should reduce working memory (WM) capacity. Study 1 showed that DIs and non-DIs have similar WM capacities. Study 2 embedded depressive information into a WM task. Compared to non-DIs, DIs showed significantly reduced WM capacity for goal-relevant information in this task. Study 3 replicated results from Studies 1 and 2, and further showed that DIs had a significantly greater association between processing speed and recall on the depressively modified WM task compared to non-DIs. The presence of inter-task depressive information leads to DI-related decreased WM capacity. Results suggest dysphoria-related WM capacity deficits when depressive thoughts are present. WM capacity deficits in the presence of depressive thoughts are a plausible mechanism to explain day-to-day memory and concentration difficulties associated with depressed mood.

  7. StegNet: Mega Image Steganography Capacity with Deep Convolutional Network

    Directory of Open Access Journals (Sweden)

    Pin Wu

    2018-06-01

    Full Text Available Traditional image steganography often leans interests towards safely embedding hidden information into cover images with payload capacity almost neglected. This paper combines recent deep convolutional neural network methods with image-into-image steganography. It successfully hides the same size images with a decoding rate of 98.2% or bpp (bits per pixel of 23.57 by changing only 0.76% of the cover image on average. Our method directly learns end-to-end mappings between the cover image and the embedded image and between the hidden image and the decoded image. We further show that our embedded image, while with mega payload capacity, is still robust to statistical analysis.

  8. Visual words assignment via information-theoretic manifold embedding.

    Science.gov (United States)

    Deng, Yue; Li, Yipeng; Qian, Yanjun; Ji, Xiangyang; Dai, Qionghai

    2014-10-01

    Codebook-based learning provides a flexible way to extract the contents of an image in a data-driven manner for visual recognition. One central task in such frameworks is codeword assignment, which allocates local image descriptors to the most similar codewords in the dictionary to generate histogram for categorization. Nevertheless, existing assignment approaches, e.g., nearest neighbors strategy (hard assignment) and Gaussian similarity (soft assignment), suffer from two problems: 1) too strong Euclidean assumption and 2) neglecting the label information of the local descriptors. To address the aforementioned two challenges, we propose a graph assignment method with maximal mutual information (GAMI) regularization. GAMI takes the power of manifold structure to better reveal the relationship of massive number of local features by nonlinear graph metric. Meanwhile, the mutual information of descriptor-label pairs is ultimately optimized in the embedding space for the sake of enhancing the discriminant property of the selected codewords. According to such objective, two optimization models, i.e., inexact-GAMI and exact-GAMI, are respectively proposed in this paper. The inexact model can be efficiently solved with a closed-from solution. The stricter exact-GAMI nonparametrically estimates the entropy of descriptor-label pairs in the embedding space and thus leads to a relatively complicated but still trackable optimization. The effectiveness of GAMI models are verified on both the public and our own datasets.

  9. Inventory management with advance capacity information

    NARCIS (Netherlands)

    Jaksic, M.; Fransoo, J.C.; Tan, T.; Kok, de A.G.; Rusjan, B.

    2011-01-01

    An important aspect of supply chain management is dealing with demand and supply uncertainty. The uncertainty of future supply can be reduced if a company is able to obtain advance capacity information (ACI) about future supply/production capacity availability from its supplier. We address a

  10. Inventory management with advance capacity information

    NARCIS (Netherlands)

    Jaksic, M.; Fransoo, J.C.; Tan, T.; Kok, de A.G.; Rusjan, B.

    2008-01-01

    One of the important aspects of supply chain management is dealing with demand and supply uncertainty. The uncertainty of future supply can be reduced, if a company is able to obtain advance capacity information (ACI) on future supply/production capacity availability from its supplier. We address a

  11. Unfree markets: socially embedded informal health providers in northern Karnataka, India.

    Science.gov (United States)

    George, Asha; Iyer, Aditi

    2013-11-01

    The dynamics of informal health markets in marginalised regions are relevant to policy discourse in India, but are poorly understood. We examine how informal health markets operate from the viewpoint of informal providers (those without any government-recognised medical degrees, otherwise known as RMPs) by drawing upon data from a household survey in 2002, a provider census in 2004 and ongoing field observations from a research site in Koppal district, Karnataka, India. We find that despite their illegality, RMPs depend on government and private providers for their training and referral networks. Buffeted by unregulated market pressures, RMPs are driven to provide allopathic commodities regardless of need, but can also be circumspect in their practice. Though motivated by profit, their socially embedded practice at community level at times undermines their ability to ensure payment of fees for their services. In addition, RMPs feel that communities can threaten them via violence or malicious rumours, leading them to seek political favour and social protection from village elites and elected representatives. RMPs operate within negotiated quid pro quo bargains that lead to tenuous reciprocity or fragile trust between them and the communities in which they practise. In the context of this 'unfree' market, some RMPs reported being more embedded in health systems, more responsive to communities and more vulnerable to unregulated market pressures than others. Understanding the heterogeneity, nuanced motivations and the embedded social relations that mark informal providers in the health systems, markets and communities they work in, is critical for health system reforms. Copyright © 2013 Elsevier Ltd. All rights reserved.

  12. The data embedding method

    Energy Technology Data Exchange (ETDEWEB)

    Sandford, M.T. II; Bradley, J.N.; Handel, T.G.

    1996-06-01

    Data embedding is a new steganographic method for combining digital information sets. This paper describes the data embedding method and gives examples of its application using software written in the C-programming language. Sandford and Handel produced a computer program (BMPEMBED, Ver. 1.51 written for IBM PC/AT or compatible, MS/DOS Ver. 3.3 or later) that implements data embedding in an application for digital imagery. Information is embedded into, and extracted from, Truecolor or color-pallet images in Microsoft{reg_sign} bitmap (.BMP) format. Hiding data in the noise component of a host, by means of an algorithm that modifies or replaces the noise bits, is termed {open_quote}steganography.{close_quote} Data embedding differs markedly from conventional steganography, because it uses the noise component of the host to insert information with few or no modifications to the host data values or their statistical properties. Consequently, the entropy of the host data is affected little by using data embedding to add information. The data embedding method applies to host data compressed with transform, or {open_quote}lossy{close_quote} compression algorithms, as for example ones based on discrete cosine transform and wavelet functions. Analysis of the host noise generates a key required for embedding and extracting the auxiliary data from the combined data. The key is stored easily in the combined data. Images without the key cannot be processed to extract the embedded information. To provide security for the embedded data, one can remove the key from the combined data and manage it separately. The image key can be encrypted and stored in the combined data or transmitted separately as a ciphertext much smaller in size than the embedded data. The key size is typically ten to one-hundred bytes, and it is in data an analysis algorithm.

  13. Unsupervised Symbolization of Signal Time Series for Extraction of the Embedded Information

    Directory of Open Access Journals (Sweden)

    Yue Li

    2017-03-01

    Full Text Available This paper formulates an unsupervised algorithm for symbolization of signal time series to capture the embedded dynamic behavior. The key idea is to convert time series of the digital signal into a string of (spatially discrete symbols from which the embedded dynamic information can be extracted in an unsupervised manner (i.e., no requirement for labeling of time series. The main challenges here are: (1 definition of the symbol assignment for the time series; (2 identification of the partitioning segment locations in the signal space of time series; and (3 construction of probabilistic finite-state automata (PFSA from the symbol strings that contain temporal patterns. The reported work addresses these challenges by maximizing the mutual information measures between symbol strings and PFSA states. The proposed symbolization method has been validated by numerical simulation as well as by experimentation in a laboratory environment. Performance of the proposed algorithm has been compared to that of two commonly used algorithms of time series partitioning.

  14. Information Transfer Capacity of Articulators in American Sign Language.

    Science.gov (United States)

    Malaia, Evie; Borneman, Joshua D; Wilbur, Ronnie B

    2018-03-01

    The ability to convey information is a fundamental property of communicative signals. For sign languages, which are overtly produced with multiple, completely visible articulators, the question arises as to how the various channels co-ordinate and interact with each other. We analyze motion capture data of American Sign Language (ASL) narratives, and show that the capacity of information throughput, mathematically defined, is highest on the dominant hand (DH). We further demonstrate that information transfer capacity is also significant for the non-dominant hand (NDH), and the head channel too, as compared to control channels (ankles). We discuss both redundancy and independence in articulator motion in sign language, and argue that the NDH and the head articulators contribute to the overall information transfer capacity, indicating that they are neither completely redundant to, nor completely independent of, the DH.

  15. ESTIMATION OF FILTRATION CAPACITY OF POSTFLOTATION TAILINGS EMBEDDED IN DAMS OF TAILINGS DEPOSITION SITES

    Directory of Open Access Journals (Sweden)

    Wojciech Tschuschke

    2015-10-01

    Full Text Available Construction of very big mine tailings deposition sites, such as postflotation tailings ponds, is a complicated engineering task, in which several technical and environmental problems need to be solved. Designing, construction and operation of such an object applying the monitoring method consists in the verification of design assumptions based on continuous observations. One of the primary tasks of monitoring while the deposition site is being filled with tailings is to control quality of the formed dam embankments, as the structural element of the object responsible for its stability. In order to use material selected from deposited tailings in the construction of dams it is necessary to define grain size and compaction criteria, which directly affect load bearing capacity and deformation of the structure. For this reason main control tests include the analyses of grain size distribution and physical properties of the material embedded in the dams. These data may also be used to estimate filtration capacity of the embankment. A lack of drainage, causing accumulation of water within the embankment, may potentially deteriorate stability conditions. This paper presents the use of empirical formulas, i.e. formulas typically applied to natural soils, to assess permeability coefficient of tailings. A simple empirical formula was also proposed for the estimation of permeability coefficient of tailings based on grain size and compaction parameters determined in routine quality tests of constructed dam embankments.

  16. Embedded systems handbook

    CERN Document Server

    Zurawski, Richard

    2005-01-01

    Embedded systems are nearly ubiquitous, and books on individual topics or components of embedded systems are equally abundant. Unfortunately, for those designers who thirst for knowledge of the big picture of embedded systems there is not a drop to drink. Until now. The Embedded Systems Handbook is an oasis of information, offering a mix of basic and advanced topics, new solutions and technologies arising from the most recent research efforts, and emerging trends to help you stay current in this ever-changing field.With preeminent contributors from leading industrial and academic institutions

  17. Embedded systems handbook networked embedded systems

    CERN Document Server

    Zurawski, Richard

    2009-01-01

    Considered a standard industry resource, the Embedded Systems Handbook provided researchers and technicians with the authoritative information needed to launch a wealth of diverse applications, including those in automotive electronics, industrial automated systems, and building automation and control. Now a new resource is required to report on current developments and provide a technical reference for those looking to move the field forward yet again. Divided into two volumes to accommodate this growth, the Embedded Systems Handbook, Second Edition presents a comprehensive view on this area

  18. The capacity of black holes to transmit quantum information

    International Nuclear Information System (INIS)

    Brádler, Kamil; Adami, Christoph

    2014-01-01

    We study the properties of the quantum information transmission channel that emerges from the quantum dynamics of particles interacting with a black hole horizon. We calculate the quantum channel capacity in two limiting cases where a single-letter capacity is known to exist: the limit of perfectly reflecting and perfectly absorbing black holes. We find that the perfectly reflecting black hole channel is closely related to the Unruh channel and that its capacity is non-vanishing, allowing for the perfect reconstruction of quantum information outside of the black hole horizon. We also find that the complementary channel (transmitting entanglement behind the horizon) is entanglement-breaking in this case, with vanishing capacity. We then calculate the quantum capacity of the black hole channel in the limit of a perfectly absorbing black hole and find that this capacity vanishes, while the capacity of the complementary channel is non-vanishing instead. Rather than inviting a new crisis for quantum physics, this finding instead is in accordance with the quantum no-cloning theorem, because it guarantees that there are no space-like surfaces that contain both the sender’s quantum state and the receiver’s reconstructed quantum state

  19. The capacity of black holes to transmit quantum information

    Energy Technology Data Exchange (ETDEWEB)

    Brádler, Kamil [Department of Astronomy and Physics, Saint Mary’s University,Halifax, Nova Scotia, B3H 3C3 (Canada); Adami, Christoph [Department of Physics and Astronomy, Michigan State University,East Lansing, MI 48824 (United States)

    2014-05-21

    We study the properties of the quantum information transmission channel that emerges from the quantum dynamics of particles interacting with a black hole horizon. We calculate the quantum channel capacity in two limiting cases where a single-letter capacity is known to exist: the limit of perfectly reflecting and perfectly absorbing black holes. We find that the perfectly reflecting black hole channel is closely related to the Unruh channel and that its capacity is non-vanishing, allowing for the perfect reconstruction of quantum information outside of the black hole horizon. We also find that the complementary channel (transmitting entanglement behind the horizon) is entanglement-breaking in this case, with vanishing capacity. We then calculate the quantum capacity of the black hole channel in the limit of a perfectly absorbing black hole and find that this capacity vanishes, while the capacity of the complementary channel is non-vanishing instead. Rather than inviting a new crisis for quantum physics, this finding instead is in accordance with the quantum no-cloning theorem, because it guarantees that there are no space-like surfaces that contain both the sender’s quantum state and the receiver’s reconstructed quantum state.

  20. 2009 Capacity Building For Library and Information Centre

    African Journals Online (AJOL)

    discussed the features of digitized/virtual library and information centre and the need for capacity building especially in .... electronic library, virtual reality, digital library, community library .... architecture of the existing information system and ...

  1. Electric distribution systems and embedded generation capacity

    International Nuclear Information System (INIS)

    Calderaro, V.; Galdi, V.; Piccolo, A.; Siano, P.

    2006-01-01

    The main policy issues of European States are sustainable energy supply promotion and liberalization of energy markets, which introduced market competition in electricity production and created support mechanisms to encourage renewable electricity production and consumption. As a result of liberalization, any generator, including small-scale and renewable energy based units, can sell electricity on the free market. In order to meet future sustainability targets, connection of a higher number of Distributed Generation (DG) units to the electrical power system is expected, requiring changes in the design and operation of distribution electricity systems, as well as changes in electricity network regulation. In order to assist distribution system operators in planning and managing DG connections and in maximizing DG penetration and renewable sources exploitation, this paper proposed a reconfiguration methodology based on a Genetic Algorithm (GA), that was tested on a 70-bus system with DG units. The simulation results confirmed that the methodology represents a suitable tool for distribution system operators when dealing with DG capacity expansion and power loss issues, providing information regarding the potential penetration network-wide and allowing maximum exploitation of renewable generation. 35 refs., 4 tabs., 6 figs

  2. Exploring Embedded Path Capacity Estimation in TCP Receiver

    NARCIS (Netherlands)

    Marcondes, Cesar; Sanadidi, M.Y.; Gerla, Mario; Martinello, Magnos; de Souza Schwartz, Ramon

    2007-01-01

    Accurate estimation of network characteristics, such as capacity, based on non-intrusive measurements is a fundamental desire of several applications. For instance, P2P applications that build overlay networks can use path capacity for optimizing network performance. We present a simple technique to

  3. Embedded Information Literacy in the Basic Oral Communication Course: From Conception through Assessment

    Science.gov (United States)

    Weaver, Kari D.; Pier, Penni M.

    2010-01-01

    This article explores the process of embedding information literacy into a basic oral communication course. Discussion includes student performance as an impetus for change, collaborative course design between the oral communication teaching team and instructional librarians, and assessment initiatives. Suggestions for future collaborative work…

  4. RMT Assessments of the Market Latent Information Embedded in the Stocks' Raw, Normalized, and Partial Correlations

    Directory of Open Access Journals (Sweden)

    Dror Y. Kenett

    2009-01-01

    Full Text Available We present here assessment of the latent market information embedded in the raw, affinity (normalized, and partial correlations. We compared the Zipf plot, spectrum, and distribution of the eigenvalues for each matrix with the results of the corresponding random matrix. The analysis was performed on stocks belonging to the New York and Tel Aviv Stock Exchange, for the time period of January 2000 to March 2009. Our results show that in comparison to the raw correlations, the affinity matrices highlight the dominant factors of the system, and the partial correlation matrices contain more information. We propose that significant stock market information, which cannot be captured by the raw correlations, is embedded in the affinity and partial correlations. Our results further demonstrate the differences between NY and TA markets.

  5. A novel edge based embedding in medical images based on unique key generated using sudoku puzzle design.

    Science.gov (United States)

    Santhi, B; Dheeptha, B

    2016-01-01

    The field of telemedicine has gained immense momentum, owing to the need for transmitting patients' information securely. This paper puts forth a unique method for embedding data in medical images. It is based on edge based embedding and XOR coding. The algorithm proposes a novel key generation technique by utilizing the design of a sudoku puzzle to enhance the security of the transmitted message. The edge blocks of the cover image alone, are utilized to embed the payloads. The least significant bit of the pixel values are changed by XOR coding depending on the data to be embedded and the key generated. Hence the distortion in the stego image is minimized and the information is retrieved accurately. Data is embedded in the RGB planes of the cover image, thus increasing its embedding capacity. Several measures including peak signal noise ratio (PSNR), mean square error (MSE), universal image quality index (UIQI) and correlation coefficient (R) are the image quality measures that have been used to analyze the quality of the stego image. It is evident from the results that the proposed technique outperforms the former methodologies.

  6. Efficient physical embedding of topologically complex information processing networks in brains and computer circuits.

    Directory of Open Access Journals (Sweden)

    Danielle S Bassett

    2010-04-01

    Full Text Available Nervous systems are information processing networks that evolved by natural selection, whereas very large scale integrated (VLSI computer circuits have evolved by commercially driven technology development. Here we follow historic intuition that all physical information processing systems will share key organizational properties, such as modularity, that generally confer adaptivity of function. It has long been observed that modular VLSI circuits demonstrate an isometric scaling relationship between the number of processing elements and the number of connections, known as Rent's rule, which is related to the dimensionality of the circuit's interconnect topology and its logical capacity. We show that human brain structural networks, and the nervous system of the nematode C. elegans, also obey Rent's rule, and exhibit some degree of hierarchical modularity. We further show that the estimated Rent exponent of human brain networks, derived from MRI data, can explain the allometric scaling relations between gray and white matter volumes across a wide range of mammalian species, again suggesting that these principles of nervous system design are highly conserved. For each of these fractal modular networks, the dimensionality of the interconnect topology was greater than the 2 or 3 Euclidean dimensions of the space in which it was embedded. This relatively high complexity entailed extra cost in physical wiring: although all networks were economically or cost-efficiently wired they did not strictly minimize wiring costs. Artificial and biological information processing systems both may evolve to optimize a trade-off between physical cost and topological complexity, resulting in the emergence of homologous principles of economical, fractal and modular design across many different kinds of nervous and computational networks.

  7. Cepstral domain modification of audio signals for data embedding: preliminary results

    Science.gov (United States)

    Gopalan, Kaliappan

    2004-06-01

    A method of embedding data in an audio signal using cepstral domain modification is described. Based on successful embedding in the spectral points of perceptually masked regions in each frame of speech, first the technique was extended to embedding in the log spectral domain. This extension resulted at approximately 62 bits /s of embedding with less than 2 percent of bit error rate (BER) for a clean cover speech (from the TIMIT database), and about 2.5 percent for a noisy speech (from an air traffic controller database), when all frames - including silence and transition between voiced and unvoiced segments - were used. Bit error rate increased significantly when the log spectrum in the vicinity of a formant was modified. In the next procedure, embedding by altering the mean cepstral values of two ranges of indices was studied. Tests on both a noisy utterance and a clean utterance indicated barely noticeable perceptual change in speech quality when lower range of cepstral indices - corresponding to vocal tract region - was modified in accordance with data. With an embedding capacity of approximately 62 bits/s - using one bit per each frame regardless of frame energy or type of speech - initial results showed a BER of less than 1.5 percent for a payload capacity of 208 embedded bits using the clean cover speech. BER of less than 1.3 percent resulted for the noisy host with a capacity was 316 bits. When the cepstrum was modified in the region of excitation, BER increased to over 10 percent. With quantization causing no significant problem, the technique warrants further studies with different cepstral ranges and sizes. Pitch-synchronous cepstrum modification, for example, may be more robust to attacks. In addition, cepstrum modification in regions of speech that are perceptually masked - analogous to embedding in frequency masked regions - may yield imperceptible stego audio with low BER.

  8. An experimental approach to estimate operator’s information processing capacity for diagnosing tasks in NPPs

    International Nuclear Information System (INIS)

    Kim, Ji Tae; Shin, Seung Ki; Kim, Jong Hyun; Seong, Poong Hyun

    2013-01-01

    Highlights: • Main control room operator’s information processing capacity is determined. • The relationship between the information processing capacity and human factors is described. • The information processing capacity results from the subjective and physiological measures are nearly identical. - Abstract: The objectives of this research are: (1) to determine information processing capacity of an operator in a main control room and (2) to describe the relationship between the information processing capacity and human factors. This research centers on the relationship, as experimentally determined, between an operator’s mental workload and information flow during accident diagnosis tasks at nuclear power plants. Based on this relationship, the operator’s information processing capacity is established. In this paper, the information processing capacity is defined as the operator’s ability to manage the amount of bits in a second when diagnosing tasks or accidents. If the operator’s performance decreases rapidly as the information flow rate (bit/s) increases, it is possible to determine the operator’s information processing capacity. The cognitive information of a diagnosis task can be quantified using an information flow model and the operator’s mental workload is measured by subjective and physiological measures. NASA-TLX (Task Load indeX) is selected as the subjective method and an eye tracking system is used as the physiological measure for the workload. In addition, the information processing capacity related to human factors is investigated. Once the information processing capacity of operators is known, then it will be possible to apply it to predict the operators’ performance, design diagnosis tasks, and design human–machine interface

  9. Developing Evaluation Capacity in Information and Communication ...

    International Development Research Centre (IDRC) Digital Library (Canada)

    17 août 2009 ... The nuanced ways in which information and communication technologies (ICTs) interact with developing country societies necessitate thoughtful, systematic evaluation of their effects, grounded in the concepts of utility, outcome and ownership. This grant will allow Developing Evaluation Capacity in ICT4D ...

  10. STEGO TRANSFORMATION OF SPATIAL DOMAIN OF COVER IMAGE ROBUST AGAINST ATTACKS ON EMBEDDED MESSAGE

    Directory of Open Access Journals (Sweden)

    Kobozeva A.

    2014-04-01

    Full Text Available One of the main requirements to steganografic algorithm to be developed is robustness against disturbing influences, that is, to attacks against the embedded message. It was shown that guaranteeing the stego algorithm robustness does not depend on whether the additional information is embedded into the spatial or transformation domain of the cover image. Given the existing advantages of the spatial domain of the cover image in organization of embedding and extracting processes, a sufficient condition for ensuring robustness of such stego transformation was obtained in this work. It was shown that the amount of brightness correction related to the pixels of the cover image block is similar to the amount of correction related to the maximum singular value of the corresponding matrix of the block in case of embedding additional data that ensures robustness against attacks on the embedded message. Recommendations were obtained for selecting the size of the cover image block used in stego transformation as one of the parameters determining the calculation error of stego message. Given the inversely correspondence between the stego capacity of the stego channel being organized and the size of the cover image block, l=8 value was recommended.

  11. Embedded engineering education

    CERN Document Server

    Kaštelan, Ivan; Temerinac, Miodrag; Barak, Moshe; Sruk, Vlado

    2016-01-01

    This book focuses on the outcome of the European research project “FP7-ICT-2011-8 / 317882: Embedded Engineering Learning Platform” E2LP. Additionally, some experiences and researches outside this project have been included. This book provides information about the achieved results of the E2LP project as well as some broader views about the embedded engineering education. It captures project results and applications, methodologies, and evaluations. It leads to the history of computer architectures, brings a touch of the future in education tools and provides a valuable resource for anyone interested in embedded engineering education concepts, experiences and material. The book contents 12 original contributions and will open a broader discussion about the necessary knowledge and appropriate learning methods for the new profile of embedded engineers. As a result, the proposed Embedded Computer Engineering Learning Platform will help to educate a sufficient number of future engineers in Europe, capable of d...

  12. Poincaré Embeddings for Learning Hierarchical Representations

    CERN Multimedia

    CERN. Geneva

    2018-01-01

    Abstracts: Representation learning has become an invaluable approach for learning from symbolic data such as text and graphs. However, while complex symbolic datasets often exhibit a latent hierarchical structure, state-of-the-art methods typically do not account for this property. In this talk, I will discuss a new approach for learning hierarchical representations of symbolic data by embedding them into hyperbolic space -- or more precisely into an n-dimensional Poincaré ball. Due to the underlying hyperbolic geometry, this allows us to learn parsimonious representations of symbolic data by simultaneously capturing hierarchy and similarity. We introduce an efficient algorithm to learn the embeddings based on Riemannian optimization and show experimentally that Poincaré embeddings outperform Euclidean embeddings significantly on data with latent hierarchies, both in terms of representation capacity and in terms of generalization ability.      &...

  13. The value of information in explicit cross-border capacity auction regimes in electricity markets

    International Nuclear Information System (INIS)

    Richter, Jan; Viehmann, Johannes

    2014-01-01

    We study two electricity markets connected by a fixed amount of cross-border capacity. The total amount of capacity is known to all electricity traders and allocated via an auction. The capacity allocated to each bidder in the auction remains private information. We assume that traders are faced with a demand function reflecting the relationship between electricity transmitted between the markets and the spot price difference. Therefore, traders act like Bayesian–Cournot oligopolists in exercising their transmission rights when presented with incomplete information about the competitors’ capacities. Our analysis breaks down the welfare effect into three different components: Cournot behavior, capacity constraints, and incomplete information. We find that social welfare increases with the level of information with which traders are endowed. - Highlights: • We regard the utilization of explicitly auctioned cross-border capacities in electricity markets as a Bayesian Cournot game. • We analyze social welfare and find three forces diminishing it, (1) firms play a cournot game, (2) the presence of capacity constraints, (3) incomplete information. • We derive information regimes from “real world” examples and analyze their effect on social welfare

  14. Biometric feature embedding using robust steganography technique

    Science.gov (United States)

    Rashid, Rasber D.; Sellahewa, Harin; Jassim, Sabah A.

    2013-05-01

    This paper is concerned with robust steganographic techniques to hide and communicate biometric data in mobile media objects like images, over open networks. More specifically, the aim is to embed binarised features extracted using discrete wavelet transforms and local binary patterns of face images as a secret message in an image. The need for such techniques can arise in law enforcement, forensics, counter terrorism, internet/mobile banking and border control. What differentiates this problem from normal information hiding techniques is the added requirement that there should be minimal effect on face recognition accuracy. We propose an LSB-Witness embedding technique in which the secret message is already present in the LSB plane but instead of changing the cover image LSB values, the second LSB plane will be changed to stand as a witness/informer to the receiver during message recovery. Although this approach may affect the stego quality, it is eliminating the weakness of traditional LSB schemes that is exploited by steganalysis techniques for LSB, such as PoV and RS steganalysis, to detect the existence of secrete message. Experimental results show that the proposed method is robust against PoV and RS attacks compared to other variants of LSB. We also discussed variants of this approach and determine capacity requirements for embedding face biometric feature vectors while maintain accuracy of face recognition.

  15. An information capacity limitation of visual short-term memory.

    Science.gov (United States)

    Sewell, David K; Lilburn, Simon D; Smith, Philip L

    2014-12-01

    Research suggests that visual short-term memory (VSTM) has both an item capacity, of around 4 items, and an information capacity. We characterize the information capacity limits of VSTM using a task in which observers discriminated the orientation of a single probed item in displays consisting of 1, 2, 3, or 4 orthogonally oriented Gabor patch stimuli that were presented in noise for 50 ms, 100 ms, 150 ms, or 200 ms. The observed capacity limitations are well described by a sample-size model, which predicts invariance of ∑(i)(d'(i))² for displays of different sizes and linearity of (d'(i))² for displays of different durations. Performance was the same for simultaneous and sequentially presented displays, which implicates VSTM as the locus of the observed invariance and rules out explanations that ascribe it to divided attention or stimulus encoding. The invariance of ∑(i)(d'(i))² is predicted by the competitive interaction theory of Smith and Sewell (2013), which attributes it to the normalization of VSTM traces strengths arising from competition among stimuli entering VSTM. PsycINFO Database Record (c) 2014 APA, all rights reserved.

  16. Capacity-achieving CPM schemes

    OpenAIRE

    Perotti, Alberto; Tarable, Alberto; Benedetto, Sergio; Montorsi, Guido

    2008-01-01

    The pragmatic approach to coded continuous-phase modulation (CPM) is proposed as a capacity-achieving low-complexity alternative to the serially-concatenated CPM (SC-CPM) coding scheme. In this paper, we first perform a selection of the best spectrally-efficient CPM modulations to be embedded into SC-CPM schemes. Then, we consider the pragmatic capacity (a.k.a. BICM capacity) of CPM modulations and optimize it through a careful design of the mapping between input bits and CPM waveforms. The s...

  17. 76 FR 56780 - Notice of Proposed Information Collection: Comment Request; Capacity Building for Sustainable...

    Science.gov (United States)

    2011-09-14

    ... Information Collection: Comment Request; Capacity Building for Sustainable Communities Program: Notice of... public comments on the subject proposal. The Capacity Building for Sustainable Communities Program... also lists the following information: Title of Proposal: Capacity Building for Sustainable Communities...

  18. Using information theory to assess the communicative capacity of circulating microRNA.

    Science.gov (United States)

    Finn, Nnenna A; Searles, Charles D

    2013-10-11

    The discovery of extracellular microRNAs (miRNAs) and their transport modalities (i.e., microparticles, exosomes, proteins and lipoproteins) has sparked theories regarding their role in intercellular communication. Here, we assessed the information transfer capacity of different miRNA transport modalities in human serum by utilizing basic principles of information theory. Zipf Statistics were calculated for each of the miRNA transport modalities identified in human serum. Our analyses revealed that miRNA-mediated information transfer is redundant, as evidenced by negative Zipf's Statistics with magnitudes greater than one. In healthy subjects, the potential communicative capacity of miRNA in complex with circulating proteins was significantly lower than that of miRNA encapsulated in circulating microparticles and exosomes. Moreover, the presence of coronary heart disease significantly lowered the communicative capacity of all circulating miRNA transport modalities. To assess the internal organization of circulating miRNA signals, Shannon's zero- and first-order entropies were calculated. Microparticles (MPs) exhibited the lowest Shannon entropic slope, indicating a relatively high capacity for information transfer. Furthermore, compared to the other miRNA transport modalities, MPs appeared to be the most efficient at transferring miRNA to cultured endothelial cells. Taken together, these findings suggest that although all transport modalities have the capacity for miRNA-based information transfer, MPs may be the simplest and most robust way to achieve miRNA-based signal transduction in sera. This study presents a novel method for analyzing the quantitative capacity of miRNA-mediated information transfer while providing insight into the communicative characteristics of distinct circulating miRNA transport modalities. Published by Elsevier Inc.

  19. Stereotype Strength and Attentional Bias: Preference for Confirming versus Disconfirming Information Depends on Processing Capacity

    Science.gov (United States)

    Allen, Thomas J.; Sherman, Jeffrey W.; Conrey, Frederica R.; Stroessner, Steven J.

    2009-01-01

    In two experiments, we investigated the relationships among stereotype strength, processing capacity, and the allocation of attention to stereotype-consistent versus stereotype-inconsistent information describing a target person. The results of both experiments showed that, with full capacity, greater stereotype strength was associated with increased attention toward stereotype-consistent versus stereotype-inconsistent information. However, when capacity was diminished, greater stereotype strength was associated with increased attention toward inconsistent versus consistent information. Thus, strong stereotypes may act as self-confirming filters when processing capacity is plentiful, but as efficient information gathering devices that maximize the acquisition of novel (disconfirming) information when capacity is depleted. Implications for models of stereotyping and stereotype change are discussed. PMID:20161043

  20. Working memory capacity and redundant information processing efficiency.

    Science.gov (United States)

    Endres, Michael J; Houpt, Joseph W; Donkin, Chris; Finn, Peter R

    2015-01-01

    Working memory capacity (WMC) is typically measured by the amount of task-relevant information an individual can keep in mind while resisting distraction or interference from task-irrelevant information. The current research investigated the extent to which differences in WMC were associated with performance on a novel redundant memory probes (RMP) task that systematically varied the amount of to-be-remembered (targets) and to-be-ignored (distractor) information. The RMP task was designed to both facilitate and inhibit working memory search processes, as evidenced by differences in accuracy, response time, and Linear Ballistic Accumulator (LBA) model estimates of information processing efficiency. Participants (N = 170) completed standard intelligence tests and dual-span WMC tasks, along with the RMP task. As expected, accuracy, response-time, and LBA model results indicated memory search and retrieval processes were facilitated under redundant-target conditions, but also inhibited under mixed target/distractor and redundant-distractor conditions. Repeated measures analyses also indicated that, while individuals classified as high (n = 85) and low (n = 85) WMC did not differ in the magnitude of redundancy effects, groups did differ in the efficiency of memory search and retrieval processes overall. Results suggest that redundant information reliably facilitates and inhibits the efficiency or speed of working memory search, and these effects are independent of more general limits and individual differences in the capacity or space of working memory.

  1. An Improved Information Hiding Method Based on Sparse Representation

    Directory of Open Access Journals (Sweden)

    Minghai Yao

    2015-01-01

    Full Text Available A novel biometric authentication information hiding method based on the sparse representation is proposed for enhancing the security of biometric information transmitted in the network. In order to make good use of abundant information of the cover image, the sparse representation method is adopted to exploit the correlation between the cover and biometric images. Thus, the biometric image is divided into two parts. The first part is the reconstructed image, and the other part is the residual image. The biometric authentication image cannot be restored by any one part. The residual image and sparse representation coefficients are embedded into the cover image. Then, for the sake of causing much less attention of attackers, the visual attention mechanism is employed to select embedding location and embedding sequence of secret information. Finally, the reversible watermarking algorithm based on histogram is utilized for embedding the secret information. For verifying the validity of the algorithm, the PolyU multispectral palmprint and the CASIA iris databases are used as biometric information. The experimental results show that the proposed method exhibits good security, invisibility, and high capacity.

  2. The capacity to transmit classical information via black holes

    Science.gov (United States)

    Adami, Christoph; Ver Steeg, Greg

    2013-03-01

    One of the most vexing problems in theoretical physics is the relationship between quantum mechanics and gravity. According to an argument originally by Hawking, a black hole must destroy any information that is incident on it because the only radiation that a black hole releases during its evaporation (the Hawking radiation) is precisely thermal. Surprisingly, this claim has never been investigated within a quantum information-theoretic framework, where the black hole is treated as a quantum channel to transmit classical information. We calculate the capacity of the quantum black hole channel to transmit classical information (the Holevo capacity) within curved-space quantum field theory, and show that the information carried by late-time particles sent into a black hole can be recovered with arbitrary accuracy, from the signature left behind by the stimulated emission of radiation that must accompany any absorption event. We also show that this stimulated emission turns the black hole into an almost-optimal quantum cloning machine, where the violation of the no-cloning theorem is ensured by the noise provided by the Hawking radiation. Thus, rather than threatening the consistency of theoretical physics, Hawking radiation manages to save it instead.

  3. Novel Variants of a Histogram Shift-Based Reversible Watermarking Technique for Medical Images to Improve Hiding Capacity

    Directory of Open Access Journals (Sweden)

    Vishakha Kelkar

    2017-01-01

    Full Text Available In telemedicine systems, critical medical data is shared on a public communication channel. This increases the risk of unauthorised access to patient’s information. This underlines the importance of secrecy and authentication for the medical data. This paper presents two innovative variations of classical histogram shift methods to increase the hiding capacity. The first technique divides the image into nonoverlapping blocks and embeds the watermark individually using the histogram method. The second method separates the region of interest and embeds the watermark only in the region of noninterest. This approach preserves the medical information intact. This method finds its use in critical medical cases. The high PSNR (above 45 dB obtained for both techniques indicates imperceptibility of the approaches. Experimental results illustrate superiority of the proposed approaches when compared with other methods based on histogram shifting techniques. These techniques improve embedding capacity by 5–15% depending on the image type, without affecting the quality of the watermarked image. Both techniques also enable lossless reconstruction of the watermark and the host medical image. A higher embedding capacity makes the proposed approaches attractive for medical image watermarking applications without compromising the quality of the image.

  4. Novel Variants of a Histogram Shift-Based Reversible Watermarking Technique for Medical Images to Improve Hiding Capacity

    Science.gov (United States)

    Tuckley, Kushal

    2017-01-01

    In telemedicine systems, critical medical data is shared on a public communication channel. This increases the risk of unauthorised access to patient's information. This underlines the importance of secrecy and authentication for the medical data. This paper presents two innovative variations of classical histogram shift methods to increase the hiding capacity. The first technique divides the image into nonoverlapping blocks and embeds the watermark individually using the histogram method. The second method separates the region of interest and embeds the watermark only in the region of noninterest. This approach preserves the medical information intact. This method finds its use in critical medical cases. The high PSNR (above 45 dB) obtained for both techniques indicates imperceptibility of the approaches. Experimental results illustrate superiority of the proposed approaches when compared with other methods based on histogram shifting techniques. These techniques improve embedding capacity by 5–15% depending on the image type, without affecting the quality of the watermarked image. Both techniques also enable lossless reconstruction of the watermark and the host medical image. A higher embedding capacity makes the proposed approaches attractive for medical image watermarking applications without compromising the quality of the image. PMID:29104744

  5. Graph embedding with rich information through heterogeneous graph

    KAUST Repository

    Sun, Guolei

    2017-01-01

    Graph embedding, aiming to learn low-dimensional representations for nodes in graphs, has attracted increasing attention due to its critical application including node classification, link prediction and clustering in social network analysis. Most

  6. OLP embedment design method research for AP1000 nuclear plant

    International Nuclear Information System (INIS)

    Li Cheng; Li Shaoping; Liu Jianwei

    2013-01-01

    Background: One of the most advanced nuclear power technology, the first AP1000 reactor is under construction in China. Modularization is one of the main characteristics for AP1000 nuclear plant building. Module wall with steel face plate is used instead of reinforced concrete structure wall. A number of OLP embedments need to be installed into the module wall to connect other structures such as pipes, equipment, operation platforms and any other component attached to the module wall. Therefore, the design of embedment is very important in AP1000 structural design. Purpose: A finite element analysis method and tool for embedment design is needed for convenience. Methods: This paper applies the self-developed GTStrudl command template and VBA macro program for embedment capacity calculation and evaluation based on Microsoft Excel to the embedment design. Results: A Microsoft Excel template for embedment design is developed. Conclusions: The analysis method and template brings reasonable results and may provide some help and use for reference for the engineering practice. (authors)

  7. The Innovative Capacity of Institutional Entrepreneurs

    OpenAIRE

    Boxenbaum, Eva; Battilana, Julie

    2006-01-01

    The notion of institutional entrepreneur (DiMaggio, 1988) has given rise to a controversy in neo-institutional theory around the ability of actors to distance themselves from institutional pressures, envision alternative institutional patterns, and act strategically to change institutions in which they are embedded. This paper empirically examines the ability of embedded actors to envision alternative institutional patterns, that is, their innovative capacity. We analyze the role that an indi...

  8. RMT Assessments of the Market Latent Information Embedded in the Stocks' Raw, Normalized, and Partial Correlations

    OpenAIRE

    Kenett, Dror Y.; Shapira, Yoash; Ben-Jacob, Eshel

    2009-01-01

    We present here assessment of the latent market information embedded in the raw, affinity (normalized), and partial correlations. We compared the Zipf plot, spectrum, and distribution of the eigenvalues for each matrix with the results of the corresponding random matrix. The analysis was performed on stocks belonging to the New York ...

  9. Human resource capacity for information management in selected ...

    African Journals Online (AJOL)

    Results: it was established that capacity building was usually undertaken through on-job trainings i.e. 85.1% (103) health workers had on-job training on filling of data collection tools and only 10% (13) had received formal classroom training on the same. Further, only 9.1% (11) health workers had received information ...

  10. Effect of embedment on the plastic behaviour of Bucket Foundations

    DEFF Research Database (Denmark)

    Ibsen, Lars Bo; Barari, Amin; Larsen, Kim André

    2015-01-01

    studies have indicated the possibility of defining foundation response using plasticity theory. Results of multiple loading tests addressing the effect of embedment on the strain-hardening behavior of shallow bucket foundations under combined loading are reported. The kinematic mechanisms accompanying pre......-failure are presented. It is argued that the drained capacity of offshore bucket foundations and the ratio of plastic increments are largely influenced by embedment depth and the preload ratio V/Vpeak....

  11. Building policy-making capacity in the Ministry of Health: the Kazakhstan experience.

    Science.gov (United States)

    Chanturidze, Tata; Adams, Orvill; Tokezhanov, Bolat; Naylor, Mike; Richardson, Erica

    2015-01-20

    Recent economic growth in Kazakhstan has been accompanied by slower improvements in population health and this has renewed impetus for health system reform. Strengthening strategic planning and policy-making capacity in the Ministry of Health has been identified as an important priority, particularly as the Ministry of Health is leading the health system reform process. The intervention was informed by the United Nations Development Programme (UNDP) framework for capacity building which views capacity building as an ongoing process embedded in local institutions and practices. In response to local needs extra elements were included in the framework to tailor the capacity building programme according to the existing policy and budget cycles and respective competence requirements, and link it with transparent career development structures of the Ministry of Health. This aspect of the programme was informed by the institutional capability assessment model used by the United Kingdom National Health Service (NHS) which was adapted to examine the specific organizational and individual competences of the Ministry of Health in Kazakhstan. There were clear successes in building capacity for policy making and strategic planning within the Ministry of Health in Kazakhstan, including better planned, more timely and in-depth responses to policy assignments. Embedding career development as a part of this process was more challenging. This case study highlights the importance of strong political will and high level support for capacity building in ensuring the sustainability of programmes. It also shows that capacity-building programmes need to ensure full engagement with all local stakeholders, or where this is not possible, programmes need to be targeted narrowly to those stakeholders who will benefit most, for the greatest impact to be achieved. In sum, high quality tailor-made capacity development programmes should be based on thorough needs assessment of individual and

  12. Research on the method of measuring space information network capacity in communication service

    Directory of Open Access Journals (Sweden)

    Zhu Shichao

    2017-02-01

    Full Text Available Because of the large scale characteristic of space information network in terms of space and time and the increasing of its complexity,existing measuring methods of information transmission capacity have been unable to measure the existing and future space information networkeffectively.In this study,we firstly established a complex model of space information network,and measured the whole space information network capacity by means of analyzing data access capability to the network and data transmission capability within the network.At last,we verified the rationality of the proposed measuring method by using STK and Matlab simulation software for collaborative simulation.

  13. Information Processing Capacity of Dynamical Systems

    Science.gov (United States)

    Dambre, Joni; Verstraeten, David; Schrauwen, Benjamin; Massar, Serge

    2012-07-01

    Many dynamical systems, both natural and artificial, are stimulated by time dependent external signals, somehow processing the information contained therein. We demonstrate how to quantify the different modes in which information can be processed by such systems and combine them to define the computational capacity of a dynamical system. This is bounded by the number of linearly independent state variables of the dynamical system, equaling it if the system obeys the fading memory condition. It can be interpreted as the total number of linearly independent functions of its stimuli the system can compute. Our theory combines concepts from machine learning (reservoir computing), system modeling, stochastic processes, and functional analysis. We illustrate our theory by numerical simulations for the logistic map, a recurrent neural network, and a two-dimensional reaction diffusion system, uncovering universal trade-offs between the non-linearity of the computation and the system's short-term memory.

  14. Information Processing Capacity of Dynamical Systems

    Science.gov (United States)

    Dambre, Joni; Verstraeten, David; Schrauwen, Benjamin; Massar, Serge

    2012-01-01

    Many dynamical systems, both natural and artificial, are stimulated by time dependent external signals, somehow processing the information contained therein. We demonstrate how to quantify the different modes in which information can be processed by such systems and combine them to define the computational capacity of a dynamical system. This is bounded by the number of linearly independent state variables of the dynamical system, equaling it if the system obeys the fading memory condition. It can be interpreted as the total number of linearly independent functions of its stimuli the system can compute. Our theory combines concepts from machine learning (reservoir computing), system modeling, stochastic processes, and functional analysis. We illustrate our theory by numerical simulations for the logistic map, a recurrent neural network, and a two-dimensional reaction diffusion system, uncovering universal trade-offs between the non-linearity of the computation and the system's short-term memory. PMID:22816038

  15. An experimental approach to estimation of human information processing capacity for diagnosis tasks in NPPs

    Energy Technology Data Exchange (ETDEWEB)

    Kim, Ji Tae

    2006-02-15

    The objectives of this research are 1) to determine the human's information processing capacity and 2) to describe the relationship between the information processing capacity and human factors. This research centers on the relationship, as experimentally determined, between an operator's mental workload and information flow during accident diagnosis tasks at nuclear power plants (NPPs). The relationship between the information flow rate and operator's mental workload is investigated experimentally. According to this relationship, the operator's information processing capacity can be established. Once the information processing capacity of a main control room (MCR) operator in a NPP is known, it is possible to apply it 1) to predict the operator's performance, 2) to design diagnosis tasks, and 3) to design human-machine interface. In advanced MCR, an operator's mental activity is more important than his or her physical activity. The mental workload is the portion of the operator's limited capacity that is actually required to perform a particular task. A high mental workload may cause an operator to make a mistake and consequently affect that the safe operation of NPPs. Thus, to predict an operator's performance is very important for the nuclear safety. The information processing capacity is the operator's ability to manage the amount of bits per second when an operator is diagnosing tasks or accidents. We can estimate the information processing capacity using the relationship between the information flow rate and human performance. That is, if the operator's performance decreases rapidly as the information flow rate (bit/sec) is increased, it is possible to determine the operator's information processing capacity. A diagnosis task is one of the most complex and mentally demanding tasks as well as a crucial part in maintaining the safe operation of NPPs. Diagnosis tasks refer to the overall tasks of finding the

  16. An experimental approach to estimation of human information processing capacity for diagnosis tasks in NPPs

    International Nuclear Information System (INIS)

    Kim, Ji Tae

    2006-02-01

    The objectives of this research are 1) to determine the human's information processing capacity and 2) to describe the relationship between the information processing capacity and human factors. This research centers on the relationship, as experimentally determined, between an operator's mental workload and information flow during accident diagnosis tasks at nuclear power plants (NPPs). The relationship between the information flow rate and operator's mental workload is investigated experimentally. According to this relationship, the operator's information processing capacity can be established. Once the information processing capacity of a main control room (MCR) operator in a NPP is known, it is possible to apply it 1) to predict the operator's performance, 2) to design diagnosis tasks, and 3) to design human-machine interface. In advanced MCR, an operator's mental activity is more important than his or her physical activity. The mental workload is the portion of the operator's limited capacity that is actually required to perform a particular task. A high mental workload may cause an operator to make a mistake and consequently affect that the safe operation of NPPs. Thus, to predict an operator's performance is very important for the nuclear safety. The information processing capacity is the operator's ability to manage the amount of bits per second when an operator is diagnosing tasks or accidents. We can estimate the information processing capacity using the relationship between the information flow rate and human performance. That is, if the operator's performance decreases rapidly as the information flow rate (bit/sec) is increased, it is possible to determine the operator's information processing capacity. A diagnosis task is one of the most complex and mentally demanding tasks as well as a crucial part in maintaining the safe operation of NPPs. Diagnosis tasks refer to the overall tasks of finding the root of cause of the faults or accidents. In this

  17. Agent-Oriented Embedded Control System Design and Development of a Vision-Based Automated Guided Vehicle

    Directory of Open Access Journals (Sweden)

    Wu Xing

    2012-07-01

    Full Text Available This paper presents a control system design and development approach for a vision-based automated guided vehicle (AGV based on the multi-agent system (MAS methodology and embedded system resources. A three-phase agent-oriented design methodology Prometheus is used to analyse system functions, construct operation scenarios, define agent types and design the MAS coordination mechanism. The control system is then developed in an embedded implementation containing a digital signal processor (DSP and an advanced RISC machine (ARM by using the multitasking processing capacity of multiple microprocessors and system services of a real-time operating system (RTOS. As a paradigm, an onboard embedded controller is designed and developed for the AGV with a camera detecting guiding landmarks, and the entire procedure has a high efficiency and a clear hierarchy. A vision guidance experiment for our AGV is carried out in a space-limited laboratory environment to verify the perception capacity and the onboard intelligence of the agent-oriented embedded control system.

  18. Adaptive GDDA-BLAST: fast and efficient algorithm for protein sequence embedding.

    Directory of Open Access Journals (Sweden)

    Yoojin Hong

    2010-10-01

    Full Text Available A major computational challenge in the genomic era is annotating structure/function to the vast quantities of sequence information that is now available. This problem is illustrated by the fact that most proteins lack comprehensive annotations, even when experimental evidence exists. We previously theorized that embedded-alignment profiles (simply "alignment profiles" hereafter provide a quantitative method that is capable of relating the structural and functional properties of proteins, as well as their evolutionary relationships. A key feature of alignment profiles lies in the interoperability of data format (e.g., alignment information, physio-chemical information, genomic information, etc.. Indeed, we have demonstrated that the Position Specific Scoring Matrices (PSSMs are an informative M-dimension that is scored by quantitatively measuring the embedded or unmodified sequence alignments. Moreover, the information obtained from these alignments is informative, and remains so even in the "twilight zone" of sequence similarity (<25% identity. Although our previous embedding strategy was powerful, it suffered from contaminating alignments (embedded AND unmodified and high computational costs. Herein, we describe the logic and algorithmic process for a heuristic embedding strategy named "Adaptive GDDA-BLAST." Adaptive GDDA-BLAST is, on average, up to 19 times faster than, but has similar sensitivity to our previous method. Further, data are provided to demonstrate the benefits of embedded-alignment measurements in terms of detecting structural homology in highly divergent protein sequences and isolating secondary structural elements of transmembrane and ankyrin-repeat domains. Together, these advances allow further exploration of the embedded alignment data space within sufficiently large data sets to eventually induce relevant statistical inferences. We show that sequence embedding could serve as one of the vehicles for measurement of low

  19. Steganographic embedding in containers-images

    Science.gov (United States)

    Nikishova, A. V.; Omelchenko, T. A.; Makedonskij, S. A.

    2018-05-01

    Steganography is one of the approaches to ensuring the protection of information transmitted over the network. But a steganographic method should vary depending on a used container. According to statistics, the most widely used containers are images and the most common image format is JPEG. Authors propose a method of data embedding into a frequency area of images in format JPEG 2000. It is proposed to use the method of Benham-Memon- Yeo-Yeung, in which instead of discrete cosine transform, discrete wavelet transform is used. Two requirements for images are formulated. Structure similarity is chosen to obtain quality assessment of data embedding. Experiments confirm that requirements satisfaction allows achieving high quality assessment of data embedding.

  20. Graphene-Embedded Co3O4 Rose-Spheres for Enhanced Performance in Lithium Ion Batteries.

    Science.gov (United States)

    Jing, Mingjun; Zhou, Minjie; Li, Gangyong; Chen, Zhengu; Xu, Wenyuan; Chen, Xiaobo; Hou, Zhaohui

    2017-03-22

    Co 3 O 4 has been widely studied as a promising candidate as an anode material for lithium ion batteries. However, the huge volume change and structural strain associated with the Li + insertion and extraction process leads to the pulverization and deterioration of the electrode, resulting in a poor performance in lithium ion batteries. In this paper, Co 3 O 4 rose-spheres obtained via hydrothermal technique are successfully embedded in graphene through an electrostatic self-assembly process. Graphene-embedded Co 3 O 4 rose-spheres (G-Co 3 O 4 ) show a high reversible capacity, a good cyclic performance, and an excellent rate capability, e.g., a stable capacity of 1110.8 mAh g -1 at 90 mA g -1 (0.1 C), and a reversible capacity of 462.3 mAh g -1 at 1800 mA g -1 (2 C), benefitted from the novel architecture of graphene-embedded Co 3 O 4 rose-spheres. This work has demonstrated a feasible strategy to improve the performance of Co 3 O 4 for lithium-ion battery application.

  1. Co-design for an SoC embedded network controller

    Institute of Scientific and Technical Information of China (English)

    2006-01-01

    With the development of Ethernet systems and the growing capacity of modern silicon technology, embedded communication networks are playing an increasingly important role in embedded and safety critical systems. Hardware/software co-design is a methodology for solving design problems in processor based embedded systems. In this work, we implemented a new 1-cycle pipeline microprocessor and a fast Ethernet transceiver and established a low cost, high performance embedded network controller, and designed a TCP/IP stack to access the Internet. We discussed the hardware/software architecture in the forepart, and then the whole system-on-a-chip on Altera Stratix EP1S25F780C6 device. Using the FPGA environment and SmartBit tester, we tested the system's throughput. Our simulation results showed that the maximum throughput of Ethernet packets is up to 7 Mbps, that of UDP packets is up to 5.8 Mbps, and that of TCP packets is up to 3.4 Mbps, which showed that this embedded system can easily transmit basic voice and video signals through Ethernet, and that using only one chip can realize that many electronic devices access to the Internet directly and get high performance.

  2. Reversible and Embedded Watermarking of Medical Images for Telemedicine

    Directory of Open Access Journals (Sweden)

    Chung-Yen Su

    2015-08-01

    Full Text Available In this paper, we propose a new reversible watermarking of medical images for the applications in telemedicine. By using a bit-stream insertion scheme, the patient’s information can be treated as a watermark and can be embedded into the bit-stream of a cover image for remote transmission. The proposed method simplifies the design of traditional image coding after a reversible watermarking. Experimental results show that the compression ratio can be achieved up to 3.025. The watermarking capacity can be obtained over 0.75 bpp for some common images. In addition, the watermark can be extracted exactly and the cover image can be reconstructed either in a lossless way or a lossy way. The obtained results also show the improvement with respect to previous works.

  3. Dynamic virtual optical network embedding in spectral and spatial domains over elastic optical networks with multicore fibers

    Science.gov (United States)

    Zhu, Ruijie; Zhao, Yongli; Yang, Hui; Tan, Yuanlong; Chen, Haoran; Zhang, Jie; Jue, Jason P.

    2016-08-01

    Network virtualization can eradicate the ossification of the infrastructure and stimulate innovation of new network architectures and applications. Elastic optical networks (EONs) are ideal substrate networks for provisioning flexible virtual optical network (VON) services. However, as network traffic continues to increase exponentially, the capacity of EONs will reach the physical limitation soon. To further increase network flexibility and capacity, the concept of EONs is extended into the spatial domain. How to map the VON onto substrate networks by thoroughly using the spectral and spatial resources is extremely important. This process is called VON embedding (VONE).Considering the two kinds of resources at the same time during the embedding process, we propose two VONE algorithms, the adjacent link embedding algorithm (ALEA) and the remote link embedding algorithm (RLEA). First, we introduce a model to solve the VONE problem. Then we design the embedding ability measurement of network elements. Based on the network elements' embedding ability, two VONE algorithms were proposed. Simulation results show that the proposed VONE algorithms could achieve better performance than the baseline algorithm in terms of blocking probability and revenue-to-cost ratio.

  4. IDE Support of String-Embedded Languages

    Directory of Open Access Journals (Sweden)

    S. Grigorev

    2014-01-01

    Full Text Available Complex information systems are often implemented by using more than one programming language. Sometimes this variety takes a form of one host and one or few string-embedded languages. Textual representation of clauses in a string-embedded language is built at run time by a host program and then analyzed, compiled or interpreted by a dedicated runtime component (database, web browser etc. Most general-purpose programming languages may play the role of the host; one of the most evident examples of the string-embedded language is the dynamic SQL which was specified in ISO SQL standard and is supported by the majority of DBMS. Standard IDE functionality such as code completion or syntax highlighting can really helps the developers who use this technique. There are several tools providing this functionality, but they all process only one concrete string-embedded language and cannot be easily extended for supporting another language. We present a platform which allows to easily create tools for string-embedded language processing.

  5. The Effects of Embedding Information Technologies within ELT on EFL Learners’ Motivation and Interest

    Directory of Open Access Journals (Sweden)

    Shaker Al-Mohammadi

    2014-01-01

    Full Text Available In today’s globalised world, technologies have been embedded in every aspect of daily activities and discourses. The field of education made no exception and hence technologies have become an integral part of all educational systems worldwide, but with different levels and layers. The presence of information technology in English language teaching has brought about notable changes for teachers and learners alike. Accordingly, this paper investigates the impact of integrating information technologies in ELT on EFL learners’ motivation and interest. Based on an authentic comparative case study, this paper explores the influence of information technology on EFL learners’ perceptions, motivation, and interest in the context of ELT in the Tunisian higher education. The findings of this study suggest that the integration of IT in ELT heavily affects EFL students’ motivation and academic performance and hence EFL instructors should take this variable into consideration.

  6. Embedded Academic Librarianship: A Review of the Literature

    Directory of Open Access Journals (Sweden)

    Stephanie J. Schulte

    2012-12-01

    Full Text Available Objectives – The purpose of this review is to examine the development of embedded librarianship, its multiple meanings, and activities in practice. The review will also report on published outcomes and future research needs of embedded librarian programs.Methods – A search of current literature was conducted and summarized searching PubMed, CINAHL, Library, Information Science & Technology Abstracts (EBSCO, Academic Search Complete, and ERIC (EBSCO through August 23, 2012. Articles wereselected for inclusion in the review if they reported research findings related to embedded librarianship, if they provided unique case reports about embedded librarian programs, or if they provided substantive editorial comments on the topic. Relevant study findings were assessed for quality and presented in tabular and narrative form.Results – Currently, there is disparity in how embedded librarianship is being definedand used in common practice, ranging from embedding an online component into asingle course to full physical and cultural integration into an academic college orbusiness unit of an organization. Activities of embedded librarians include creatingcourse integrated instruction modules for either face-to-face or online courses, providingin depth research assistance to students or faculty, and co-locating within colleges orcustomer units via office hours for a few hours to all hours per week. Several case reports exist in the recent literature. Few high quality research studies reporting outcomes of librarians or library programs labeled as embedded exist at this point. Some evidence suggests that embedded librarians are effective with regards to student learning of information literacy objectives. Surveys suggest that both students and faculty appreciate embedded librarian services.Conclusion – Most published accounts discuss librarians embedding content and ready access to services in an online course management system. A few notable cases

  7. Bandwidth Extension of Telephone Speech Aided by Data Embedding

    Directory of Open Access Journals (Sweden)

    Sagi Ariel

    2007-01-01

    Full Text Available A system for bandwidth extension of telephone speech, aided by data embedding, is presented. The proposed system uses the transmitted analog narrowband speech signal as a carrier of the side information needed to carry out the bandwidth extension. The upper band of the wideband speech is reconstructed at the receiving end from two components: a synthetic wideband excitation signal, generated from the narrowband telephone speech and a wideband spectral envelope, parametrically represented and transmitted as embedded data in the telephone speech. We propose a novel data embedding scheme, in which the scalar Costa scheme is combined with an auditory masking model allowing high rate transparent embedding, while maintaining a low bit error rate. The signal is transformed to the frequency domain via the discrete Hartley transform (DHT and is partitioned into subbands. Data is embedded in an adaptively chosen subset of subbands by modifying the DHT coefficients. In our simulations, high quality wideband speech was obtained from speech transmitted over a telephone line (characterized by spectral magnitude distortion, dispersion, and noise, in which side information data is transparently embedded at the rate of 600 information bits/second and with a bit error rate of approximately . In a listening test, the reconstructed wideband speech was preferred (at different degrees over conventional telephone speech in of the test utterances.

  8. Bandwidth Extension of Telephone Speech Aided by Data Embedding

    Directory of Open Access Journals (Sweden)

    David Malah

    2007-01-01

    Full Text Available A system for bandwidth extension of telephone speech, aided by data embedding, is presented. The proposed system uses the transmitted analog narrowband speech signal as a carrier of the side information needed to carry out the bandwidth extension. The upper band of the wideband speech is reconstructed at the receiving end from two components: a synthetic wideband excitation signal, generated from the narrowband telephone speech and a wideband spectral envelope, parametrically represented and transmitted as embedded data in the telephone speech. We propose a novel data embedding scheme, in which the scalar Costa scheme is combined with an auditory masking model allowing high rate transparent embedding, while maintaining a low bit error rate. The signal is transformed to the frequency domain via the discrete Hartley transform (DHT and is partitioned into subbands. Data is embedded in an adaptively chosen subset of subbands by modifying the DHT coefficients. In our simulations, high quality wideband speech was obtained from speech transmitted over a telephone line (characterized by spectral magnitude distortion, dispersion, and noise, in which side information data is transparently embedded at the rate of 600 information bits/second and with a bit error rate of approximately 3⋅10−4. In a listening test, the reconstructed wideband speech was preferred (at different degrees over conventional telephone speech in 92.5% of the test utterances.

  9. Feature-based component model for design of embedded systems

    Science.gov (United States)

    Zha, Xuan Fang; Sriram, Ram D.

    2004-11-01

    An embedded system is a hybrid of hardware and software, which combines software's flexibility and hardware real-time performance. Embedded systems can be considered as assemblies of hardware and software components. An Open Embedded System Model (OESM) is currently being developed at NIST to provide a standard representation and exchange protocol for embedded systems and system-level design, simulation, and testing information. This paper proposes an approach to representing an embedded system feature-based model in OESM, i.e., Open Embedded System Feature Model (OESFM), addressing models of embedded system artifacts, embedded system components, embedded system features, and embedded system configuration/assembly. The approach provides an object-oriented UML (Unified Modeling Language) representation for the embedded system feature model and defines an extension to the NIST Core Product Model. The model provides a feature-based component framework allowing the designer to develop a virtual embedded system prototype through assembling virtual components. The framework not only provides a formal precise model of the embedded system prototype but also offers the possibility of designing variation of prototypes whose members are derived by changing certain virtual components with different features. A case study example is discussed to illustrate the embedded system model.

  10. Impact and user satisfaction of a clinical information portal embedded in an electronic health record.

    Science.gov (United States)

    Tannery, Nancy H; Epstein, Barbara A; Wessel, Charles B; Yarger, Frances; LaDue, John; Klem, Mary Lou

    2011-01-01

    In 2008, a clinical information tool was developed and embedded in the electronic health record system of an academic medical center. In 2009, the initial information tool, Clinical-e, was superseded by a portal called Clinical Focus, with a single search box enabling a federated search of selected online information resources. To measure the usefulness and impact of Clinical Focus, a survey was used to gather feedback about users' experience with this clinical resource. The survey determined what type of clinicians were using this tool and assessed user satisfaction and perceived impact on patient care decision making. Initial survey results suggest the majority of respondents found Clinical Focus easy to navigate, the content easy to read, and the retrieved information relevant and complete. The majority would recommend Clinical Focus to their colleagues. Results indicate that this tool is a promising area for future development.

  11. Intelligence for embedded systems a methodological approach

    CERN Document Server

    Alippi, Cesare

    2014-01-01

    Addressing current issues of which any engineer or computer scientist should be aware, this monograph is a response to the need to adopt a new computational paradigm as the methodological basis for designing pervasive embedded systems with sensor capabilities. The requirements of this paradigm are to control complexity, to limit cost and energy consumption, and to provide adaptation and cognition abilities allowing the embedded system to interact proactively with the real world. The quest for such intelligence requires the formalization of a new generation of intelligent systems able to exploit advances in digital architectures and in sensing technologies. The book sheds light on the theory behind intelligence for embedded systems with specific focus on: ·        robustness (the robustness of a computational flow and its evaluation); ·        intelligence (how to mimic the adaptation and cognition abilities of the human brain), ·        the capacity to learn in non-stationary and evolv...

  12. Embedded system of image storage based on fiber channel

    Science.gov (United States)

    Chen, Xiaodong; Su, Wanxin; Xing, Zhongbao; Wang, Hualong

    2008-03-01

    In domains of aerospace, aviation, aiming, and optic measure etc., the embedded system of imaging, processing and recording is absolutely necessary, which has small volume, high processing speed and high resolution. But the embedded storage technology becomes system bottleneck because of developing slowly. It is used to use RAID to promote storage speed, but it is unsuitable for the embedded system because of its big volume. Fiber channel (FC) technology offers a new method to develop the high-speed, portable storage system. In order to make storage subsystem meet the needs of high storage rate, make use of powerful Virtex-4 FPGA and high speed fiber channel, advance a project of embedded system of digital image storage based on Xilinx Fiber Channel Arbitrated Loop LogiCORE. This project utilizes Virtex- 4 RocketIO MGT transceivers to transmit the data serially, and connects many Fiber Channel hard drivers by using of Arbitrated Loop optionally. It can achieve 400MBps storage rate, breaks through the bottleneck of PCI interface, and has excellences of high-speed, real-time, portable and massive capacity.

  13. Strategic analytics: towards fully embedding evidence in healthcare decision-making.

    Science.gov (United States)

    Garay, Jason; Cartagena, Rosario; Esensoy, Ali Vahit; Handa, Kiren; Kane, Eli; Kaw, Neal; Sadat, Somayeh

    2015-01-01

    Cancer Care Ontario (CCO) has implemented multiple information technology solutions and collected health-system data to support its programs. There is now an opportunity to leverage these data and perform advanced end-to-end analytics that inform decisions around improving health-system performance. In 2014, CCO engaged in an extensive assessment of its current data capacity and capability, with the intent to drive increased use of data for evidence-based decision-making. The breadth and volume of data at CCO uniquely places the organization to contribute to not only system-wide operational reporting, but more advanced modelling of current and future state system management and planning. In 2012, CCO established a strategic analytics practice to assist the agency's programs contextualize and inform key business decisions and to provide support through innovative predictive analytics solutions. This paper describes the organizational structure, services and supporting operations that have enabled progress to date, and discusses the next steps towards the vision of embedding evidence fully into healthcare decision-making. Copyright © 2014 Longwoods Publishing.

  14. Ultimate Lateral Capacity of Rigid Pile in c- φ Soil

    Science.gov (United States)

    Zhang, Wei-min

    2018-03-01

    To date no analytical solution of the pile ultimate lateral capacity for the general c- φ soil has been obtained. In the present study, a new dimensionless embedded ratio was proposed and the analytical solutions of ultimate lateral capacity and rotation center of rigid pile in c- φ soils were obtained. The results showed that both the dimensionless ultimate lateral capacity and dimensionless rotation center were the univariate functions of the embedded ratio. Also, the ultimate lateral capacity in the c- φ soil was the combination of the ultimate lateral capacity ( f c ) in the clay, and the ultimate lateral capacity ( f φ ) in the sand. Therefore, the Broms chart for clay, solution for clay ( φ=0) put forward by Poulos and Davis, solution for sand ( c=0) obtained by Petrasovits and Awad, and Kondner's ultimate bending moment were all proven to be the special cases of the general solution in the present study. A comparison of the field and laboratory tests in 93 cases showed that the average ratios of the theoretical values to the experimental value ranged from 0.85 to 1.15. Also, the theoretical values displayed a good agreement with the test values.

  15. Embedded librarianship what every academic librarian should know

    CERN Document Server

    Russo, Michael F

    2013-01-01

    Is the embedded librarian an equal partner in the course, or is the librarian perceived as a "value-added" extra? What is the place of technology in this effort? Is there a line librarians should not cross? Taking into account both theory and practice to discuss multiple facets of the subject, Embedded Librarianship: What Every Academic Librarian Should Know thoroughly examines these questions and more from the perspectives of experienced embedded librarian contributors who have worked in higher education settings. The chapters illuminate the benefits and challenges of embedding, explain the planning required to set up an embedded course, identify the different forms of embedding, and consider information literacy instruction in various contexts. Readers who will benefit from this work include not only academic librarians but any professor who wants their students to be able to do better research in their fields.

  16. Embedded Leverage

    DEFF Research Database (Denmark)

    Frazzini, Andrea; Heje Pedersen, Lasse

    find that asset classes with embedded leverage offer low risk-adjusted returns and, in the cross-section, higher embedded leverage is associated with lower returns. A portfolio which is long low-embedded-leverage securities and short high-embedded-leverage securities earns large abnormal returns...

  17. NOISE SECURES SECRET DATA! BY ACT AS A REFERENCE FOR EMBEDDING

    Directory of Open Access Journals (Sweden)

    J. Jayaseelan

    2014-03-01

    Full Text Available Data Security is that the most crucial think about a communication network. Data security is achieved by cryptography and data concealing. Steganography is one of the info concealing technique; here any form of signal is concealing by exploitation a picture, audio or video. In an exceedingly spatial domain steganography, most typically the info is embedded into a LSB’s of the cover image pixels. As a result of it maintain the standard of the stego image as like as cover image instead of embedded into MSB’s. To embedding into a LSB’s of cover image (R, G, B plane researchers are using different types of pixel indicating methods, random embedding, edge based embedding in spatial domain or applying completely different reworks in transform domain. In this paper, for spatial domain steganography noise based embedding technique is proposed; it is entirely different from the out there techniques. In this paper two copies of JPEG, PNG, GIF, or BMP etc., images are used. One is taken as a reference image and noise is added onto that. Supported this reference image knowledge is embedded into the LSB’s of cover image. Proposed system using salt and pepper noise for data embedding, it is an ON, OFF noise. Based on added salt, pepper, and no noise portions of reference image completely different range of bits are embedded into the cover image. The result is analyzed by using MSE, PSNR and capacity performance metrics.

  18. Embedding potentials for excited states of embedded species

    International Nuclear Information System (INIS)

    Wesolowski, Tomasz A.

    2014-01-01

    Frozen-Density-Embedding Theory (FDET) is a formalism to obtain the upper bound of the ground-state energy of the total system and the corresponding embedded wavefunction by means of Euler-Lagrange equations [T. A. Wesolowski, Phys. Rev. A 77(1), 012504 (2008)]. FDET provides the expression for the embedding potential as a functional of the electron density of the embedded species, electron density of the environment, and the field generated by other charges in the environment. Under certain conditions, FDET leads to the exact ground-state energy and density of the whole system. Following Perdew-Levy theorem on stationary states of the ground-state energy functional, the other-than-ground-state stationary states of the FDET energy functional correspond to excited states. In the present work, we analyze such use of other-than-ground-state embedded wavefunctions obtained in practical calculations, i.e., when the FDET embedding potential is approximated. Three computational approaches based on FDET, that assure self-consistent excitation energy and embedded wavefunction dealing with the issue of orthogonality of embedded wavefunctions for different states in a different manner, are proposed and discussed

  19. Signalling information from embedded sensors to promote lifetime extension in electrical and electronic equipment

    International Nuclear Information System (INIS)

    Hickey, S; Fitzpatrick, C

    2007-01-01

    The work presented in this paper proposes how life cycle data attained from embedded sensors in electronic systems can be used to potentially enhance their environmental efficiency. Signalling is a means whereby sensor information can be utilised to enhance consumer perception of the value of used equipment and therefore promote lifetime extension for these systems. This can help mitigate a large portion of the environmental impact associated with electronic system manufacture. A case study of a Personal Computer (PC) is presented together with potential signals that can ultimately serve to stimulate secondary market activity for this system

  20. Signalling information from embedded sensors to promote lifetime extension in electrical and electronic equipment

    Science.gov (United States)

    Hickey, S.; Fitzpatrick, C.

    2007-07-01

    The work presented in this paper proposes how life cycle data attained from embedded sensors in electronic systems can be used to potentially enhance their environmental efficiency. Signalling is a means whereby sensor information can be utilised to enhance consumer perception of the value of used equipment and therefore promote lifetime extension for these systems. This can help mitigate a large portion of the environmental impact associated with electronic system manufacture. A case study of a Personal Computer (PC) is presented together with potential signals that can ultimately serve to stimulate secondary market activity for this system.

  1. Liquid-phase plasma synthesis of silicon quantum dots embedded in carbon matrix for lithium battery anodes

    Energy Technology Data Exchange (ETDEWEB)

    Wei, Ying [Institute of Functional Nano and Soft Materials (FUNSOM) and Jiangsu Key Laboratory for Carbon-Based Functional Materials and Devices, Soochow University, Suzhou (China); College of Chemistry and Chemical Engineering, Bohai University, Jinzhou 121000 (China); Yu, Hang; Li, Haitao; Ming, Hai; Pan, Keming; Huang, Hui [Institute of Functional Nano and Soft Materials (FUNSOM) and Jiangsu Key Laboratory for Carbon-Based Functional Materials and Devices, Soochow University, Suzhou (China); Liu, Yang, E-mail: yangl@suda.edu.cn [Institute of Functional Nano and Soft Materials (FUNSOM) and Jiangsu Key Laboratory for Carbon-Based Functional Materials and Devices, Soochow University, Suzhou (China); Kang, Zhenhui, E-mail: zhkang@suda.edu.cn [Institute of Functional Nano and Soft Materials (FUNSOM) and Jiangsu Key Laboratory for Carbon-Based Functional Materials and Devices, Soochow University, Suzhou (China)

    2013-10-15

    Graphical abstract: - Highlights: • Silicon quantum dots embedded in carbon matrix (SiQDs/C) were fabricated. • SiQDs/C exhibits excellent battery performance as anode materials with high specific capacity. • The good performance was attributed to the marriage of small sized SiQDs and carbon. - Abstract: Silicon quantum dots embedded in carbon matrix (SiQDs/C) nanocomposites were prepared by a novel liquid-phase plasma assisted synthetic process. The SiQDs/C nanocomposites were demonstrated to show high specific capacity, good cycling life and high coulmbic efficiency as anode materials for lithium-ion battery.

  2. Liquid-phase plasma synthesis of silicon quantum dots embedded in carbon matrix for lithium battery anodes

    International Nuclear Information System (INIS)

    Wei, Ying; Yu, Hang; Li, Haitao; Ming, Hai; Pan, Keming; Huang, Hui; Liu, Yang; Kang, Zhenhui

    2013-01-01

    Graphical abstract: - Highlights: • Silicon quantum dots embedded in carbon matrix (SiQDs/C) were fabricated. • SiQDs/C exhibits excellent battery performance as anode materials with high specific capacity. • The good performance was attributed to the marriage of small sized SiQDs and carbon. - Abstract: Silicon quantum dots embedded in carbon matrix (SiQDs/C) nanocomposites were prepared by a novel liquid-phase plasma assisted synthetic process. The SiQDs/C nanocomposites were demonstrated to show high specific capacity, good cycling life and high coulmbic efficiency as anode materials for lithium-ion battery

  3. Decreased integration and information capacity in stroke measured by whole brain models of resting state activity.

    Science.gov (United States)

    Adhikari, Mohit H; Hacker, Carl D; Siegel, Josh S; Griffa, Alessandra; Hagmann, Patric; Deco, Gustavo; Corbetta, Maurizio

    2017-04-01

    While several studies have shown that focal lesions affect the communication between structurally normal regions of the brain, and that these changes may correlate with behavioural deficits, their impact on brain's information processing capacity is currently unknown. Here we test the hypothesis that focal lesions decrease the brain's information processing capacity, of which changes in functional connectivity may be a measurable correlate. To measure processing capacity, we turned to whole brain computational modelling to estimate the integration and segregation of information in brain networks. First, we measured functional connectivity between different brain areas with resting state functional magnetic resonance imaging in healthy subjects (n = 26), and subjects who had suffered a cortical stroke (n = 36). We then used a whole-brain network model that coupled average excitatory activities of local regions via anatomical connectivity. Model parameters were optimized in each healthy or stroke participant to maximize correlation between model and empirical functional connectivity, so that the model's effective connectivity was a veridical representation of healthy or lesioned brain networks. Subsequently, we calculated two model-based measures: 'integration', a graph theoretical measure obtained from functional connectivity, which measures the connectedness of brain networks, and 'information capacity', an information theoretical measure that cannot be obtained empirically, representative of the segregative ability of brain networks to encode distinct stimuli. We found that both measures were decreased in stroke patients, as compared to healthy controls, particularly at the level of resting-state networks. Furthermore, we found that these measures, especially information capacity, correlate with measures of behavioural impairment and the segregation of resting-state networks empirically measured. This study shows that focal lesions affect the brain's ability to

  4. Wavelet based mobile video watermarking: spread spectrum vs. informed embedding

    Science.gov (United States)

    Mitrea, M.; Prêteux, F.; Duţă, S.; Petrescu, M.

    2005-11-01

    The cell phone expansion provides an additional direction for digital video content distribution: music clips, news, sport events are more and more transmitted toward mobile users. Consequently, from the watermarking point of view, a new challenge should be taken: very low bitrate contents (e.g. as low as 64 kbit/s) are now to be protected. Within this framework, the paper approaches for the first time the mathematical models for two random processes, namely the original video to be protected and a very harmful attack any watermarking method should face the StirMark attack. By applying an advanced statistical investigation (combining the Chi square, Ro, Fisher and Student tests) in the discrete wavelet domain, it is established that the popular Gaussian assumption can be very restrictively used when describing the former process and has nothing to do with the latter. As these results can a priori determine the performances of several watermarking methods, both of spread spectrum and informed embedding types, they should be considered in the design stage.

  5. Heave induced reduction of friction capacity of pile embedded in clays

    OpenAIRE

    Setyo Budi Gogot; Wibowo Tantri Gondo

    2017-01-01

    Installation of new piles may cause heave which influence friction capacity of existing piles. The heave can be observed from the difference in the elevation of existing pile heads recorded before and after the installation of new piles or through load-settlement diagram from Static Load Test data. This paper presents the study of bearing capacity of hollow cylindrical concrete piles with diameter of 800 mm from two projects. The piles at Project I and Project II were hydraulically jacked int...

  6. On the low SNR capacity of MIMO fading channels with imperfect channel state information

    KAUST Repository

    Benkhelifa, Fatma

    2014-06-01

    The capacity of multiple-input multiple-output (MIMO) Rayleigh fading channels with full knowledge of channel state information (CSI) at both the transmitter and the receiver (CSI-TR) has been shown recently to scale at low signal-to-noise ratio (SNR) essentially as SNR log(1/SNR), independently of the number of transmit and receive antennas. In this paper, we investigate the ergodic capacity of MIMO Rayleigh fading channel with estimated channel state information at the transmitter (CSI-T) and possibly imperfect channel state information at the receiver (CSI-R). Our framework can be seen as a generalization of previous works as it can capture the perfect CSI-TR as a special case when the estimation error variance goes to zero. In this paper, we mainly focus on the low SNR regime, and we show that the capacity scales as (1-α) SNR log(1/SNR), where α is the estimation error variance. This characterization shows the loss of performance due to error estimation over the perfect channel state information at both the transmitter and the receiver. As a by-product of our new analysis, we show that our framework can be also extended to characterize the capacity of MIMO Rician fading channels at low SNR with possibly imperfect CSI-T and CSI-R. © 1972-2012 IEEE.

  7. On the low SNR capacity of MIMO fading channels with imperfect channel state information

    KAUST Repository

    Benkhelifa, Fatma

    2014-05-01

    The capacity of Multiple Input Multiple Output (MIMO) Rayleigh fading channels with full knowledge of channel state information (CSI) at both the transmitter and the receiver (CSI-TR) has been shown recently to scale at low Signal-to-Noise Ratio (SNR) essentially as SNR log(1=SNR), independently of the number of transmit and receive antennas. In this paper, we investigate the ergodic capacity of MIMO Rayleigh fading channel with estimated channel state information at the transmitter (CSI-T) and possibly imperfect channel state information at the receiver (CSI-R). Our framework can be seen as a generalization of previous works as it can capture the perfect CSI-TR as a special case when the estimation error variance goes to zero. In our work, we mainly focus on the low SNR regime and we show that the capacity scales as (1-α) SNR log(1=SNR), where α is the estimation error variance. This characterization shows the loss of performance due to error estimation over the perfect channel state information at both the transmitter and the receiver. As a by-product of our new analysis, we show that our framework can also be extended to characterize the capacity of MIMO Rician fading channels at low SNR with possibly imperfect CSI-T and CSI-R. © 2014 IFIP.

  8. 76 FR 71996 - Notice of Submission of Proposed Information Collection to OMB; Capacity Building for Sustainable...

    Science.gov (United States)

    2011-11-21

    ... Proposed Information Collection to OMB; Capacity Building for Sustainable Communities Program AGENCY... proposal. The Capacity Building for Sustainable Communities Program (Program), through a Notice of Funding...: Title of Proposal: Capacity Building for Sustainable Communities Program OMB Approval Number: 2501-0026...

  9. Embedding Co3O4 nanoparticles into graphene nanoscrolls as anode for lithium ion batteries with superior capacity and outstanding cycling stability

    Directory of Open Access Journals (Sweden)

    Zhigang Zhang

    2018-04-01

    Full Text Available Co3O4 is a promising high-performance anode for lithium ion batteries (LIBs, but suffers from unsatisfied cyclability originating duo to low electrical conductivity and large volume expansion during charge and discharge process. Herein, we successfully constructed the Co3O4 nanoparticles embedded into graphene nanoscrolls (GNSs as advanced anode for high-performance LIBs with large capacity and exceptional cyclability. The one-dimensional (1D Co3O4/GNSs were synthesized via liquid nitrogen cold quenching of large-size graphene oxide nanosheets and sodium citrate (SC modified Co3O4 nanoparticles, followed by freeze drying and annealing at 400 °C for 2 h in nitrogen atmosphere. Benefiting from the interconnected porous network constructed by 1D Co3O4/GNSs for fast electron transfer and rapid ion diffusion, and wrinkled graphene shell for significantly alleviating the huge volume expansion of Co3O4 during lithiation and delithiation. The resultant Co3O4/GNSs exhibited ultrahigh reversible capacity of 1200 mAh g−1 at 0.1 C, outperforming most reported Co3O4 anodes. Moreover, they showed high rate capability of 600 mAh g−1 at 5 C, and outstanding cycling stability with a high capacity retention of 90% after 500 cycles. Therefore, this developed strategy could be extended as an universal and scalable approach for intergrating various metal oxide materials into GNSs for energy storage and conversion applications. Keywords: Graphene nanoscrolls, Co3O4, Anode, Lithium ion batteries, Energy storage

  10. Informing potential participants about research: observational study with an embedded randomized controlled trial.

    Directory of Open Access Journals (Sweden)

    Helen M Kirkby

    Full Text Available OBJECTIVES: To assess: 1 the feasibility of electronic information provision; 2 gather evidence on the topics and level of detail of information potential research participant's accessed; 3 to assess satisfaction and understanding. DESIGN: Observational study with an embedded randomised controlled trial. SETTING: Low risk intervention study based in primary care. PARTICIPANTS: White British & Irish, South Asian and African-Caribbean subjects aged between 40-74 years eligible for a blood pressure monitoring study. INTERVENTIONS: PDF copy of the standard paper participant information sheet (PDF-PIS and an electronic Interactive Information Sheet (IIS where participants could choose both the type and level of detail accessed. MAIN OUTCOME MEASURES: 1 Proportion of participants providing an email address and accessing electronic information 2 Willingness to participate in a recruitment clinic. 3 Type and depth of information accessed on the IIS. 4 Participant satisfaction and understanding. RESULTS: 1160 participants were eligible for the study. Of these, 276 (24% provided an active email address, of whom 84 did not respond to the email. 106 responded to the email but chose not to access any electronic information and were therefore ineligible for randomisation. 42 were randomised to receive the PDF-PIS and 44 to receive the IIS (with consent rates of 48% and 36%, respectively; odds ratio 0.6, 95% confidence interval 0.25 to 1.4. Electronic observation of information accessed by potential participants showed 41% chose to access no information and only 9% accessed the detail presented on the Research Ethics Committee approved participant information sheet before booking to attend a recruitment clinic for the intervention study. 63 of the 106 participants (59% who chose not to access any electronic information also booked an appointment. CONCLUSIONS: Current written information about research may not be read, emphasising the importance of the consent

  11. Embedded Systems for Smart Appliances and Energy Management

    CERN Document Server

    Neumann, Peter; Mahlknecht, Stefan

    2013-01-01

    This book provides a comprehensive introduction to embedded systems for smart appliances and energy management, bringing together for the first time a multidisciplinary blend of topics from embedded systems, information technology and power engineering.  Coverage includes challenges for future resource distribution grids, energy management in smart appliances, micro energy generation, demand response management, ultra-low power stand by, smart standby and communication networks in home and building automation.   Provides a comprehensive, multidisciplinary introduction to embedded systems for smart appliances and energy management; Equips researchers and engineers with information required to succeed in designing energy management for smart appliances; Includes coverage of resource distribution grids, energy management in smart appliances, micro energy generation, demand response management, ultra-low power stand by, smart standby and communication networks in home and building automation.  

  12. Assessment of Land Surface Complexity In Relation To Information Capacity and the Fractal Dimension in Different Landform Regions Using Landsat Data

    International Nuclear Information System (INIS)

    Hong, Wang Xu; Huijie, Qin; Zhe, Zhang; Fei, Li

    2014-01-01

    Remote sensing images are highly structured, and contiguous pixels of space domain have strong correlations that contain abundant information on land surface structure features and land surface electromagnetic radiation features. The information capacity model, which is a quality evaluation model based on a multi-dimensional histogram, includes local correlations within different pixels. Thus, the information capacity can illustrate land surface structural information more objectively and effectively than other single-pixel calculation models. Our results reveal that the information capacity value correlates well with the meaningful grey level of remote sensing imagery. This high correlation is related to the complexity of terrestrial surface landscapes. Therefore, information capacity, as applied to geoscience, is introduced in this study to demonstrate the spatial differentiation of information capacity of different landform regions. Generally, the information capacity of a mountain is large and is followed in decreasing order by those of the hills and the plains. Moreover, the correlation between information capacity and the fractal dimension is analysed. Based on the results of this study, it can be concluded that the level of correlation for information capacity and the fractal dimension is high, and the correlation coefficient for the basic landform areas and the loess landform areas is 0.874 and 0.825, respectively. Finally, this paper proposes that information capacity be used as a new reference index for geoscientific analysis in quantitative research on the characteristics of land surface complexity

  13. Checkpointing for graceful degradation in distributed embedded systems

    Science.gov (United States)

    Sababha, Belal Hussein

    Graceful degradation is an approach to developing dependable safety-critical embedded applications, where redundant active or standby resources are used to cope with faults through a system reconfiguration at run-time. Compared to traditional hardware and software redundancy, it is a promising technique that may achieve dependability with a significant reduction in cost, size, weight, and power requirements. Reconfiguration at run-time necessitates using proper checkpointing protocols to support state reservation to ensure correct task restarts after a system reconfiguration. One of the most common checkpointing protocols are communication induced checkpointing (CIC) protocols, which are well developed and understood for large parallel and information systems, but not much has been done for resource limited embedded systems. This work implements and evaluates some of the most common CIC protocols in a periodic resource constrained distributed embedded system for graceful degradation purposes. A test-bed has been developed and used for the evaluation of the various protocols. The implemented protocols are thoroughly studied and performances are contrasted. Specifically the periodicity property and how it benefits checkpointing in embedded systems is investigated. This work introduces a unique effort of CIC protocol implementation and evaluation in the field of distributed embedded systems. Other than providing a test-bed for graceful degradation support, this work shows that some checkpointing protocols that are not efficient in large information systems and supercomputers perform well in embedded systems. We show that a simple index-based CIC protocol, such as the BCS protocol, is more appropriate in embedded system applications compared to other protocols that piggyback a significant amount of information to reduce the number of forced checkpoints. Finally, this work proposes a whole graceful degradation approach to achieve fault tolerance in resource constrained

  14. Embedded Systems

    Indian Academy of Sciences (India)

    Embedded system, micro-con- troller ... Embedded systems differ from general purpose computers in many ... Low cost: As embedded systems are extensively used in con- .... operating systems for the desktop computers where scheduling.

  15. Conceptualizing Embedded Configuration

    DEFF Research Database (Denmark)

    Oddsson, Gudmundur Valur; Hvam, Lars; Lysgaard, Ole

    2006-01-01

    and services. The general idea can be named embedded configuration. In this article we intend to conceptualize embedded configuration, what it is and is not. The difference between embedded configuration, sales configuration and embedded software is explained. We will look at what is needed to make embedded...... configuration systems. That will include requirements to product modelling techniques. An example with consumer electronics will illuminate the elements of embedded configuration in settings that most can relate to. The question of where embedded configuration would be relevant is discussed, and the current...

  16. Liquid-Embedded Elastomer Electronics

    Science.gov (United States)

    Kramer, Rebecca; Majidi, Carmel; Park, Yong-Lae; Paik, Jamie; Wood, Robert

    2012-02-01

    Hyperelastic sensors are fabricated by embedding a silicone rubber film with microchannels of conductive liquid. In the case of soft tactile sensors, pressing the surface of the elastomer will deform the cross-section of underlying channels and change their electrical resistance. Soft pressure sensors may be employed in a variety of applications. For example, a network of pressure sensors can serve as artificial skin by yielding detailed information about contact pressures. This concept was demonstrated in a hyperelastic keypad, where perpendicular conductive channels form a quasi-planar network within an elastomeric matrix that registers the location, intensity and duration of applied pressure. In a second demonstration, soft curvature sensors were used for joint angle proprioception. Because the sensors are soft and stretchable, they conform to the host without interfering with the natural mechanics of motion. This marked the first use of liquid-embedded elastomer electronics to monitor human or robotic motion. Finally, liquid-embedded elastomers may be implemented as conductors in applications that call for flexible or stretchable circuitry, such as robotic origami.

  17. Ergodic Capacity of Cognitive Radio Under Imperfect Channel-State Information

    KAUST Repository

    Rezki, Zouheir; Alouini, Mohamed-Slim

    2012-01-01

    A spectrum-sharing communication system where the secondary user is aware of the instantaneous channel-state information (CSI) of the secondary link but knows only the statistics and an estimated version of the secondary transmitter-primary receiver link is investigated. The optimum power profile and the ergodic capacity of the secondary link are derived for general fading channels [with a continuous probability density function (pdf)] under the average and peak transmit power constraints and with respect to the following two different interference constraints: 1) an interference outage constraint and 2) a signal-to-interference outage constraint. When applied to Rayleigh fading channels, our results show, for example, that the interference constraint is harmful at the high-power regime, because the capacity does not increase with the power, whereas at the low-power regime, it has a marginal impact and no-interference performance, which corresponds to the ergodic capacity under average or peak transmit power constraint in the absence of the primary user, may be achieved. © 2012 IEEE.

  18. Ergodic Capacity of Cognitive Radio Under Imperfect Channel-State Information

    KAUST Repository

    Rezki, Zouheir

    2012-09-08

    A spectrum-sharing communication system where the secondary user is aware of the instantaneous channel-state information (CSI) of the secondary link but knows only the statistics and an estimated version of the secondary transmitter-primary receiver link is investigated. The optimum power profile and the ergodic capacity of the secondary link are derived for general fading channels [with a continuous probability density function (pdf)] under the average and peak transmit power constraints and with respect to the following two different interference constraints: 1) an interference outage constraint and 2) a signal-to-interference outage constraint. When applied to Rayleigh fading channels, our results show, for example, that the interference constraint is harmful at the high-power regime, because the capacity does not increase with the power, whereas at the low-power regime, it has a marginal impact and no-interference performance, which corresponds to the ergodic capacity under average or peak transmit power constraint in the absence of the primary user, may be achieved. © 2012 IEEE.

  19. Search for Expectancy-Inconsistent Information Reduces Uncertainty Better: The Role of Cognitive Capacity.

    Science.gov (United States)

    Strojny, Paweł; Kossowska, Małgorzata; Strojny, Agnieszka

    2016-01-01

    Motivation and cognitive capacity are key factors in people's everyday struggle with uncertainty. However, the exact nature of their interplay in various contexts still needs to be revealed. The presented paper reports on two experimental studies which aimed to examine the joint consequences of motivational and cognitive factors for preferences regarding incomplete information expansion. In Study 1 we demonstrate the interactional effect of motivation and cognitive capacity on information preference. High need for closure resulted in a stronger relative preference for expectancy-inconsistent information among non-depleted individuals, but the opposite among cognitively depleted ones. This effect was explained by the different informative value of questions in comparison to affirmative sentences and the potential possibility of assimilation of new information if it contradicts prior knowledge. In Study 2 we further investigated the obtained effect, showing that not only questions but also other kinds of incomplete information are subject to the same dependency. Our results support the expectation that, in face of incomplete information, motivation toward closure may be fulfilled efficiently by focusing on expectancy-inconsistent pieces of data. We discuss the obtained effect in the context of previous assumptions that high need for closure results in a simple processing style, advocating a more complex approach based on the character of the provided information.

  20. Pullout capacity of batter pile in sand.

    Science.gov (United States)

    Nazir, Ashraf; Nasr, Ahmed

    2013-03-01

    Many offshore structures are subjected to overturning moments due to wind load, wave pressure, and ship impacts. Also most of retaining walls are subjected to horizontal forces and bending moments, these forces are due to earth pressure. For foundations in such structures, usually a combination of vertical and batter piles is used. Little information is available in the literature about estimating the capacity of piles under uplift. In cases where these supporting piles are not vertical, the behavior under axial pullout is not well established. In order to delineate the significant variables affecting the ultimate uplift shaft resistance of batter pile in dry sand, a testing program comprising 62 pullout tests was conducted. The tests are conducted on model steel pile installed in loose, medium, and dense sand to an embedded depth ratio, L/d, vary from 7.5 to 30 and with various batter angles of 0°, 10°, 20°, and 30°. Results indicate that the pullout capacity of a batter pile constructed in dense and/or medium density sand increases with the increase of batter angle attains maximum value and then decreases, the maximum value of Pα occurs at batter angle approximately equal to 20°, and it is about 21-31% more than the vertical pile capacity, while the pullout capacity for batter pile that constructed in loose sand decreases with the increase of pile inclination. The results also indicated that the circular pile is more resistant to pullout forces than the square and rectangular pile shape. The rough model piles tested is experienced 18-75% increase in capacity compared with the smooth model piles. The suggested relations for the pullout capacity of batter pile regarding the vertical pile capacity are well predicted.

  1. Pullout capacity of batter pile in sand

    Directory of Open Access Journals (Sweden)

    Ashraf Nazir

    2013-03-01

    Full Text Available Many offshore structures are subjected to overturning moments due to wind load, wave pressure, and ship impacts. Also most of retaining walls are subjected to horizontal forces and bending moments, these forces are due to earth pressure. For foundations in such structures, usually a combination of vertical and batter piles is used. Little information is available in the literature about estimating the capacity of piles under uplift. In cases where these supporting piles are not vertical, the behavior under axial pullout is not well established. In order to delineate the significant variables affecting the ultimate uplift shaft resistance of batter pile in dry sand, a testing program comprising 62 pullout tests was conducted. The tests are conducted on model steel pile installed in loose, medium, and dense sand to an embedded depth ratio, L/d, vary from 7.5 to 30 and with various batter angles of 0°, 10°, 20°, and 30°. Results indicate that the pullout capacity of a batter pile constructed in dense and/or medium density sand increases with the increase of batter angle attains maximum value and then decreases, the maximum value of Pα occurs at batter angle approximately equal to 20°, and it is about 21–31% more than the vertical pile capacity, while the pullout capacity for batter pile that constructed in loose sand decreases with the increase of pile inclination. The results also indicated that the circular pile is more resistant to pullout forces than the square and rectangular pile shape. The rough model piles tested is experienced 18–75% increase in capacity compared with the smooth model piles. The suggested relations for the pullout capacity of batter pile regarding the vertical pile capacity are well predicted.

  2. Efficient Information Hiding Based on Theory of Numbers

    Directory of Open Access Journals (Sweden)

    Yanjun Liu

    2018-01-01

    Full Text Available Data hiding is an efficient technique that conceals secret data into a digital medium. In 2006, Zhang and Wang proposed a data hiding scheme called exploiting modification direction (EMD which has become a milestone in the field of data hiding. In recent years, many EMD-type data hiding schemes have been developed, but their embedding capacity remains restricted. In this paper, a novel data hiding scheme based on the combination of Chinese remainder theorem (CRT and a new extraction function is proposed. By the proposed scheme, the cover image is divided into non-overlapping pixel groups for embedding to increase the embedding capacity. Experimental results show that the embedding capacity of the proposed scheme is significantly higher (greater than 2.5 bpp than previously proposed schemes while ensuring very good visual quality of the stego image. In addition, security analysis is given to show that the proposed scheme can resist visual attack.

  3. Information processing capacity in psychopathy: Effects of anomalous attention.

    Science.gov (United States)

    Hamilton, Rachel K B; Newman, Joseph P

    2018-03-01

    Hamilton and colleagues (2015) recently proposed that an integrative deficit in psychopathy restricts simultaneous processing, thereby leaving fewer resources available for information encoding, narrowing the scope of attention, and undermining associative processing. The current study evaluated this parallel processing deficit proposal using the Simultaneous-Sequential paradigm. This investigation marks the first a priori test of the Hamilton et al.'s theoretical framework. We predicted that psychopathy would be associated with inferior performance (as indexed by lower accuracy and longer response time) on trials requiring simultaneous processing of visual information relative to trials necessitating sequential processing. Results were consistent with these predictions, supporting the proposal that psychopathy is characterized by a reduced capacity to process multicomponent perceptual information concurrently. We discuss the potential implications of impaired simultaneous processing for the conceptualization of the psychopathic deficit. (PsycINFO Database Record (c) 2018 APA, all rights reserved).

  4. Wavelet techniques for reversible data embedding into images

    NARCIS (Netherlands)

    L. Kamstra; H.J.A.M. Heijmans (Henk)

    2004-01-01

    textabstractThe proliferation of digital information in our society has enticed a lot of research into data embedding techniques that add information to digital content like images, audio and video. This additional information can be used for various purposes and different applications place

  5. Effects of Common Factors on Dynamics of Stocks Traded by Investors with Limited Information Capacity

    Directory of Open Access Journals (Sweden)

    Songtao Wu

    2017-01-01

    Full Text Available An artificial stock market with agent-based model is built to investigate effects of different information characteristics of common factors on the dynamics stock returns. Investors with limited information capacity update their beliefs based on the information they have obtained and processed and optimize portfolios based on beliefs. We find that with changing of concerned information characteristics the uncertainty of stock price returns rises and is higher than the uncertainty of intrinsic value returns. However, this increase is constrained by the limited information capacity of investors. At the same time, we also find that dependence between returns of stock prices also increased with the changing information environment. The uncertainty and dependency pertaining to prices show a positive relationship. However, the positive relationship is weakened when taking into account the features of intrinsic values, based on which prices are generated.

  6. Informed Consent and Capacity to Give Consent in Mental Disorders

    Directory of Open Access Journals (Sweden)

    Zeynep Mackali

    2014-09-01

    Full Text Available Among four basic principles (respect for autonomy, beneficence, non-malfeasance, and justice which determine ethical behaviors in healthcare, informed consent is mostly related to and lsquo;respect for autonomy'. Also, it reflects patient/client's right for decision and the value given for the client and his/her autonomy. Informed consent is an information sharing process including both rational decision-making about the most appropriate method among many different options and the interaction between the clinician and the client. This concept sheds light on criteria regarding the limits of confidentiality, competency, appropriate and sufficient information sharing and voluntariness. In this theoretical review, the definitions and the content of informed consent were shared, and then a section regarding the required content of informed consent for psychotherapy process was provided. Then, the components of informed consent were discussed and the relationship between capacity to consent and mental disorders in terms of aforementioned diagnostic groups was examined. [Psikiyatride Guncel Yaklasimlar - Current Approaches in Psychiatry 2014; 6(3.000: 227-242

  7. Capacity of cognitive radio under imperfect secondary and cross link channel state information

    KAUST Repository

    Sboui, Lokman

    2011-09-01

    In this paper, we study the ergodic capacity of secondary user channel in a spectrum sharing scenario in which the secondary transmitter is instantaneously aware of estimated versions of the cross link (between the secondary transmitter and the primary receiver) and the secondary link Channel State Information (CSI). The secondary link optimal power profile along with the ergodic capacity are derived for a class of fading channels, under an average power constraint and an instantaneous interference outage constraint. We also show that our framework is rather general as it encompasses several previously studied spectrum sharing settings as special cases. In order to gain some insights on the capacity behavior, numerical results are shown for independent Rayleigh fading channels where it is found for instance, that at low SNR regime, only the secondary channel estimation matters and that the cross link CSI has no effect on the ergodic capacity; whereas at high SNR regime, the capacity is rather driven by the cross link CSI. © 2011 IEEE.

  8. Embedded Librarians: Just-in-Time or Just-in-Case? A Research Study

    Science.gov (United States)

    Heathcock, Kristin

    2015-01-01

    Embedded librarians in online courses provide a wealth of service and information to students. Though students indicate that these services are valuable, the librarians providing embedded services frequently note that these projects are very time consuming. This study examines the provision of a less time-intensive model of embedded librarianship…

  9. Using Information Theory to Assess the Communicative Capacity of Circulating MicroRNA

    OpenAIRE

    Finn, Nnenna A.; Searles, Charles D.

    2013-01-01

    The discovery of extracellular microRNAs (miRNAs) and their transport modalities (i.e. microparticles, exosomes, proteins and lipoproteins) has sparked theories regarding their role in intercellular communication. Here, we assessed the information transfer capacity of different miRNA transport modalities in human serum by utilizing basic principles of information theory. Zipf Statistics were calculated for each of the miRNA transport modalities identified in human serum. Our analyses revealed...

  10. Embedded and real-time operating systems

    CERN Document Server

    Wang, K C

    2017-01-01

    This book covers the basic concepts and principles of operating systems, showing how to apply them to the design and implementation of complete operating systems for embedded and real-time systems. It includes all the foundational and background information on ARM architecture, ARM instructions and programming, toolchain for developing programs, virtual machines for software implementation and testing, program execution image, function call conventions, run-time stack usage and link C programs with assembly code. It describes the design and implementation of a complete OS for embedded systems in incremental steps, explaining the design principles and implementation techniques. For Symmetric Multiprocessing (SMP) embedded systems, the author examines the ARM MPcore processors, which include the SCU and GIC for interrupts routing and interprocessor communication and synchronization by Software Generated Interrupts (SGIs). Throughout the book, complete working sample systems demonstrate the design principles and...

  11. CESAR cost-efficient methods and processes for safety-relevant embedded systems

    CERN Document Server

    Wahl, Thomas

    2013-01-01

    The book summarizes the findings and contributions of the European ARTEMIS project, CESAR, for improving and enabling interoperability of methods, tools, and processes to meet the demands in embedded systems development across four domains - avionics, automotive, automation, and rail. The contributions give insight to an improved engineering and safety process life-cycle for the development of safety critical systems. They present new concept of engineering tools integration platform to improve the development of safety critical embedded systems and illustrate capacity of this framework for end-user instantiation to specific domain needs and processes. They also advance state-of-the-art in component-based development as well as component and system validation and verification, with tool support. And finally they describe industry relevant evaluated processes and methods especially designed for the embedded systems sector as well as easy adoptable common interoperability principles for software tool integratio...

  12. Sustainable Regulation of Information Sharing with Electronic Data Interchange by a Trust-Embedded Contract

    Directory of Open Access Journals (Sweden)

    Guanghua Han

    2017-06-01

    Full Text Available This paper studies the risks in demand information sharing applications by electronic soft-orders using electronic data interchange (EDI systems in e-commerce and aims to suggest a sustainable regulation mechanism with a trust-embedded contract. In a supply chain with one retailer and one supplier, the retailer solicits private forecasted demand and places soft-orders via EDI to the supplier. To ensure abundant supply, the retailer has an incentive to inflate her soft-orders, which potentially harms the credible information sharing and sustainability of business cooperation. Normally, the degree to which the supplier relies on the retailer’s order information is specified by trust, which is evaluated according to the retailer’s reputation and supplier’s intuition in this study. Based on standard game theory, we find that both the retailer’s order and the quantity of supplier prepared materials are independent of the retailer’s forecast. Therefore, EDI based information sharing in e-commerce without a regulation mechanism leads to inefficient demand information sharing. Since both the supplier and retailer are proved to faces huge of potential profit losses due to the failure of information sharing, the commerce by EDI based information sharing is full of risk and unsustainable. Therefore, a regulation mechanism that leaded by the retailer is proposed to establish ‘win-win’ sustainable cooperation. Numerical experiments highlight the value of trust, the impact of reputation and intuition in decisions, and the effectiveness of the regulation mechanism by a cost-sharing contract.

  13. Embedded Web Technology: Applying World Wide Web Standards to Embedded Systems

    Science.gov (United States)

    Ponyik, Joseph G.; York, David W.

    2002-01-01

    Embedded Systems have traditionally been developed in a highly customized manner. The user interface hardware and software along with the interface to the embedded system are typically unique to the system for which they are built, resulting in extra cost to the system in terms of development time and maintenance effort. World Wide Web standards have been developed in the passed ten years with the goal of allowing servers and clients to intemperate seamlessly. The client and server systems can consist of differing hardware and software platforms but the World Wide Web standards allow them to interface without knowing about the details of system at the other end of the interface. Embedded Web Technology is the merging of Embedded Systems with the World Wide Web. Embedded Web Technology decreases the cost of developing and maintaining the user interface by allowing the user to interface to the embedded system through a web browser running on a standard personal computer. Embedded Web Technology can also be used to simplify an Embedded System's internal network.

  14. Some Fundamental Limits on SAW RFID Tag Information Capacity and Collision Resolution

    Science.gov (United States)

    Barton, Richard J.

    2013-01-01

    In this paper, we apply results from multi-user information theory to study the limits of information capacity and collision resolution for SAW RFID tags. In particular, we derive bounds on the achievable data rate per tag as a function of fundamental parameters such as tag time-bandwidth product, tag signal-to-noise ratio (SNR), and number of tags in the environment. We also discuss the implications of these bounds for tag waveform design and tag interrogation efficiency

  15. Embedded, everywhere: a research agenda for networked systems of embedded computers

    National Research Council Canada - National Science Library

    Committee on Networked Systems of Embedded Computers; National Research Council Staff; Division on Engineering and Physical Sciences; Computer Science and Telecommunications Board; National Academy of Sciences

    2001-01-01

    .... Embedded, Everywhere explores the potential of networked systems of embedded computers and the research challenges arising from embedding computation and communications technology into a wide variety of applicationsâ...

  16. The Magical Number Seven, Plus or Minus Two: Some Limits on Our Capacity for Processing Information.

    Science.gov (United States)

    Miller, George A.

    1994-01-01

    Capacity limitations in absolute judgment tasks are discussed in relation to information theory. Information theory can provide a quantitative way of resolving questions about limitations on the amount of information we can receive and the process of recoding. (SLD)

  17. Introduction to embedded system design using field programmable gate arrays

    CERN Document Server

    Dubey, Rahul

    2009-01-01

    Offers information on the use of field programmable gate arrays (FPGAs) in the design of embedded systems. This text considers a hypothetical robot controller as an embedded application and weaves around it related concepts of FPGA-based digital design. It is suitable for both students and designers who have worked with microprocessors.

  18. "You're just one of the group when you're embedded": report from a mixed-method investigation of the research-embedded health librarian experience.

    Science.gov (United States)

    Greyson, Devon; Surette, Soleil; Dennett, Liz; Chatterley, Trish

    2013-10-01

    Embedded librarianship has received much attention in recent years. A model of embeddedness rarely discussed to date is that of research-embedded health librarians (REHLs). This study explores the characteristics of Canadian REHLs and the situations in which they are employed. The authors employed a sequential, mixed-method design. An online survey provided descriptive statistics about REHLs' positions and work experiences. This informed a series of focus group interviews that expanded upon the survey. Through constant comparison, we conducted qualitative descriptive analysis of the interviews. Based on twenty-nine survey responses and four group interviews, we created a portrait of a "typical" REHL and discovered themes relevant to REHL work. REHLs may identify more strongly as researchers than as librarians, with corresponding professional needs and rewards. REHLs value "belonging" to the research team, involvement in full project lifecycles, and in-depth relationships with nonlibrarian colleagues. Despite widely expressed job satisfaction, many REHLs struggle with isolation from library and information science peers and relative lack of job security. REHLs differ from non-embedded health librarians, as well as from other types of embedded librarians. REHLs' work also differs from just a decade or two ago, prior to widespread Internet access to digital resources. Given that research-embedded librarianship appears to be a distinct and growing subset of health librarianship, libraries, master's of library and information science programs, and professional associations will need to respond to the support and education needs of REHLs or risk losing them to the health research field.

  19. A theory-informed approach to mental health care capacity building for pharmacists.

    Science.gov (United States)

    Murphy, Andrea L; Gardner, David M; Kutcher, Stan P; Martin-Misener, Ruth

    2014-01-01

    Pharmacists are knowledgeable, accessible health care professionals who can provide services that improve outcomes in mental health care. Various challenges and opportunities can exist in pharmacy practice to hinder or support pharmacists' efforts. We used a theory-informed approach to development and implementation of a capacity-building program to enhance pharmacists' roles in mental health care. Theories and frameworks including the Consolidated Framework for Implementation Research, the Theoretical Domains Framework, and the Behaviour Change Wheel were used to inform the conceptualization, development, and implementation of a capacity-building program to enhance pharmacists' roles in mental health care. The More Than Meds program was developed and implemented through an iterative process. The main program components included: an education and training day; use of a train-the-trainer approach from partnerships with pharmacists and people with lived experience of mental illness; development of a community of practice through email communications, a website, and a newsletter; and use of educational outreach delivered by pharmacists. Theories and frameworks used throughout the program's development and implementation facilitated a means to conceptualize the component parts of the program as well as its overall presence as a whole from inception through evolution in implementation. Using theoretical foundations for the program enabled critical consideration and understanding of issues related to trialability and adaptability of the program. Theory was essential to the underlying development and implementation of a capacity-building program for enhancing services by pharmacists for people with lived experience of mental illness. Lessons learned from the development and implementation of this program are informing current research and evolution of the program.

  20. Evaluation of guardrail embedded lighting system in Trinidad, Colorado.

    Science.gov (United States)

    2014-02-01

    This report provides information on the design considerations of the embedded highway lighting : design on Interstate-25 in Trinidad, Colorado, in terms of visibility. The information is based on : visibility characterizations of small targets using ...

  1. Socially anxious individuals with low working memory capacity could not inhibit the goal-irrelevant information.

    Science.gov (United States)

    Moriya, Jun; Sugiura, Yoshinori

    2013-01-01

    Socially anxious individuals are interfered by distractors. Recent work has suggested that low working memory capacity and inappropriate temporary goal induce attention to distractors. We investigated the effects of working memory capacity and temporary goal on attention to distractors in social anxiety. Participants viewed a rapid serial visual presentation, in which participants reported the identity of a single target letter drawn in red. Distractors appeared before the target was presented. When the color of distractors was red (i.e., goal-relevant stimuli), low-capacity individuals were strongly interfered by the distractors compared to high-capacity individuals regardless of social anxiety. When the color of distractors was goal-irrelevant, low-capacity and high socially anxious individuals were strongly interfered by the distractors. These results suggest that socially anxious individuals with low working memory capacity could not inhibit the goal-irrelevant information and direct attention to distractors.

  2. Socially Anxious Individuals with Low Working Memory Capacity Could Not Inhibit the Goal-Irrelevant Information

    Directory of Open Access Journals (Sweden)

    Jun eMoriya

    2013-12-01

    Full Text Available Socially anxious individuals are interfered by distractors. Recent work has suggested that low working memory capacity and inappropriate temporary goal induce attentional capture to distractors. We investigated the effects of working memory capacity and temporary goal on attentional capture to distractors in social anxiety. Participants viewed a rapid serial visual presentation, in which participants reported the identity of a single target letter drawn in red. Distractors appeared before the target was presented. When the color of distractors was red (i.e., goal-relevant stimuli, low-capacity individuals were strongly interfered by the distractors compared to high-capacity individuals regardless of social anxiety. When the color of distractors was goal-irrelevant, low-capacity and high socially anxious individuals were strongly interfered by the distractors. These results suggest that socially anxious individuals with low working memory capacity could not inhibit the goal-irrelevant information and direct attention to distractors.

  3. Early auditory evoked potential is modulated by selective attention and related to individual differences in visual working memory capacity.

    Science.gov (United States)

    Giuliano, Ryan J; Karns, Christina M; Neville, Helen J; Hillyard, Steven A

    2014-12-01

    A growing body of research suggests that the predictive power of working memory (WM) capacity for measures of intellectual aptitude is due to the ability to control attention and select relevant information. Crucially, attentional mechanisms implicated in controlling access to WM are assumed to be domain-general, yet reports of enhanced attentional abilities in individuals with larger WM capacities are primarily within the visual domain. Here, we directly test the link between WM capacity and early attentional gating across sensory domains, hypothesizing that measures of visual WM capacity should predict an individual's capacity to allocate auditory selective attention. To address this question, auditory ERPs were recorded in a linguistic dichotic listening task, and individual differences in ERP modulations by attention were correlated with estimates of WM capacity obtained in a separate visual change detection task. Auditory selective attention enhanced ERP amplitudes at an early latency (ca. 70-90 msec), with larger P1 components elicited by linguistic probes embedded in an attended narrative. Moreover, this effect was associated with greater individual estimates of visual WM capacity. These findings support the view that domain-general attentional control mechanisms underlie the wide variation of WM capacity across individuals.

  4. Web Server Embedded System

    Directory of Open Access Journals (Sweden)

    Adharul Muttaqin

    2014-07-01

    Full Text Available Abstrak Embedded sistem saat ini menjadi perhatian khusus pada teknologi komputer, beberapa sistem operasi linux dan web server yang beraneka ragam juga sudah dipersiapkan untuk mendukung sistem embedded, salah satu aplikasi yang dapat digunakan dalam operasi pada sistem embedded adalah web server. Pemilihan web server pada lingkungan embedded saat ini masih jarang dilakukan, oleh karena itu penelitian ini dilakukan dengan menitik beratkan pada dua buah aplikasi web server yang tergolong memiliki fitur utama yang menawarkan “keringanan” pada konsumsi CPU maupun memori seperti Light HTTPD dan Tiny HTTPD. Dengan menggunakan parameter thread (users, ramp-up periods, dan loop count pada stress test embedded system, penelitian ini menawarkan solusi web server manakah diantara Light HTTPD dan Tiny HTTPD yang memiliki kecocokan fitur dalam penggunaan embedded sistem menggunakan beagleboard ditinjau dari konsumsi CPU dan memori. Hasil penelitian menunjukkan bahwa dalam hal konsumsi CPU pada beagleboard embedded system lebih disarankan penggunaan Light HTTPD dibandingkan dengan tiny HTTPD dikarenakan terdapat perbedaan CPU load yang sangat signifikan antar kedua layanan web tersebut Kata kunci: embedded system, web server Abstract Embedded systems are currently of particular concern in computer technology, some of the linux operating system and web server variegated also prepared to support the embedded system, one of the applications that can be used in embedded systems are operating on the web server. Selection of embedded web server on the environment is still rarely done, therefore this study was conducted with a focus on two web application servers belonging to the main features that offer a "lightness" to the CPU and memory consumption as Light HTTPD and Tiny HTTPD. By using the parameters of the thread (users, ramp-up periods, and loop count on a stress test embedded systems, this study offers a solution of web server which between the Light

  5. Design and implementation of embedded un-interruptible power supply system (EUPSS) for web-based mobile application

    Science.gov (United States)

    Zhang, De-gan; Zhang, Xiao-dan

    2012-11-01

    With the growth of the amount of information manipulated by embedded application systems, which are embedded into devices and offer access to the devices on the internet, the requirements of saving the information systemically is necessary so as to fulfil access from the client and the local processing more efficiently. For supporting mobile applications, a design and implementation solution of embedded un-interruptible power supply (UPS) system (in brief, EUPSS) is brought forward for long-distance monitoring and controlling of UPS based on Web. The implementation of system is based on ATmega161, RTL8019AS and Arm chips with TCP/IP protocol suite for communication. In the embedded UPS system, an embedded file system is designed and implemented which saves the data and index information on a serial EEPROM chip in a structured way and communicates with a microcontroller unit through I2C bus. By embedding the file system into UPS system or other information appliances, users can access and manipulate local data on the web client side. Embedded file system on chips will play a major role in the growth of IP networking. Based on our experiment tests, the mobile users can easily monitor and control UPS in different places of long-distance. The performance of EUPSS has satisfied the requirements of all kinds of Web-based mobile applications.

  6. Knowledge Translation Capacity of Arts-informed Dissemination: A Narrative Study

    Directory of Open Access Journals (Sweden)

    Jennifer L Lapum

    2016-07-01

    Full Text Available Background: Arts-informed dissemination is an expanding approach to enhancing knowledge translation in the health sciences. Problematic is the minimal evaluation studies and the rare reporting of the influencing factors of knowledge translation. “The 7,024th Patient” is a research-derived art installation created to disseminate findings about patients’ experiences of heart surgery and the importance of humanistic patient-centred care approaches. The current study’s purpose was to explore how arts-informed dissemination (i.e., “The 7,024th Patient” influenced healthcare practitioners’ delivery of care. Methods: An arts-informed narrative study was guided by the Promoting Action on Research Implementation in Health Services framework. The sample included a multi-disciplinary group of 19 individuals who worked with patients undergoing and recovering from heart surgery. Two interviews were conducted with each participant at the time of viewing the installation and 6 months later. A narrative analysis was conducted using Pictorial Narrative Mapping techniques. Results: Study findings indicated that the arts as a form of evidence provide an experiential and aesthetic encounter, which stimulated reflective practice. Participants’ accounts reflected cognitive and behavioral modifications related to empathy, holistic approaches and relational care. However, the complexities associated with the interpretive process and the influencing knowledge translation elements indicated a need to dialogue about the translation process, including deconstructing the evidence within the context of one’s own practice. Conclusions: Art is not just works of beauty or eccentric paintings. There is an imaginative and aesthetic capacity that can be cultivated with diligence, creativity, and rigour in the world of healthcare research and knowledge translation. Next steps require the examination of the knowledge translation capacity of different art forms with

  7. Visual content highlighting via automatic extraction of embedded captions on MPEG compressed video

    Science.gov (United States)

    Yeo, Boon-Lock; Liu, Bede

    1996-03-01

    Embedded captions in TV programs such as news broadcasts, documentaries and coverage of sports events provide important information on the underlying events. In digital video libraries, such captions represent a highly condensed form of key information on the contents of the video. In this paper we propose a scheme to automatically detect the presence of captions embedded in video frames. The proposed method operates on reduced image sequences which are efficiently reconstructed from compressed MPEG video and thus does not require full frame decompression. The detection, extraction and analysis of embedded captions help to capture the highlights of visual contents in video documents for better organization of video, to present succinctly the important messages embedded in the images, and to facilitate browsing, searching and retrieval of relevant clips.

  8. Embedding Multiple Literacies into STEM Curricula

    Science.gov (United States)

    Soules, Aline; Nielsen, Sarah; LeDuc, Danika; Inouye, Caron; Singley, Jason; Wildy, Erica; Seitz, Jeff

    2014-01-01

    In fall 2012, an interdisciplinary team of science, English, and library faculty embedded reading, writing, and information literacy strategies in Science, Technology, Engineering, and Mathematics (STEM) curricula as a first step in improving student learning and retention in science courses and aligning them with the Next Generation Science and…

  9. Embedded Hardware

    CERN Document Server

    Ganssle, Jack G; Eady, Fred; Edwards, Lewin; Katz, David J; Gentile, Rick

    2007-01-01

    The Newnes Know It All Series takes the best of what our authors have written to create hard-working desk references that will be an engineer's first port of call for key information, design techniques and rules of thumb. Guaranteed not to gather dust on a shelf!. Circuit design using microcontrollers is both a science and an art. This book covers it all. It details all of the essential theory and facts to help an engineer design a robust embedded system. Processors, memory, and the hot topic of interconnects (I/O) are completely covered. Our authors bring a wealth of experience and ideas; thi

  10. Unsteady Flame Embedding

    KAUST Repository

    El-Asrag, Hossam A.

    2011-01-01

    Direct simulation of all the length and time scales relevant to practical combustion processes is computationally prohibitive. When combustion processes are driven by reaction and transport phenomena occurring at the unresolved scales of a numerical simulation, one must introduce a dynamic subgrid model that accounts for the multiscale nature of the problem using information available on a resolvable grid. Here, we discuss a model that captures unsteady flow-flame interactions- including extinction, re-ignition, and history effects-via embedded simulations at the subgrid level. The model efficiently accounts for subgrid flame structure and incorporates detailed chemistry and transport, allowing more accurate prediction of the stretch effect and the heat release. In this chapter we first review the work done in the past thirty years to develop the flame embedding concept. Next we present a formulation for the same concept that is compatible with Large Eddy Simulation in the flamelet regimes. The unsteady flame embedding approach (UFE) treats the flame as an ensemble of locally one-dimensional flames, similar to the flamelet approach. However, a set of elemental one-dimensional flames is used to describe the turbulent flame structure directly at the subgrid level. The calculations employ a one-dimensional unsteady flame model that incorporates unsteady strain rate, curvature, and mixture boundary conditions imposed by the resolved scales. The model is used for closure of the subgrid terms in the context of large eddy simulation. Direct numerical simulation (DNS) data from a flame-vortex interaction problem is used for comparison. © Springer Science+Business Media B.V. 2011.

  11. Wide sense one-dependent processes with embedded Harris chains and their applications in inventory management

    NARCIS (Netherlands)

    E.M. Bazsa-Oldenkamp; P. den Iseger

    2003-01-01

    textabstractIn this paper we consider stochastic processes with an embedded Harris chain. The embedded Harris chain describes the dependence structure of the stochastic process. That is, all the relevant information of the past is contained in the state of the embedded Harris chain. For these

  12. How Uncertain Information on Service Capacity Influences the Intermodal Routing Decision: A Fuzzy Programming Perspective

    Directory of Open Access Journals (Sweden)

    Yan Sun

    2018-01-01

    Full Text Available Capacity uncertainty is a common issue in the transportation planning field. However, few studies discuss the intermodal routing problem with service capacity uncertainty. Based on our previous study on the intermodal routing under deterministic capacity consideration, we systematically explore how service capacity uncertainty influences the intermodal routing decision. First of all, we adopt trapezoidal fuzzy numbers to describe the uncertain information of the service capacity, and further transform the deterministic capacity constraint into a fuzzy chance constraint based on fuzzy credibility measure. We then integrate such fuzzy chance constraint into the mixed-integer linear programming (MILP model proposed in our previous study to develop a fuzzy chance-constrained programming model. To enable the improved model to be effectively programmed in the standard mathematical programming software and solved by exact solution algorithms, a crisp equivalent linear reformulation of the fuzzy chance constraint is generated. Finally, we modify the empirical case presented in our previous study by replacing the deterministic service capacities with trapezoidal fuzzy ones. Using the modified empirical case, we utilize sensitivity analysis and fuzzy simulation to analyze the influence of service capacity uncertainty on the intermodal routing decision, and summarize some interesting insights that are helpful for decision makers.

  13. A new paradigm on battery powered embedded system design based on User-Experience-Oriented method

    International Nuclear Information System (INIS)

    Wang, Zhuoran; Wu, Yue

    2014-01-01

    The battery sustainable time has been an active research topic recently for the development of battery powered embedded products such as tablets and smart phones, which are determined by the battery capacity and power consumption. Despite numerous efforts on the improvement of battery capacity in the field of material engineering, the power consumption also plays an important role and easier to ameliorate in delivering a desirable user-experience, especially considering the moderate advancement on batteries for decades. In this study, a new Top-Down modelling method, User-Experience-Oriented Battery Powered Embedded System Design Paradigm, is proposed to estimate the target average power consumption, to guide the hardware and software design, and eventually to approach the theoretical lowest power consumption that the application is still able to provide the full functionality. Starting from the 10-hour sustainable time standard, average working current is defined with battery design capacity and set as a target. Then an implementation is illustrated from both hardware perspective, which is summarized as Auto-Gating power management, and from software perspective, which introduces a new algorithm, SleepVote, to guide the system task design and scheduling

  14. A new paradigm on battery powered embedded system design based on User-Experience-Oriented method

    Science.gov (United States)

    Wang, Zhuoran; Wu, Yue

    2014-03-01

    The battery sustainable time has been an active research topic recently for the development of battery powered embedded products such as tablets and smart phones, which are determined by the battery capacity and power consumption. Despite numerous efforts on the improvement of battery capacity in the field of material engineering, the power consumption also plays an important role and easier to ameliorate in delivering a desirable user-experience, especially considering the moderate advancement on batteries for decades. In this study, a new Top-Down modelling method, User-Experience-Oriented Battery Powered Embedded System Design Paradigm, is proposed to estimate the target average power consumption, to guide the hardware and software design, and eventually to approach the theoretical lowest power consumption that the application is still able to provide the full functionality. Starting from the 10-hour sustainable time standard, average working current is defined with battery design capacity and set as a target. Then an implementation is illustrated from both hardware perspective, which is summarized as Auto-Gating power management, and from software perspective, which introduces a new algorithm, SleepVote, to guide the system task design and scheduling.

  15. Embedded Linux in het onderwijs

    NARCIS (Netherlands)

    Dr Ruud Ermers

    2008-01-01

    Embedded Linux wordt bij steeds meer grote bedrijven ingevoerd als embedded operating system. Binnen de opleiding Technische Informatica van Fontys Hogeschool ICT is Embedded Linux geïntroduceerd in samenwerking met het lectoraat Architectuur van Embedded Systemen. Embedded Linux is als vakgebied

  16. Embedding security messages in existing processes: a pragmatic and effective approach to information security culture change

    CERN Document Server

    Lopienski, Sebastian

    Companies and organizations world-wide depend more and more on IT infrastructure and operations. Computer systems store vital information and sensitive data; computing services are essential for main business processes. This high dependency comes with a number of security risks, which have to be managed correctly on technological, organizational and human levels. Addressing the human aspects of information security often boils down just to procedures, training and awareness raising. On the other hand, employees and collaborators do not adopt security attitude and habits simply when told to do so – a real change in behaviour requires an established security culture. But how to introduce a security culture? This thesis outlines the need of developing or improving security culture, and discusses how this can be done. The proposed approach is to gradually build security knowledge and awareness, and influence behaviours. The way to achieve this is to make security communication pervasive by embedding security me...

  17. In Vivo Microscopy Reveals Extensive Embedding of Capillaries within the Sarcolemma of Skeletal Muscle Fibers

    Science.gov (United States)

    Glancy, Brian; Hsu, Li-Yueh; Dao, Lam; Bakalar, Matthew; French, Stephanie; Chess, David J.; Taylor, Joni L.; Picard, Martin; Aponte, Angel; Daniels, Mathew P.; Esfahani, Shervin; Cushman, Samuel; Balaban, Robert S.

    2013-01-01

    Objective To provide insight into mitochondrial function in vivo, we evaluated the 3D spatial relationship between capillaries, mitochondria, and muscle fibers in live mice. Methods 3D volumes of in vivo murine Tibialis anterior muscles were imaged by multi-photon microscopy (MPM). Muscle fiber type, mitochondrial distribution, number of capillaries, and capillary-to-fiber contact were assessed. The role of myoglobin-facilitated diffusion was examined in myoglobin knockout mice. Distribution of GLUT4 was also evaluated in the context of the capillary and mitochondrial network. Results MPM revealed that 43.6 ± 3.3% of oxidative fiber capillaries had ≥ 50% of their circumference embedded in a groove in the sarcolemma, in vivo. Embedded capillaries were tightly associated with dense mitochondrial populations lateral to capillary grooves and nearly absent below the groove. Mitochondrial distribution, number of embedded capillaries, and capillary-to-fiber contact were proportional to fiber oxidative capacity and unaffected by myoglobin knockout. GLUT4 did not preferentially localize to embedded capillaries. Conclusions Embedding capillaries in the sarcolemma may provide a regulatory mechanism to optimize delivery of oxygen to heterogeneous groups of muscle fibers. We hypothesize that mitochondria locate to paravascular regions due to myofibril voids created by embedded capillaries, not to enhance the delivery of oxygen to the mitochondria. PMID:25279425

  18. Embedding beyond electrostatics

    DEFF Research Database (Denmark)

    Nåbo, Lina J.; Olsen, Jógvan Magnus Haugaard; Holmgaard List, Nanna

    2016-01-01

    We study excited states of cholesterol in solution and show that, in this specific case, solute wave-function confinement is the main effect of the solvent. This is rationalized on the basis of the polarizable density embedding scheme, which in addition to polarizable embedding includes non-electrostatic...... repulsion that effectively confines the solute wave function to its cavity. We illustrate how the inclusion of non-electrostatic repulsion results in a successful identification of the intense π → π∗ transition, which was not possible using an embedding method that only includes electrostatics....... This underlines the importance of non-electrostatic repulsion in quantum-mechanical embedding-based methods....

  19. Non-uniform multivariate embedding to assess the information transfer in cardiovascular and cardiorespiratory variability series.

    Science.gov (United States)

    Faes, Luca; Nollo, Giandomenico; Porta, Alberto

    2012-03-01

    The complexity of the short-term cardiovascular control prompts for the introduction of multivariate (MV) nonlinear time series analysis methods to assess directional interactions reflecting the underlying regulatory mechanisms. This study introduces a new approach for the detection of nonlinear Granger causality in MV time series, based on embedding the series by a sequential, non-uniform procedure, and on estimating the information flow from one series to another by means of the corrected conditional entropy. The approach is validated on short realizations of linear stochastic and nonlinear deterministic processes, and then evaluated on heart period, systolic arterial pressure and respiration variability series measured from healthy humans in the resting supine position and in the upright position after head-up tilt. Copyright © 2011 Elsevier Ltd. All rights reserved.

  20. Is Embedded Librarianship Right for Your Institution?

    Science.gov (United States)

    Muir, Gordon; Heller-Ross, Holly

    2010-01-01

    Embedded librarians, connected with students and faculty inside the classroom, lab and studio, have new opportunities for preparing students for research and for collaborating with faculty on course-integrated information literacy, research assignment design, teaching, assignment interpretation, and timely student assistance. What makes embedded…

  1. Early Auditory Evoked Potential Is Modulated by Selective Attention and Related to Individual Differences in Visual Working Memory Capacity

    Science.gov (United States)

    Giuliano, Ryan J.; Karns, Christina M.; Neville, Helen J.; Hillyard, Steven A.

    2015-01-01

    A growing body of research suggests that the predictive power of working memory (WM) capacity for measures of intellectual aptitude is due to the ability to control attention and select relevant information. Crucially, attentional mechanisms implicated in controlling access to WM are assumed to be domain-general, yet reports of enhanced attentional abilities in individuals with larger WM capacities are primarily within the visual domain. Here, we directly test the link between WM capacity and early attentional gating across sensory domains, hypothesizing that measures of visual WM capacity should predict an individual’s capacity to allocate auditory selective attention. To address this question, auditory ERPs were recorded in a linguistic dichotic listening task, and individual differences in ERP modulations by attention were correlated with estimates of WM capacity obtained in a separate visual change detection task. Auditory selective attention enhanced ERP amplitudes at an early latency (ca. 70–90 msec), with larger P1 components elicited by linguistic probes embedded in an attended narrative. Moreover, this effect was associated with greater individual estimates of visual WM capacity. These findings support the view that domain-general attentional control mechanisms underlie the wide variation of WM capacity across individuals. PMID:25000526

  2. Embedded Processor Laboratory

    Data.gov (United States)

    Federal Laboratory Consortium — The Embedded Processor Laboratory provides the means to design, develop, fabricate, and test embedded computers for missile guidance electronics systems in support...

  3. Evaluation of Bearing Capacity of Strip Foundation Subjected to Eccentric Inclined Loads Using Finite Element Method

    Directory of Open Access Journals (Sweden)

    Ahmed Majeed Ali

    2016-08-01

    Full Text Available In real conditions of structures, foundations like retaining walls, industrial machines and platforms in offshore areas are commonly subjected to eccentrically inclined loads. This type of loading significantly affects the overall stability of shallow foundations due to exposing the foundation into two components of loads (horizontal and vertical and consequently reduces the bearing capacity Based on a numerical analysis performed using finite element software (Plaxis 3D Foundation, the behavior of model strip foundation rested on dry sand under the effect of eccentric inclined loads with different embedment ratios (D/B ranging from (0-1 has been explored. The results display that, the bearing capacity of strip foundation is noticeably decreased with the increase of inclination angle (α and eccentricity ratio (e/B. As well as, a reduction factor (RF expression was appointed to measure the degree of decreasing in the bearing capacity when the model footing is subjected to eccentric inclined load. It was observed that, the (RF decreases as the embedment ratio increases. Moreover, the test results also exhibit that, the model footing bearing capacity is reduced by about (69% when the load inclination is varied from (0° to 20° and the model footing is on the surface. While, the rate of decreasing in the bearing capacity was found to be (58%, for both cases of footing when they are at embedment ratios of (0.5 and 1.0. Also, a comparative study was carried out between the present results and previous experimental test results under the same conditions (soil properties and boundary condition. A good agreement was obtained between the predicted bearing capacities for the two related studies.

  4. Semi-Supervised Tensor-Based Graph Embedding Learning and Its Application to Visual Discriminant Tracking.

    Science.gov (United States)

    Hu, Weiming; Gao, Jin; Xing, Junliang; Zhang, Chao; Maybank, Stephen

    2017-01-01

    An appearance model adaptable to changes in object appearance is critical in visual object tracking. In this paper, we treat an image patch as a two-order tensor which preserves the original image structure. We design two graphs for characterizing the intrinsic local geometrical structure of the tensor samples of the object and the background. Graph embedding is used to reduce the dimensions of the tensors while preserving the structure of the graphs. Then, a discriminant embedding space is constructed. We prove two propositions for finding the transformation matrices which are used to map the original tensor samples to the tensor-based graph embedding space. In order to encode more discriminant information in the embedding space, we propose a transfer-learning- based semi-supervised strategy to iteratively adjust the embedding space into which discriminative information obtained from earlier times is transferred. We apply the proposed semi-supervised tensor-based graph embedding learning algorithm to visual tracking. The new tracking algorithm captures an object's appearance characteristics during tracking and uses a particle filter to estimate the optimal object state. Experimental results on the CVPR 2013 benchmark dataset demonstrate the effectiveness of the proposed tracking algorithm.

  5. Politics of change: the discourses that inform organizational change and their capacity to silence.

    Science.gov (United States)

    McMillan, Kim

    2016-09-01

    Changes in healthcare organizations are inevitable and occurring at unprecedented rates. Such changes greatly impact nurses and their work, yet these experiences are rarely explored. Organizational change discourses remain grounded in perspectives that explore and explain systems, often not the people within them. Change processes in healthcare organizations informed by such organizational discourses validate only certain perspectives and forms of knowledge. This fosters exclusionary practices, limiting the capacity of certain individuals or groups of individuals to effectively contribute to change discourses and processes. The reliance on mainstream organizational discourses in healthcare organizations has left little room for the exploration of diverse perspectives on the subject of organizational change, particularly those of nurses. Michel Foucault's work challenges dominant discourse and suggest that strong reliance's on specific discourses effectively disqualify certain forms of knowledge. Foucault's writings on disqualified knowledge and parrhesia (truth telling and frank speech) facilitate the critical exploration of discourses that inform change in healthcare organizations and nurses capacities to contribute to organizational discourses. This paper explores the capacity of nurses to speak their truths within rapidly and continuously changing healthcare organizations when such changes are often driven by discourses not derived from nursing knowledge or experience. © 2016 John Wiley & Sons Ltd.

  6. Embedded defects

    International Nuclear Information System (INIS)

    Barriola, M.; Vachaspati, T.; Bucher, M.

    1994-01-01

    We give a prescription for embedding classical solutions and, in particular, topological defects in field theories which are invariant under symmetry groups that are not necessarily simple. After providing examples of embedded defects in field theories based on simple groups, we consider the electroweak model and show that it contains the Z string and a one-parameter family of strings called the W(α) string. It is argued that although the members of this family are gauge equivalent when considered in isolation, each member becomes physically distinct when multistring configurations are considered. We then turn to the issue of stability of embedded defects and demonstrate the instability of a large class of such solutions in the absence of bound states or condensates. The Z string is shown to be unstable for all values of the Higgs boson mass when θ W =π/4. W strings are also shown to be unstable for a large range of parameters. Embedded monopoles suffer from the Brandt-Neri-Coleman instability. Finally, we connect the electroweak string solutions to the sphaleron

  7. Civil Service Human Resource Capacity and Information Technology

    African Journals Online (AJOL)

    Tesfaye

    2009-01-01

    Jan 1, 2009 ... had no impact on the size of jobs that require high-level of human resource capacity. Furthermore ... level human resource capacity has an effect on the size of supervisors, which is the main ...... depreciation. 5 This indicates ...

  8. Corrosion Monitors for Embedded Evaluation

    Energy Technology Data Exchange (ETDEWEB)

    Robinson, Alex L. [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Pfeifer, Kent B. [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Casias, Adrian L. [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Howell, Stephen W. [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Sorensen, Neil R. [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Missert, Nancy A. [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States)

    2017-05-01

    We have developed and characterized novel in-situ corrosion sensors to monitor and quantify the corrosive potential and history of localized environments. Embedded corrosion sensors can provide information to aid health assessments of internal electrical components including connectors, microelectronics, wires, and other susceptible parts. When combined with other data (e.g. temperature and humidity), theory, and computational simulation, the reliability of monitored systems can be predicted with higher fidelity.

  9. Polymorphic Embedding of DSLs

    DEFF Research Database (Denmark)

    Hofer, Christian; Ostermann, Klaus; Rendel, Tillmann

    2008-01-01

    propose polymorphic embedding of DSLs, where many different interpretations of a DSL can be provided as reusable components, and show how polymorphic embedding can be realized in the programming language Scala. With polymorphic embedding, the static type-safety, modularity, composability and rapid...

  10. An Information Technology Framework for the Development of an Embedded Computer System for the Remote and Non-Destructive Study of Sensitive Archaeology Sites

    Directory of Open Access Journals (Sweden)

    Iliya Georgiev

    2017-04-01

    Full Text Available The paper proposes an information technology framework for the development of an embedded remote system for non-destructive observation and study of sensitive archaeological sites. The overall concept and motivation are described. The general hardware layout and software configuration are presented. The paper concentrates on the implementation of the following informational technology components: (a a geographically unique identification scheme supporting a global key space for a key-value store; (b a common method for octree modeling for spatial geometrical models of the archaeological artifacts, and abstract object representation in the global key space; (c a broadcast of the archaeological information as an Extensible Markup Language (XML stream over the Web for worldwide availability; and (d a set of testing methods increasing the fault tolerance of the system. This framework can serve as a foundation for the development of a complete system for remote archaeological exploration of enclosed archaeological sites like buried churches, tombs, and caves. An archaeological site is opened once upon discovery, the embedded computer system is installed inside upon a robotic platform, equipped with sensors, cameras, and actuators, and the intact site is sealed again. Archaeological research is conducted on a multimedia data stream which is sent remotely from the system and conforms to necessary standards for digital archaeology.

  11. The starting up of a pilot plant for radioactive incinerator ash conditioning - results of two embedding campaigns

    International Nuclear Information System (INIS)

    Kertesz, C.J.; Chenavas, P.R.; Naud, G.M.

    1990-01-01

    A new pilot plant called 'PICC' designed for radioactive incinerator ash conditioning, by embedding in several matrices, was launched at the Nuclear Research Centre in Cadarache - France - in the middle of 1988. This polyvalent facility can work with the three following embedding products = cement, thermosetting epoxide resin and an epoxide-cement compound. The capacity per day of the plant is two 100 or 200 I drums of solidified ash form. Two embedding campaigns have been carried out on inactive ashes: the first is a cementation campaign, done on phosphated ash coming from incineration of spent tributylphosphate. The second is a polymer cement campaign done on simulated alpha ash coming from technological wastes. Description of the PICC and data on these two campaigns are given

  12. Data Error Detection and Recovery in Embedded Systems: a Literature Review

    Directory of Open Access Journals (Sweden)

    Venu Babu Thati

    2017-06-01

    Full Text Available This paper presents a literature review on data flow error detection and recovery techniques in embedded systems. In recent years, embedded systems are being used more and more in an enormous number of applications from small mobile device to big medical devices. At the same time, it is becoming important for embedded developers to make embedded systems fault-tolerant. To make embedded systems fault-tolerant, error detection and recovery mechanisms are effective techniques to take into consideration. Fault tolerance can be achieved by using both hardware and software techniques. This literature review focuses on software-based techniques since hardware-based techniques need extra hardware and are an extra investment in cost per product. Whereas, software-based techniques needed no or limited hardware. A review on various existing data flow error detection and error recovery techniques is given along with their strengths and weaknesses. Such an information is useful to identify the better techniques among the others.

  13. On the capacity of multiaccess fading channels with full channel state information at low power regime

    KAUST Repository

    Rezki, Zouheir

    2013-06-01

    We study the throughput capacity region of the Gaussian multiaccess (MAC) fading channel with perfect channel state information (CSI) at the receiver (CSI-R) and at the transmitters (CSI-T), at low power regime. We show that it has a multidimensional rectangle structure and thus is simply characterized by single user capacity points. More specifically, we show that at low power regime, the boundary surface of the capacity region shrinks to a single point corresponding to the sum rate maximizer and that the coordinates of this point coincide with single user capacity bounds. Inspired from this result, we propose an on-off scheme, compute its achievable rate, and provide a necessary condition on the fading channels under which this scheme achieves single user capacity bounds of the MAC channel at asymptotically low power regime. We argue that this necessary condition characterizes a class of fading that encompasses all known wireless channels, where the capacity region of the MAC channel has a simple expression in terms of users\\' average power constraints only. © 2013 IEEE.

  14. Time-dependent embedding

    OpenAIRE

    Inglesfield, J. E.

    2007-01-01

    A method of solving the time-dependent Schr\\"odinger equation is presented, in which a finite region of space is treated explicitly, with the boundary conditions for matching the wave-functions on to the rest of the system replaced by an embedding term added on to the Hamiltonian. This time-dependent embedding term is derived from the Fourier transform of the energy-dependent embedding potential, which embeds the time-independent Schr\\"odinger equation. Results are presented for a one-dimensi...

  15. Field tests on partial embedment effects (embedment effect tests on soil-structure interaction)

    International Nuclear Information System (INIS)

    Kurimoto, O.; Tsunoda, T.; Inoue, T.; Izumi, M.; Kusakabe, K.; Akino, K.

    1993-01-01

    A series of Model Tests of Embedment Effect on Reactor Buildings has been carried out by the Nuclear Power Engineering Corporation (NUPEC), under the sponsorship of the Ministry of International Trade and lndustry (MITI) of Japan. The nuclear reactor buildings are partially embedded due to conditions for the construction or building arrangement in Japan. It is necessary to verify the partial embedment effects by experiments and analytical studies in order to incorporate the effects in the seismic design. Forced vibration tests, therefore, were performed using a model with several types of embedment. Correlated simulation analyses were also performed and the characteristics of partial embedment effects on soil-structure interaction were evaluated. (author)

  16. An Embedded Database Application for the Aggregation of Farming Device Data

    DEFF Research Database (Denmark)

    Iftikhar, Nadeem; Pedersen, Torben Bach

    2010-01-01

    In order to store massive amounts of data produced by the farming devices and to keep data that spans long intervals of time for analysis, reporting and maintenance purposes; it is desirable to reduce the size of the data by maintaining the data at different aggregate levels. The older data can...... be made coarse-grained while keeping the newest data fine-grained. Considering the availability of a limited amount of storage capacity on the farm machinery, an application written in C was developed to collect the data from a CAN-BUS, store it into the embedded database efficiently and perform gradual...... data aggregation effectively. Furthermore, the aggregation is achieved by using either two ratio-based aggregation methods or a time-granularity based aggregation method. A detailed description of the embedded database technology on a tractor computer is also presented in this paper....

  17. Capacity building for health inequality monitoring in Indonesia: enhancing the equity orientation of country health information system.

    Science.gov (United States)

    Hosseinpoor, Ahmad Reza; Nambiar, Devaki; Tawilah, Jihane; Schlotheuber, Anne; Briot, Benedicte; Bateman, Massee; Davey, Tamzyn; Kusumawardani, Nunik; Myint, Theingi; Nuryetty, Mariet Tetty; Prasetyo, Sabarinah; Suparmi; Floranita, Rustini

    Inequalities in health represent a major problem in many countries, including Indonesia. Addressing health inequality is a central component of the Sustainable Development Goals and a priority of the World Health Organization (WHO). WHO provides technical support for health inequality monitoring among its member states. Following a capacity-building workshop in the WHO South-East Asia Region in 2014, Indonesia expressed interest in incorporating health-inequality monitoring into its national health information system. This article details the capacity-building process for national health inequality monitoring in Indonesia, discusses successes and challenges, and how this process may be adapted and implemented in other countries/settings. We outline key capacity-building activities undertaken between April 2016 and December 2017 in Indonesia and present the four key outcomes of this process. The capacity-building process entailed a series of workshops, meetings, activities, and processes undertaken between April 2016 and December 2017. At each stage, a range of stakeholders with access to the relevant data and capacity for data analysis, interpretation and reporting was engaged with, under the stewardship of state agencies. Key steps to strengthening health inequality monitoring included capacity building in (1) identification of the health topics/areas of interest, (2) mapping data sources and identifying gaps, (3) conducting equity analyses using raw datasets, and (4) interpreting and reporting inequality results. As a result, Indonesia developed its first national report on the state of health inequality. A number of peer-reviewed manuscripts on various aspects of health inequality in Indonesia have also been developed. The capacity-building process undertaken in Indonesia is designed to be adaptable to other contexts. Capacity building for health inequality monitoring among countries is a critical step for strengthening equity-oriented national health

  18. Embedded Systems Design: Optimization Challenges

    DEFF Research Database (Denmark)

    Pop, Paul

    2005-01-01

    Summary form only given. Embedded systems are everywhere: from alarm clocks to PDAs, from mobile phones to cars, almost all the devices we use are controlled by embedded systems. Over 99% of the microprocessors produced today are used in embedded systems, and recently the number of embedded systems...

  19. Embedding operational research into national disease control programme: lessons from 10 years of experience in Indonesia

    Directory of Open Access Journals (Sweden)

    Yodi Mahendradhata

    2014-10-01

    Full Text Available There is growing recognition that operational research (OR should be embedded into national disease control programmes. However, much of the current OR capacity building schemes are still predominantly driven by international agencies with limited integration into national disease control programmes. We demonstrated that it is possible to achieve a more sustainable capacity building effort across the country by establishing an OR group within the national tuberculosis (TB control programme in Indonesia. Key challenges identified include long-term financial support, limited number of scientific publications, and difficulties in documenting impact on programmatic performance. External evaluation has expressed concerns in regard to utilisation of OR in policy making. Efforts to address this concern have been introduced recently and led to indications of increased utilisation of research evidence in policy making by the national TB control programme. Embedding OR in national disease control programmes is key in establishing an evidence-based disease control programme.

  20. Best Hiding Capacity Scheme for Variable Length Messages Using Particle Swarm Optimization

    Science.gov (United States)

    Bajaj, Ruchika; Bedi, Punam; Pal, S. K.

    Steganography is an art of hiding information in such a way that prevents the detection of hidden messages. Besides security of data, the quantity of data that can be hidden in a single cover medium, is also very important. We present a secure data hiding scheme with high embedding capacity for messages of variable length based on Particle Swarm Optimization. This technique gives the best pixel positions in the cover image, which can be used to hide the secret data. In the proposed scheme, k bits of the secret message are substituted into k least significant bits of the image pixel, where k varies from 1 to 4 depending on the message length. The proposed scheme is tested and results compared with simple LSB substitution, uniform 4-bit LSB hiding (with PSO) for the test images Nature, Baboon, Lena and Kitty. The experimental study confirms that the proposed method achieves high data hiding capacity and maintains imperceptibility and minimizes the distortion between the cover image and the obtained stego image.

  1. The effects of magnetic nanoparticles embedded with SA/PVA and pH on chemical-mechanical polishing wastewater and magnetic particle regeneration and recycle

    Directory of Open Access Journals (Sweden)

    Chung-Fu Huang

    2017-12-01

    Full Text Available Experiments were conducted using sodium alginate (SA and polyvinyl alcohol (PVA as embedded materials for Fe3O4 magnetic nanoparticles (MNPs. The materials provided excellent protection to the embedded MNPs in low-pH conditions. This study observed and compared the adsorption capacity of the unaltered and embedded MNPs. At pH 3 and without additional magnetic fields, the wastewater turbidity removal rate of the embedded MNPs reached a maximum of 95%, similar to that of the unaltered MNPs. Moreover, this study examined the recyclability and reusability of the unaltered and embedded MNPs and discovered that the embedded MNPs could be reused up to seven times. Overall, the use of SA/PVA prevented MNPs from disintegrating and contaminating the wastewater through the dissolution of Fe ions. SA and PVA also increased the reusability of the unaltered MNPs.

  2. On the capacity of Rician fading channels with full channel state information at low SNR

    KAUST Repository

    Rezki, Zouheir

    2012-06-01

    The capacity of flat Rayleigh fading channels with full channel state information (CSI) at the transmitter and at the receiver at asymptotically low SNR has been recently shown to scale essentially as SNR log (1/SNR). In this paper, we investigate the Rician fading channel capacity with full CSI, and show that the capacity of this channel scales essentially as 1/1+K SNR log (1 /SNR), where K is the Rician factor. This characterization includes perfect CSI at both the transmitter and the receiver or noisy CSI at the transmitter and perfect CSI at the receiver. We also show that one-bit CSI at the transmitter is enough to achieve this asymptotic capacity using an On-Off power control scheme. Our framework may be seen as a generalization of previous works as it captures the Rayleigh fading channel as a special case by letting K goes to zero. © 2012 IEEE.

  3. A high capacity text steganography scheme based on LZW compression and color coding

    Directory of Open Access Journals (Sweden)

    Aruna Malik

    2017-02-01

    Full Text Available In this paper, capacity and security issues of text steganography have been considered by employing LZW compression technique and color coding based approach. The proposed technique uses the forward mail platform to hide the secret data. This algorithm first compresses secret data and then hides the compressed secret data into the email addresses and also in the cover message of the email. The secret data bits are embedded in the message (or cover text by making it colored using a color coding table. Experimental results show that the proposed method not only produces a high embedding capacity but also reduces computational complexity. Moreover, the security of the proposed method is significantly improved by employing stego keys. The superiority of the proposed method has been experimentally verified by comparing with recently developed existing techniques.

  4. The biokinetics of uranium migrating from embedded DU fragments

    International Nuclear Information System (INIS)

    Leggett, R.W.; Pellmar, T.C.

    2003-01-01

    Military uses of depleted uranium (DU) munitions have resulted in casualties with embedded DU fragments. Assessment of radiological or chemical health risks from these fragments requires a model relating urinary U to the rate of migration of U from the fragments, and its accumulation in systemic tissues. A detailed biokinetic model for U has been published by the International Commission on Radiological Protection (ICRP), but its applicability to U migrating from embedded DU fragments is uncertain. Recently, ) conducted a study at the Armed Forces Radiobiology Research Institute (AFRRI) on the redistribution and toxicology of U in rats with implanted DU pellets, simulating embedded fragments. This paper compares the biokinetic data from that study with the behavior of commonly studied forms of U in rats (e.g., intravenously injected U nitrate). The comparisons indicate that the biokinetics of U migrating from embedded DU is similar to that of commonly studied forms of U with regard to long-term accumulation in kidneys, bone, and liver. The results provide limited support for the application of the ICRP's model to persons with embedded DU fragments. Additional information is needed with regard to the short-term behavior of migrating U and its accumulation in lymph nodes, brain, testicles, and other infrequently studied U repositories

  5. Hiding Electronic Patient Record (EPR) in medical images: A high capacity and computationally efficient technique for e-healthcare applications.

    Science.gov (United States)

    Loan, Nazir A; Parah, Shabir A; Sheikh, Javaid A; Akhoon, Jahangir A; Bhat, Ghulam M

    2017-09-01

    A high capacity and semi-reversible data hiding scheme based on Pixel Repetition Method (PRM) and hybrid edge detection for scalable medical images has been proposed in this paper. PRM has been used to scale up the small sized image (seed image) and hybrid edge detection ensures that no important edge information is missed. The scaled up version of seed image has been divided into 2×2 non overlapping blocks. In each block there is one seed pixel whose status decides the number of bits to be embedded in the remaining three pixels of that block. The Electronic Patient Record (EPR)/data have been embedded by using Least Significant and Intermediate Significant Bit Substitution (ISBS). The RC4 encryption has been used to add an additional security layer for embedded EPR/data. The proposed scheme has been tested for various medical and general images and compared with some state of art techniques in the field. The experimental results reveal that the proposed scheme besides being semi-reversible and computationally efficient is capable of handling high payload and as such can be used effectively for electronic healthcare applications. Copyright © 2017. Published by Elsevier Inc.

  6. On the capacity of nakagami-m fading Channels with full channel state information at low SNR

    KAUST Repository

    Rezki, Zouheir

    2012-06-01

    The capacity of flat Rayleigh fading channels with full channel state information (CSI) at the transmitter and at the receiver at asymptotically low SNR has been recently shown to scale essentially as SNR log(1/SNR)}. In this paper, we investigate the Nakagami-m fading channel capacity with full CSI, and show that the capacity of this channel scales essentially as m/ Omega SNR log(1/SNR), where m is the Nakagami-m fading parameter and where Ω is the channel mean-square. We also show that one-bit CSI at the transmitter is enough to achieve this asymptotic capacity using an On-Off power control scheme. Our framework may be seen as a generalization of previous works as it captures the Rayleigh fading channel as a special case by taking m=1. © 2012 IEEE.

  7. Embedded software verification and debugging

    CERN Document Server

    Winterholer, Markus

    2017-01-01

    This book provides comprehensive coverage of verification and debugging techniques for embedded software, which is frequently used in safety critical applications (e.g., automotive), where failures are unacceptable. Since the verification of complex systems needs to encompass the verification of both hardware and embedded software modules, this book focuses on verification and debugging approaches for embedded software with hardware dependencies. Coverage includes the entire flow of design, verification and debugging of embedded software and all key approaches to debugging, dynamic, static, and hybrid verification. This book discusses the current, industrial embedded software verification flow, as well as emerging trends with focus on formal and hybrid verification and debugging approaches. Includes in a single source the entire flow of design, verification and debugging of embedded software; Addresses the main techniques that are currently being used in the industry for assuring the quality of embedded softw...

  8. Design of remote weather monitor system based on embedded web database

    International Nuclear Information System (INIS)

    Gao Jiugang; Zhuang Along

    2010-01-01

    The remote weather monitoring system is designed by employing the embedded Web database technology and the S3C2410 microprocessor as the core. The monitoring system can simultaneously monitor the multi-channel sensor signals, and can give a dynamic Web pages display of various types of meteorological information on the remote computer. It gives a elaborated introduction of the construction and application of the Web database under the embedded Linux. Test results show that the client access the Web page via the GPRS or the Internet, acquires data and uses an intuitive graphical way to display the value of various types of meteorological information. (authors)

  9. Isometric embeddings of 2-spheres by embedding flow for applications in numerical relativity

    International Nuclear Information System (INIS)

    Jasiulek, Michael; Korzyński, Mikołaj

    2012-01-01

    We present a numerical method for solving Weyl's embedding problem which consists in finding a global isometric embedding of a positively curved and positive-definite spherical 2-metric into the Euclidean 3-space. The method is based on a construction introduced by Weingarten and was used in Nirenberg's proof of Weyl's conjecture. The target embedding results as the endpoint of an embedding flow in R 3 beginning at the unit sphere's embedding. We employ spectral methods to handle functions on the surface and to solve various (non)linear elliptic PDEs. The code requires no additional input or steering from the operator and its convergence is guaranteed by the Nirenberg arguments. Possible applications in 3 + 1 numerical relativity range from quasi-local mass and momentum measures to coarse-graining in inhomogeneous cosmological models. (paper)

  10. Virtually embedded the librarian in an online environment

    CERN Document Server

    McCaffrey, Erin

    2014-01-01

    The rise of online education at institutions of higher learning, together with the increasing cost of higher education, lead some to suggest that online (or distance) education will eventually become the dominant form of higher learning. This has particular significance for librarians. This casebook, a blueprint for embedding academic librarians in online environments, from undergraduate to science-based graduate schools to MOOCs is the first to explore how librarians can play a key role in the virtual academic landscape. The authors, academic librarians representing a broad range of colleges and universities, look at the evolution of the embedded librarian from physical to virtual, suggest how to develop and implement unique programs in and out of the classroom, and explain how to scale programs once they are embedded. This book is suitable for professional collections in academic libraries of all sizes and types. It is also suitable for collections in schools of library and information science.

  11. The embodied embedded character of system 1 processing.

    Science.gov (United States)

    Bellini-Leite, Samuel de Castro

    2013-01-01

    In the last thirty years, a relatively large group of cognitive scientists have begun characterising the mind in terms of two distinct, relatively autonomous systems. To account for paradoxes in empirical results of studies mainly on reasoning, Dual Process Theories were developed. Such Dual Process Theories generally agree that System 1 is rapid, automatic, parallel, and heuristic-based and System 2 is slow, capacity-demanding, sequential, and related to consciousness. While System 2 can still be decently understood from a traditional cognitivist approach, I will argue that it is essential for System 1 processing to be comprehended in an Embodied Embedded approach to Cognition.

  12. Sustaining librarian vitality: embedded librarianship model for health sciences libraries.

    Science.gov (United States)

    Wu, Lin; Mi, Misa

    2013-01-01

    With biomedical information widely accessible from anywhere at any time, health sciences libraries have become less centralized, and they are challenged to stay relevant and vital to the mission and strategic goals of their home institution. One solution is to embed librarians at strategic points in health professions' education, research, and patient care. This article discusses a proposed five-level model of embedded librarianship within the context of health sciences libraries and describes different roles, knowledge, and skills desirable for health sciences librarians working as embedded librarians.

  13. How Employees' Perception of Information Technology Application and Their Knowledge Management Capacity Influence Organisational Performance

    Science.gov (United States)

    Kuo, Yen-Ku; Ye, Kung-Don

    2010-01-01

    This study investigates how workers' gender, work experience, designated division, and appointment affect (i) their perception of information technology (IT) within the organisation, (ii) their self-perceived capacity in knowledge management (KM), and (iii) their perception of organisational performance (OP). Furthermore, the study also examines…

  14. 76 FR 39153 - Agency Information Collection; Activity Under OMB Review; Report of Traffic and Capacity...

    Science.gov (United States)

    2011-07-05

    ... responsibilities relating to airline competition and consolidation. Traffic Forecasting The FAA uses traffic... FAA develops ways of increasing airport capacity at congested airports. Airline Industry Status... Seguin, Office of Airline Information, RTS-42, Room E34-418, RITA, BTS, 1200 New Jersey Avenue, SE...

  15. Software test attacks to break mobile and embedded devices

    CERN Document Server

    Hagar, Jon Duncan

    2013-01-01

    Address Errors before Users Find Them Using a mix-and-match approach, Software Test Attacks to Break Mobile and Embedded Devices presents an attack basis for testing mobile and embedded systems. Designed for testers working in the ever-expanding world of ""smart"" devices driven by software, the book focuses on attack-based testing that can be used by individuals and teams. The numerous test attacks show you when a software product does not work (i.e., has bugs) and provide you with information about the software product under test. The book guides you step by step starting with the basics. It

  16. Scaling the Information Load of Occupations: Preliminary Findings of the Fit between Individual Capacities and Environmental Demands

    Science.gov (United States)

    Haase, Richard F.; Ferreira, Joaquim Armando G. A.; Santos, Eduardo J. R.; Aguayo, Gina M.; Fallon, Melissa M.

    2008-01-01

    Person-Environment (P-E) fit models provide a conceptually powerful way to think about career development, vocational choice, and occupational success. The work reported here focuses on yet another pair of P-E criteria: self-reported individual capacity for information processing (the ability to tolerate information overload from a variety of…

  17. Generative embedding for model-based classification of fMRI data.

    Directory of Open Access Journals (Sweden)

    Kay H Brodersen

    2011-06-01

    Full Text Available Decoding models, such as those underlying multivariate classification algorithms, have been increasingly used to infer cognitive or clinical brain states from measures of brain activity obtained by functional magnetic resonance imaging (fMRI. The practicality of current classifiers, however, is restricted by two major challenges. First, due to the high data dimensionality and low sample size, algorithms struggle to separate informative from uninformative features, resulting in poor generalization performance. Second, popular discriminative methods such as support vector machines (SVMs rarely afford mechanistic interpretability. In this paper, we address these issues by proposing a novel generative-embedding approach that incorporates neurobiologically interpretable generative models into discriminative classifiers. Our approach extends previous work on trial-by-trial classification for electrophysiological recordings to subject-by-subject classification for fMRI and offers two key advantages over conventional methods: it may provide more accurate predictions by exploiting discriminative information encoded in 'hidden' physiological quantities such as synaptic connection strengths; and it affords mechanistic interpretability of clinical classifications. Here, we introduce generative embedding for fMRI using a combination of dynamic causal models (DCMs and SVMs. We propose a general procedure of DCM-based generative embedding for subject-wise classification, provide a concrete implementation, and suggest good-practice guidelines for unbiased application of generative embedding in the context of fMRI. We illustrate the utility of our approach by a clinical example in which we classify moderately aphasic patients and healthy controls using a DCM of thalamo-temporal regions during speech processing. Generative embedding achieves a near-perfect balanced classification accuracy of 98% and significantly outperforms conventional activation-based and

  18. Embedded multiprocessors scheduling and synchronization

    CERN Document Server

    Sriram, Sundararajan

    2009-01-01

    Techniques for Optimizing Multiprocessor Implementations of Signal Processing ApplicationsAn indispensable component of the information age, signal processing is embedded in a variety of consumer devices, including cell phones and digital television, as well as in communication infrastructure, such as media servers and cellular base stations. Multiple programmable processors, along with custom hardware running in parallel, are needed to achieve the computation throughput required of such applications. Reviews important research in key areas related to the multiprocessor implementation of multi

  19. On the capacity of multiple access and broadcast fading Channels with full channel state information at low power regime

    KAUST Repository

    Rezki, Zouheir

    2013-07-01

    We study the throughput capacity region of the Gaussian multi-access (MAC) fading channel with perfect channel state information (CSI) at the receiver and at the transmitters (CSI-TR), at low power regime. We show that it has a multidimensional rectangle structure and thus is simply characterized by single user capacity points. More specifically, we show that at low power regime, the boundary surface of the capacity region shrinks to a single point corresponding to the sum-rate maximizer and that the coordinates of this point coincide with single user capacity bounds. Using the duality of Gaussian MAC and broadcast channels (BC), we provide a simple characterization of the BC capacity region at low power regime. © 2013 IEEE.

  20. Determination of the Relationship between Information Capacity and Identification by Simulated Aerial Photography.

    Science.gov (United States)

    1978-06-27

    experiment by Frank Scott, Peter Hollanda , and Albert Harabedian 7 7Scott, F., Hollanda , P. A., and Harabedian, A., Phot. Sci. Eng., 14 1 pp 21-27...photographs of models of military tanks and trucks. The information capacity of these photos was varied by defocussing the taking camera and the simulated...photographic reconnaissance mission. This was done by photographing models of military targets, I processing and duplicating the resulting images, and

  1. Improving Nigerian health policymakers' capacity to access and utilize policy relevant evidence: outcome of information and communication technology training workshop.

    Science.gov (United States)

    Uneke, Chigozie Jesse; Ezeoha, Abel Ebeh; Uro-Chukwu, Henry; Ezeonu, Chinonyelum Thecla; Ogbu, Ogbonnaya; Onwe, Friday; Edoga, Chima

    2015-01-01

    Information and communication technology (ICT) tools are known to facilitate communication and processing of information and sharing of knowledge by electronic means. In Nigeria, the lack of adequate capacity on the use of ICT by health sector policymakers constitutes a major impediment to the uptake of research evidence into the policymaking process. The objective of this study was to improve the knowledge and capacity of policymakers to access and utilize policy relevant evidence. A modified "before and after" intervention study design was used in which outcomes were measured on the target participants both before the intervention is implemented and after. A 4-point likert scale according to the degree of adequacy; 1 = grossly inadequate, 4 = very adequate was employed. This study was conducted in Ebonyi State, south-eastern Nigeria and the participants were career health policy makers. A two-day intensive ICT training workshop was organized for policymakers who had 52 participants in attendance. Topics covered included: (i). intersectoral partnership/collaboration; (ii). Engaging ICT in evidence-informed policy making; use of ICT for evidence synthesis; (iv) capacity development on the use of computer, internet and other ICT. The pre-workshop mean of knowledge and capacity for use of ICT ranged from 2.19-3.05, while the post-workshop mean ranged from 2.67-3.67 on 4-point scale. The percentage increase in mean of knowledge and capacity at the end of the workshop ranged from 8.3%-39.1%. Findings of this study suggest that policymakers' ICT competence relevant to evidence-informed policymaking can be enhanced through training workshop.

  2. The development of ORACLe: a measure of an organisation's capacity to engage in evidence-informed health policy.

    Science.gov (United States)

    Makkar, Steve R; Turner, Tari; Williamson, Anna; Louviere, Jordan; Redman, Sally; Haynes, Abby; Green, Sally; Brennan, Sue

    2016-01-14

    Evidence-informed policymaking is more likely if organisations have cultures that promote research use and invest in resources that facilitate staff engagement with research. Measures of organisations' research use culture and capacity are needed to assess current capacity, identify opportunities for improvement, and examine the impact of capacity-building interventions. The aim of the current study was to develop a comprehensive system to measure and score organisations' capacity to engage with and use research in policymaking, which we entitled ORACLe (Organisational Research Access, Culture, and Leadership). We used a multifaceted approach to develop ORACLe. Firstly, we reviewed the available literature to identify key domains of organisational tools and systems that may facilitate research use by staff. We interviewed senior health policymakers to verify the relevance and applicability of these domains. This information was used to generate an interview schedule that focused on seven key domains of organisational capacity. The interview was pilot-tested within four Australian policy agencies. A discrete choice experiment (DCE) was then undertaken using an expert sample to establish the relative importance of these domains. This data was used to produce a scoring system for ORACLe. The ORACLe interview was developed, comprised of 23 questions addressing seven domains of organisational capacity and tools that support research use, including (1) documented processes for policymaking; (2) leadership training; (3) staff training; (4) research resources (e.g. database access); and systems to (5) generate new research, (6) undertake evaluations, and (7) strengthen relationships with researchers. From the DCE data, a conditional logit model was estimated to calculate total scores that took into account the relative importance of the seven domains. The model indicated that our expert sample placed the greatest importance on domains (2), (3) and (4). We utilised

  3. Evaluation of Maintenance and EOL Operation Performance of Sensor-Embedded Laptops

    Directory of Open Access Journals (Sweden)

    Mehmet Talha Dulman

    2018-01-01

    Full Text Available Sensors are commonly employed to monitor products during their life cycles and to remotely and continuously track their usage patterns. Installing sensors into products can help generate useful data related to the conditions of products and their components, and this information can subsequently be used to inform EOL decision-making. As such, embedded sensors can enhance the performance of EOL product processing operations. The information collected by the sensors can also be used to estimate and predict product failures, thereby helping to improve maintenance operations. This paper describes a study in which system maintenance and EOL processes were combined and closed-loop supply chain systems were constructed to analyze the financial contribution that sensors can make to these procedures by using discrete event simulation to model and compare regular systems and sensor-embedded systems. The factors that had an impact on the performance measures, such as disassembly cost, maintenance cost, inspection cost, sales revenues, and profitability, were determined and a design of experiments study was carried out. The experiment results were compared, and pairwise t-tests were executed. The results reveal that sensor-embedded systems are significantly superior to regular systems in terms of the identified performance measures.

  4. Informant Report of Financial Capacity for Individuals With Chronic Acquired Brain Injury: An Assessment of Informant Accuracy.

    Science.gov (United States)

    Sunderaraman, Preeti; Cosentino, Stephanie; Lindgren, Karen; James, Angela; Schultheis, Maria

    2018-03-29

    Primarily, to investigate the association between informant report and objective performance on specific financial capacity (FC) tasks by adults with chronic, moderate to severe acquired brain injury, and to examine the nature of misestimates by the informants. Cross-sectional design. A postacute, community-based rehabilitation center. Data were obtained from 22 chronic acquired brain injury (CABI) adults, mean age of 46.6 years (SD = 8.67), mean years of education of 13.45 years (SD = 2.15), with moderate to severe acquired brain injury (86% had traumatic brain injury), with a mean postinjury period of 17.14 years (SD = 9.5). Whereas the CABI adults completed the Financial Competence Assessment Inventory interview-a combination of self-report and performance-based assessment, 22 informants completed a specifically designed parallel version of the interview. Pearson correlations and 1-sample t tests based on the discrepancy scores between informant report and CABI group's performance were used. The CABI group's performance was not associated with its informant's perceptions. One-sample t tests revealed that informants both underestimated and overestimated CABI group's performance. Results indicate lack of correspondence between self- and informant ratings. Further investigation revealed that misestimations by informants occurred in contrary directions with CABI adults' performance being inaccurately rated. These findings raise critical issues related to assuming that the informant report can be used as a "gold standard" for collecting functional data related to financial management, and the idea that obtaining objective data on financial tasks may represent a more valid method of assessing financial competency in adults with brain injury.

  5. Embedding Complementarity in HCI Methods

    DEFF Research Database (Denmark)

    Nielsen, Janni; Yssing, Carsten; Tweddell Levinsen, Karin

    2007-01-01

    Differences in cultural contexts constitute differences in cognition, and research has shown that different cultures may use different cognitive tools for perception and reasoning. The cultural embeddings are significant in relation to HCI, because the cultural context is also embedded in the tec......Differences in cultural contexts constitute differences in cognition, and research has shown that different cultures may use different cognitive tools for perception and reasoning. The cultural embeddings are significant in relation to HCI, because the cultural context is also embedded...

  6. Smart Multicore Embedded Systems

    DEFF Research Database (Denmark)

    This book provides a single-source reference to the state-of-the-art of high-level programming models and compilation tool-chains for embedded system platforms. The authors address challenges faced by programmers developing software to implement parallel applications in embedded systems, where very...... specificities of various embedded systems from different industries. Parallel programming tool-chains are described that take as input parameters both the application and the platform model, then determine relevant transformations and mapping decisions on the concrete platform, minimizing user intervention...... and hiding the difficulties related to the correct and efficient use of memory hierarchy and low level code generation. Describes tools and programming models for multicore embedded systems Emphasizes throughout performance per watt scalability Discusses realistic limits of software parallelization Enables...

  7. Embedment Effects on Vertical Bearing Capacity of Offshore Bucket Foundations on Cohesionless Soil

    DEFF Research Database (Denmark)

    Barari, Amin; Ibsen, Lars Bo; Ghalesari, Abbasali Taghavi

    2017-01-01

    This paper presents the results from a series of physical modeling and three-dimensional finite 9 element (FE) analyses, which examined the uniaxial vertical capacity of suction caissons for 10 offshore wind turbines. The experiments were carried out in quartz sand and involved monotonic 11 appli...

  8. An improved algorithm for information hiding based on features of Arabic text: A Unicode approach

    Directory of Open Access Journals (Sweden)

    A.A. Mohamed

    2014-07-01

    Full Text Available Steganography means how to hide secret information in a cover media, so that other individuals fail to realize their existence. Due to the lack of data redundancy in the text file in comparison with other carrier files, text steganography is a difficult problem to solve. In this paper, we proposed a new promised steganographic algorithm for Arabic text based on features of Arabic text. The focus is on more secure algorithm and high capacity of the carrier. Our extensive experiments using the proposed algorithm resulted in a high capacity of the carrier media. The embedding capacity rate ratio of the proposed algorithm is high. In addition, our algorithm can resist traditional attacking methods since it makes the changes in carrier text as minimum as possible.

  9. Embedding librarianship in learning management systems a how-to-do-it manual for librarians

    CERN Document Server

    Tumbleson, Beth E

    2014-01-01

    Information literacy instruction is best when it is integrated into actual research, and in higher education that means embedding librarianship into the learning management system (LMS). This new How-To-Do-It Manual is geared towards academic librarians already working with classes in an LMS as well as those considering how to begin a pilot. Tumbleson and Burke, who surveyed 280 librarians for information on related activities, also use their own first-hand experience implementing an embedded librarianship program at their university to offer guidance and encouragement.

  10. The effect of increasing levels of embedded generation on the distribution network. Final report

    Energy Technology Data Exchange (ETDEWEB)

    Collinson, A; Earp, G K; Howson, D; Owen, R D; Wright, A J

    1999-10-01

    This report was commissioned as part of the EA Technology Strategic Technology Programme under guidance of the Module 5 (Embedded Generation) Steering Group. This report aims to provide information related to the distribution and supply of electricity in the context of increasing levels of embedded generation. There is a brief description of the operating environment within which electricity companies in the UK must operate. Technical issues related to the connection of generation to the existing distribution infrastructure are highlighted and the design philosophy adopted by network designers in accommodating applications for the connection of embedded generation to the network is discussed. The effects embedded generation has on the network and the issues raised are presented as many of them present barriers to the connection of embedded generators. The final chapters cover the forecast of required connection to 2010 and solutions to restrictions preventing the connection of more embedded generation to the network. (author)

  11. Digital Libraries with Embedded Values: Combining Insights from LIS and Science and Technology Studies

    Science.gov (United States)

    Fleischmann, Kenneth R.

    2007-01-01

    In the digital age, libraries are increasingly being augmented or even replaced by information technology (IT), which is often accompanied by implicit assumptions of objectivity and neutrality, yet the field of science and technology studies (STS) has a long history of studying what values are embedded in IT and how they are embedded. This article…

  12. Communicating embedded systems networks applications

    CERN Document Server

    Krief, Francine

    2013-01-01

    Embedded systems become more and more complex and require having some knowledge in various disciplines such as electronics, data processing, telecommunications and networks. Without detailing all the aspects related to the design of embedded systems, this book, which was written by specialists in electronics, data processing and telecommunications and networks, gives an interesting point of view of communication techniques and problems in embedded systems. This choice is easily justified by the fact that embedded systems are today massively communicating and that telecommunications and network

  13. Advances in embedded computer vision

    CERN Document Server

    Kisacanin, Branislav

    2014-01-01

    This illuminating collection offers a fresh look at the very latest advances in the field of embedded computer vision. Emerging areas covered by this comprehensive text/reference include the embedded realization of 3D vision technologies for a variety of applications, such as stereo cameras on mobile devices. Recent trends towards the development of small unmanned aerial vehicles (UAVs) with embedded image and video processing algorithms are also examined. The authoritative insights range from historical perspectives to future developments, reviewing embedded implementation, tools, technolog

  14. Gender Beliefs and Embedded Gendered Values in Preschool

    Science.gov (United States)

    Emilson, Anette; Folkesson, Anne-Mari; Lindberg, Ingeborg Moqvist

    2016-01-01

    The aim of this study is to explore practitioners' gender beliefs and how gendered values are embedded in Swedish preschool practice. The research question is: What beliefs about gender and the associated values, can be identified in practitioners' talk when they discuss gender issues? The study is informed by Bronwyn Davies' theoretical ideas…

  15. Amplification of chromosomal translocation junctions from paraffin-embedded tissues of follicular lymphoma patients

    International Nuclear Information System (INIS)

    Nambiar, Mridula; Raghavan, Sathees C; Choudhary, Bibha; Rao, Clementina R

    2008-01-01

    Follicular lymphoma is associated with the t(14;18) translocation, which is one of the most common chromosomal translocations in cancer. Generally, tissues from such patients are preserved as formalin-fixed and paraffin-embedded samples. Most of the time, retrieving the molecular information from such samples is hampered due to quality of preservation, extraction procedures and reaction conditions. In the present study, we isolate the chromosomal DNA from the paraffin-embedded nodal tissues of lymphoma patients and use a highly sensitive nested PCR approach to detect t(14;18) translocation. Our studies show that despite the sheared DNA obtained, appropriate modification of PCR reaction conditions can help in obtaining the desired amplifications. The DNA extraction protocol from paraffin-embedded nodal tissues and modifications in the PCR conditions are discussed. This study would contribute to the successful use of archival tissue samples in obtaining valuable information for cancer research

  16. Amplification of chromosomal translocation junctions from paraffin-embedded tissues of follicular lymphoma patients

    Energy Technology Data Exchange (ETDEWEB)

    Nambiar, Mridula; Raghavan, Sathees C [Department of Biochemistry, Indian Institute of Science, Bangalore-560 012 (India); Choudhary, Bibha [Manipal Institute of Regenerative Medicine, Manipal University, Bangalore-560 071 (India); Rao, Clementina R [Department of Pathology, Kidwai Memorial Institute of Oncology, Bangalore-560 029 (India)], E-mail: sathees@biochem.iisc.ernet.in

    2008-09-01

    Follicular lymphoma is associated with the t(14;18) translocation, which is one of the most common chromosomal translocations in cancer. Generally, tissues from such patients are preserved as formalin-fixed and paraffin-embedded samples. Most of the time, retrieving the molecular information from such samples is hampered due to quality of preservation, extraction procedures and reaction conditions. In the present study, we isolate the chromosomal DNA from the paraffin-embedded nodal tissues of lymphoma patients and use a highly sensitive nested PCR approach to detect t(14;18) translocation. Our studies show that despite the sheared DNA obtained, appropriate modification of PCR reaction conditions can help in obtaining the desired amplifications. The DNA extraction protocol from paraffin-embedded nodal tissues and modifications in the PCR conditions are discussed. This study would contribute to the successful use of archival tissue samples in obtaining valuable information for cancer research.

  17. Design Methodologies for Secure Embedded Systems

    CERN Document Server

    Biedermann, Alexander

    2011-01-01

    Embedded systems have been almost invisibly pervading our daily lives for several decades. They facilitate smooth operations in avionics, automotive electronics, or telecommunication. New problems arise by the increasing employment, interconnection, and communication of embedded systems in heterogeneous environments: How secure are these embedded systems against attacks or breakdowns? Therefore, how can embedded systems be designed to be more secure? And how can embedded systems autonomically react to threats? Facing these questions, Sorin A. Huss is significantly involved in the exploration o

  18. Embedded generation: issues arising in network charging and supply

    International Nuclear Information System (INIS)

    1999-01-01

    This study has been commissioned by ETSU, as part of the DTI's New and Renewable Energy Commercialisation programme, with the intention of informing the debate about the appropriate basis for transmission and distribution charges for, and supply of electricity by, Embedded Generators (EGs). (Author)

  19. Ultimate capacity of piles penetrating in weak soil layers

    Directory of Open Access Journals (Sweden)

    Al-Obaidi Ahmed

    2018-01-01

    Full Text Available A pile foundation is one of the most popular forms of deep foundations. They are routinely employed to transfer axial structure loads through the soft soil to stronger bearing strata. Piles generally used to increase the load carrying capacity of the foundation and reduce the settlement of the foundation. On the other hand, many cases in practice where piles pass through different layers of soil that contain weak layers located at different depths and extension, also some time cavities with a different shape, size, and depth are found. In this study, a total of 96 cases is considered and simulated in PLAXIS 2D program aiming to understand the influence of weak soil on the ultimate pile capacity. The piles embedded in the dense sand with a layer of weak soil at different extension and location. The cross section of the geometry used in this study was designed as an axisymmetric model with the 15-node element; the boundary condition recommended at least 5D in the horizontal direction, and (L+5D in the vertical direction where D and L are the diameter and length of pile, respectively. The soil is modeled as Mohr-Coulomb, with five input parameters and the behavior of pile material represented by the linear elastic model. The results of the above cases are compared with the results found in a pile embedded in dense soil without weak layers or cavities. The results indicated that the existence of weak soil layer within the surrounding soil around the pile decreases the ultimate capacity. Furthermore, it has been found that increase in the weak soil width (extension leads to reduction in the ultimate capacity of the pile. This phenomenon is applicable to all depth of weak soil. The influence of weak layer extension on the ultimate capacity is less when it is presentin the upper soil layers.

  20. Building capacity for evidence informed decision making in public health: a case study of organizational change.

    Science.gov (United States)

    Peirson, Leslea; Ciliska, Donna; Dobbins, Maureen; Mowat, David

    2012-02-20

    Core competencies for public health in Canada require proficiency in evidence informed decision making (EIDM). However, decision makers often lack access to information, many workers lack knowledge and skills to conduct systematic literature reviews, and public health settings typically lack infrastructure to support EIDM activities. This research was conducted to explore and describe critical factors and dynamics in the early implementation of one public health unit's strategic initiative to develop capacity to make EIDM standard practice. This qualitative case study was conducted in one public health unit in Ontario, Canada between 2008 and 2010. In-depth information was gathered from two sets of semi-structured interviews and focus groups (n = 27) with 70 members of the health unit, and through a review of 137 documents. Thematic analysis was used to code the key informant and document data. The critical factors and dynamics for building EIDM capacity at an organizational level included: clear vision and strong leadership, workforce and skills development, ability to access research (library services), fiscal investments, acquisition and development of technological resources, a knowledge management strategy, effective communication, a receptive organizational culture, and a focus on change management. With leadership, planning, commitment and substantial investments, a public health department has made significant progress, within the first two years of a 10-year initiative, towards achieving its goal of becoming an evidence informed decision making organization.

  1. Algorithmic complexity of quantum capacity

    Science.gov (United States)

    Oskouei, Samad Khabbazi; Mancini, Stefano

    2018-04-01

    We analyze the notion of quantum capacity from the perspective of algorithmic (descriptive) complexity. To this end, we resort to the concept of semi-computability in order to describe quantum states and quantum channel maps. We introduce algorithmic entropies (like algorithmic quantum coherent information) and derive relevant properties for them. Then we show that quantum capacity based on semi-computable concept equals the entropy rate of algorithmic coherent information, which in turn equals the standard quantum capacity. Thanks to this, we finally prove that the quantum capacity, for a given semi-computable channel, is limit computable.

  2. Poly(glycidyl methacrylate) beads embedded cryogels for pseudo-specific affinity depletion of albumin and immunoglobulin G

    Energy Technology Data Exchange (ETDEWEB)

    Bereli, Nilay; Sener, Guelsu; Altintas, Evrim Banu; Yavuz, Handan [Department of Chemistry, Biochemistry Division, Hacettepe University, Ankara (Turkey); Denizli, Adil, E-mail: denizli@hacettepe.edu.tr [Department of Chemistry, Biochemistry Division, Hacettepe University, Ankara (Turkey)

    2010-01-30

    Depletion of high abundant proteins like albumin and immunoglobulin G (IgG) can be beneficial in the analysis of serum proteins. For this purpose, Cibacron Blue F3GA and iminodiacetic acid (IDA)-Cu{sup 2+} containing poly(glycidyl methacrylate) (PGMA) beads (1.6 {mu}m in diameter) were embedded into the poly(hydroxyethyl methacrylate) (PHEMA) cryogel. The PGMA beads were prepared by dispersion polymerization. The PGMA beads were modified with Cibacron Blue F3GA and iminodiacetic acid (IDA)-Cu{sup 2+} for simultaneous albumin and IgG depletion, respectively. The PHEMA cryogel was synthesized by free radical polymerization in the presence of the modified PGMA beads. The PHEMA and PHEMA/PGMA composite cryogels were characterized by swelling measurements and scanning electron microscopy (SEM). Protein depletion studies were carried out in a continuous experimental set-up in a stacked column. Albumin adsorption capacity of the PGMA-Cibacron Blue F3GA beads embedded PHEMA cryogel (PHEMA/PGMA-Cibacron Blue F3GA) was 342 mg/g and IgG adsorption capacity of the PGMA-IDA-Cu{sup 2+} beads embedded PHEMA cryogel (PHEMA/PGMA-IDA-Cu{sup 2+}) was 257 mg/g. The composite cryogels depleted albumin and IgG from human serum with 89.4% and 93.6% efficiency, respectively. High desorption values (over 90% for both modified cryogels) were achieved with 0.05 M phosphate buffer containing1.0 M NaCl.

  3. Wavelet-based audio embedding and audio/video compression

    Science.gov (United States)

    Mendenhall, Michael J.; Claypoole, Roger L., Jr.

    2001-12-01

    Watermarking, traditionally used for copyright protection, is used in a new and exciting way. An efficient wavelet-based watermarking technique embeds audio information into a video signal. Several effective compression techniques are applied to compress the resulting audio/video signal in an embedded fashion. This wavelet-based compression algorithm incorporates bit-plane coding, index coding, and Huffman coding. To demonstrate the potential of this audio embedding and audio/video compression algorithm, we embed an audio signal into a video signal and then compress. Results show that overall compression rates of 15:1 can be achieved. The video signal is reconstructed with a median PSNR of nearly 33 dB. Finally, the audio signal is extracted from the compressed audio/video signal without error.

  4. Effective capacity of Nakagami-m fading channels with full channel state information in the low power regime

    KAUST Repository

    Benkhelifa, Fatma

    2013-09-01

    The effective capacity have been introduced by Wu and Neji as a link-layer model supporting statistical delay QoS requirements. In this paper, we propose to study the effective capacity of a Nakagami-m fading channel with full channel state information (CSI) at both the transmitter and at the receiver. We focus on the low Signal-to-Noise Ratio (SNR) regime. We show that the effective capacity for any arbitrary but finite statistically delay Quality of Service (QoS) exponent θ, scales essentially as S NRlog(1/SNR) exactly as the ergodic capacity, independently of any QoS constraint. We also characterize the minimum energy required for reliable communication, and the wideband slope to show that our results are in agreement with results established recently by Gursoy et al. We also propose an on-off power control scheme that achieves the capacity asymptotically using only one bit CSI feedback at the transmitter. Finally, some numerical results are presented to show the accuracy of our asymptotic results. © 2013 IEEE.

  5. HOT SPOT RELIEF WITH EMBEDDED BEAM FOR CDMA SYSTEMS IN HAPS

    Institute of Scientific and Technical Information of China (English)

    2006-01-01

    This paper proposes a novel micro/macro beam coverage scheme used in High Altitude Platform System (HAPS) Code Division Multiple Access (CDMA) systems. A relief of traffic burden in hot spot areas is achieved by embedding micro-beams into the macro-beams at the hot spot locations, together with appropriate power ratio control and user ratio control. The simulation results show that the hot spot problem can be relieved efficiently with the presented configuration, and a higher and more stable system capacity is expectable despite the variation of user distribution.

  6. Embedded generation: issues arising in network charging and supply

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    1999-07-01

    This study has been commissioned by ETSU, as part of the DTI's New and Renewable Energy Commercialisation programme, with the intention of informing the debate about the appropriate basis for transmission and distribution charges for, and supply of electricity by, Embedded Generators (EGs). (Author)

  7. Electronics for embedded systems

    CERN Document Server

    Bindal, Ahmet

    2017-01-01

    This book provides semester-length coverage of electronics for embedded systems, covering most common analog and digital circuit-related issues encountered while designing embedded system hardware. It is written for students and young professionals who have basic circuit theory background and want to learn more about passive circuits, diode and bipolar transistor circuits, the state-of-the-art CMOS logic family and its interface with older logic families such as TTL, sensors and sensor physics, operational amplifier circuits to condition sensor signals, data converters and various circuits used in electro-mechanical device control in embedded systems. The book also provides numerous hardware design examples by integrating the topics learned in earlier chapters. The last chapter extensively reviews the combinational and sequential logic design principles to be able to design the digital part of embedded system hardware.

  8. Brauer type embedding problems

    CERN Document Server

    Ledet, Arne

    2005-01-01

    This monograph is concerned with Galois theoretical embedding problems of so-called Brauer type with a focus on 2-groups and on finding explicit criteria for solvability and explicit constructions of the solutions. The advantage of considering Brauer type embedding problems is their comparatively simple condition for solvability in the form of an obstruction in the Brauer group of the ground field. This book presupposes knowledge of classical Galois theory and the attendant algebra. Before considering questions of reducing the embedding problems and reformulating the solvability criteria, the

  9. Embedded Systems Design with FPGAs

    CERN Document Server

    Pnevmatikatos, Dionisios; Sklavos, Nicolas

    2013-01-01

    This book presents methodologies for modern applications of embedded systems design, using field programmable gate array (FPGA) devices.  Coverage includes state-of-the-art research from academia and industry on a wide range of topics, including advanced electronic design automation (EDA), novel system architectures, embedded processors, arithmetic, dynamic reconfiguration and applications. Describes a variety of methodologies for modern embedded systems design;  Implements methodologies presented on FPGAs; Covers a wide variety of applications for reconfigurable embedded systems, including Bioinformatics, Communications and networking, Application acceleration, Medical solutions, Experiments for high energy physics, Astronomy, Aerospace, Biologically inspired systems and Computational fluid dynamics (CFD).

  10. On the low SNR capacity of maximum ratio combining over rician fading channels with full channel state information

    KAUST Repository

    Benkhelifa, Fatma; Rezki, Zouheir; Alouini, Mohamed-Slim

    2013-01-01

    In this letter, we study the ergodic capacity of a maximum ratio combining (MRC) Rician fading channel with full channel state information (CSI) at the transmitter and at the receiver. We focus on the low Signal-to-Noise Ratio (SNR) regime and we show that the capacity scales as L ΩK+L SNRx log(1SNR), where Ω is the expected channel gain per branch, K is the Rician fading factor, and L is the number of diversity branches. We show that one-bit CSI feedback at the transmitter is enough to achieve this capacity using an on-off power control scheme. Our framework can be seen as a generalization of recently established results regarding the fading-channels capacity characterization in the low-SNR regime. © 2012 IEEE.

  11. On the low SNR capacity of maximum ratio combining over rician fading channels with full channel state information

    KAUST Repository

    Benkhelifa, Fatma

    2013-04-01

    In this letter, we study the ergodic capacity of a maximum ratio combining (MRC) Rician fading channel with full channel state information (CSI) at the transmitter and at the receiver. We focus on the low Signal-to-Noise Ratio (SNR) regime and we show that the capacity scales as L ΩK+L SNRx log(1SNR), where Ω is the expected channel gain per branch, K is the Rician fading factor, and L is the number of diversity branches. We show that one-bit CSI feedback at the transmitter is enough to achieve this capacity using an on-off power control scheme. Our framework can be seen as a generalization of recently established results regarding the fading-channels capacity characterization in the low-SNR regime. © 2012 IEEE.

  12. Permutation entropy with vector embedding delays

    Science.gov (United States)

    Little, Douglas J.; Kane, Deb M.

    2017-12-01

    Permutation entropy (PE) is a statistic used widely for the detection of structure within a time series. Embedding delay times at which the PE is reduced are characteristic timescales for which such structure exists. Here, a generalized scheme is investigated where embedding delays are represented by vectors rather than scalars, permitting PE to be calculated over a (D -1 ) -dimensional space, where D is the embedding dimension. This scheme is applied to numerically generated noise, sine wave and logistic map series, and experimental data sets taken from a vertical-cavity surface emitting laser exhibiting temporally localized pulse structures within the round-trip time of the laser cavity. Results are visualized as PE maps as a function of embedding delay, with low PE values indicating combinations of embedding delays where correlation structure is present. It is demonstrated that vector embedding delays enable identification of structure that is ambiguous or masked, when the embedding delay is constrained to scalar form.

  13. Transmitting Information by Propagation in an Ocean Waveguide: Computation of Acoustic Field Capacity

    Science.gov (United States)

    2015-06-17

    and optics literature [6, 7]. Primary motivation for the resurgence of interest in the study of fundamental relationships between (classical) wave...approximated by a finite number of degrees of freedom, and the information-theoretic analysis used for studying MIMO capacity can be applied to determine the...vectors are given by νm,n(ρ ′,z′,φ ′) = am, nun (z′)Jm(knρ ′)e−imφ ′ (42) with m,n corresponding to azimuthal and depth eigenvalue indices. Finally

  14. Pricing of embedded generation: Incorporation of externalities and avoided network losses

    International Nuclear Information System (INIS)

    Rodrigo, Asanka S.; Wijayatunga, Priyantha D.C.

    2007-01-01

    Traditionally, the electricity purchase tariff of embedded generators reflected only the cost of production and delivery of electricity to the consumers, which includes the costs of labor, capital, operation, taxes and insurance. However, the production of electricity causes adverse impacts on the environment. At present, this issue has not been widely addressed by the existing pricing methodologies. This paper proposes a pricing methodology for renewable energy based embedded electricity generation, incorporating the cost of externalities with a case study on the Sri Lanka power system. It recommends that the embedded generation tariff be based on the principle of 'avoided cost', considering the cost of energy production, cost of externalities and the cost of network losses. While the 'impact path way' approach is proposed for calculation of the cost of externalities of energy, the nodal-based cost calculation is proposed for the avoided cost of network losses calculation. The pricing methodology proposed in the paper provides important information for investors when choosing the most economical site for their development. It can also be used to optimize the network use. These will allow the developers of embedded generation facilities and the utilities operating the national grid to maximize the potential of embedded generation. (author)

  15. Smart Multicore Embedded Systems

    DEFF Research Database (Denmark)

    This book provides a single-source reference to the state-of-the-art of high-level programming models and compilation tool-chains for embedded system platforms. The authors address challenges faced by programmers developing software to implement parallel applications in embedded systems, where ve...

  16. Building capacity for evidence informed decision making in public health: a case study of organizational change

    Directory of Open Access Journals (Sweden)

    Peirson Leslea

    2012-02-01

    Full Text Available Abstract Background Core competencies for public health in Canada require proficiency in evidence informed decision making (EIDM. However, decision makers often lack access to information, many workers lack knowledge and skills to conduct systematic literature reviews, and public health settings typically lack infrastructure to support EIDM activities. This research was conducted to explore and describe critical factors and dynamics in the early implementation of one public health unit's strategic initiative to develop capacity to make EIDM standard practice. Methods This qualitative case study was conducted in one public health unit in Ontario, Canada between 2008 and 2010. In-depth information was gathered from two sets of semi-structured interviews and focus groups (n = 27 with 70 members of the health unit, and through a review of 137 documents. Thematic analysis was used to code the key informant and document data. Results The critical factors and dynamics for building EIDM capacity at an organizational level included: clear vision and strong leadership, workforce and skills development, ability to access research (library services, fiscal investments, acquisition and development of technological resources, a knowledge management strategy, effective communication, a receptive organizational culture, and a focus on change management. Conclusion With leadership, planning, commitment and substantial investments, a public health department has made significant progress, within the first two years of a 10-year initiative, towards achieving its goal of becoming an evidence informed decision making organization.

  17. Leadership capacity in two Brazilian regional tourism organisations

    DEFF Research Database (Denmark)

    Valente, Flavio Jose; Dredge, Dianne; Lohmann, Gui

    2014-01-01

    at the speed required by the private sector. The IER is a market-led governance structure and its leadership practices effectively mobilised the private sector. However, it was found to operate in isolation from government and other key tourism stakeholders. Originality/value – This paper draws together......Purpose – This paper examines the leadership practices of two Brazilian regional tourism organisations (RTOs) using an exploratory case study. Design/methodology/approach – The research adopts an embedded case study approach, permitting the comparison of the leadership phenomenon in the ‘‘Instituto....... Findings – Four leadership themes emerged: capacity to produce results, capacity to mobilise followers, articulation and communication of goals and actions, and articulation of roles and responsibilities. The findings are discussed in regards to the hierarchical and market governance structures of the two...

  18. Experimental study of reinforced concrete pile caps with external, embedded and partially embedded socket with smooth interface

    Directory of Open Access Journals (Sweden)

    R. Barros

    Full Text Available On Precast concrete structures the column foundation connections can occur through the socket foundation, which can be embedded, partially embedded or external, with socket walls over the pile caps. This paper presents an experimental study about two pile caps reinforced concrete with external, partially embedded and embedded socket submitted to central load, using 1:2 scaled models. In the analyzed models, the smooth interface between the socket walls and column was considered. The results are compared to a reference model that presents monolithic connections between the column and pile cap. It is observed that the ultimate load of pile cap with external sockets has the same magnitude as the reference pile cap, but the ultimate load of models with partially embedded and embedded socket present less magnitude than the reference model.

  19. INCREASE OF STABILITY AT JPEG COMPRESSION OF THE DIGITAL WATERMARKS EMBEDDED IN STILL IMAGES

    Directory of Open Access Journals (Sweden)

    V. A. Batura

    2015-07-01

    Full Text Available Subject of Research. The paper deals with creation and research of method for increasing stability at JPEG compressing of digital watermarks embedded in still images. Method. A new algorithm of digital watermarking for still images which embeds digital watermark into a still image via modification of frequency coefficients for Hadamard discrete transformation is presented. The choice of frequency coefficients for embedding of a digital watermark is based on existence of sharp change of their values after modification at the maximum compression of JPEG. The choice of blocks of pixels for embedding is based on the value of their entropy. The new algorithm was subjected to the analysis of resistance to an image compression, noising, filtration, change of size, color and histogram equalization. Elham algorithm possessing a good resistance to JPEG compression was chosen for comparative analysis. Nine gray-scale images were selected as objects for protection. Obscurity of the distortions embedded in them was defined on the basis of the peak value of a signal to noise ratio which should be not lower than 43 dB for obscurity of the brought distortions. Resistibility of embedded watermark was determined by the Pearson correlation coefficient, which value should not be below 0.5 for the minimum allowed stability. The algorithm of computing experiment comprises: watermark embedding into each test image by the new algorithm and Elham algorithm; introducing distortions to the object of protection; extracting of embedded information with its subsequent comparison with the original. Parameters of the algorithms were chosen so as to provide approximately the same level of distortions introduced into the images. Main Results. The method of preliminary processing of digital watermark presented in the paper makes it possible to reduce significantly the volume of information embedded in the still image. The results of numerical experiment have shown that the

  20. Trusted computing for embedded systems

    CERN Document Server

    Soudris, Dimitrios; Anagnostopoulos, Iraklis

    2015-01-01

    This book describes the state-of-the-art in trusted computing for embedded systems. It shows how a variety of security and trusted computing problems are addressed currently and what solutions are expected to emerge in the coming years. The discussion focuses on attacks aimed at hardware and software for embedded systems, and the authors describe specific solutions to create security features. Case studies are used to present new techniques designed as industrial security solutions. Coverage includes development of tamper resistant hardware and firmware mechanisms for lightweight embedded devices, as well as those serving as security anchors for embedded platforms required by applications such as smart power grids, smart networked and home appliances, environmental and infrastructure sensor networks, etc. ·         Enables readers to address a variety of security threats to embedded hardware and software; ·         Describes design of secure wireless sensor networks, to address secure authen...

  1. Poincare ball embeddings of the optical geometry

    International Nuclear Information System (INIS)

    Abramowicz, M A; Bengtsson, I; Karas, V; Rosquist, K

    2002-01-01

    It is shown that the optical geometry of the Reissner-Nordstroem exterior metric can be embedded in a hyperbolic space all the way down to its outer horizon. The adopted embedding procedure removes a breakdown of flat-space embeddings which occurs outside the horizon, at and below the Buchdahl-Bondi limit (R/M=9/4 in the Schwarzschild case). In particular, the horizon can be captured in the optical geometry embedding diagram. Moreover, by using the compact Poincare ball representation of the hyperbolic space, the embedding diagram can cover the whole extent of radius from spatial infinity down to the horizon. Attention is drawn to the advantages of such embeddings in an appropriately curved space: this approach gives compact embeddings and it clearly distinguishes the case of an extremal black hole from a non-extremal one in terms of the topology of the embedded horizon

  2. On the capacity of multiple access and broadcast fading channels with full channel state information at low SNR

    KAUST Repository

    Rezki, Zouheir

    2014-01-01

    We study the throughput capacity region of the Gaussian multi-access (MAC) fading channel with perfect channel state information (CSI) at the receiver and at the transmitters, at low power regime. We show that it has a multidimensional rectangle structure and thus is simply characterized by single user capacity points.More specifically, we show that at low power regime, the boundary surface of the capacity region shrinks to a single point corresponding to the sum rate maximizer and that the coordinates of this point coincide with single user capacity bounds. Inspired from this result, we propose an on-off scheme, compute its achievable rate, and show that this scheme achieves single user capacity bounds of the MAC channel for a wide class of fading channels at asymptotically low power regime. We argue that this class of fading encompasses all known wireless channels for which the capacity region of the MAC channel has even a simpler expression in terms of users\\' average power constraints only. Using the duality of Gaussian MAC and broadcast channels (BC), we deduce a simple characterization of the BC capacity region at low power regime and show that for a class of fading channels (including Rayleigh fading), time-sharing is asymptotically optimal. © 2014 IEEE.

  3. Homomorphic embeddings in n-groups

    Directory of Open Access Journals (Sweden)

    Mona Cristescu

    2013-06-01

    Full Text Available We prove that an cancellative n-groupoid A can be homotopic embedded in an n-group if and only if in A are satisfied all n-ary Malcev conditions. Now we shall prove that in the presence of associative law we obtain homomorphic embeddings. Furthermore, if A has a lateral identity a such embeddings is assured by a subset of n-ary Malcev conditions - unary Malcev conditions.

  4. Presentation of spatio-temporal data in the context of information capacity and visual suggestiveness

    Science.gov (United States)

    Cybulski, Paweł

    2014-12-01

    The aim of this article is to present the concept of information capacity and visual suggestiveness as a map characteristic on the example of two maps of human migration. From this viewpoint the literature study has been performed. Proposed by the author the features of cartographic visualization are an attempt to establish cartographic pragmatics and find the way to increase effectiveness of dynamic maps with large information capacity. Among the works on cartographic pragmatics, muliaspectuality of spatio-temporal data the proposed solution has not been taken so far, and refers to the map design problematic. Celem rozważań było podsumowanie wiedzy dotyczącej projektowania dynamicznych opracowań przestrzennych oraz ich klasyfi kacja ze względu na ilość zmiennych grafi cznych oraz dynamicznych, które mogą zostać użyte w procesie geowizualizacji. Zróżnicowanie ilości zmiennych grafi cznych i dynamicznych w przestrzennych wizualizacjach autor proponuje nazywać pojemnością wizualną prezentacji. Autor stawia również hipotezę, że im większą pojemność wizualną stosujemy tym bardziej sugestywne musi być to przestawienie, aby efektywność przekazywania informacji była zachowana

  5. Embedding health policy and systems research into decision-making processes in low- and middle-income countries.

    Science.gov (United States)

    Koon, Adam D; Rao, Krishna D; Tran, Nhan T; Ghaffar, Abdul

    2013-08-08

    Attention is increasingly directed to bridging the gap between the production of knowledge and its use for health decision-making in low- and middle-income countries (LMICs). An important and underdeveloped area of health policy and systems research (HPSR) is the organization of this process. Drawing from an interdisciplinary conception of embeddedness, a literature review was conducted to identify examples of embedded HPSR used to inform decision-making in LMICs. The results of the literature review were organized according to the World Health Organization's Building Blocks Framework. Next, a conceptual model was created to illustrate the arrangement of organizations that produce embedded HPSR and the characteristics that facilitate its uptake into the arena of decision-making. We found that multiple forces converge to create context-specific pathways through which evidence enters into decision-making. Depending on the decision under consideration, the literature indicates that decision-makers may call upon an intricate combination of actors for sourcing HPSR. While proximity to decision-making does have advantages, it is not the position of the organization within the network, but rather the qualities the organization possesses, that enable it to be embedded. Our findings suggest that four qualities influence embeddedness: reputation, capacity, quality of connections to decision-makers, and quantity of connections to decision-makers and others. In addition to this, the policy environment (e.g. the presence of legislation governing the use of HPSR, presence of strong civil society, etc.) strongly influences uptake. Through this conceptual model, we can understand which conditions are likely to enhance uptake of HPSR in LMIC health systems. This raises several important considerations for decision-makers and researchers about the arrangement and interaction of evidence-generating organizations in health systems.

  6. Highly conductive porous Na-embedded carbon nanowalls for high-performance capacitive deionization

    Science.gov (United States)

    Chang, Liang; Hu, Yun Hang

    2018-05-01

    Highly conductive porous Na-embedded carbon nanowalls (Na@C), which were recently invented, have exhibited excellent performance for dye-sensitized solar cells and electric double-layer capacitors. In this work, Na@C was demonstrated as an excellent electrode material for capacitive deionization (CDI). In a three-electrode configuration system, the specific capacity of the Na@C electrodes can achieve 306.4 F/g at current density of 0.2 A/g in 1 M NaCl, which is higher than that (235.2 F/g) of activated carbon (AC) electrodes. Furthermore, a high electrosorption capacity of 8.75 mg g-1 in 100 mg/L NaCl was obtained with the Na@C electrodes in a batch-mode capacitive deionization cell. It exceeds the electrosorption capacity (4.08 mg g-1) of AC electrodes. The Na@C electrode also showed a promising cycle stability. The excellent performance of Na@C electrode for capacitive deionization (CDI) can be attributed to its high electrical conductivity and large accessible surface area.

  7. Smart concrete slabs with embedded tubular PZT transducers for damage detection

    Science.gov (United States)

    Gao, Weihang; Huo, Linsheng; Li, Hongnan; Song, Gangbing

    2018-02-01

    The objective of this study is to develop a new concept and methodology of smart concrete slab (SCS) with embedded tubular lead zirconate titanate transducer array for image based damage detection. Stress waves, as the detecting signals, are generated by the embedded tubular piezoceramic transducers in the SCS. Tubular piezoceramic transducers are used due to their capacity of generating radially uniform stress waves in a two-dimensional concrete slab (such as bridge decks and walls), increasing the monitoring range. A circular type delay-and-sum (DAS) imaging algorithm is developed to image the active acoustic sources based on the direct response received by each sensor. After the scattering signals from the damage are obtained by subtracting the baseline response of the concrete structures from those of the defective ones, the elliptical type DAS imaging algorithm is employed to process the scattering signals and reconstruct the image of the damage. Finally, two experiments, including active acoustic source monitoring and damage imaging for concrete structures, are carried out to illustrate and demonstrate the effectiveness of the proposed method.

  8. Absorptive capacity and smart companies

    Directory of Open Access Journals (Sweden)

    Patricia Moro González

    2014-12-01

    Full Text Available Purpose: The current competitive environment is substantially modifying the organizations’ learning processes due to a global increase of available information allowing this to be transformed into knowledge. This opportunity has been exploited since the nineties by the tools of “Business Analytics” and “Business Intelligence” but, nevertheless, being integrated in the study of new organizational capacities engaged in the process of creating intelligence inside organizations is still an outstanding task. The review of the concept of absorptive capacity and a detailed study from the perspective of this new reality will be the main objective of study of this paper.Design/methodology/approach: By comparing classical absorptive capacity and absorptive capacity from the point of view of information management tools in each one of the three stages of the organizational learning cycle, some gaps of the former are overcome/fulfilled. The academic/bibliographical references provided in this paper have been obtained from ISI web of knowledge, Scopus and Dialnet data bases, supporting the state of affairs on absorptive capacity and thereafter filtering by "Business Intelligence" and "Business Analytics". Specialized websites and Business Schools` Publications there have also been included, crowning the content on information management tools used that are currently used in the strategic consulting.Findings: Our contribution to the literature is the development of "smart absorptive capacity". This is a new capacity emerging from the reformulation of the classical concept of absorptive capacity wherein some aspects of its definition that might have been omitted are emphasized. The result of this new approach is the creation of a new Theoretical Model of Organizational Intelligence, which aims to explain, within the framework of the Resources and Capabilities Theory, the competitive advantage achieved by the so-called smart companies

  9. Development and characterization of silicone embedded distributed piezoelectric sensors for contact detection

    International Nuclear Information System (INIS)

    Acer, Merve; Salerno, Marco; Paik, Jamie; Agbeviade, Kossi

    2015-01-01

    Tactile sensing transfers complex interactive information in a most intuitive sense. Such a populated set of data from the environment and human interactions necessitates various degrees of information from both modular and distributed areas. A sensor design that could provide such types of feedback becomes challenging when the target component has a nonuniform, agile, high resolution, and soft surface. This paper presents an innovative methodology for the manufacture of novel soft sensors that have a high resolution sensing array due to the sensitivity of ceramic piezoelectric (PZT) elements, while uncommonly matched with the high stretchability of the soft substrate and electrode design. Further, they have a low profile and their transfer function is easy to tune by changing the material and thickness of the soft substrate in which the PZTs are embedded. In this manuscript, we present experimental results of the soft sensor prototypes: PZTs arranged in a four by two array form, measuring 1.5–2.3 mm in thickness, with the sensitivity in the range of 0.07–0.12 of the normalized signal change per unit force. We have conducted extensive tests under dynamic loading conditions that include impact, step and cyclic. The presented prototype's mechanical and functional capacities are promising for applications in biomedical systems where soft, wearable and high precision sensors are needed. (paper)

  10. Development and characterization of silicone embedded distributed piezoelectric sensors for contact detection

    Science.gov (United States)

    Acer, Merve; Salerno, Marco; Agbeviade, Kossi; Paik, Jamie

    2015-07-01

    Tactile sensing transfers complex interactive information in a most intuitive sense. Such a populated set of data from the environment and human interactions necessitates various degrees of information from both modular and distributed areas. A sensor design that could provide such types of feedback becomes challenging when the target component has a nonuniform, agile, high resolution, and soft surface. This paper presents an innovative methodology for the manufacture of novel soft sensors that have a high resolution sensing array due to the sensitivity of ceramic piezoelectric (PZT) elements, while uncommonly matched with the high stretchability of the soft substrate and electrode design. Further, they have a low profile and their transfer function is easy to tune by changing the material and thickness of the soft substrate in which the PZTs are embedded. In this manuscript, we present experimental results of the soft sensor prototypes: PZTs arranged in a four by two array form, measuring 1.5-2.3 mm in thickness, with the sensitivity in the range of 0.07-0.12 of the normalized signal change per unit force. We have conducted extensive tests under dynamic loading conditions that include impact, step and cyclic. The presented prototype's mechanical and functional capacities are promising for applications in biomedical systems where soft, wearable and high precision sensors are needed.

  11. On the capacity of cognitive radio under limited channel state information

    KAUST Repository

    Rezki, Zouheir

    2010-09-01

    A spectrum-sharing communication system where the secondary user is aware of the instantaneous channel state information (CSI) of the secondary link, but knows only the statistics of the secondary transmitter-primary receiver link, is investigated. The optimum power profile and the ergodic capacity of the secondary link are derived for general fading channels (with continuous probability density function) under average and peak transmit-power constraints and with respect to two different interference constraints: an interference outage constraint and a signal-to-interference (SI) outage constraint. When applied to Rayleigh fading channels, our results show that the interference constraint is harmful at high-power regime, whereas at lowpower regime, it has a marginal impact and no-interference performance may be achieved. © 2010 IEEE.

  12. Enhancing the Capacity of Policy-Makers to Develop Evidence-Informed Policy Brief on Infectious Diseases of Poverty in Nigeria

    Directory of Open Access Journals (Sweden)

    Chigozie Jesse Uneke

    2015-09-01

    Full Text Available Background The lack of effective use of research evidence in policy-making is a major challenge in most low- and middle-income countries (LMICs. There is need to package research data into effective policy tools that will help policy-makers to make evidence-informed policy regarding infectious diseases of poverty (IDP. The objective of this study was to assess the usefulness of training workshops and mentoring to enhance the capacity of Nigerian health policy-makers to develop evidence-informed policy brief on the control of IDP. Methods A modified “before and after” intervention study design was used in which outcomes were measured on the target participants both before the intervention is implemented and after. A 4-point Likert scale according to the degree of adequacy; 1 = “grossly inadequate,” 4 = “very adequate” was employed. The main parameter measured was participants’ perceptions of their own knowledge/understanding. This study was conducted at subnational level and the participants were the career health policy-makers drawn from Ebonyi State in the South-Eastern Nigeria. A oneday evidence-to-policy workshop was organized to enhance the participants’ capacity to develop evidence-informed policy brief on IDP in Ebonyi State. Topics covered included collaborative initiative; preparation and use of policy briefs; policy dialogue; ethics in health policy-making; and health policy and politics. Results The preworkshop mean of knowledge and capacity ranged from 2.49-3.03, while the postworkshop mean ranged from 3.42–3.78 on 4-point scale. The percentage increase in mean of knowledge and capacity at the end of the workshop ranged from 20.10%–45%. Participants were divided into 3 IDP mentorship groups (malaria, schistosomiasis, lymphatic filariasis [LF] and were mentored to identify potential policy options/recommendations for control of the diseases for the policy briefs. These policy options were subjected to research

  13. Enhancing the Capacity of Policy-Makers to Develop Evidence-Informed Policy Brief on Infectious Diseases of Poverty in Nigeria

    Science.gov (United States)

    Uneke, Chigozie Jesse; Ezeoha, Abel Ebeh; Uro-Chukwu, Henry; Ezeonu, Chinonyelum Thecla; Ogbu, Ogbonnaya; Onwe, Friday; Edoga, Chima

    2015-01-01

    Background: The lack of effective use of research evidence in policy-making is a major challenge in most low- and middle-income countries (LMICs). There is need to package research data into effective policy tools that will help policy-makers to make evidence-informed policy regarding infectious diseases of poverty (IDP). The objective of this study was to assess the usefulness of training workshops and mentoring to enhance the capacity of Nigerian health policy-makers to develop evidence-informed policy brief on the control of IDP. Methods: A modified "before and after" intervention study design was used in which outcomes were measured on the target participants both before the intervention is implemented and after. A 4-point Likert scale according to the degree of adequacy; 1 = "grossly inadequate," 4 = "very adequate" was employed. The main parameter measured was participants’ perceptions of their own knowledge/understanding. This study was conducted at subnational level and the participants were the career health policy-makers drawn from Ebonyi State in the South-Eastern Nigeria. A one-day evidence-to-policy workshop was organized to enhance the participants’ capacity to develop evidence-informed policy brief on IDP in Ebonyi State. Topics covered included collaborative initiative; preparation and use of policy briefs; policy dialogue; ethics in health policy-making; and health policy and politics. Results: The preworkshop mean of knowledge and capacity ranged from 2.49-3.03, while the postworkshop mean ranged from 3.42–3.78 on 4-point scale. The percentage increase in mean of knowledge and capacity at the end of the workshop ranged from 20.10%–45%. Participants were divided into 3 IDP mentorship groups (malaria, schistosomiasis, lymphatic filariasis [LF]) and were mentored to identify potential policy options/recommendations for control of the diseases for the policy briefs. These policy options were subjected to research evidence synthesis by each

  14. Effective capacity of Nakagami-m fading channels with full channel state information in the low power regime

    KAUST Repository

    Benkhelifa, Fatma; Rezki, Zouheir; Alouini, Mohamed-Slim

    2013-01-01

    information (CSI) at both the transmitter and at the receiver. We focus on the low Signal-to-Noise Ratio (SNR) regime. We show that the effective capacity for any arbitrary but finite statistically delay Quality of Service (QoS) exponent θ, scales essentially

  15. Embedded Ultrasonics for SHM of Space Applications

    Science.gov (United States)

    2012-07-30

    information on material properties and other forms of damage such as cracks, structural fatigue and/or impact events. This synergistic aspect of the embedded...larger the phase shift. However, high excitation levels could contribute to sensor fatigue and levels in a range 15 to 20 (110 to 130 volts) are...joints each featuring three bolts. Piezoelectric wafers ( PZT ) with UNF electrodes were bonded to the isogrid panels using 3M 2216 epoxy

  16. Modular Neural Tile Architecture for Compact Embedded Hardware Spiking Neural Network

    NARCIS (Netherlands)

    Pande, Sandeep; Morgan, Fearghal; Cawley, Seamus; Bruintjes, Tom; Smit, Gerardus Johannes Maria; McGinley, Brian; Carrillo, Snaider; Harkin, Jim; McDaid, Liam

    2013-01-01

    Biologically-inspired packet switched network on chip (NoC) based hardware spiking neural network (SNN) architectures have been proposed as an embedded computing platform for classification, estimation and control applications. Storage of large synaptic connectivity (SNN topology) information in

  17. Real-time Kernel Implementation Practice Program for Embedded Software Engineers' Education and its Evaluation

    Science.gov (United States)

    Yoshida, Toshio; Matsumoto, Masahide; Seo, Katsuhiko; Chino, Shinichiro; Sugino, Eiji; Sawamoto, Jun; Koizumi, Hisao

    A real-time kernel (henceforth RTK) is in the center place of embedded software technology, and the understanding of RTK is indispensable for the embedded system design. To implement RTK, it is necessary to understand languages that describe RTK software program code, system programming manners, software development tools, CPU on that RTK runs and the interface between software and hardware, etc. in addition to understanding of RTK itself. This means RTK implementation process largely covers embedded software implementation process. Therefore, it is thought that RTK implementation practice program is very effective as a means of the acquisition of common embedded software skill in addition to deeper acquisition of RTK itself. In this paper, we propose to apply RTK implementing practice program to embedded software engineers educational program. We newly developed very small and step-up type RTK named μK for educational use, and held a seminar that used μK as a teaching material for the students of information science and engineers of the software house. As a result, we confirmed that RTK implementation practice program is very effective for the acquisition of embedded software common skill.

  18. Ultrafine Sn nanoparticles embedded in shell of N-doped hollow carbon spheres as high rate anode for lithium-ion batteries

    Energy Technology Data Exchange (ETDEWEB)

    Dou, Peng; Cao, Zhenzhen; Wang, Chao; Zheng, Jiao [School of Materials Science and Engineering, Tianjin University, Tianjin 300072 (China); Xu, Xinhua, E-mail: xhxutju@gmail.com [School of Materials Science and Engineering, Tianjin University, Tianjin 300072 (China); Tianjin Key Laboratory of Composite and Functional Materials, Tianjin 300072 (China)

    2017-05-15

    Highlights: • Dynamic covalent bond in polymeric nanoparticles is used to induce hollow Sn{sup 4+}-MOPs. • Ultrafine Sn nanoparticles uniformly embedded in shell of N-doped hollow carbon spheres is successfully synthesized by pyrolysis of the Sn{sup 4+}-MOPs precursor. • The composite exhibits superior cycle stability and rate capacity. - Abstract: A novel reversible interaction in polymeric nanoparticles is used to induce hollow Sn{sup 4+}-MOPs. Then ultrafine Sn nanoparticles uniformly embedded in shell of N-doped hollow carbon spheres is successfully synthesized by pyrolysis of the Sn{sup 4+}-MOPs precursor. In this architecture, the N-doped carbon shells can effectively avoid the direct exposure of embedded Sn nanoparticles to the electrolyte and efficiently accommodate the volume change of Sn nanoparticles. Furthermore, the hollow structure of carbon sphere can prevent Sn nanoparticles aggregation over repeated cycling and shorten the diffusion path of both electrons and ions. As a consequence, this N-doped hollow Sn/C anode delivers a reversible capacity of 606 mA h g{sup −1} at a current density of 0.2 A g{sup −1} after 250 cycles and a reversible capacity of 221 mA h g{sup −1} even at a much higher current density of 10 A g{sup −1}, which are much better than those of pure Sn nanoparticles. The desirable cyclic stability and rate capability were attributed to the unique architecture that provided fast pathway for electron transport and simultaneously solved the major issues of Sn-based anodes, such as pulverization, aggregation and loss of electrical contact.

  19. Real-time depth processing for embedded platforms

    Science.gov (United States)

    Rahnama, Oscar; Makarov, Aleksej; Torr, Philip

    2017-05-01

    Obtaining depth information of a scene is an important requirement in many computer-vision and robotics applications. For embedded platforms, passive stereo systems have many advantages over their active counterparts (i.e. LiDAR, Infrared). They are power efficient, cheap, robust to lighting conditions and inherently synchronized to the RGB images of the scene. However, stereo depth estimation is a computationally expensive task that operates over large amounts of data. For embedded applications which are often constrained by power consumption, obtaining accurate results in real-time is a challenge. We demonstrate a computationally and memory efficient implementation of a stereo block-matching algorithm in FPGA. The computational core achieves a throughput of 577 fps at standard VGA resolution whilst consuming less than 3 Watts of power. The data is processed using an in-stream approach that minimizes memory-access bottlenecks and best matches the raster scan readout of modern digital image sensors.

  20. Embedded Linux projects using Yocto project cookbook

    CERN Document Server

    González, Alex

    2015-01-01

    If you are an embedded developer learning about embedded Linux with some experience with the Yocto project, this book is the ideal way to become proficient and broaden your knowledge with examples that are immediately applicable to your embedded developments. Experienced embedded Yocto developers will find new insight into working methodologies and ARM specific development competence.

  1. Consensus embedding: theory, algorithms and application to segmentation and classification of biomedical data

    Directory of Open Access Journals (Sweden)

    Viswanath Satish

    2012-02-01

    Full Text Available Abstract Background Dimensionality reduction (DR enables the construction of a lower dimensional space (embedding from a higher dimensional feature space while preserving object-class discriminability. However several popular DR approaches suffer from sensitivity to choice of parameters and/or presence of noise in the data. In this paper, we present a novel DR technique known as consensus embedding that aims to overcome these problems by generating and combining multiple low-dimensional embeddings, hence exploiting the variance among them in a manner similar to ensemble classifier schemes such as Bagging. We demonstrate theoretical properties of consensus embedding which show that it will result in a single stable embedding solution that preserves information more accurately as compared to any individual embedding (generated via DR schemes such as Principal Component Analysis, Graph Embedding, or Locally Linear Embedding. Intelligent sub-sampling (via mean-shift and code parallelization are utilized to provide for an efficient implementation of the scheme. Results Applications of consensus embedding are shown in the context of classification and clustering as applied to: (1 image partitioning of white matter and gray matter on 10 different synthetic brain MRI images corrupted with 18 different combinations of noise and bias field inhomogeneity, (2 classification of 4 high-dimensional gene-expression datasets, (3 cancer detection (at a pixel-level on 16 image slices obtained from 2 different high-resolution prostate MRI datasets. In over 200 different experiments concerning classification and segmentation of biomedical data, consensus embedding was found to consistently outperform both linear and non-linear DR methods within all applications considered. Conclusions We have presented a novel framework termed consensus embedding which leverages ensemble classification theory within dimensionality reduction, allowing for application to a wide range

  2. Capacity Building: Data- and Research-Informed Development of Schools and Teaching Practices in Denmark and Norway

    Science.gov (United States)

    Qvortrup, Lars

    2016-01-01

    Based on experiences from a number of large scale data- and research-informed school development projects in Denmark and Norway, led by the author, three hypotheses are discussed: that an effective way of linking research and practice is achieved (1) using a capacity building approach, that is, to collaborate in the practical school context…

  3. A Secure and Robust Compressed Domain Video Steganography for Intra- and Inter-Frames Using Embedding-Based Byte Differencing (EBBD) Scheme.

    Science.gov (United States)

    Idbeaa, Tarik; Abdul Samad, Salina; Husain, Hafizah

    2016-01-01

    This paper presents a novel secure and robust steganographic technique in the compressed video domain namely embedding-based byte differencing (EBBD). Unlike most of the current video steganographic techniques which take into account only the intra frames for data embedding, the proposed EBBD technique aims to hide information in both intra and inter frames. The information is embedded into a compressed video by simultaneously manipulating the quantized AC coefficients (AC-QTCs) of luminance components of the frames during MPEG-2 encoding process. Later, during the decoding process, the embedded information can be detected and extracted completely. Furthermore, the EBBD basically deals with two security concepts: data encryption and data concealing. Hence, during the embedding process, secret data is encrypted using the simplified data encryption standard (S-DES) algorithm to provide better security to the implemented system. The security of the method lies in selecting candidate AC-QTCs within each non-overlapping 8 × 8 sub-block using a pseudo random key. Basic performance of this steganographic technique verified through experiments on various existing MPEG-2 encoded videos over a wide range of embedded payload rates. Overall, the experimental results verify the excellent performance of the proposed EBBD with a better trade-off in terms of imperceptibility and payload, as compared with previous techniques while at the same time ensuring minimal bitrate increase and negligible degradation of PSNR values.

  4. A Secure and Robust Compressed Domain Video Steganography for Intra- and Inter-Frames Using Embedding-Based Byte Differencing (EBBD Scheme.

    Directory of Open Access Journals (Sweden)

    Tarik Idbeaa

    Full Text Available This paper presents a novel secure and robust steganographic technique in the compressed video domain namely embedding-based byte differencing (EBBD. Unlike most of the current video steganographic techniques which take into account only the intra frames for data embedding, the proposed EBBD technique aims to hide information in both intra and inter frames. The information is embedded into a compressed video by simultaneously manipulating the quantized AC coefficients (AC-QTCs of luminance components of the frames during MPEG-2 encoding process. Later, during the decoding process, the embedded information can be detected and extracted completely. Furthermore, the EBBD basically deals with two security concepts: data encryption and data concealing. Hence, during the embedding process, secret data is encrypted using the simplified data encryption standard (S-DES algorithm to provide better security to the implemented system. The security of the method lies in selecting candidate AC-QTCs within each non-overlapping 8 × 8 sub-block using a pseudo random key. Basic performance of this steganographic technique verified through experiments on various existing MPEG-2 encoded videos over a wide range of embedded payload rates. Overall, the experimental results verify the excellent performance of the proposed EBBD with a better trade-off in terms of imperceptibility and payload, as compared with previous techniques while at the same time ensuring minimal bitrate increase and negligible degradation of PSNR values.

  5. Evidence-informed capacity building for setting health priorities in low- and middle-income countries: A framework and recommendations for further research.

    Science.gov (United States)

    Li, Ryan; Ruiz, Francis; Culyer, Anthony J; Chalkidou, Kalipso; Hofman, Karen J

    2017-01-01

    Priority-setting in health is risky and challenging, particularly in resource-constrained settings. It is not simply a narrow technical exercise, and involves the mobilisation of a wide range of capacities among stakeholders - not only the technical capacity to "do" research in economic evaluations. Using the Individuals, Nodes, Networks and Environment (INNE) framework, we identify those stakeholders, whose capacity needs will vary along the evidence-to-policy continuum. Policymakers and healthcare managers require the capacity to commission and use relevant evidence (including evidence of clinical and cost-effectiveness, and of social values); academics need to understand and respond to decision-makers' needs to produce relevant research. The health system at all levels will need institutional capacity building to incentivise routine generation and use of evidence. Knowledge brokers, including priority-setting agencies (such as England's National Institute for Health and Care Excellence, and Health Interventions and Technology Assessment Program, Thailand) and the media can play an important role in facilitating engagement and knowledge transfer between the various actors. Especially at the outset but at every step, it is critical that patients and the public understand that trade-offs are inherent in priority-setting, and careful efforts should be made to engage them, and to hear their views throughout the process. There is thus no single approach to capacity building; rather a spectrum of activities that recognises the roles and skills of all stakeholders. A range of methods, including formal and informal training, networking and engagement, and support through collaboration on projects, should be flexibly employed (and tailored to specific needs of each country) to support institutionalisation of evidence-informed priority-setting. Finally, capacity building should be a two-way process; those who build capacity should also attend to their own capacity

  6. Tensor Train Neighborhood Preserving Embedding

    Science.gov (United States)

    Wang, Wenqi; Aggarwal, Vaneet; Aeron, Shuchin

    2018-05-01

    In this paper, we propose a Tensor Train Neighborhood Preserving Embedding (TTNPE) to embed multi-dimensional tensor data into low dimensional tensor subspace. Novel approaches to solve the optimization problem in TTNPE are proposed. For this embedding, we evaluate novel trade-off gain among classification, computation, and dimensionality reduction (storage) for supervised learning. It is shown that compared to the state-of-the-arts tensor embedding methods, TTNPE achieves superior trade-off in classification, computation, and dimensionality reduction in MNIST handwritten digits and Weizmann face datasets.

  7. Research on embedded automobile collision avoidance system

    Directory of Open Access Journals (Sweden)

    TAO Feng

    2016-08-01

    Full Text Available Taking ARM embedded Linux operating system as the development platform,combined with AVR microcontroller,while optimizing the ranging algorithm and using air ultrasonic transducer,the measurement range of which can be up to 50 meter,this paper designs a high-precision,range far,low price,various models suitable automobile collision avoidance warning system.The system adopts Forlinx OK6410 development board for the master.AVR microcontroller is responsible for taking the data of traveling distance between vehicles,and with the ARM development board via RS232 communication transfers vehicle′s distance and speed information to the ARM development boards.The system uses the established collision avoidance model to get alarm information.Experiments show that the system can accurately send out alarm information within a certain range.It is innovative and practical.

  8. Polarizable Density Embedding

    DEFF Research Database (Denmark)

    Olsen, Jógvan Magnus Haugaard; Steinmann, Casper; Ruud, Kenneth

    2015-01-01

    We present a new QM/QM/MM-based model for calculating molecular properties and excited states of solute-solvent systems. We denote this new approach the polarizable density embedding (PDE) model and it represents an extension of our previously developed polarizable embedding (PE) strategy. The PDE...... model is a focused computational approach in which a core region of the system studied is represented by a quantum-chemical method, whereas the environment is divided into two other regions: an inner and an outer region. Molecules belonging to the inner region are described by their exact densities...

  9. Embedding Marketing in International Campus Development: Lessons from UK Universities

    Science.gov (United States)

    Lewis, Vicky

    2016-01-01

    This paper provides recommendations for embedding a market- and marketing-informed approach within the development process for a new international campus. It includes a brief outline of the current global profile of international campuses (as one form of transnational education) before highlighting the role of marketing at key stages of campus…

  10. High capacity fiber optic sensor networks using hybrid multiplexing techniques and their applications

    Science.gov (United States)

    Sun, Qizhen; Li, Xiaolei; Zhang, Manliang; Liu, Qi; Liu, Hai; Liu, Deming

    2013-12-01

    Fiber optic sensor network is the development trend of fiber senor technologies and industries. In this paper, I will discuss recent research progress on high capacity fiber sensor networks with hybrid multiplexing techniques and their applications in the fields of security monitoring, environment monitoring, Smart eHome, etc. Firstly, I will present the architecture of hybrid multiplexing sensor passive optical network (HSPON), and the key technologies for integrated access and intelligent management of massive fiber sensor units. Two typical hybrid WDM/TDM fiber sensor networks for perimeter intrusion monitor and cultural relics security are introduced. Secondly, we propose the concept of "Microstructure-Optical X Domin Refecltor (M-OXDR)" for fiber sensor network expansion. By fabricating smart micro-structures with the ability of multidimensional encoded and low insertion loss along the fiber, the fiber sensor network of simple structure and huge capacity more than one thousand could be achieved. Assisted by the WDM/TDM and WDM/FDM decoding methods respectively, we built the verification systems for long-haul and real-time temperature sensing. Finally, I will show the high capacity and flexible fiber sensor network with IPv6 protocol based hybrid fiber/wireless access. By developing the fiber optic sensor with embedded IPv6 protocol conversion module and IPv6 router, huge amounts of fiber optic sensor nodes can be uniquely addressed. Meanwhile, various sensing information could be integrated and accessed to the Next Generation Internet.

  11. Feature Genes Selection Using Supervised Locally Linear Embedding and Correlation Coefficient for Microarray Classification.

    Science.gov (United States)

    Xu, Jiucheng; Mu, Huiyu; Wang, Yun; Huang, Fangzhou

    2018-01-01

    The selection of feature genes with high recognition ability from the gene expression profiles has gained great significance in biology. However, most of the existing methods have a high time complexity and poor classification performance. Motivated by this, an effective feature selection method, called supervised locally linear embedding and Spearman's rank correlation coefficient (SLLE-SC 2 ), is proposed which is based on the concept of locally linear embedding and correlation coefficient algorithms. Supervised locally linear embedding takes into account class label information and improves the classification performance. Furthermore, Spearman's rank correlation coefficient is used to remove the coexpression genes. The experiment results obtained on four public tumor microarray datasets illustrate that our method is valid and feasible.

  12. Embedding Sustainability Instruction across Content Areas: best Classroom Practices from Informal Environmental Education

    Science.gov (United States)

    Clary, R. M.; Walker, R. M.; Wissehr, C.

    2017-12-01

    Environmental education (EE) facilitates students' scientific and environmental literacy, and addresses content areas including sustainability, ecology, and civic responsibility. However, U.S. science content compartmentalization and EE's interdisciplinary nature historically made it a fragmented curriculum within U.S. schools. To gain a better understanding of effective EE instruction that can be transferred to traditional K-12 classrooms, we researched the interactions between a recognized environmental residential camp and students and teachers from six participating schools using grounded theory methodology. Our research identified the residential learning center's objectives, methods of instruction, and objectives' alignment to the delivered curricula. Data generated included lesson plans, survey responses, and interviews. Students (n = 215) identified wilderness and geology activities as the activities they wanted to experience more; they also identified developing curiosity and a sense of discovery as the most meaningful. Whereas most student-identified meaningful experiences aligned with the center's curricular objectives within the optional units, categories emerged that were not explicitly targeted in the unit activities but were embedded throughout the curriculum in sustainable practices, data collection, and reflections. We propose that embedded activities and implicit instruction can be included across content areas within K-12 classrooms. Teacher modeling and implicit instruction will require minimal classroom time, and facilitate students' scientific and environmental literacy in topics such as sustainability and citizen responsibility.

  13. Why embedding Health ICT in daily practice is not that easy.

    NARCIS (Netherlands)

    Swinkels, I.

    2017-01-01

    Background: The prospects of information and communication technologies (ICT) seem endless. In daily life ICT is fully embedded, but in healthcare its uptake and use does not reach its potential yet despite high expectations. Policymakers promote Health ICT widely, e.g. by policy letters, investing

  14. A severe capacity limit in the consolidation of orientation information into visual short-term memory.

    Science.gov (United States)

    Becker, Mark W; Miller, James R; Liu, Taosheng

    2013-04-01

    Previous research has suggested that two color patches can be consolidated into visual short-term memory (VSTM) via an unlimited parallel process. Here we examined whether the same unlimited-capacity parallel process occurs for two oriented grating patches. Participants viewed two gratings that were presented briefly and masked. In blocks of trials, the gratings were presented either simultaneously or sequentially. In Experiments 1 and 2, the presentation of the stimuli was followed by a location cue that indicated the grating on which to base one's response. In Experiment 1, participants responded whether the target grating was oriented clockwise or counterclockwise with respect to vertical. In Experiment 2, participants indicated whether the target grating was oriented along one of the cardinal directions (vertical or horizontal) or was obliquely oriented. Finally, in Experiment 3, the location cue was replaced with a third grating that appeared at fixation, and participants indicated whether either of the two test gratings matched this probe. Despite the fact that these responses required fairly coarse coding of the orientation information, across all methods of responding we found superior performance for sequential over simultaneous presentations. These findings suggest that the consolidation of oriented gratings into VSTM is severely limited in capacity and differs from the consolidation of color information.

  15. Embedding Affective Learning Outcomes in Library Instruction

    Directory of Open Access Journals (Sweden)

    Ellysa Stern Cahoy

    2012-12-01

    Full Text Available While information literacy in higher education has long been focused on cognitive learning outcomes, attention must be paid to students’ affective, emotional needs throughout the research process. This article identifies models for embedding affective learning outcomes within information literacy instruction, and provides strategies to help librarians discover, articulate, and address students’ self-efficacy, motivation, emotions and attitudes. Worksheets to assist in creating affective learning outcomes are included to bring structure to an area of learning that is often challenging to articulate and measure. Also included in the article are the results of a recent survey of instruction librarians’ familiarity and inclusion of affective learning outcomes within teaching and learning initiatives.

  16. Improving emotion recognition systems by embedding cardiorespiratory coupling

    International Nuclear Information System (INIS)

    Valenza, Gaetano; Lanatá, Antonio; Scilingo, Enzo Pasquale

    2013-01-01

    This work aims at showing improved performances of an emotion recognition system embedding information gathered from cardiorespiratory (CR) coupling. Here, we propose a novel methodology able to robustly identify up to 25 regions of a two-dimensional space model, namely the well-known circumplex model of affect (CMA). The novelty of embedding CR coupling information in an autonomic nervous system-based feature space better reveals the sympathetic activations upon emotional stimuli. A CR synchrogram analysis was used to quantify such a coupling in terms of number of heartbeats per respiratory period. Physiological data were gathered from 35 healthy subjects emotionally elicited by means of affective pictures of the international affective picture system database. In this study, we finely detected five levels of arousal and five levels of valence as well as the neutral state, whose combinations were used for identifying 25 different affective states in the CMA plane. We show that the inclusion of the bivariate CR measures in a previously developed system based only on monovariate measures of heart rate variability, respiration dynamics and electrodermal response dramatically increases the recognition accuracy of a quadratic discriminant classifier, obtaining more than 90% of correct classification per class. Finally, we propose a comprehensive description of the CR coupling during sympathetic elicitation adapting an existing theoretical nonlinear model with external driving. The theoretical idea behind this model is that the CR system is comprised of weakly coupled self-sustained oscillators that, when exposed to an external perturbation (i.e. sympathetic activity), becomes synchronized and less sensible to input variations. Given the demonstrated role of the CR coupling, this model can constitute a general tool which is easily embedded in other model-based emotion recognition systems. (paper)

  17. Phylogenetic trees and Euclidean embeddings.

    Science.gov (United States)

    Layer, Mark; Rhodes, John A

    2017-01-01

    It was recently observed by de Vienne et al. (Syst Biol 60(6):826-832, 2011) that a simple square root transformation of distances between taxa on a phylogenetic tree allowed for an embedding of the taxa into Euclidean space. While the justification for this was based on a diffusion model of continuous character evolution along the tree, here we give a direct and elementary explanation for it that provides substantial additional insight. We use this embedding to reinterpret the differences between the NJ and BIONJ tree building algorithms, providing one illustration of how this embedding reflects tree structures in data.

  18. The design of infrared information collection circuit based on embedded technology

    Science.gov (United States)

    Liu, Haoting; Zhang, Yicong

    2013-07-01

    S3C2410 processor is a 16/32 bit RISC embedded processor which based on ARM920T core and AMNA bus, and mainly for handheld devices, and high cost, low-power applications. This design introduces a design plan of the PIR sensor system, circuit and its assembling, debugging. The Application Circuit of the passive PIR alarm uses the invisibility of the infrared radiation well into the alarm system, and in order to achieve the anti-theft alarm and security purposes. When the body goes into the range of PIR sensor detection, sensors will detect heat sources and then the sensor will output a weak signal. The Signal should be amplified, compared and delayed; finally light emitting diodes emit light, playing the role of a police alarm.

  19. Parametric embedding for class visualization.

    Science.gov (United States)

    Iwata, Tomoharu; Saito, Kazumi; Ueda, Naonori; Stromsten, Sean; Griffiths, Thomas L; Tenenbaum, Joshua B

    2007-09-01

    We propose a new method, parametric embedding (PE), that embeds objects with the class structure into a low-dimensional visualization space. PE takes as input a set of class conditional probabilities for given data points and tries to preserve the structure in an embedding space by minimizing a sum of Kullback-Leibler divergences, under the assumption that samples are generated by a gaussian mixture with equal covariances in the embedding space. PE has many potential uses depending on the source of the input data, providing insight into the classifier's behavior in supervised, semisupervised, and unsupervised settings. The PE algorithm has a computational advantage over conventional embedding methods based on pairwise object relations since its complexity scales with the product of the number of objects and the number of classes. We demonstrate PE by visualizing supervised categorization of Web pages, semisupervised categorization of digits, and the relations of words and latent topics found by an unsupervised algorithm, latent Dirichlet allocation.

  20. 76 FR 6694 - Disclosure of Medical Information to the Surrogate of a Patient Who Lacks Decision-Making Capacity

    Science.gov (United States)

    2011-02-08

    ... pertaining to the release of information from VA records. We are adding definitions of ``decision-making... lacks decision-making capacity.'' Because the existing definition of ``surrogate'' is substantively... sections. 0 2. Amend Sec. 1.460 by adding, in alphabetical order, the definitions of ``decision-making...

  1. Brain oscillatory substrates of visual short-term memory capacity.

    Science.gov (United States)

    Sauseng, Paul; Klimesch, Wolfgang; Heise, Kirstin F; Gruber, Walter R; Holz, Elisa; Karim, Ahmed A; Glennon, Mark; Gerloff, Christian; Birbaumer, Niels; Hummel, Friedhelm C

    2009-11-17

    The amount of information that can be stored in visual short-term memory is strictly limited to about four items. Therefore, memory capacity relies not only on the successful retention of relevant information but also on efficient suppression of distracting information, visual attention, and executive functions. However, completely separable neural signatures for these memory capacity-limiting factors remain to be identified. Because of its functional diversity, oscillatory brain activity may offer a utile solution. In the present study, we show that capacity-determining mechanisms, namely retention of relevant information and suppression of distracting information, are based on neural substrates independent of each other: the successful maintenance of relevant material in short-term memory is associated with cross-frequency phase synchronization between theta (rhythmical neural activity around 5 Hz) and gamma (> 50 Hz) oscillations at posterior parietal recording sites. On the other hand, electroencephalographic alpha activity (around 10 Hz) predicts memory capacity based on efficient suppression of irrelevant information in short-term memory. Moreover, repetitive transcranial magnetic stimulation at alpha frequency can modulate short-term memory capacity by influencing the ability to suppress distracting information. Taken together, the current study provides evidence for a double dissociation of brain oscillatory correlates of visual short-term memory capacity.

  2. Cross functional organisational embedded system development

    OpenAIRE

    Lennon, Sophie

    2015-01-01

    peer-reviewed Embedded system development is continuing to grow. Medical, automotive and Internet of Things are just some of the market segments. There is a tight coupling between hardware and software when developing an embedded system, often needing to meet strict performance targets, standards requirements and aggressive schedules. Embedded software developers need to consider hardware requirements in far greater detail as they can have a significant impact on the quality and value of t...

  3. Laser assisted embedding of nanoparticles into metallic materials

    International Nuclear Information System (INIS)

    Lin Dong; Suslov, Sergey; Ye Chang; Liao Yiliang; Liu, C. Richard; Cheng, Gary J.

    2012-01-01

    This paper reports a methodology of half-embedding nanoparticles into metallic materials. Transparent and opaque nanoparticles are chosen to demonstrate the process of laser assisted nanoparticle embedding. Dip coating method is used to coat transparent or opaque nanoparticle on the surface of metallic material. Nanoparticles are embedded into substrate by laser irradiation. In this study, the mechanism and process of nanoparticle embedding are investigated. It is found both transparent and opaque nanoparticles embedding are with high densities and good uniformities.

  4. Micro Information Systems

    DEFF Research Database (Denmark)

    Ulslev Pedersen, Rasmus; Kühn Pedersen, Mogens

    2014-01-01

    such as medical and manufacturing. These new sensor applications have implications for information systems (IS) and, the authors visualize this new class of information systems as fractals growing from an established class of systems; namely that of information systems (IS). The identified applications...... and implications are used as an empirical basis for creating a model for these small new information systems. Such sensor systems are called embedded systems in the technical sciences, and the authors want to couple it with general IS. They call the merger of these two important research areas (IS and embedded...... systems) for micro information systems (micro-IS). It is intended as a new research field within IS research. An initial framework model is established, which seeks to capture both the possibilities and constraints of this new paradigm, while looking simultaneously at the fundamental IS and ICT aspects...

  5. Umbrella project for Bangladesh: strengthening NGO capacity and linkages to improve reproductive health service and information. RAS/98/P55.

    Science.gov (United States)

    1999-06-01

    In Bangladesh, the UN Population Fund is working to strengthen nongovernmental organization (NGO) capacity and linkages to improve reproductive health services and information. Specifically, the aim is to strengthen the technical and human resource capacity of participating NGOs and the functional linkages between national NGOs and relevant government agencies to help harmonize and standardize the delivery of reproductive health information and services. This umbrella project collaborates with RHI-participating NGOs in a policy paper on adolescent reproductive health, and will maintain contact with the regional dimension project to collaborate its activities. Programs implemented by partner NGOs are being reviewed and monitored, and linkages among national NGOs and government agencies are being developed. The main activities of the project are enumerated.

  6. Learning Word Embeddings with Chi-Square Weights for Healthcare Tweet Classification

    Directory of Open Access Journals (Sweden)

    Sicong Kuang

    2017-08-01

    Full Text Available Twitter is a popular source for the monitoring of healthcare information and public disease. However, there exists much noise in the tweets. Even though appropriate keywords appear in the tweets, they do not guarantee the identification of a truly health-related tweet. Thus, the traditional keyword-based classification task is largely ineffective. Algorithms for word embeddings have proved to be useful in many natural language processing (NLP tasks. We introduce two algorithms based on an existing word embedding learning algorithm: the continuous bag-of-words model (CBOW. We apply the proposed algorithms to the task of recognizing healthcare-related tweets. In the CBOW model, the vector representation of words is learned from their contexts. To simplify the computation, the context is represented by an average of all words inside the context window. However, not all words in the context window contribute equally to the prediction of the target word. Greedily incorporating all the words in the context window will largely limit the contribution of the useful semantic words and bring noisy or irrelevant words into the learning process, while existing word embedding algorithms also try to learn a weighted CBOW model. Their weights are based on existing pre-defined syntactic rules while ignoring the task of the learned embedding. We propose learning weights based on the words’ relative importance in the classification task. Our intuition is that such learned weights place more emphasis on words that have comparatively more to contribute to the later task. We evaluate the embeddings learned from our algorithms on two healthcare-related datasets. The experimental results demonstrate that embeddings learned from the proposed algorithms outperform existing techniques by a relative accuracy improvement of over 9%.

  7. Projective embeddings of homogeneous spaces with small boundary

    International Nuclear Information System (INIS)

    Arzhantsev, Ivan V

    2009-01-01

    We study open equivariant projective embeddings of homogeneous spaces such that the complement of the open orbit has codimension at least 2. We establish a criterion for the existence of such an embedding, prove that the set of isomorphism classes of such embeddings is finite, and give a construction of the embeddings in terms of Geometric Invariant Theory. A generalization of Cox's construction and the theory of bunched rings enable us to describe in combinatorial terms the basic geometric properties of embeddings with small boundary

  8. Time-Scale Invariant Audio Data Embedding

    Directory of Open Access Journals (Sweden)

    Mansour Mohamed F

    2003-01-01

    Full Text Available We propose a novel algorithm for high-quality data embedding in audio. The algorithm is based on changing the relative length of the middle segment between two successive maximum and minimum peaks to embed data. Spline interpolation is used to change the lengths. To ensure smooth monotonic behavior between peaks, a hybrid orthogonal and nonorthogonal wavelet decomposition is used prior to data embedding. The possible data embedding rates are between 20 and 30 bps. However, for practical purposes, we use repetition codes, and the effective embedding data rate is around 5 bps. The algorithm is invariant after time-scale modification, time shift, and time cropping. It gives high-quality output and is robust to mp3 compression.

  9. Quantum capacity of Pauli channels with memory

    International Nuclear Information System (INIS)

    Huang Peng; He Guangqiang; Lu Yuan; Zeng Guihua

    2011-01-01

    The amount of coherent quantum information that can be reliably transmitted down the memory Pauli channels with Markovian correlated noise is investigated. Two methods for evaluating the quantum capacity of the memory Pauli channels are proposed to try to trace the memory effect on the transmissions of quantum information. We show that the evaluation of quantum capacity can be reduced to the calculation of the initial memory state of each successive transmission. Furthermore, we derive quantum capacities of the memory phase flip channel, bit flip channel and bit-phase flip channel. Also, a lower bound of the quantum capacity of the memory depolarizing channel is obtained. An increase of the degree of memory of the channels has a positive effect on the increase of their quantum capacities.

  10. Cumulative Impact Assessment: Approaching Environmental Capacity in Development Area Using Environmental Impact Assessment Information

    Science.gov (United States)

    Cho, N.; Lee, M. J.; Maeng, J. H.

    2017-12-01

    Environmental impact assessment estimates the impact of development as a business unit and establishes mitigation plan. If the development is done, its economic effects can spread to the nearby areas. So that various developments can be distributed at different time intervals. The impact of the new developments can be combined with existing environmental impacts and can have a larger impact. That is, Cumulative impact assessment is needed to consider the environmental capacity of the Nearby area. Cumulative impact assessments require policy tools such as environmental impact assessment information and cumulative impact estimation models. In Korea, environmental information (water quality, air quality, etc.) of the development site is measured for environmental impact assessment and monitored for a certain period (generally 5 years) after the project. In addition, by constructing the environmental information as a spatial database, it is possible to express the environmental impact on a regional basis spatially and to intuitively use it for development site selection. Utilizing a composite model of environmental impact assessment information and Remote Sensing data for cumulative impact estimation, That can be used as a policy decision support tool that provides quantitative information for development area management, such as time series effect and sprawl phenomenon.

  11. The Activation of Embedded Words in Spoken Word Recognition.

    Science.gov (United States)

    Zhang, Xujin; Samuel, Arthur G

    2015-01-01

    The current study investigated how listeners understand English words that have shorter words embedded in them. A series of auditory-auditory priming experiments assessed the activation of six types of embedded words (2 embedded positions × 3 embedded proportions) under different listening conditions. Facilitation of lexical decision responses to targets (e.g., pig) associated with words embedded in primes (e.g., hamster ) indexed activation of the embedded words (e.g., ham ). When the listening conditions were optimal, isolated embedded words (e.g., ham ) primed their targets in all six conditions (Experiment 1a). Within carrier words (e.g., hamster ), the same set of embedded words produced priming only when they were at the beginning or comprised a large proportion of the carrier word (Experiment 1b). When the listening conditions were made suboptimal by expanding or compressing the primes, significant priming was found for isolated embedded words (Experiment 2a), but no priming was produced when the carrier words were compressed/expanded (Experiment 2b). Similarly, priming was eliminated when the carrier words were presented with one segment replaced by noise (Experiment 3). When cognitive load was imposed, priming for embedded words was again found when they were presented in isolation (Experiment 4a), but not when they were embedded in the carrier words (Experiment 4b). The results suggest that both embedded position and proportion play important roles in the activation of embedded words, but that such activation only occurs under unusually good listening conditions.

  12. A novel quantum steganography scheme for color images

    Science.gov (United States)

    Li, Panchi; Liu, Xiande

    In quantum image steganography, embedding capacity and security are two important issues. This paper presents a novel quantum steganography scheme using color images as cover images. First, the secret information is divided into 3-bit segments, and then each 3-bit segment is embedded into the LSB of one color pixel in the cover image according to its own value and using Gray code mapping rules. Extraction is the inverse of embedding. We designed the quantum circuits that implement the embedding and extracting process. The simulation results on a classical computer show that the proposed scheme outperforms several other existing schemes in terms of embedding capacity and security.

  13. Embedding Complementarity in HCI Methods and Techniques

    DEFF Research Database (Denmark)

    Nielsen, Janni; Yssing, Carsten; Tweddell Levinsen, Karin

    Differences in cultural contexts constitute differences in cognition, and research has shown that different cultures may use different cognitive tools for perception and reasoning. The cultural embeddings are significant in relation to HCI, because the cultural context is also embedded in the tec......Differences in cultural contexts constitute differences in cognition, and research has shown that different cultures may use different cognitive tools for perception and reasoning. The cultural embeddings are significant in relation to HCI, because the cultural context is also embedded...... the HCI paradigm in system development....

  14. Graphical Model Debugger Framework for Embedded Systems

    DEFF Research Database (Denmark)

    Zeng, Kebin

    2010-01-01

    Model Driven Software Development has offered a faster way to design and implement embedded real-time software by moving the design to a model level, and by transforming models to code. However, the testing of embedded systems has remained at the code level. This paper presents a Graphical Model...... Debugger Framework, providing an auxiliary avenue of analysis of system models at runtime by executing generated code and updating models synchronously, which allows embedded developers to focus on the model level. With the model debugger, embedded developers can graphically test their design model...

  15. Building research capacity to inform practical policymaking | IDRC ...

    International Development Research Centre (IDRC) Digital Library (Canada)

    2017-08-17

    Aug 17, 2017 ... IDRC is committed to supporting cutting-edge research led by developing country experts to create lasting change. Building strong partnerships with regional researchers and organizations through research support and capacity building is integral to the success of this approach. The African Economic ...

  16. Smart multicore embedded systems

    CERN Document Server

    Bertels, Koen; Karlsson, Sven; Pacull, François

    2014-01-01

    This book provides a single-source reference to the state-of-the-art of high-level programming models and compilation tool-chains for embedded system platforms. The authors address challenges faced by programmers developing software to implement parallel applications in embedded systems, where very often they are forced to rewrite sequential programs into parallel software, taking into account all the low level features and peculiarities of the underlying platforms. Readers will benefit from these authors’ approach, which takes into account both the application requirements and the platform specificities of various embedded systems from different industries. Parallel programming tool-chains are described that take as input parameters both the application and the platform model, then determine relevant transformations and mapping decisions on the concrete platform, minimizing user intervention and hiding the difficulties related to the correct and efficient use of memory hierarchy and low level code generati...

  17. Energy Efficiency of Task Allocation for Embedded JPEG Systems

    Directory of Open Access Journals (Sweden)

    Yang-Hsin Fan

    2014-01-01

    Full Text Available Embedded system works everywhere for repeatedly performing a few particular functionalities. Well-known products include consumer electronics, smart home applications, and telematics device, and so forth. Recently, developing methodology of embedded systems is applied to conduct the design of cloud embedded system resulting in the applications of embedded system being more diverse. However, the more energy consumes result from the more embedded system works. This study presents hyperrectangle technology (HT to embedded system for obtaining energy saving. The HT adopts drift effect to construct embedded systems with more hardware circuits than software components or vice versa. It can fast construct embedded system with a set of hardware circuits and software components. Moreover, it has a great benefit to fast explore energy consumption for various embedded systems. The effects are presented by assessing a JPEG benchmarks. Experimental results demonstrate that the HT, respectively, achieves the energy saving by 29.84%, 2.07%, and 68.80% on average to GA, GHO, and Lin.

  18. Energy efficiency of task allocation for embedded JPEG systems.

    Science.gov (United States)

    Fan, Yang-Hsin; Wu, Jan-Ou; Wang, San-Fu

    2014-01-01

    Embedded system works everywhere for repeatedly performing a few particular functionalities. Well-known products include consumer electronics, smart home applications, and telematics device, and so forth. Recently, developing methodology of embedded systems is applied to conduct the design of cloud embedded system resulting in the applications of embedded system being more diverse. However, the more energy consumes result from the more embedded system works. This study presents hyperrectangle technology (HT) to embedded system for obtaining energy saving. The HT adopts drift effect to construct embedded systems with more hardware circuits than software components or vice versa. It can fast construct embedded system with a set of hardware circuits and software components. Moreover, it has a great benefit to fast explore energy consumption for various embedded systems. The effects are presented by assessing a JPEG benchmarks. Experimental results demonstrate that the HT, respectively, achieves the energy saving by 29.84%, 2.07%, and 68.80% on average to GA, GHO, and Lin.

  19. The Activation of Embedded Words in Spoken Word Recognition

    Science.gov (United States)

    Zhang, Xujin; Samuel, Arthur G.

    2015-01-01

    The current study investigated how listeners understand English words that have shorter words embedded in them. A series of auditory-auditory priming experiments assessed the activation of six types of embedded words (2 embedded positions × 3 embedded proportions) under different listening conditions. Facilitation of lexical decision responses to targets (e.g., pig) associated with words embedded in primes (e.g., hamster) indexed activation of the embedded words (e.g., ham). When the listening conditions were optimal, isolated embedded words (e.g., ham) primed their targets in all six conditions (Experiment 1a). Within carrier words (e.g., hamster), the same set of embedded words produced priming only when they were at the beginning or comprised a large proportion of the carrier word (Experiment 1b). When the listening conditions were made suboptimal by expanding or compressing the primes, significant priming was found for isolated embedded words (Experiment 2a), but no priming was produced when the carrier words were compressed/expanded (Experiment 2b). Similarly, priming was eliminated when the carrier words were presented with one segment replaced by noise (Experiment 3). When cognitive load was imposed, priming for embedded words was again found when they were presented in isolation (Experiment 4a), but not when they were embedded in the carrier words (Experiment 4b). The results suggest that both embedded position and proportion play important roles in the activation of embedded words, but that such activation only occurs under unusually good listening conditions. PMID:25593407

  20. Costs and benefits of embedded generation

    International Nuclear Information System (INIS)

    1999-11-01

    This project sought to evaluate the costs and benefits of embedded generation in the light of the UK government's consultation paper on the future of green generation, the government's aim to increase the levels of generation from renewable energy sources and cogeneration, the current Review of the Electricity Trading Arrangements, and the form of the Distribution Price Control. Definitions are given for embedded, centrally dispatched, and pooled generation, and licensed suppliers, and commercial and economic values. The commercial and economic value of embedded generation is examined in terms of generation prices, costs to electrical suppliers, losses (electrical, transmission, distribution), and effects on the national grid and distribution network. Diagrams showing the cost elements of trading through the Pool and the elements that are avoided by non-Pool embedded generator trading are presented

  1. ZnO nanowire-based nano-floating gate memory with Pt nanocrystals embedded in Al2O3 gate oxides

    International Nuclear Information System (INIS)

    Yeom, Donghyuk; Kang, Jeongmin; Lee, Myoungwon; Jang, Jaewon; Yun, Junggwon; Jeong, Dong-Young; Yoon, Changjoon; Koo, Jamin; Kim, Sangsig

    2008-01-01

    The memory characteristics of ZnO nanowire-based nano-floating gate memory (NFGM) with Pt nanocrystals acting as the floating gate nodes were investigated in this work. Pt nanocrystals were embedded between Al 2 O 3 tunneling and control oxide layers deposited on ZnO nanowire channels. For a representative ZnO nanowire-based NFGM with embedded Pt nanocrystals, a threshold voltage shift of 3.8 V was observed in its drain current versus gate voltage (I DS -V GS ) measurements for a double sweep of the gate voltage, revealing that the deep effective potential wells built into the nanocrystals provide our NFGM with a large charge storage capacity. Details of the charge storage effect observed in this memory device are discussed in this paper

  2. Embedding initial data for black hole collisions

    OpenAIRE

    Romano, Joseph D.; Price, Richard H.

    1994-01-01

    We discuss isometric embedding diagrams for the visualization of initial data for the problem of the head-on collision of two black holes. The problem of constructing the embedding diagrams is explicitly presented for the best studied initial data, the Misner geometry. We present a partial solution of the embedding diagrams and discuss issues related to completing the solution.

  3. Modeling of Embedded Human Systems

    Science.gov (United States)

    2013-07-01

    ISAT study [7] for DARPA in 20051 concretized the notion of an embedded human, who is a necessary component of the system. The proposed work integrates...Technology, IEEE Transactions on, vol. 16, no. 2, pp. 229–244, March 2008. [7] C. J. Tomlin and S. S. Sastry, “Embedded humans,” tech. rep., DARPA ISAT

  4. Investigation of protein adsorption performance of Ni2+-attached diatomite particles embedded in composite monolithic cryogels.

    Science.gov (United States)

    Ünlü, Nuri; Ceylan, Şeyda; Erzengin, Mahmut; Odabaşı, Mehmet

    2011-08-01

    As a low-cost natural adsorbent, diatomite (DA) (2 μm) has several advantages including high surface area, chemical reactivity, hydrophilicity and lack of toxicity. In this study, the protein adsorption performance of supermacroporous composite cryogels embedded with Ni(2+)-attached DA particles (Ni(2+)-ADAPs) was investigated. Supermacroporous poly(2-hydroxyethyl methacrylate) (PHEMA)-based monolithic composite cryogel column embedded with Ni(2+)-ADAPs was prepared by radical cryo-copolymerization of 2-hydroxyethyl methacrylate (HEMA) with N,N'-methylene-bis-acrylamide (MBAAm) as cross-linker directly in a plastic syringe for affinity purification of human serum albumin (HSA) both from aqueous solutions and human serum. The chemical composition and surface area of DA was determined by XRF and BET method, respectively. The characterization of composite cryogel was investigated by SEM. The effect of pH, and embedded Ni(2+)-ADAPs amount, initial HSA concentration, temperature and flow rate on adsorption were studied. The maximum amount of HSA adsorption from aqueous solution at pH 8.0 phosphate buffer was very high (485.15 mg/g DA). It was observed that HSA could be repeatedly adsorbed and desorbed to the embedded Ni(2+)-ADAPs in poly(2-hydroxyethyl methacrylate) composite cryogel without significant loss of adsorption capacity. The efficiency of albumin adsorption from human serum before and after albumin adsorption was also investigated with SDS-PAGE analyses. Copyright © 2011 WILEY-VCH Verlag GmbH & Co. KGaA, Weinheim.

  5. Methodology and Supporting Toolset Advancing Embedded Systems Quality

    DEFF Research Database (Denmark)

    Berger, Michael Stübert; Soler, José; Brewka, Lukasz Jerzy

    2013-01-01

    Software quality is of primary importance in the development of embedded systems that are often used in safety-critical applications. Moreover, as the life cycle of embedded products becomes increasingly tighter, productivity and quality are simultaneously required and closely interrelated towards...... delivering competitive products. In this context, the MODUS (Methodology and supporting toolset advancing embedded systems quality) project aims to provide a pragmatic and viable solution that will allow SMEs to substantially improve their positioning in the embedded-systems development market. This paper...... will describe the MODUS project with focus on the technical methodologies that will be developed advancing embedded system quality....

  6. Quantum thetas on noncommutative Td with general embeddings

    International Nuclear Information System (INIS)

    Chang-Young, Ee; Kim, Hoil

    2008-01-01

    In this paper, we construct quantum theta functions over noncommutative T d with general embeddings. Manin has constructed quantum theta functions from the lattice embedding into vector space x finite group. We extend Manin's construction of quantum thetas to the case of general embedding of vector space x lattice x torus. It turns out that only for the vector space part of the embedding there exists the holomorphic theta vector, while for the lattice part there does not. Furthermore, the so-called quantum translations from embedding into the lattice part become non-additive, while those from the vector space part are additive

  7. AdS2 models in an embedding superspace

    International Nuclear Information System (INIS)

    McKeon, D.G.C.; Sherry, T.N.

    2003-01-01

    An embedding superspace, whose bosonic part is the flat (2+1)-dimensional embedding space for AdS 2 , is introduced. Superfields and several supersymmetric models are examined in the embedded AdS 2 superspace

  8. Novel photodefined polymer-embedded vias for silicon interposers

    International Nuclear Information System (INIS)

    Thadesar, Paragkumar A; Bakir, Muhannad S

    2013-01-01

    This paper describes the fabrication and characterization of novel photodefined polymer-embedded vias for silicon interposers. The fabricated polymer-embedded vias can help obtain ∼3.8× reduction in via-to-via capacitance as well as a reduction in insertion loss compared to TSVs with a silicon dioxide liner. Polymer-embedded vias 100 μm in diameter, 270 μm tall and at 250 μm pitch were fabricated. Resistance and leakage measurements were performed for the fabricated polymer-embedded vias. The average value of the measured resistance for 20 polymer-embedded vias is 2.54 mΩ and the maximum measured via-to-via leakage current for 10 pairs of polymer-embedded vias is 80.8 pA for an applied voltage of 200 V. (paper)

  9. Positron confinement in embedded lithium nanoclusters

    Science.gov (United States)

    van Huis, M. A.; van Veen, A.; Schut, H.; Falub, C. V.; Eijt, S. W.; Mijnarends, P. E.; Kuriplach, J.

    2002-02-01

    Quantum confinement of positrons in nanoclusters offers the opportunity to obtain detailed information on the electronic structure of nanoclusters by application of positron annihilation spectroscopy techniques. In this work, positron confinement is investigated in lithium nanoclusters embedded in monocrystalline MgO. These nanoclusters were created by means of ion implantation and subsequent annealing. It was found from the results of Doppler broadening positron beam analysis that approximately 92% of the implanted positrons annihilate in lithium nanoclusters rather than in the embedding MgO, while the local fraction of lithium at the implantation depth is only 1.3 at. %. The results of two-dimensional angular correlation of annihilation radiation confirm the presence of crystalline bulk lithium. The confinement of positrons is ascribed to the difference in positron affinity between lithium and MgO. The nanocluster acts as a potential well for positrons, where the depth of the potential well is equal to the difference in the positron affinities of lithium and MgO. These affinities were calculated using the linear muffin-tin orbital atomic sphere approximation method. This yields a positronic potential step at the MgO||Li interface of 1.8 eV using the generalized gradient approximation and 2.8 eV using the insulator model.

  10. Isometric embeddings in cosmology and astrophysics

    Indian Academy of Sciences (India)

    embedding theory, a given spacetime (or 'brane') is embedded in a higher- ..... If one recalls that the motivation (at least in part) for non-compact extra ... to successfully embed (apparently perfect fluid) astrophysical models, we typically need to.

  11. Embedded Hyperchaotic Generators: A Comparative Analysis

    Science.gov (United States)

    Sadoudi, Said; Tanougast, Camel; Azzaz, Mohamad Salah; Dandache, Abbas

    In this paper, we present a comparative analysis of FPGA implementation performances, in terms of throughput and resources cost, of five well known autonomous continuous hyperchaotic systems. The goal of this analysis is to identify the embedded hyperchaotic generator which leads to designs with small logic area cost, satisfactory throughput rates, low power consumption and low latency required for embedded applications such as secure digital communications between embedded systems. To implement the four-dimensional (4D) chaotic systems, we use a new structural hardware architecture based on direct VHDL description of the forth order Runge-Kutta method (RK-4). The comparative analysis shows that the hyperchaotic Lorenz generator provides attractive performances compared to that of others. In fact, its hardware implementation requires only 2067 CLB-slices, 36 multipliers and no block RAMs, and achieves a throughput rate of 101.6 Mbps, at the output of the FPGA circuit, at a clock frequency of 25.315 MHz with a low latency time of 316 ns. Consequently, these good implementation performances offer to the embedded hyperchaotic Lorenz generator the advantage of being the best candidate for embedded communications applications.

  12. Embracing the Future: Embedding Digital Repositories in Higher Education Institutions. Research Brief

    Science.gov (United States)

    Hoorens, Stijn; van Dijk, Lidia Villalba; van Stolk, Christian

    2009-01-01

    This briefing paper captures the key findings and recommendations of a study commissioned by the Joint Information Systems Committee on aspects of the strategic commitment of institutions to repository sustainability. This project, labelled EMBRACE (EMBedding Repositories And Consortial Enhancement), is aimed at enhancing the functionality,…

  13. A Framework of Secured Embedding Scheme Using Vector Discrete Wavelet Transformation and Lagrange Interpolation

    Directory of Open Access Journals (Sweden)

    Maheswari Subramanian

    2018-01-01

    Full Text Available Information hiding techniques have a significant role in recent application areas. Steganography is the embedding of information within an innocent cover work in a way which cannot be detected by any person without accessing the steganographic key. The proposed work uses a steganographic scheme for useful information with the help of human skin tone regions as cover image. The proposed algorithm has undergone Lagrange interpolation encryption for enhancement of the security of the hidden information. First, the skin tone regions are identified by using YCbCr color space which can be used as a cover image. Image pixels which belong to the skin regions are used to carry more secret bits, and the secret information is hidden in both horizontal and vertical sequences of the skin areas of the cover image. The secret information will hide behind the human skin regions rather than other objects in the same image because the skin pixels have high intensity value. The performance of embedding is done and is quite invisible by the vector discrete wavelet transformation (VDWT technique. A new Lagrange interpolation-based encryption method is introduced to achieve high security of the hidden information with higher payload and better visual quality.

  14. The art of designing embedded systems

    CERN Document Server

    Ganssle, Jack G

    2000-01-01

    Art of Designing Embedded Systems is apart primer and part reference, aimed at practicing embedded engineers, whether working on the code or the hardware design. Embedded systems suffer from a chaotic, ad hoc development process. This books lays out a very simple seven-step plan to get firmware development under control. There are no formal methodologies to master; the ideas are immediately useful. Most designers are unaware that code complexity grows faster than code size. This book shows a number of ways to linearize the complexity/size curve and get products out faster

  15. Embedded Solenoid Transformer for Power Conversion

    DEFF Research Database (Denmark)

    2015-01-01

    A resonant power converter for operation in the radio frequency range, preferably in the VHF, comprises at least one PCB-embedded transformer. The transformer is configured for radio frequency operation and comprises a printed circuit board defining a horizontal plane, the printed circuit board...... comprising at least two horizontal conductive layers separated by an isolating layer, a first embedded solenoid forming a primary winding of the transformer and a second embedded solenoid being arranged parallel to the first solenoid and forming a secondary winding of the transformer, wherein the first...

  16. Bootstrap embedding: An internally consistent fragment-based method

    Energy Technology Data Exchange (ETDEWEB)

    Welborn, Matthew; Tsuchimochi, Takashi; Van Voorhis, Troy [Department of Chemistry, Massachusetts Institute of Technology, 77 Massachusetts Avenue, Cambridge, Massachusetts 02139 (United States)

    2016-08-21

    Strong correlation poses a difficult problem for electronic structure theory, with computational cost scaling quickly with system size. Fragment embedding is an attractive approach to this problem. By dividing a large complicated system into smaller manageable fragments “embedded” in an approximate description of the rest of the system, we can hope to ameliorate the steep cost of correlated calculations. While appealing, these methods often converge slowly with fragment size because of small errors at the boundary between fragment and bath. We describe a new electronic embedding method, dubbed “Bootstrap Embedding,” a self-consistent wavefunction-in-wavefunction embedding theory that uses overlapping fragments to improve the description of fragment edges. We apply this method to the one dimensional Hubbard model and a translationally asymmetric variant, and find that it performs very well for energies and populations. We find Bootstrap Embedding converges rapidly with embedded fragment size, overcoming the surface-area-to-volume-ratio error typical of many embedding methods. We anticipate that this method may lead to a low-scaling, high accuracy treatment of electron correlation in large molecular systems.

  17. Wireless and embedded carbon nanotube networks for damage detection in concrete structures

    International Nuclear Information System (INIS)

    Saafi, Mohamed

    2009-01-01

    Concrete structures undergo an uncontrollable damage process manifesting in the form of cracks due to the coupling of fatigue loading and environmental effects. In order to achieve long-term durability and performance, continuous health monitoring systems are needed to make critical decisions regarding operation, maintenance and repairs. Recent advances in nanostructured materials such as carbon nanotubes have opened the door for new smart and advanced sensing materials that could effectively be used in health monitoring of structures where wireless and real time sensing could provide information on damage development. In this paper, carbon nanotube networks were embedded into a cement matrix to develop an in situ wireless and embedded sensor for damage detection in concrete structures. By wirelessly measuring the change in the electrical resistance of the carbon nanotube networks, the progress of damage can be detected and monitored. As a proof of concept, wireless cement-carbon nanotube sensors were embedded into concrete beams and subjected to monotonic and cyclic loading to evaluate the effect of damage on their response. Experimental results showed that the wireless response of the embedded nanotube sensors changes due to the formation of cracks during loading. In addition, the nanotube sensors were able to detect the initiation of damage at an early stage of loading.

  18. Wireless and embedded carbon nanotube networks for damage detection in concrete structures

    Science.gov (United States)

    Saafi, Mohamed

    2009-09-01

    Concrete structures undergo an uncontrollable damage process manifesting in the form of cracks due to the coupling of fatigue loading and environmental effects. In order to achieve long-term durability and performance, continuous health monitoring systems are needed to make critical decisions regarding operation, maintenance and repairs. Recent advances in nanostructured materials such as carbon nanotubes have opened the door for new smart and advanced sensing materials that could effectively be used in health monitoring of structures where wireless and real time sensing could provide information on damage development. In this paper, carbon nanotube networks were embedded into a cement matrix to develop an in situ wireless and embedded sensor for damage detection in concrete structures. By wirelessly measuring the change in the electrical resistance of the carbon nanotube networks, the progress of damage can be detected and monitored. As a proof of concept, wireless cement-carbon nanotube sensors were embedded into concrete beams and subjected to monotonic and cyclic loading to evaluate the effect of damage on their response. Experimental results showed that the wireless response of the embedded nanotube sensors changes due to the formation of cracks during loading. In addition, the nanotube sensors were able to detect the initiation of damage at an early stage of loading.

  19. Multithreading for Embedded Reconfigurable Multicore Systems

    NARCIS (Netherlands)

    Zaykov, P.G.

    2014-01-01

    In this dissertation, we address the problem of performance efficient multithreading execution on heterogeneous multicore embedded systems. By heterogeneous multicore embedded systems we refer to those, which have real-time requirements and consist of processor tiles with General Purpose Processor

  20. Multithreading for embedded reconfigurable multicore systems

    NARCIS (Netherlands)

    Zaykov, P.G.

    2014-01-01

    In this dissertation, we address the problem of performance efficient multithreading execution on heterogeneous multicore embedded systems. By heterogeneous multicore embedded systems we refer to those, which have real-time requirements and consist of processor tiles with General Purpose Processor

  1. Heterogeneous Embedded Real-Time Systems Environment

    Science.gov (United States)

    2003-12-01

    AFRL-IF-RS-TR-2003-290 Final Technical Report December 2003 HETEROGENEOUS EMBEDDED REAL - TIME SYSTEMS ENVIRONMENT Integrated...HETEROGENEOUS EMBEDDED REAL - TIME SYSTEMS ENVIRONMENT 6. AUTHOR(S) Cosmo Castellano and James Graham 5. FUNDING NUMBERS C - F30602-97-C-0259

  2. Spectral embedding-based registration (SERg) for multimodal fusion of prostate histology and MRI

    Science.gov (United States)

    Hwuang, Eileen; Rusu, Mirabela; Karthigeyan, Sudha; Agner, Shannon C.; Sparks, Rachel; Shih, Natalie; Tomaszewski, John E.; Rosen, Mark; Feldman, Michael; Madabhushi, Anant

    2014-03-01

    Multi-modal image registration is needed to align medical images collected from different protocols or imaging sources, thereby allowing the mapping of complementary information between images. One challenge of multimodal image registration is that typical similarity measures rely on statistical correlations between image intensities to determine anatomical alignment. The use of alternate image representations could allow for mapping of intensities into a space or representation such that the multimodal images appear more similar, thus facilitating their co-registration. In this work, we present a spectral embedding based registration (SERg) method that uses non-linearly embedded representations obtained from independent components of statistical texture maps of the original images to facilitate multimodal image registration. Our methodology comprises the following main steps: 1) image-derived textural representation of the original images, 2) dimensionality reduction using independent component analysis (ICA), 3) spectral embedding to generate the alternate representations, and 4) image registration. The rationale behind our approach is that SERg yields embedded representations that can allow for very different looking images to appear more similar, thereby facilitating improved co-registration. Statistical texture features are derived from the image intensities and then reduced to a smaller set by using independent component analysis to remove redundant information. Spectral embedding generates a new representation by eigendecomposition from which only the most important eigenvectors are selected. This helps to accentuate areas of salience based on modality-invariant structural information and therefore better identifies corresponding regions in both the template and target images. The spirit behind SERg is that image registration driven by these areas of salience and correspondence should improve alignment accuracy. In this work, SERg is implemented using Demons

  3. Critical points in an algebra of elementary embeddings

    OpenAIRE

    Dougherty, Randall

    1992-01-01

    Given two elementary embeddings from the collection of sets of rank less than $\\lambda$ to itself, one can combine them to obtain another such embedding in two ways: by composition, and by applying one to (initial segments of) the other. Hence, a single such nontrivial embedding $j$ generates an algebra of embeddings via these two operations, which satisfies certain laws (for example, application distributes over both composition and application). Laver has shown, among other things, that thi...

  4. High capacity Si/DC/MWCNTs nanocomposite anode materials for lithium ion batteries

    International Nuclear Information System (INIS)

    Zhou Zhibin; Xu Yunhua; Liu Wengang; Niu Libin

    2010-01-01

    Nanocomposites comprising nanocrystal silicon (Si), disordered carbon (DC), and multi-walled carbon nanotubes (MWCNTs) - denoted as Si/DC/MWCNTs - have been prepared by pyrolyzing the phenol-formaldehyde resin (PFR) mixed with Si and MWCNTs. This nanocomposite anode material showed a discharge capacity of 1216 mAh/g in the first cycle, and a charge capacity of 711 mAh/g after 20 charge-discharge, much higher than that of Si/DC composite. It can be observed that Si particles wrapped in MWCNTs were homogeneously embedded into the matrix of the DC. The improved electrochemical performance is hypothesized to be mainly attributed to the morphology stability of the composite due to the excellent resiliency and distinct electric conductivity of the MWCNTs.

  5. Minimum curvilinearity to enhance topological prediction of protein interactions by network embedding

    KAUST Repository

    Cannistraci, Carlo

    2013-06-21

    Motivation: Most functions within the cell emerge thanks to protein-protein interactions (PPIs), yet experimental determination of PPIs is both expensive and time-consuming. PPI networks present significant levels of noise and incompleteness. Predicting interactions using only PPI-network topology (topological prediction) is difficult but essential when prior biological knowledge is absent or unreliable.Methods: Network embedding emphasizes the relations between network proteins embedded in a low-dimensional space, in which protein pairs that are closer to each other represent good candidate interactions. To achieve network denoising, which boosts prediction performance, we first applied minimum curvilinear embedding (MCE), and then adopted shortest path (SP) in the reduced space to assign likelihood scores to candidate interactions. Furthermore, we introduce (i) a new valid variation of MCE, named non-centred MCE (ncMCE); (ii) two automatic strategies for selecting the appropriate embedding dimension; and (iii) two new randomized procedures for evaluating predictions.Results: We compared our method against several unsupervised and supervisedly tuned embedding approaches and node neighbourhood techniques. Despite its computational simplicity, ncMCE-SP was the overall leader, outperforming the current methods in topological link prediction.Conclusion: Minimum curvilinearity is a valuable non-linear framework that we successfully applied to the embedding of protein networks for the unsupervised prediction of novel PPIs. The rationale for our approach is that biological and evolutionary information is imprinted in the non-linear patterns hidden behind the protein network topology, and can be exploited for predicting new protein links. The predicted PPIs represent good candidates for testing in high-throughput experiments or for exploitation in systems biology tools such as those used for network-based inference and prediction of disease-related functional modules. The

  6. Native American Women Leaders' Use of Information and Communication Technologies (ICTs) for Work-Life Balance (WLB) and Capacity Building

    Science.gov (United States)

    Jensen, Crystal C.

    2013-01-01

    Native American women's leadership, information communication technologies (ICTs), work-life balance (WLB) and human capacity building (HCB) are grounded in social justice issues due to their long history of overall cultural decimation, inequitable access to technology, monetary resources, and social power (agency), and influence. Currently, there…

  7. Distributed, Embedded and Real-time Java Systems

    CERN Document Server

    Wellings, Andy

    2012-01-01

    Research on real-time Java technology has been prolific over the past decade, leading to a large number of corresponding hardware and software solutions, and frameworks for distributed and embedded real-time Java systems.  This book is aimed primarily at researchers in real-time embedded systems, particularly those who wish to understand the current state of the art in using Java in this domain.  Much of the work in real-time distributed, embedded and real-time Java has focused on the Real-time Specification for Java (RTSJ) as the underlying base technology, and consequently many of the Chapters in this book address issues with, or solve problems using, this framework. Describes innovative techniques in: scheduling, memory management, quality of service and communication systems supporting real-time Java applications; Includes coverage of multiprocessor embedded systems and parallel programming; Discusses state-of-the-art resource management for embedded systems, including Java’s real-time garbage collect...

  8. Quantum-Assisted Learning of Hardware-Embedded Probabilistic Graphical Models

    Science.gov (United States)

    Benedetti, Marcello; Realpe-Gómez, John; Biswas, Rupak; Perdomo-Ortiz, Alejandro

    2017-10-01

    Mainstream machine-learning techniques such as deep learning and probabilistic programming rely heavily on sampling from generally intractable probability distributions. There is increasing interest in the potential advantages of using quantum computing technologies as sampling engines to speed up these tasks or to make them more effective. However, some pressing challenges in state-of-the-art quantum annealers have to be overcome before we can assess their actual performance. The sparse connectivity, resulting from the local interaction between quantum bits in physical hardware implementations, is considered the most severe limitation to the quality of constructing powerful generative unsupervised machine-learning models. Here, we use embedding techniques to add redundancy to data sets, allowing us to increase the modeling capacity of quantum annealers. We illustrate our findings by training hardware-embedded graphical models on a binarized data set of handwritten digits and two synthetic data sets in experiments with up to 940 quantum bits. Our model can be trained in quantum hardware without full knowledge of the effective parameters specifying the corresponding quantum Gibbs-like distribution; therefore, this approach avoids the need to infer the effective temperature at each iteration, speeding up learning; it also mitigates the effect of noise in the control parameters, making it robust to deviations from the reference Gibbs distribution. Our approach demonstrates the feasibility of using quantum annealers for implementing generative models, and it provides a suitable framework for benchmarking these quantum technologies on machine-learning-related tasks.

  9. Quantum-Assisted Learning of Hardware-Embedded Probabilistic Graphical Models

    Directory of Open Access Journals (Sweden)

    Marcello Benedetti

    2017-11-01

    Full Text Available Mainstream machine-learning techniques such as deep learning and probabilistic programming rely heavily on sampling from generally intractable probability distributions. There is increasing interest in the potential advantages of using quantum computing technologies as sampling engines to speed up these tasks or to make them more effective. However, some pressing challenges in state-of-the-art quantum annealers have to be overcome before we can assess their actual performance. The sparse connectivity, resulting from the local interaction between quantum bits in physical hardware implementations, is considered the most severe limitation to the quality of constructing powerful generative unsupervised machine-learning models. Here, we use embedding techniques to add redundancy to data sets, allowing us to increase the modeling capacity of quantum annealers. We illustrate our findings by training hardware-embedded graphical models on a binarized data set of handwritten digits and two synthetic data sets in experiments with up to 940 quantum bits. Our model can be trained in quantum hardware without full knowledge of the effective parameters specifying the corresponding quantum Gibbs-like distribution; therefore, this approach avoids the need to infer the effective temperature at each iteration, speeding up learning; it also mitigates the effect of noise in the control parameters, making it robust to deviations from the reference Gibbs distribution. Our approach demonstrates the feasibility of using quantum annealers for implementing generative models, and it provides a suitable framework for benchmarking these quantum technologies on machine-learning-related tasks.

  10. Analysis, fabrication, and field test of an advanced embedded throwing electromechanical sensing system

    Energy Technology Data Exchange (ETDEWEB)

    Gao, Zhen; Zhang, Dan [Beijing JiaoTong University, Beijing (China)

    2014-01-15

    Scientific measuring equipment is important in maintaining and further improving the daily training quality of professional athletes. In throwing sports, only kinematic information is usually recorded by several high-speed cameras, whereas the dynamic data are lacking. An advanced embedded throwing system is analyzed, fabricated, and field tested. This throwing system can be used to substitute the normal shot-put that obtains acceleration information from the upper limb when force is applied onto the device. This device has four main parts, namely, a mechanical shell, an embedded sensor, a signal processing circuit, and interface ports. The detailed design, simulation, and prototyping process are introduced in this work. The practical results obtained from the field test and feedback from users prove that the proposed throwing system is efficient for technical training and monitoring. This design provides a unique solution for the modeling and development of non-traditional, electro-mechanical sensing devices.

  11. Achieving Performance Speed-up in FPGA Based Bit-Parallel Multipliers using Embedded Primitive and Macro support

    Directory of Open Access Journals (Sweden)

    Burhan Khurshid

    2015-05-01

    Full Text Available Modern Field Programmable Gate Arrays (FPGA are fast moving into the consumer market and their domain has expanded from prototype designing to low and medium volume productions. FPGAs are proving to be an attractive replacement for Application Specific Integrated Circuits (ASIC primarily because of the low Non-recurring Engineering (NRE costs associated with FPGA platforms. This has prompted FPGA vendors to improve the capacity and flexibility of the underlying primitive fabric and include specialized macro support and intellectual property (IP cores in their offerings. However, most of the work related to FPGA implementations does not take full advantage of these offerings. This is primarily because designers rely mainly on the technology-independent optimization to enhance the performance of the system and completely neglect the speed-up that is achievable using these embedded primitives and macro support. In this paper, we consider the technology-dependent optimization of fixed-point bit-parallel multipliers by carrying out their implementations using embedded primitives and macro support that are inherent in modern day FPGAs. Our implementation targets three different FPGA families viz. Spartan-6, Virtex-4 and Virtex-5. The implementation results indicate that a considerable speed up in performance is achievable using these embedded FPGA resources.

  12. Apparatuses And Systems For Embedded Thermoelectric Generators

    KAUST Repository

    Hussain, Muhammad M.; Inayat, Salman Bin; Smith, Casey Eben

    2013-01-01

    An apparatus and a system for embedded thermoelectric generators are disclosed. In one embodiment, the apparatus is embedded in an interface where the ambient temperatures on two sides of the interface are different. In one embodiment, the apparatus is fabricated with the interface in integrity as a unitary piece. In one embodiment, the apparatus includes a first thermoelectric material embedded through the interface. The apparatus further includes a second thermoelectric material embedded through the interface. The first thermoelectric material is electrically coupled to the second thermoelectric material. In one embodiment, the apparatus further includes an output structure coupled to the first thermoelectric material and the second thermoelectric material and configured to output a voltage.

  13. Apparatuses And Systems For Embedded Thermoelectric Generators

    KAUST Repository

    Hussain, Muhammad M.

    2013-08-08

    An apparatus and a system for embedded thermoelectric generators are disclosed. In one embodiment, the apparatus is embedded in an interface where the ambient temperatures on two sides of the interface are different. In one embodiment, the apparatus is fabricated with the interface in integrity as a unitary piece. In one embodiment, the apparatus includes a first thermoelectric material embedded through the interface. The apparatus further includes a second thermoelectric material embedded through the interface. The first thermoelectric material is electrically coupled to the second thermoelectric material. In one embodiment, the apparatus further includes an output structure coupled to the first thermoelectric material and the second thermoelectric material and configured to output a voltage.

  14. Dynamic characterization, monitoring and control of rotating flexible beam-mass structures via piezo-embedded techniques

    Science.gov (United States)

    Lai, Steven H.-Y.

    1992-01-01

    A variational principle and a finite element discretization technique were used to derive the dynamic equations for a high speed rotating flexible beam-mass system embedded with piezo-electric materials. The dynamic equation thus obtained allows the development of finite element models which accommodate both the original structural element and the piezoelectric element. The solutions of finite element models provide system dynamics needed to design a sensing system. The characterization of gyroscopic effect and damping capacity of smart rotating devices are addressed. Several simulation examples are presented to validate the analytical solution.

  15. Strengthening our approaches to building capacity

    International Development Research Centre (IDRC) Digital Library (Canada)

    CCAA

    and capacity building mandate. A number of ... of CCAA capacity building: participatory action research (PAR) mentoring ... project, to ensure its application in planning, monitoring ... community volunteers who use climate information in emergency response ... has expertise in monitoring and evaluation, and the Department.

  16. Exact solutions for isometric embeddings of pseudo-Riemannian manifolds

    International Nuclear Information System (INIS)

    Amery, G; Moodley, J

    2014-01-01

    Embeddings into higher dimensions are of direct importance in the study of higher dimensional theories of our Universe, in high energy physics and in classical general relativity. Theorems have been established that guarantee the existence of local and global codimension-1 embeddings between pseudo-Riemannian manifolds, particularly for Einstein embedding spaces. A technique has been provided to determine solutions to such embeddings. However, general solutions have not yet been found and most known explicit solutions are for embedded spaces with relatively simple Ricci curvature. Motivated by this, we have considered isometric embeddings of 4-dimensional pseudo-Riemannian spacetimes into 5-dimensional Einstein manifolds. We have applied the technique to treat specific 4-dimensional cases of interest in astrophysics and cosmology (including the global monopole exterior and Vaidya-de Sitter-class solutions), and provided novel physical insights into, for example, Einstein-Gauss-Bonnet gravity. Since difficulties arise in solving the 5-dimensional equations for given 4-dimensional spaces, we have also investigated embedded spaces, which admit bulks with a particular metric form. These analyses help to provide insight to the general embedding problem

  17. Modern Embedded Computing Designing Connected, Pervasive, Media-Rich Systems

    CERN Document Server

    Barry, Peter

    2012-01-01

    Modern embedded systems are used for connected, media-rich, and highly integrated handheld devices such as mobile phones, digital cameras, and MP3 players. All of these embedded systems require networking, graphic user interfaces, and integration with PCs, as opposed to traditional embedded processors that can perform only limited functions for industrial applications. While most books focus on these controllers, Modern Embedded Computing provides a thorough understanding of the platform architecture of modern embedded computing systems that drive mobile devices. The book offers a comprehen

  18. A novel reusable nanocomposite for complete removal of dyes, heavy metals and microbial load from water based on nanocellulose and silver nano-embedded pebbles.

    Science.gov (United States)

    Suman; Kardam, Abhishek; Gera, Meeta; Jain, V K

    2015-01-01

    The present work proposed a nanocellulose (NC)-silver nanoparticles (AgNPs) embedded pebbles-based composite material as a novel reusable cost-effective water purification device for complete removal of dyes, heavy metals and microbes. NC was prepared using acid hydrolysis of cellulose. The AgNPs were generated in situ using glucose and embedded within the porous concrete pebbles by the technique of inter-diffusion of ion, providing a very strong binding of nanoparticles within the porous pebbles and thus preventing any nanomaterials leaching. Fabrication of a continual running water purifier was achieved by making different layering of NC and Ag nano-embedded pebbles in a glass column. The water purifier exhibited not only excellent dye and heavy metal adsorption capacity, but also long-term antibacterial activity against pathogenic and non-pathogenic bacterial strains. The adsorption mainly occurred through electrostatic interaction and pore diffusion also contributed to the process. The bed column purifier has shown 99.48% Pb(II) and 98.30% Cr(III) removal efficiency along with 99% decontamination of microbial load at an optimum working pH of 6.0. The high adsorption capacity and reusability, with complete removal of dyes, heavy metals and Escherichia coli from the simulated contaminated water of composite material, will provide new opportunities to develop a cost-effective and eco-friendly water purifier for commercial application.

  19. Hardware Support for Embedded Java

    DEFF Research Database (Denmark)

    Schoeberl, Martin

    2012-01-01

    The general Java runtime environment is resource hungry and unfriendly for real-time systems. To reduce the resource consumption of Java in embedded systems, direct hardware support of the language is a valuable option. Furthermore, an implementation of the Java virtual machine in hardware enables...... worst-case execution time analysis of Java programs. This chapter gives an overview of current approaches to hardware support for embedded and real-time Java....

  20. Molecular Properties through Polarizable Embedding

    DEFF Research Database (Denmark)

    Olsen, Jógvan Magnus Haugaard; Kongsted, Jacob

    2011-01-01

    We review the theory related to the calculation of electric and magnetic molecular properties through polarizable embedding. In particular, we derive the expressions for the response functions up to the level of cubic response within the density functional theory-based polarizable embedding (PE......-DFT) formalism. In addition, we discuss some illustrative applications related to the calculation of nuclear magnetic resonance parameters, nonlinear optical properties, and electronic excited states in solution....

  1. A Foundation for Embedded Languages

    DEFF Research Database (Denmark)

    Rhiger, Morten

    2003-01-01

    Recent work on embedding object languages into Haskell use "phantom types" (i.e., parameterized types whose parameter does not occur on the right-hand side of the type definition) to ensure that the embedded object-language terms are simply typed. But is it a safe assumption that only simply...... be answered affirmatively for an idealized Haskell-like language and discuss to which extent Haskell can be used as a meta-language....

  2. Embedded computer systems for control applications in EBR-II

    International Nuclear Information System (INIS)

    Carlson, R.B.; Start, S.E.

    1993-01-01

    The purpose of this paper is to describe the embedded computer systems approach taken at Experimental Breeder Reactor II (EBR-II) for non-safety related systems. The hardware and software structures for typical embedded systems are presented The embedded systems development process is described. Three examples are given which illustrate typical embedded computer applications in EBR-II

  3. Bubbling and on-off intermittency in bailout embeddings.

    Science.gov (United States)

    Cartwright, Julyan H E; Magnasco, Marcelo O; Piro, Oreste; Tuval, Idan

    2003-07-01

    We establish and investigate the conceptual connection between the dynamics of the bailout embedding of a Hamiltonian system and the dynamical regimes associated with the occurrence of bubbling and blowout bifurcations. The roles of the invariant manifold and the dynamics restricted to it, required in bubbling and blowout bifurcating systems, are played in the bailout embedding by the embedded Hamiltonian dynamical system. The Hamiltonian nature of the dynamics is precisely the distinctive feature of this instance of a bubbling or blowout bifurcation. The detachment of the embedding trajectories from the original ones can thus be thought of as transient on-off intermittency, and noise-induced avoidance of some regions of the embedded phase space can be recognized as Hamiltonian bubbling.

  4. Embeddings for the Schwarzschild metric: classification and new results

    International Nuclear Information System (INIS)

    Paston, S A; Sheykin, A A

    2012-01-01

    We suggest a method to search the embeddings of Riemannian spaces with a high enough symmetry in a flat ambient space. It is based on a procedure of construction surfaces with a given symmetry. The method is used to classify the embeddings of the Schwarzschild metric which have the symmetry of this solution, and all such embeddings in a six-dimensional ambient space (i.e. a space with a minimal possible dimension) are constructed. Four of the six possible embeddings are already known, while the two others are new. One of the new embeddings is asymptotically flat, while the other embeddings in a six-dimensional ambient space do not have this property. The asymptotically flat embedding can be of use in the analysis of the many-body problem, as well as for the development of gravity description as a theory of a surface in a flat ambient space. (paper)

  5. Capacity region of the 3 receiver state dependent multilevel BC with noncausal state information

    Directory of Open Access Journals (Sweden)

    Viswanathan Ramachandran

    2017-09-01

    Full Text Available We consider a three receiver state dependent multilevel broadcast channel (BC, where the state information is known non-causally at the encoder as well as all the decoders. This is an extension of Nair and El Gamal’s three receiver multilevel BC (Nair and El Gamal, 2009, wherein two of the receivers decode only a common message while a third receiver decodes a private message as well. The objective is to characterize the rate tuples that are simultaneously achievable while ensuring negligible probability of error at each of the receivers. We characterize the capacity region of this setup in the paper.

  6. Radio-over-optical waveguide system-on-wafer for massive delivery capacity 5G MIMO access networks

    Science.gov (United States)

    Binh, Le N.

    2017-01-01

    Delivering maximum information capacity over MIMO antennae systems beam steering is critical so as to achieve the flexibility via beam steering, maximizing the number of users or community of users in Gb/s rate per user over distributed cloud-based optical-wireless access networks. This paper gives an overview of (i) demands of optical - wireless delivery with high flexibility, especially the beam steering of multi-Tbps information channels to information hungry community of users via virtualized beam steering MIMO antenna systems at the free-license mmW region; (ii) Proposing a novel photonic planar integrated waveguide systems composing several passive and active, passive and amplification photonic devices so as to generate mmW carrier and embedded baseband information channels to feed to antenna elements; (iii) Integration techniques to generate a radio over optical waveguide (RoOW) system-on-wafer (SoW) comprising MIMO planar antenna elements and associate photonic integrated circuits for both up- and down- links; (iv) Challenges encountered in the implementation of the SoW in both wireless and photonic domains; (v) Photonic modulation techniques to achieve maximum transmission capacity per wavelength per MIMO antenna system. (vi) A view on control-feedback systems for fast and accurate generation of phase pattern for MIMO beam steering via a bank of optical phase modulators to mmW carrier phases and their preservation in the converted mmW domain . (vi) The overall operational principles of the novel techniques and technologies based on the coherent mixing of two lightwave channels The entire SoW can be implemented on SOI Si-photonic technology or via hybrid integration. These technological developments and their pros- and cons- will be discussed to achieve 50Tera-bps over the extended 110 channel Cband single mode fiber with mmW centered at 58.6GHz and 7GHz free-license band.

  7. Potential-functional embedding theory for molecules and materials.

    Science.gov (United States)

    Huang, Chen; Carter, Emily A

    2011-11-21

    We introduce a potential-functional embedding theory by reformulating a recently proposed density-based embedding theory in terms of functionals of the embedding potential. This potential-functional based theory completes the dual problem in the context of embedding theory for which density-functional embedding theory has existed for two decades. With this potential-functional formalism, it is straightforward to solve for the unique embedding potential shared by all subsystems. We consider charge transfer between subsystems and discuss how to treat fractional numbers of electrons in subsystems. We show that one is able to employ different energy functionals for different subsystems in order to treat different regions with theories of different levels of accuracy, if desired. The embedding potential is solved for by directly minimizing the total energy functional, and we discuss how to efficiently calculate the gradient of the total energy functional with respect to the embedding potential. Forces are also derived, thereby making it possible to optimize structures and account for nuclear dynamics. We also extend the theory to spin-polarized cases. Numerical examples of the theory are given for some homo- and hetero-nuclear diatomic molecules and a more complicated test of a six-hydrogen-atom chain. We also test our theory in a periodic bulk environment with calculations of basic properties of bulk NaCl, by treating each atom as a subsystem. Finally, we demonstrate the theory for water adsorption on the MgO(001)surface.

  8. Using mobile phone contextual information to facilitate managing image collections

    DEFF Research Database (Denmark)

    Larsen, Jakob Eg; Luniewski, Maciej

    2009-01-01

    In this paper, we describe a prototype application that utilizes the embedded sensors in advanced mobile phones to infer meaningful contextual information, with the potential to support the users in managing their personal information. Contextual information such as time, location, movement...... in personal information management. We hypothesize that information inferred from embedded mobile phone sensors can offer useful contextual information for managing personal information, including the domain of interest here, namely image collections. This has potential for individuals as well as groups...

  9. Mentoring approach improves evaluation capacity of ICTD ...

    International Development Research Centre (IDRC) Digital Library (Canada)

    2016-06-09

    Jun 9, 2016 ... ... initiative is improving evaluation capacities of researchers studying Information and ... Capacity in ICTD (DECI) provides researchers from five IDRC-funded projects in ... Using technology to deliver quality education in Asia.

  10. LSB steganography with improved embedding efficiency and undetectability

    OpenAIRE

    Khalind, Omed; Aziz, Benjamin Yowell Yousif

    2015-01-01

    In this paper, we propose a new method of non-adapt ive LSB steganography in still images to improve the embedding efficiency from 2 to 8/3 rand om bits per one embedding change even for the embedding rate of 1 bit per pixel. The method t akes 2-bits of the secret message at a time and compares them to the LSBs of the two chosen pix el values for embedding, it always assumes a single mismatch between the two and uses the seco nd LSB o...

  11. Unsupervised Document Embedding With CNNs

    OpenAIRE

    Liu, Chundi; Zhao, Shunan; Volkovs, Maksims

    2017-01-01

    We propose a new model for unsupervised document embedding. Leading existing approaches either require complex inference or use recurrent neural networks (RNN) that are difficult to parallelize. We take a different route and develop a convolutional neural network (CNN) embedding model. Our CNN architecture is fully parallelizable resulting in over 10x speedup in inference time over RNN models. Parallelizable architecture enables to train deeper models where each successive layer has increasin...

  12. Diverse Power Iteration Embeddings and Its Applications

    Energy Technology Data Exchange (ETDEWEB)

    Huang H.; Yoo S.; Yu, D.; Qin, H.

    2014-12-14

    Abstract—Spectral Embedding is one of the most effective dimension reduction algorithms in data mining. However, its computation complexity has to be mitigated in order to apply it for real-world large scale data analysis. Many researches have been focusing on developing approximate spectral embeddings which are more efficient, but meanwhile far less effective. This paper proposes Diverse Power Iteration Embeddings (DPIE), which not only retains the similar efficiency of power iteration methods but also produces a series of diverse and more effective embedding vectors. We test this novel method by applying it to various data mining applications (e.g. clustering, anomaly detection and feature selection) and evaluating their performance improvements. The experimental results show our proposed DPIE is more effective than popular spectral approximation methods, and obtains the similar quality of classic spectral embedding derived from eigen-decompositions. Moreover it is extremely fast on big data applications. For example in terms of clustering result, DPIE achieves as good as 95% of classic spectral clustering on the complex datasets but 4000+ times faster in limited memory environment.

  13. Technical solutions to enable embedded generation growth

    Energy Technology Data Exchange (ETDEWEB)

    Lynch, C.A.; Todd, S.; Millar, W.; Wood, H.S.

    2003-07-01

    This report describes the results of one of a series of studies commissioned by the UK Department of Trade and Industry into various aspects of embedded generation with the aim of supporting the development and deployment of electrical sources (particularly their ease of connection to the network) to deliver power to consumers. The first phase of the project involved a literature review and meetings with embedded generation developers and planning engineers from distribution network operators (DNOs). The second phase investigated embedded generation at different levels of the distribution network and included modelling a representative network. Technologies that could facilitate a significant increase in embedded generation were identified and estimates made of when and where significant development would be needed. Technical problems identified by DNOs were concerned with thermal loading, voltage regulation, fault levels, protection and network operation. A number of non-technical (commercial and regulatory) problems were also identified. The report describes the UK regulatory framework, the present situation, the British power system, the accommodation of embedded generation by established means, the representative model and technical innovations.

  14. Social Environmental Accounting and Reporting

    DEFF Research Database (Denmark)

    Huerter O, Gabriela Gutierrez; Moon, Jeremy; Gold, Stefan

    Based on an embedded multiple case study of a UK-based MNC, FINEST, informed by 24 semi-structured interviews, this paper investigates the antecedents and outcome of subsidiaries’ absorptive capacity (ACAP) in the context of the intra-MNC transfer of social and environmental accounting and report......Based on an embedded multiple case study of a UK-based MNC, FINEST, informed by 24 semi-structured interviews, this paper investigates the antecedents and outcome of subsidiaries’ absorptive capacity (ACAP) in the context of the intra-MNC transfer of social and environmental accounting...

  15. An Overview of Reconfigurable Hardware in Embedded Systems

    Directory of Open Access Journals (Sweden)

    Wenyin Fu

    2006-09-01

    Full Text Available Over the past few years, the realm of embedded systems has expanded to include a wide variety of products, ranging from digital cameras, to sensor networks, to medical imaging systems. Consequently, engineers strive to create ever smaller and faster products, many of which have stringent power requirements. Coupled with increasing pressure to decrease costs and time-to-market, the design constraints of embedded systems pose a serious challenge to embedded systems designers. Reconfigurable hardware can provide a flexible and efficient platform for satisfying the area, performance, cost, and power requirements of many embedded systems. This article presents an overview of reconfigurable computing in embedded systems, in terms of benefits it can provide, how it has already been used, design issues, and hurdles that have slowed its adoption.

  16. Time-dependent potential-functional embedding theory

    International Nuclear Information System (INIS)

    Huang, Chen; Libisch, Florian; Peng, Qing; Carter, Emily A.

    2014-01-01

    We introduce a time-dependent potential-functional embedding theory (TD-PFET), in which atoms are grouped into subsystems. In TD-PFET, subsystems can be propagated by different suitable time-dependent quantum mechanical methods and their interactions can be treated in a seamless, first-principles manner. TD-PFET is formulated based on the time-dependent quantum mechanics variational principle. The action of the total quantum system is written as a functional of the time-dependent embedding potential, i.e., a potential-functional formulation. By exploiting the Runge-Gross theorem, we prove the uniqueness of the time-dependent embedding potential under the constraint that all subsystems share a common embedding potential. We derive the integral equation that such an embedding potential needs to satisfy. As proof-of-principle, we demonstrate TD-PFET for a Na 4 cluster, in which each Na atom is treated as one subsystem and propagated by time-dependent Kohn-Sham density functional theory (TDDFT) using the adiabatic local density approximation (ALDA). Our results agree well with a direct TDDFT calculation on the whole Na 4 cluster using ALDA. We envision that TD-PFET will ultimately be useful for studying ultrafast quantum dynamics in condensed matter, where key regions are solved by highly accurate time-dependent quantum mechanics methods, and unimportant regions are solved by faster, less accurate methods

  17. Fast and effective embedded systems design applying the ARM mbed

    CERN Document Server

    Toulson, Rob

    2012-01-01

    A hands-on introduction to the field of embedded systems; A focus on fast prototyping of embedded systems; All key embedded system concepts covered through simple and effective experimentation; An understanding of ARM technology, one of the world's leaders; A practical introduction to embedded C; Applies possibly the most accessible set of tools available in the embedded world.  This book is an introduction to embedded systems design, using the ARM mbed and C programming language as development tools. The mbed provides a compact, self-contained and low-cost hardware core, and the

  18. [Micro-invasive embedding combined with montelukast sodium for children cough variant asthma:a randomized controlled trial].

    Science.gov (United States)

    Wang, Xiaoyan; Liu, Baoqin; Lu, Bin; Zhang, Yanmei; Wang, Liran; Li, Haijin; Han, Xue; Ding, Dan

    2017-03-12

    To observe the effects of micro-invasive embedding combined with montelukast sodium and simple montelukast sodium for children cough variant asthma (CVA). A total of 240 patients were randomly assigned into an observation group and a control group, 120 cases in each one. Considering of cases dropping, 101 patients in the observation group and 105 cases in the control group were included. Montelukast sodium chewable tablets were applied before sleep for 3 months in the control group, 5 mg a time, once a day. Based on the treatment as the control group, micro-invasive embedding was used for 3 months in the observation group, twice in the first month and once in the other two months. The acupoints were Feishu (BL 13), Danzhong (CV 17), Dingchuan (EX-B 1), and Zusanli (ST 36). Follow-up was conducted 9 months after treatment in the two groups. The cough score, serum immunoglobulin (IgE, IgG, IgA), platelet activating factor (PAF) were observed before and after treatment. The indices were compared before and after treatment and at follow-up, including pulmonary function indices[peak expiratory flow rate (PEF), forced expiratory volume at the 1st second (FEV1)], and small airway function indices[forced expiratory flow rate with remaining 25% vital capacity (MEF25%), forced expiratory flow rate with remaining 50% vital capacity (MEF50%), forced expiratory flow rate with remaining 75% vital capacity (MEF75%) and mid expiratory flow rate (MEF25%-75%)]. Also, the total effects were evaluated. ①The total effective rate in the observation group was 93.1% (94/101), which was better than 87.6% (92/105) in the control group ( P disappearance time of the cured children in the observation group was (10.38±2.64) d, and it was shorter than (10.72 ±2.60) d of those in the control group ( P 0.05). ④ There was no statistically significance before and after treatment on small airway function indices in the two groups (all P >0.05). The indices at follow-up increased compared with

  19. Adaptive Engineering of an Embedded System, Engineered for use by Search and Rescue Canines

    Directory of Open Access Journals (Sweden)

    Cristina Ribeiro

    2011-06-01

    Full Text Available In Urban Search and Rescue (US&R operations, canine teams are deployed to find live patients, and save lives. US&R may benefit from increased levels of situational awareness, through information made available through the use of embedded systems attached to the dogs. One of these is the Canine Pose Estimation (CPE system. There are many challenges faced with such embedded systems including the engineering of such devices for use in disaster environments. Durability and wireless connectivity in areas with materials that inhibit wireless communications, the safety of the dog wearing the devices, and form factor must be accommodated. All of these factors must be weighed without compromising the accuracy of the application and the timely delivery of its data. This paper discusses the adaptive engineering process and how each of the unique challenges of emergency response embedded systems can be defined and overcome through effective design methods.

  20. Sequence2Vec: A novel embedding approach for modeling transcription factor binding affinity landscape

    KAUST Repository

    Dai, Hanjun

    2017-07-26

    Motivation: An accurate characterization of transcription factor (TF)-DNA affinity landscape is crucial to a quantitative understanding of the molecular mechanisms underpinning endogenous gene regulation. While recent advances in biotechnology have brought the opportunity for building binding affinity prediction methods, the accurate characterization of TF-DNA binding affinity landscape still remains a challenging problem. Results: Here we propose a novel sequence embedding approach for modeling the transcription factor binding affinity landscape. Our method represents DNA binding sequences as a hidden Markov model (HMM) which captures both position specific information and long-range dependency in the sequence. A cornerstone of our method is a novel message passing-like embedding algorithm, called Sequence2Vec, which maps these HMMs into a common nonlinear feature space and uses these embedded features to build a predictive model. Our method is a novel combination of the strength of probabilistic graphical models, feature space embedding and deep learning. We conducted comprehensive experiments on over 90 large-scale TF-DNA data sets which were measured by different high-throughput experimental technologies. Sequence2Vec outperforms alternative machine learning methods as well as the state-of-the-art binding affinity prediction methods.

  1. Evaluation of protein immobilization capacity on various carbon nanotube embedded hydrogel biomaterials

    Energy Technology Data Exchange (ETDEWEB)

    Derkus, Burak, E-mail: burakderkus@gmail.com; Emregul, Kaan Cebesoy; Emregul, Emel

    2015-11-01

    This study investigates effective immobilization of proteins, an important procedure in many fields of bioengineering and medicine, using various biomaterials. Gelatin, alginate and chitosan were chosen as polymeric carriers, and applied in both their composites and nanocomposite forms in combination with carbon nanotubes (CNTs). The prepared nano/composite structures were characterized using scanning electron microscopy (SEM), Fourier-transform infrared spectroscopy (FTIR), thermal gravimetric analysis (TG) and contact angle analysis (CA). Electrochemical impedance spectroscopy analysis revealed gelatin composites in general to exhibit better immobilization performance relative to the native gelatin which can be attributed to enhanced film morphologies of the composite structures. Moreover, superior immobilization efficiencies were obtained with the addition of carbon nanotubes, due to their conducting and surface enhancement features, especially in the gelatin–chitosan structures due to the presence of structural active groups. - Highlights: • Various nanocomposite biomaterials were developed for efficient immobilization of proteins. • CNTs enhance the immobilization efficiency owing to their conducting and surface enhancement features. • Gelatin–chitosan–CNTs structure is promising immobilization matrix thanks to its effective CNTs binding capacity.

  2. Hybrid Message-Embedded Cipher Using Logistic Map

    OpenAIRE

    Mishra, Mina; Mankar, V. H.

    2012-01-01

    The proposed hybrid message embedded scheme consists of hill cipher combined with message embedded chaotic scheme. Message-embedded scheme using non-linear feedback shift register as non-linear function and 1-D logistic map as chaotic map is modified, analyzed and tested for avalanche property and strength against known plaintext attack and brute-force attack. Parameter of logistic map acts as a secret key. As we know that the minimum key space to resist brute-force attack is 2100, and it is ...

  3. Competence building capacity shortage

    International Nuclear Information System (INIS)

    Doorman, Gerard; Wangensteen, Ivar; Bakken, Bjoern

    2005-02-01

    1990 and if the availability of Danish import and hydropower is normal. Finally, an analysis was done of Capacity Subscription, a model where consumers pay for the capacity they use during system peak load. It was shown how this model can be embedded in the Nordic market solution. However, given the present situation which is not seen as critical, a prospective introduction of this model would lie some years into the future. Further research with respect to technological solutions and market communication should be undertaken to learn more about these central issues for this model. (author)

  4. Integrated Design and Implementation of Embedded Control Systems with Scilab.

    Science.gov (United States)

    Ma, Longhua; Xia, Feng; Peng, Zhe

    2008-09-05

    Embedded systems are playing an increasingly important role in control engineering. Despite their popularity, embedded systems are generally subject to resource constraints and it is therefore difficult to build complex control systems on embedded platforms. Traditionally, the design and implementation of control systems are often separated, which causes the development of embedded control systems to be highly timeconsuming and costly. To address these problems, this paper presents a low-cost, reusable, reconfigurable platform that enables integrated design and implementation of embedded control systems. To minimize the cost, free and open source software packages such as Linux and Scilab are used. Scilab is ported to the embedded ARM-Linux system. The drivers for interfacing Scilab with several communication protocols including serial, Ethernet, and Modbus are developed. Experiments are conducted to test the developed embedded platform. The use of Scilab enables implementation of complex control algorithms on embedded platforms. With the developed platform, it is possible to perform all phases of the development cycle of embedded control systems in a unified environment, thus facilitating the reduction of development time and cost.

  5. Integrated Design and Implementation of Embedded Control Systems with Scilab

    Directory of Open Access Journals (Sweden)

    Zhe Peng

    2008-09-01

    Full Text Available Embedded systems are playing an increasingly important role in control engineering. Despite their popularity, embedded systems are generally subject to resource constraints and it is therefore difficult to build complex control systems on embedded platforms. Traditionally, the design and implementation of control systems are often separated, which causes the development of embedded control systems to be highly timeconsuming and costly. To address these problems, this paper presents a low-cost, reusable, reconfigurable platform that enables integrated design and implementation of embedded control systems. To minimize the cost, free and open source software packages such as Linux and Scilab are used. Scilab is ported to the embedded ARM-Linux system. The drivers for interfacing Scilab with several communication protocols including serial, Ethernet, and Modbus are developed. Experiments are conducted to test the developed embedded platform. The use of Scilab enables implementation of complex control algorithms on embedded platforms. With the developed platform, it is possible to perform all phases of the development cycle of embedded control systems in a unified environment, thus facilitating the reduction of development time and cost.

  6. LSB-based Steganography Using Reflected Gray Code for Color Quantum Images

    Science.gov (United States)

    Li, Panchi; Lu, Aiping

    2018-02-01

    At present, the classical least-significant-bit (LSB) based image steganography has been extended to quantum image processing. For the existing LSB-based quantum image steganography schemes, the embedding capacity is no more than 3 bits per pixel. Therefore, it is meaningful to study how to improve the embedding capacity of quantum image steganography. This work presents a novel LSB-based steganography using reflected Gray code for colored quantum images, and the embedding capacity of this scheme is up to 4 bits per pixel. In proposed scheme, the secret qubit sequence is considered as a sequence of 4-bit segments. For the four bits in each segment, the first bit is embedded in the second LSB of B channel of the cover image, and and the remaining three bits are embedded in LSB of RGB channels of each color pixel simultaneously using reflected-Gray code to determine the embedded bit from secret information. Following the transforming rule, the LSB of stego-image are not always same as the secret bits and the differences are up to almost 50%. Experimental results confirm that the proposed scheme shows good performance and outperforms the previous ones currently found in the literature in terms of embedding capacity.

  7. Hazard, Vulnerability and Capacity Mapping for Landslides Risk Analysis using Geographic Information System (GIS)

    Science.gov (United States)

    Sari, D. A. P.; Innaqa, S.; Safrilah

    2017-06-01

    This research analyzed the levels of disaster risk in the Citeureup sub-District, Bogor Regency, West Java, based on its potential hazard, vulnerability and capacity, using map to represent the results, then Miles and Huberman analytical techniques was used to analyze the qualitative interviews. The analysis conducted in this study is based on the concept of disaster risk by Wisner. The result shows that the Citeureup sub-District has medium-low risk of landslides. Of the 14 villages, three villages have a moderate risk level, namely Hambalang, Tajur, and Tangkil, or 49.58% of the total land area. Eleven villages have a low level of risk, namely Pasir Mukti, Sanja, Tarikolot, Gunung Sari, Puspasari, East Karang Asem, Citeureup, Leuwinutug, Sukahati, West Karang Asem West and Puspanegara, or 48.68% of the total land area, for high-risk areas only around 1.74%, which is part of Hambalang village. The analysis using Geographic Information System (GIS) prove that areas with a high risk potential does not necessarily have a high level of risk. The capacity of the community plays an important role to minimize the risk of a region. Disaster risk reduction strategy is done by creating a safe condition, which intensified the movement of disaster risk reduction.

  8. The Organization of Informal Learning

    Science.gov (United States)

    Rogoff, Barbara; Callanan, Maureen; Gutiérrez, Kris D.; Erickson, Frederick

    2016-01-01

    Informal learning is often treated as simply an alternative to formal, didactic instruction. This chapter discusses how the organization of informal learning differs across distinct settings but with important commonalities distinguishing informal learning from formal learning: Informal learning is nondidactic, is embedded in meaningful activity,…

  9. Measuring information processing in a client with extreme agitation following traumatic brain injury using the Perceive, Recall, Plan and Perform System of Task Analysis.

    Science.gov (United States)

    Nott, Melissa T; Chapparo, Christine

    2008-09-01

    Agitation following traumatic brain injury is characterised by a heightened state of activity with disorganised information processing that interferes with learning and achieving functional goals. This study aimed to identify information processing problems during task performance of a severely agitated adult using the Perceive, Recall, Plan and Perform (PRPP) System of Task Analysis. Second, this study aimed to examine the sensitivity of the PRPP System to changes in task performance over a short period of rehabilitation, and third, to evaluate the guidance provided by the PRPP in directing intervention. A case study research design was employed. The PRPP System of Task Analysis was used to assess changes in task embedded information processing capacity during occupational therapy intervention with a severely agitated adult in a rehabilitation context. Performance is assessed on three selected tasks over a one-month period. Information processing difficulties during task performance can be clearly identified when observing a severely agitated adult following a traumatic brain injury. Processing skills involving attention, sensory processing and planning were most affected at this stage of rehabilitation. These processing difficulties are linked to established descriptions of agitated behaviour. Fluctuations in performance across three tasks of differing processing complexity were evident, leading to hypothesised relationships between task complexity, environment and novelty with information processing errors. Changes in specific information processing capacity over time were evident based on repeated measures using the PRPP System of Task Analysis. This lends preliminary support for its utility as an outcome measure, and raises hypotheses about the type of therapy required to enhance information processing in people with severe agitation. The PRPP System is sensitive to information processing changes in severely agitated adults when used to reassess performance

  10. Capacity building for sustainable energy development

    International Nuclear Information System (INIS)

    Rogner, Hans-Holger

    2006-01-01

    Capacity Building for Sustainable Energy Development - Mission: To build capacity in Member States (MS) for comprehensive energy system, economic and environmental analyses to assist in: - making informed policy decisions for sustainable energy development; - assessing the role of nuclear power; - understanding environmental and climate change issues related to energy production and use

  11. Autonomous Multicamera Tracking on Embedded Smart Cameras

    Directory of Open Access Journals (Sweden)

    Bischof Horst

    2007-01-01

    Full Text Available There is currently a strong trend towards the deployment of advanced computer vision methods on embedded systems. This deployment is very challenging since embedded platforms often provide limited resources such as computing performance, memory, and power. In this paper we present a multicamera tracking method on distributed, embedded smart cameras. Smart cameras combine video sensing, processing, and communication on a single embedded device which is equipped with a multiprocessor computation and communication infrastructure. Our multicamera tracking approach focuses on a fully decentralized handover procedure between adjacent cameras. The basic idea is to initiate a single tracking instance in the multicamera system for each object of interest. The tracker follows the supervised object over the camera network, migrating to the camera which observes the object. Thus, no central coordination is required resulting in an autonomous and scalable tracking approach. We have fully implemented this novel multicamera tracking approach on our embedded smart cameras. Tracking is achieved by the well-known CamShift algorithm; the handover procedure is realized using a mobile agent system available on the smart camera network. Our approach has been successfully evaluated on tracking persons at our campus.

  12. Self-Organization in Embedded Real-Time Systems

    CERN Document Server

    Brinkschulte, Uwe; Rettberg, Achim

    2013-01-01

    This book describes the emerging field of self-organizing, multicore, distributed and real-time embedded systems.  Self-organization of both hardware and software can be a key technique to handle the growing complexity of modern computing systems. Distributed systems running hundreds of tasks on dozens of processors, each equipped with multiple cores, requires self-organization principles to ensure efficient and reliable operation. This book addresses various, so-called Self-X features such as self-configuration, self-optimization, self-adaptation, self-healing and self-protection. Presents open components for embedded real-time adaptive and self-organizing applications; Describes innovative techniques in: scheduling, memory management, quality of service, communications supporting organic real-time applications; Covers multi-/many-core embedded systems supporting real-time adaptive systems and power-aware, adaptive hardware and software systems; Includes case studies of open embedded real-time self-organizi...

  13. Capacity and optimal collusion attack channels for Gaussian fingerprinting games

    Science.gov (United States)

    Wang, Ying; Moulin, Pierre

    2007-02-01

    constraints. Under those constraints on the fingerprint embedder and the colluders, fingerprinting capacity is obtained as the solution of a mutual-information game involving probability density functions (pdf's) designed by the embedder and the colluders. We show that the optimal fingerprinting strategy is a Gaussian test channel where the fingerprinted signal is the sum of an attenuated version of the cover signal plus a Gaussian information-bearing noise, and the optimal collusion strategy is to average fingerprinted signals possessed by all the colluders and pass the averaged copy through a Gaussian test channel. The capacity result and the optimal strategies are the same for both the private and public games. In the former scenario, the original covertext is available to the decoder, while in the latter setup, the original covertext is available to the encoder but not to the decoder.

  14. Testing the Predictions of the Central Capacity Sharing Model

    Science.gov (United States)

    Tombu, Michael; Jolicoeur, Pierre

    2005-01-01

    The divergent predictions of 2 models of dual-task performance are investigated. The central bottleneck and central capacity sharing models argue that a central stage of information processing is capacity limited, whereas stages before and after are capacity free. The models disagree about the nature of this central capacity limitation. The…

  15. Embedded data representations

    DEFF Research Database (Denmark)

    Willett, Wesley; Jansen, Yvonne; Dragicevic, Pierre

    2017-01-01

    We introduce embedded data representations, the use of visual and physical representations of data that are deeply integrated with the physical spaces, objects, and entities to which the data refers. Technologies like lightweight wireless displays, mixed reality hardware, and autonomous vehicles...

  16. Two diverse models of embedding class one

    Science.gov (United States)

    Kuhfittig, Peter K. F.

    2018-05-01

    Embedding theorems have continued to be a topic of interest in the general theory of relativity since these help connect the classical theory to higher-dimensional manifolds. This paper deals with spacetimes of embedding class one, i.e., spacetimes that can be embedded in a five-dimensional flat spacetime. These ideas are applied to two diverse models, a complete solution for a charged wormhole admitting a one-parameter group of conformal motions and a new model to explain the flat rotation curves in spiral galaxies without the need for dark matter.

  17. Secure smart embedded devices, platforms and applications

    CERN Document Server

    Markantonakis, Konstantinos

    2013-01-01

    New generations of IT users are increasingly abstracted from the underlying devices and platforms that provide and safeguard their services. As a result they may have little awareness that they are critically dependent on the embedded security devices that are becoming pervasive in daily modern life. Secure Smart Embedded Devices, Platforms and Applications provides a broad overview of the many security and practical issues of embedded devices, tokens, and their operation systems, platforms and main applications. It also addresses a diverse range of industry/government initiatives and consider

  18. Value Relevance of Embedded Value and IFRS 4 Insurance Contracts

    OpenAIRE

    Rebecca Chung-Fern Wu; Audrey Wen-Hsin Hsu

    2011-01-01

    In light of the recent exodus of foreign insurers from Taiwan and the local insurers’ outcries against the International Financial Reporting Standard (IFRS) 4 Insurance Contracts, we examine the value relevance of financial statements for life insurance firms, with particular interests to the embedded value (EV) disclosure. We find that the EV of equity has an incremental information role for book value of equity, which indicates that the accounting mismatching problem in the insurance indust...

  19. Development of an Erlang System Adaopted to Embedded Devices

    OpenAIRE

    Andersson, Fredrik; Bergström, Fabian

    2011-01-01

    Erlang is a powerful and robust language for writing massively parallel and distributed applications. With the introduction of multi-core ARM processors, the embedded market will be looking for ways of taking advantage of the newfound opportunities for parallelism. To support the development of embedded applications using Erlang we want to provide Erlang and Embedded developers with a run-time system suited for embedded devices. We have managed to shrink the disk size of the Erlang runtime sy...

  20. A tool to increase information-processing capacity for consumer water meter data

    Directory of Open Access Journals (Sweden)

    Heinz E. Jacobs

    2012-06-01

    Objective: The objective of this research article was to describe the development of Swift, a locally developed software tool for analysing water meter data from an information management perspective, which engineers in the water field generally use, and to assess critically the influence of Swift on published research and industry. This article focuses on water usage and the challenge of data interchange and extraction as issues that various industries face. Method: This article presents the first detailed report on Swift. It uses a detailed knowledge review and presents and summarises the findings chronologically. Results: The water meter data flow path used to be quite simple. The risk of breaches in confidentiality was limited. Technological advances over the years have led to additional knowledge coming from the same water meter readings with subsequent research outputs. However, there are also complicated data flow paths and increased risks. Users have used Swift to analyse more than two million consumers’ water meter readings to date. Studies have culminated in 10 peer-reviewed journal articles using the data. Seven of them were in the last five years. Conclusion: Swift-based data was the basis of various research studies in the past decade. Practical guidelines in the civil engineering fraternity for estimating water use in South Africa have incorporated knowledge from these studies. Developments after 1995 have increased the information processing capacity for water meter data.

  1. Embedding methods for phi4-interaction

    International Nuclear Information System (INIS)

    Hanckowiak, J.

    1985-01-01

    The idea of embedding a given theory in a class of similar theories is applied to quantum field theory in the case of phi 4 -interaction to derive different equations for the generating functional. The number of possible embeddings has been restricted by demanding that for the defined projections of the generating functional a closed system of equations be obtained

  2. Embedded Systems Design with 8051 Microcontrollers

    DEFF Research Database (Denmark)

    Karakahayov, Zdravko; Winther, Ole; Christensen, Knud Smed

    Textbook on embedded microcontrollers. Example microcontroller family: Intel 8051 with special emphasis on Philips 80C552. Structure, design examples and programming in C and assembler. Hardware - software codesign. EProm emulator.......Textbook on embedded microcontrollers. Example microcontroller family: Intel 8051 with special emphasis on Philips 80C552. Structure, design examples and programming in C and assembler. Hardware - software codesign. EProm emulator....

  3. ASSESSMENT OF SEISMIC ANALYSIS METHODOLOGIES FOR DEEPLY EMBEDDED NPP STRUCTURES

    International Nuclear Information System (INIS)

    XU, J.; MILLER, C.; COSTANTINO, C.; HOFMAYER, C.; GRAVES, H. NRC.

    2005-01-01

    Several of the new generation nuclear power plant designs have structural configurations which are proposed to be deeply embedded. Since current seismic analysis methodologies have been applied to shallow embedded structures (e.g., ASCE 4 suggest that simple formulations may be used to model embedment effect when the depth of embedment is less than 30% of its foundation radius), the US Nuclear Regulatory Commission is sponsoring a program at the Brookhaven National Laboratory with the objective of investigating the extent to which procedures acceptable for shallow embedment depths are adequate for larger embedment depths. This paper presents the results of a study comparing the response spectra obtained from two of the more popular analysis methods for structural configurations varying from shallow embedment to complete embedment. A typical safety related structure embedded in a soil profile representative of a typical nuclear power plant site was utilized in the study and the depths of burial (DOB) considered range from 25-100% the height of the structure. Included in the paper are: (1) the description of a simplified analysis and a detailed approach for the SSI analyses of a structure with various DOB, (2) the comparison of the analysis results for the different DOBs between the two methods, and (3) the performance assessment of the analysis methodologies for SSI analyses of deeply embedded structures. The resulting assessment from this study has indicated that simplified methods may be capable of capturing the seismic response for much deeper embedded structures than would be normally allowed by the standard practice

  4. Polarizable Density Embedding

    DEFF Research Database (Denmark)

    Reinholdt, Peter; Kongsted, Jacob; Olsen, Jógvan Magnus Haugaard

    2017-01-01

    We analyze the performance of the polarizable density embedding (PDE) model-a new multiscale computational approach designed for prediction and rationalization of general molecular properties of large and complex systems. We showcase how the PDE model very effectively handles the use of large...

  5. Implementation of an embedded computer

    OpenAIRE

    Pikl, Bojan

    2011-01-01

    The goal of this thesis is to describe a production of an embedded computer. The thesis describes development and production of an embedded computer for the medical diode laser DL30 that is being developed in Robomed d.o.o.. The first part of the thesis describes the choice of hardware devices. I mostly describe the technologies that one can buy on the market. Moreover for every part of the computer installed and developed there is an argument why we selected that exact part. The second part ...

  6. Quantum Thetas on Noncommutative T^d with General Embeddings

    OpenAIRE

    Chang-Young, Ee; Kim, Hoil

    2007-01-01

    In this paper we construct quantum theta functions over noncommutative T^d with general embeddings. Manin has constructed quantum theta functions from the lattice embedding into vector space x finite group. We extend Manin's construction of quantum thetas to the case of general embedding of vector space x lattice x torus. It turns out that only for the vector space part of the embedding there exists the holomorphic theta vector, while for the lattice part there does not. Furthermore, the so-c...

  7. Experimental study on embedment effect of foundation, 2

    International Nuclear Information System (INIS)

    Ohtomo, Keizo; Toma, Junichi; Hashimoto, Koichi; Hanada, Kazutake; Ueshima, Teruyuki; Yajima, Hiroshi

    1986-01-01

    In order to make clear the dynamic behavior of a embeded foundation on the quarternary ground experimentally, a series of forced vibration tests and seismic observation on both the small foundation (4 x 4 x 3 m) and the embeded form larger scale foundation of the shaking table (16 x 16 x 7.7 m) were conducted at the same site. The purposes this study are evaluating the dynamic behavior and the characteristics of dynamic stiffness and damping of the larger foundation based on forced vibration tests, and applying them to the dynamic response analysis of variable embedded foundations. In this report, the authors first examine frequency dependent property and its theoretical tendency of dynamic stiffness and damping surrounding table foundation. And then, consider an applicability and point of discussion related with the some theories which influence the embedment effect, in contrast with the experimental datum of the model foundation are past studies on a embedment effect (JPDR, Large-Scale Foundation in Tadotsu). (author)

  8. NInFEA: an embedded framework for the real-time evaluation of fetal ECG extraction algorithms.

    Science.gov (United States)

    Pani, Danilo; Barabino, Gianluca; Raffo, Luigi

    2013-02-01

    Fetal electrocardiogram (ECG) extraction from non-invasive biopotential recordings is a long-standing research topic. Despite the significant number of algorithms presented in the scientific literature, it is difficult to find information about embedded hardware implementations able to provide real-time support for the required features, bridging the gap between theory and practice. This article presents the NInFEA (non-invasive fetal ECG analysis) tool, an embedded hardware/software framework based on the hybrid dual-core OMAP-L137 low-power processor for the real-time evaluation of fetal ECG extraction algorithms. The hybrid platform, including a digital signal processor (DSP) and a general-purpose processor (GPP), allows achieving the best performance compared with single-core architectures. The GPP provides a portable graphical user interface, whereas the DSP is extensively used for advanced signal processing tasks. As a case study, three state-of-the-art fetal ECG extraction algorithms have been ported onto NInFEA, along with some support routines needed to provide the additional information required by the clinicians and supported by the user interface. NInFEA can be regarded both as a reference design for similar applications and as a common embedded low-power testbed for real-time fetal ECG extraction algorithms.

  9. Programming Embedded Systems With C and GNU Development Tools

    CERN Document Server

    Barr, Michael

    2009-01-01

    Whether you're writing your first embedded program, designing the latest generation of hand-held whatchamacalits, or managing the people who do, this book is for you. Programming Embedded Systems will help you develop the knowledge and skills you need to achieve proficiency with embedded software.

  10. Design and development of embedded control system for high power RF test facility

    International Nuclear Information System (INIS)

    Nageswara Rao, J.; Badapanda, M.K.; Upadhyay, Rinki; Tripathi, Akhilesh; Hannurkar, P.R.

    2013-01-01

    Design and development of an embedded control system for the control, interlock and operation of 1MW, 352.2 MHz TH2089 klystron based RF test facility. The key components of the control system are NI compact Re configurable Input Output (cRIO) system and Windows based PC. The cRIO system's rugged hardware architecture includes a 1.06 GHz Dual-Core embedded controller with Real Time (RT) Operating System, a reconfigurable Field Programmable Gate Array (FPGA) chassis for custom I/O timing, control and processing; and I/O modules. Windows based Graphical User Interface (GUI) has been developed to guide the user through start-up procedure, to set the operating parameters and also to display the status information of all the signals. The application software for data logging and publishing of the acquired data namely set, read back and status signals of auxiliary power supplies and machine safety interlocks has been developed in LabVIEW RT module and is running on embedded controller. Machine safety interlock logic has been implemented in FPGA to meet the time criticality. (author)

  11. Feasibility study on embedded transport core calculations

    International Nuclear Information System (INIS)

    Ivanov, B.; Zikatanov, L.; Ivanov, K.

    2007-01-01

    The main objective of this study is to develop an advanced core calculation methodology based on embedded diffusion and transport calculations. The scheme proposed in this work is based on embedded diffusion or SP 3 pin-by-pin local fuel assembly calculation within the framework of the Nodal Expansion Method (NEM) diffusion core calculation. The SP 3 method has gained popularity in the last 10 years as an advanced method for neutronics calculation. NEM is a multi-group nodal diffusion code developed, maintained and continuously improved at the Pennsylvania State University. The developed calculation scheme is a non-linear iteration process, which involves cross-section homogenization, on-line discontinuity factors generation, and boundary conditions evaluation by the global solution passed to the local calculation. In order to accomplish the local calculation, a new code has been developed based on the Finite Elements Method (FEM), which is capable of performing both diffusion and SP 3 calculations. The new code will be used in the framework of the NEM code in order to perform embedded pin-by-pin diffusion and SP 3 calculations on fuel assembly basis. The development of the diffusion and SP 3 FEM code is presented first following by its application to several problems. Description of the proposed embedded scheme is provided next as well as the obtained preliminary results of the C3 MOX benchmark. The results from the embedded calculations are compared with direct pin-by-pin whole core calculations in terms of accuracy and efficiency followed by conclusions made about the feasibility of the proposed embedded approach. (authors)

  12. Food consumption and waste and the embedded carbon, water and ecological footprints of households in China.

    Science.gov (United States)

    Song, Guobao; Li, Mingjing; Semakula, Henry Musoke; Zhang, Shushen

    2015-10-01

    Strategies for reducing food waste and developing sustainable diets require information about the impacts of consumption behavior and waste generation on climatic, water, and land resources. We quantified the carbon, water, and ecological footprints of 17,110 family members of Chinese households, covering 1935 types of foods, by combining survey data with available life-cycle assessment data sets. We also summarized the patterns of both food consumption and waste generation and analyzed the factors influencing the observed trends. The average person wasted (consumed) 16 (415) kg of food at home annually, equivalent to 40 (1080) kg CO2e, 18 (673) m(3), and 173 (4956) gm(2) for the carbon, water and ecological footprints, respectively. The generation of food waste was highly correlated with consumption for various food groups. For example, vegetables, rice, and wheat were consumed the most and accounted for the most waste. In addition to the three plant-derived food groups, pork and aquatic products also contributed greatly to embedded footprints. The data obtained in this study could be used for assessing national food security or the carrying capacity of resources. Copyright © 2015 Elsevier B.V. All rights reserved.

  13. Quantum reading capacity

    International Nuclear Information System (INIS)

    Pirandola, Stefano; Braunstein, Samuel L; Lupo, Cosmo; Mancini, Stefano; Giovannetti, Vittorio

    2011-01-01

    The readout of a classical memory can be modelled as a problem of quantum channel discrimination, where a decoder retrieves information by distinguishing the different quantum channels encoded in each cell of the memory (Pirandola 2011 Phys. Rev. Lett. 106 090504). In the case of optical memories, such as CDs and DVDs, this discrimination involves lossy bosonic channels and can be remarkably boosted by the use of nonclassical light (quantum reading). Here we generalize these concepts by extending the model of memory from single-cell to multi-cell encoding. In general, information is stored in a block of cells by using a channel-codeword, i.e. a sequence of channels chosen according to a classical code. Correspondingly, the readout of data is realized by a process of ‘parallel’ channel discrimination, where the entire block of cells is probed simultaneously and decoded via an optimal collective measurement. In the limit of a large block we define the quantum reading capacity of the memory, quantifying the maximum number of readable bits per cell. This notion of capacity is nontrivial when we suitably constrain the physical resources of the decoder. For optical memories (encoding bosonic channels), such a constraint is energetic and corresponds to fixing the mean total number of photons per cell. In this case, we are able to prove a separation between the quantum reading capacity and the maximum information rate achievable by classical transmitters, i.e. arbitrary classical mixtures of coherent states. In fact, we can easily construct nonclassical transmitters that are able to outperform any classical transmitter, thus showing that the advantages of quantum reading persist in the optimal multi-cell scenario. (paper)

  14. ZnO nanowire-based nano-floating gate memory with Pt nanocrystals embedded in Al{sub 2}O{sub 3} gate oxides

    Energy Technology Data Exchange (ETDEWEB)

    Yeom, Donghyuk; Kang, Jeongmin; Lee, Myoungwon; Jang, Jaewon; Yun, Junggwon; Jeong, Dong-Young; Yoon, Changjoon; Koo, Jamin; Kim, Sangsig [Department of Electrical Engineering and Institute for Nano Science, Korea University, Seoul 136-701 (Korea, Republic of)], E-mail: sangsig@korea.ac.kr

    2008-10-01

    The memory characteristics of ZnO nanowire-based nano-floating gate memory (NFGM) with Pt nanocrystals acting as the floating gate nodes were investigated in this work. Pt nanocrystals were embedded between Al{sub 2}O{sub 3} tunneling and control oxide layers deposited on ZnO nanowire channels. For a representative ZnO nanowire-based NFGM with embedded Pt nanocrystals, a threshold voltage shift of 3.8 V was observed in its drain current versus gate voltage (I{sub DS}-V{sub GS}) measurements for a double sweep of the gate voltage, revealing that the deep effective potential wells built into the nanocrystals provide our NFGM with a large charge storage capacity. Details of the charge storage effect observed in this memory device are discussed in this paper.

  15. TTCN-3 for distributed testing embedded systems

    NARCIS (Netherlands)

    Blom, S.C.C.; Deiß, T.; Ioustinova, N.; Kontio, A.; Pol, van de J.C.; Rennoch, A.; Sidorova, N.; Virbitskaite, I.; Voronkov, A.

    2007-01-01

    Abstract. TTCN-3 is a standardized language for specifying and executing test suites that is particularly popular for testing embedded systems. Prior to testing embedded software in a target environment, the software is usually tested in the host environment. Executing in the host environment often

  16. An Embedded Systems Course for Engineering Students Using Open-Source Platforms in Wireless Scenarios

    Science.gov (United States)

    Rodriguez-Sanchez, M. C.; Torrado-Carvajal, Angel; Vaquero, Joaquin; Borromeo, Susana; Hernandez-Tamames, Juan A.

    2016-01-01

    This paper presents a case study analyzing the advantages and disadvantages of using project-based learning (PBL) combined with collaborative learning (CL) and industry best practices, integrated with information communication technologies, open-source software, and open-source hardware tools, in a specialized microcontroller and embedded systems…

  17. Advanced Technologies, Embedded and Multimedia for Human-Centric Computing

    CERN Document Server

    Chao, Han-Chieh; Deng, Der-Jiunn; Park, James; HumanCom and EMC 2013

    2014-01-01

    The theme of HumanCom and EMC are focused on the various aspects of human-centric computing for advances in computer science and its applications, embedded and multimedia computing and provides an opportunity for academic and industry professionals to discuss the latest issues and progress in the area of human-centric computing. And the theme of EMC (Advanced in Embedded and Multimedia Computing) is focused on the various aspects of embedded system, smart grid, cloud and multimedia computing, and it provides an opportunity for academic, industry professionals to discuss the latest issues and progress in the area of embedded and multimedia computing. Therefore this book will be include the various theories and practical applications in human-centric computing and embedded and multimedia computing.

  18. Indicators of sustainable capacity building for health research: analysis of four African case studies.

    Science.gov (United States)

    Bates, Imelda; Taegtmeyer, Miriam; Squire, S Bertel; Ansong, Daniel; Nhlema-Simwaka, Bertha; Baba, Amuda; Theobald, Sally

    2011-03-28

    Despite substantial investment in health capacity building in developing countries, evaluations of capacity building effectiveness are scarce. By analysing projects in Africa that had successfully built sustainable capacity, we aimed to identify evidence that could indicate that capacity building was likely to be sustainable. Four projects were selected as case studies using pre-determined criteria, including the achievement of sustainable capacity. By mapping the capacity building activities in each case study onto a framework previously used for evaluating health research capacity in Ghana, we were able to identify activities that were common to all projects. We used these activities to derive indicators which could be used in other projects to monitor progress towards building sustainable research capacity. Indicators of sustainable capacity building increased in complexity as projects matured and included- early engagement of stakeholders; explicit plans for scale up; strategies for influencing policies; quality assessments (awareness and experiential stages)- improved resources; institutionalisation of activities; innovation (expansion stage)- funding for core activities secured; management and decision-making led by southern partners (consolidation stage).Projects became sustainable after a median of 66 months. The main challenges to achieving sustainability were high turnover of staff and stakeholders, and difficulties in embedding new activities into existing systems, securing funding and influencing policy development. Our indicators of sustainable capacity building need to be tested prospectively in a variety of projects to assess their usefulness. For each project the evidence required to show that indicators have been achieved should evolve with the project and they should be determined prospectively in collaboration with stakeholders.

  19. ADAPTIVE METHODS FOR STOCHASTIC DIFFERENTIAL EQUATIONS VIA NATURAL EMBEDDINGS AND REJECTION SAMPLING WITH MEMORY.

    Science.gov (United States)

    Rackauckas, Christopher; Nie, Qing

    2017-01-01

    Adaptive time-stepping with high-order embedded Runge-Kutta pairs and rejection sampling provides efficient approaches for solving differential equations. While many such methods exist for solving deterministic systems, little progress has been made for stochastic variants. One challenge in developing adaptive methods for stochastic differential equations (SDEs) is the construction of embedded schemes with direct error estimates. We present a new class of embedded stochastic Runge-Kutta (SRK) methods with strong order 1.5 which have a natural embedding of strong order 1.0 methods. This allows for the derivation of an error estimate which requires no additional function evaluations. Next we derive a general method to reject the time steps without losing information about the future Brownian path termed Rejection Sampling with Memory (RSwM). This method utilizes a stack data structure to do rejection sampling, costing only a few floating point calculations. We show numerically that the methods generate statistically-correct and tolerance-controlled solutions. Lastly, we show that this form of adaptivity can be applied to systems of equations, and demonstrate that it solves a stiff biological model 12.28x faster than common fixed timestep algorithms. Our approach only requires the solution to a bridging problem and thus lends itself to natural generalizations beyond SDEs.

  20. Homogeneous Spaces and Equivariant Embeddings

    CERN Document Server

    Timashev, DA

    2011-01-01

    Homogeneous spaces of linear algebraic groups lie at the crossroads of algebraic geometry, theory of algebraic groups, classical projective and enumerative geometry, harmonic analysis, and representation theory. By standard reasons of algebraic geometry, in order to solve various problems on a homogeneous space it is natural and helpful to compactify it keeping track of the group action, i.e. to consider equivariant completions or, more generally, open embeddings of a given homogeneous space. Such equivariant embeddings are the subject of this book. We focus on classification of equivariant em

  1. Certifiable Java for Embedded Systems

    DEFF Research Database (Denmark)

    Schoeberl, Martin; Dalsgaard, Andreas Engelbredt; Hansen, Rene Rydhof

    2014-01-01

    The Certifiable Java for Embedded Systems (CJ4ES) project aimed to develop a prototype development environment and platform for safety-critical software for embedded applications. There are three core constituents: A profile of the Java programming language that is tailored for safety......-critical applications, a predictable Java processor built with FPGA technology, and an Eclipse based application development environment that binds the profile and the platform together and provides analyses that help to provide evidence that can be used as part of a safety case. This paper summarizes key contributions...

  2. Morphware - Fremtidens Embedded System Platform

    DEFF Research Database (Denmark)

    Madsen, Jan

    2006-01-01

    FPGA'er bliver i stigende grad brugt som komponenter i embedded systemer. Faldende priser, større kapacitet og en større felksibilitet har gjort FPGA'en til en attraktiv og konkurrencedygtig teknologi der tillader en stadig stigende grad af system integration, hvor traditionel hardware og software...... kombineres og rekonfigureres. Muligheden for at rekonfigurere systemet, og specielt rekonfigurerer det medens det kører, giver nogle helt nye muligheder for at designe og programmere embedded systemer. Dette foredrag vil give et indblik i disse nye og fremtidige muligheder....

  3. Small Private Key PKS on an Embedded Microprocessor

    OpenAIRE

    Seo, Hwajeong; Kim, Jihyun; Choi, Jongseok; Park, Taehwan; Liu, Zhe; Kim, Howon

    2014-01-01

    Multivariate quadratic (MQ) cryptography requires the use of long public and private keys to ensure a sufficient security level, but this is not favorable to embedded systems, which have limited system resources. Recently, various approaches to MQ cryptography using reduced public keys have been studied. As a result of this, at CHES2011 (Cryptographic Hardware and Embedded Systems, 2011), a small public key MQ scheme, was proposed, and its feasible implementation on an embedded microprocessor...

  4. A Resource-Aware Component Model for Embedded Systems

    OpenAIRE

    Vulgarakis, Aneta

    2009-01-01

    Embedded systems are microprocessor-based systems that cover a large range of computer systems from ultra small computer-based devices to large systems monitoring and controlling complex processes. The particular constraints that must be met by embedded systems, such as timeliness, resource-use efficiency, short time-to-market and low cost, coupled with the increasing complexity of embedded system software, demand technologies and processes that will tackle these issues. An attractive approac...

  5. Fractional Gaussian noise-enhanced information capacity of a nonlinear neuron model with binary signal input

    Science.gov (United States)

    Gao, Feng-Yin; Kang, Yan-Mei; Chen, Xi; Chen, Guanrong

    2018-05-01

    This paper reveals the effect of fractional Gaussian noise with Hurst exponent H ∈(1 /2 ,1 ) on the information capacity of a general nonlinear neuron model with binary signal input. The fGn and its corresponding fractional Brownian motion exhibit long-range, strong-dependent increments. It extends standard Brownian motion to many types of fractional processes found in nature, such as the synaptic noise. In the paper, for the subthreshold binary signal, sufficient conditions are given based on the "forbidden interval" theorem to guarantee the occurrence of stochastic resonance, while for the suprathreshold binary signal, the simulated results show that additive fGn with Hurst exponent H ∈(1 /2 ,1 ) could increase the mutual information or bits count. The investigation indicated that the synaptic noise with the characters of long-range dependence and self-similarity might be the driving factor for the efficient encoding and decoding of the nervous system.

  6. Faulty judgment, expert opinion, and decision-making capacity.

    Science.gov (United States)

    Silberfeld, M; Checkland, D

    1999-08-01

    An assessment of decision-making capacity is the accepted procedure for determining when a person is not competent. An inferential gap exists between the criteria for capacity specific abilities and the legal requirements to understand relevant information and appreciate the consequences of a decision. This gap extends to causal influences on a person's capacity to decide. Using a published case of depression, we illustrate that assessors' uses of diagnostic information is frequently not up to the task of bridging this inferential gap in a justifiable way. We then describe cases of faulty judgement which challenge the understanding of diagnostic causal influences. These cases help to clarify the nature of the expertise required for capacity assessments. In practice, the requirements of decision-making capacity are often abandoned to other considerations due to a lack of requisite expertise. The legal policy supporting decision-making capacity as a means to protective intervention is justified only if the requisite expertise is developed. We propose the requisite expertise to be developed in the long term as a distinct multidisciplinary endeavour.

  7. Maximizing the optical network capacity.

    Science.gov (United States)

    Bayvel, Polina; Maher, Robert; Xu, Tianhua; Liga, Gabriele; Shevchenko, Nikita A; Lavery, Domaniç; Alvarado, Alex; Killey, Robert I

    2016-03-06

    Most of the digital data transmitted are carried by optical fibres, forming the great part of the national and international communication infrastructure. The information-carrying capacity of these networks has increased vastly over the past decades through the introduction of wavelength division multiplexing, advanced modulation formats, digital signal processing and improved optical fibre and amplifier technology. These developments sparked the communication revolution and the growth of the Internet, and have created an illusion of infinite capacity being available. But as the volume of data continues to increase, is there a limit to the capacity of an optical fibre communication channel? The optical fibre channel is nonlinear, and the intensity-dependent Kerr nonlinearity limit has been suggested as a fundamental limit to optical fibre capacity. Current research is focused on whether this is the case, and on linear and nonlinear techniques, both optical and electronic, to understand, unlock and maximize the capacity of optical communications in the nonlinear regime. This paper describes some of them and discusses future prospects for success in the quest for capacity. © 2016 The Authors.

  8. Multi-purpose passive debugging for embedded wireless

    DEFF Research Database (Denmark)

    Hansen, Morten Tranberg

    Debugging embedded wireless systems can be cumbersome and hard due to low visibility. To ease the task of debugging we propose a multi-purpose passive debugging framework, called TinyDebug, for developing embedded wireless systems. TinyDebug is designed to be used throughout the entire system...

  9. Patron perception and utilization of an embedded librarian program.

    Science.gov (United States)

    Blake, Lindsay; Ballance, Darra; Davies, Kathy; Gaines, Julie K; Mears, Kim; Shipman, Peter; Connolly-Brown, Maryska; Burchfield, Vicki

    2016-07-01

    The study measured the perceived value of an academic library's embedded librarian service model. The study took place at the health sciences campuses of a research institution. A web-based survey was distributed that asked respondents a series of questions about their utilization of and satisfaction with embedded librarians and services. Over 58% of respondents reported being aware of their embedded librarians, and 95% of these were satisfied with provided services. The overall satisfaction with services was encouraging, but awareness of the embedded program was low, suggesting an overall need for marketing of services.

  10. PCB Embedded Inductor for High-Frequency ZVS SEPIC Converter

    DEFF Research Database (Denmark)

    Dou, Yi; Ouyang, Ziwei; Thummala, Prasanth

    2018-01-01

    The volume and temperature rise of passive components, especially inductors, limit the momentum toward high power density in high-frequency power converters. To address the limitations, PCB integration of passive components should be considered with the benefit of low profile, excellent thermal...... characteristic and cost reduction. This paper investigates an embedded structure of inductors to further increase the power density of a low power DC-DC converter. A pair of coupling inductors have been embedded into the PCB. The detailed embedded process has been described and the characteristics of embedded...

  11. STFTP: Secure TFTP Protocol for Embedded Multi-Agent Systems Communication

    Directory of Open Access Journals (Sweden)

    ZAGAR, D.

    2013-05-01

    Full Text Available Today's embedded systems have evolved into multipurpose devices moving towards an embedded multi-agent system (MAS infrastructure. With the involvement of MAS in embedded systems, one remaining issues is establishing communication between agents in low computational power and low memory embedded systems without present Embedded Operating System (EOS. One solution is the extension of an outdated Trivial File Transfer Protocol (TFTP. The main advantage of using TFTP in embedded systems is the easy implementation. However, the problem at hand is the overall lack of security mechanisms in TFTP. This paper proposes an extension to the existing TFTP in a form of added security mechanisms: STFTP. The authentication is proposed using Digest Access Authentication process whereas the data encryption can be performed by various cryptographic algorithms. The proposal is experimentally tested using two embedded systems based on micro-controller architecture. Communication is analyzed for authentication, data rate and transfer time versus various data encryption ciphers and files sizes. STFTP results in an expected drop in performance, which is in the range of similar encryption algorithms. The system could be improved by using embedded systems of higher computational power or by the use of hardware encryption modules.

  12. Moving Object Detection in Heterogeneous Conditions in Embedded Systems.

    Science.gov (United States)

    Garbo, Alessandro; Quer, Stefano

    2017-07-01

    This paper presents a system for moving object exposure, focusing on pedestrian detection, in external, unfriendly, and heterogeneous environments. The system manipulates and accurately merges information coming from subsequent video frames, making small computational efforts in each single frame. Its main characterizing feature is to combine several well-known movement detection and tracking techniques, and to orchestrate them in a smart way to obtain good results in diversified scenarios. It uses dynamically adjusted thresholds to characterize different regions of interest, and it also adopts techniques to efficiently track movements, and detect and correct false positives. Accuracy and reliability mainly depend on the overall receipt, i.e., on how the software system is designed and implemented, on how the different algorithmic phases communicate information and collaborate with each other, and on how concurrency is organized. The application is specifically designed to work with inexpensive hardware devices, such as off-the-shelf video cameras and small embedded computational units, eventually forming an intelligent urban grid. As a matter of fact, the major contribution of the paper is the presentation of a tool for real-time applications in embedded devices with finite computational (time and memory) resources. We run experimental results on several video sequences (both home-made and publicly available), showing the robustness and accuracy of the overall detection strategy. Comparisons with state-of-the-art strategies show that our application has similar tracking accuracy but much higher frame-per-second rates.

  13. Experiences as an embedded librarian in online courses.

    Science.gov (United States)

    Konieczny, Alison

    2010-01-01

    Embedded librarianship gives librarians a prime opportunity to have a direct, positive impact in a clinical setting, classroom setting, or within a working group by providing integrated services that cater to the group's needs. Extending embedded librarian services beyond the various physical settings and into online classrooms is an exceptional way for librarians to engage online learners. This group of students is growing rapidly in numbers and could benefit greatly from having library services and resources incorporated into their classes. The author's services as an embedded librarian in fully online courses at a medium-sized university will be discussed, as will strategies, lessons learned, and opportunities for engaging in this realm. To develop a foundation of knowledge on embedded librarianship, an overview of this topic is provided.

  14. Comparison of Video Steganography Methods for Watermark Embedding

    Directory of Open Access Journals (Sweden)

    Griberman David

    2016-05-01

    Full Text Available The paper focuses on the comparison of video steganography methods for the purpose of digital watermarking in the context of copyright protection. Four embedding methods that use Discrete Cosine and Discrete Wavelet Transforms have been researched and compared based on their embedding efficiency and fidelity. A video steganography program has been developed in the Java programming language with all of the researched methods implemented for experiments. The experiments used 3 video containers with different amounts of movement. The impact of the movement has been addressed in the paper as well as the ways of potential improvement of embedding efficiency using adaptive embedding based on the movement amount. Results of the research have been verified using a survey with 17 participants.

  15. Evidence-informed capacity building for setting health priorities in low- and middle-income countries: A framework and recommendations for further research [version 1; referees: 2 approved

    Directory of Open Access Journals (Sweden)

    Ryan Li

    2017-03-01

    Full Text Available Priority-setting in health is risky and challenging, particularly in resource-constrained settings. It is not simply a narrow technical exercise, and involves the mobilisation of a wide range of capacities among stakeholders – not only the technical capacity to “do” research in economic evaluations. Using the Individuals, Nodes, Networks and Environment (INNE framework, we identify those stakeholders, whose capacity needs will vary along the evidence-to-policy continuum. Policymakers and healthcare managers require the capacity to commission and use relevant evidence (including evidence of clinical and cost-effectiveness, and of social values; academics need to understand and respond to decision-makers’ needs to produce relevant research. The health system at all levels will need institutional capacity building to incentivise routine generation and use of evidence. Knowledge brokers, including priority-setting agencies (such as England’s National Institute for Health and Care Excellence, and Health Interventions and Technology Assessment Program, Thailand and the media can play an important role in facilitating engagement and knowledge transfer between the various actors. Especially at the outset but at every step, it is critical that patients and the public understand that trade-offs are inherent in priority-setting, and careful efforts should be made to engage them, and to hear their views throughout the process. There is thus no single approach to capacity building; rather a spectrum of activities that recognises the roles and skills of all stakeholders. A range of methods, including formal and informal training, networking and engagement, and support through collaboration on projects, should be flexibly employed (and tailored to specific needs of each country to support institutionalisation of evidence-informed priority-setting. Finally, capacity building should be a two-way process; those who build capacity should also attend to

  16. Metal-Embedded Porous Graphitic Carbon Fibers Fabricated from Bamboo Sticks as a Novel Cathode for Lithium-Sulfur Batteries.

    Science.gov (United States)

    Zhang, Xuqing; Zhong, Yu; Xia, Xinhui; Xia, Yang; Wang, Donghuang; Zhou, Cheng'ao; Tang, Wangjia; Wang, Xiuli; Wu, J B; Tu, Jiangping

    2018-04-25

    Lithium-sulfur batteries (LSBs) are deemed to be among the most prospective next-generation advanced high-energy batteries. Advanced cathode materials fabricated from biological carbon are becoming more popular due to their unique properties. Inspired by the fibrous structure of bamboo, herein we put forward a smart strategy to convert bamboo sticks for barbecue into uniform bamboo carbon fibers (BCF) via a simple hydrothermal treatment proceeded in alkaline solution. Then NiCl 2 is used to etch the fibers through a heat treatment to achieve Ni-embedded porous graphitic carbon fibers (PGCF/Ni) for LSBs. The designed PGCF/Ni/S electrode exhibits improved electrochemical performances including high initial capacity (1198 mAh g -1 at 0.2 C), prolonged cycling life (1030 mAh g -1 at 0.2 C after 200 cycles), and improved rate capability. The excellent properties are attributed to the synergistic effect of 3D porous graphitic carbon fibers with highly conductive Ni nanoparticles embedded.

  17. Earthquake response of nuclear reactor buildings deeply embedded in soil

    International Nuclear Information System (INIS)

    Masao, T.; Takasaki, Y.; Hirasawa, M.; Okajima, M.; Yamamoto, S.; Kawata, E.; Koori, Y.; Ochiai, S.; Shimizu, N.

    1980-01-01

    This paper is concerned with experimental and analytical studies to investigate dynamic behavior of deeply embedded structures such as nuclear reactor buildings. The principal points studied are as follows: (1) Examination of stiffness and radiation damping effects according to embedded depth, (2) verification for distributions of earth pressure according to embedded depth, (3) differences of response characteristics during oscillation according to embedded depth, and (4) proposal of an analytical method for seismic design. Experimental studies were performed by two ways: forced vibration test, and earthquake observation against a rigid body model embedded in soil. Three analytical procedures were performed to compare experimental results and to examine the relation between each procedure. Finally, the dynamic behavior for nuclear reactor buildings with different embedded depths were evaluated by an analytical method. (orig.)

  18. Embedding in thermosetting resins

    International Nuclear Information System (INIS)

    Buzonniere, A. de

    1985-01-01

    Medium activity waste coming either from nuclear power plants in operation such as evaporator concentrates, spent resins, filter cartridges or the dismantling of installations are embedded in order to obtain a product suitable for long term disposal. Embedding in thermosetting resins (polyester or epoxy) is one among currently used techniques; it is being developed by the CEA (Commissariat a l'Energie Atomique) and Technicatome (subsidiary of CEA and EDF). The process is easy to operate and yields excellent results particularly as far as volume reduction and radioelement containment (cesium particularly) are concerned. The process has already been in operation in four stationary plants for several years. Extension of the process to mobile units has been completed by Technicatome in collaboration with the CEA [fr

  19. Embedding of the radiation cosmos

    International Nuclear Information System (INIS)

    Wang, J.Z.

    1986-01-01

    The embedding of the Friedmann manifold into a higher dimensional Minkowski space is investigated. As solutions of the Friedmann equation with vanishing cosmological term, Friedmann models describe a first expanding, then contracting universe and predict a big bang singularity. For cosmic time t → 0, R(t) → 0, there is an infinite scalar, curvature in the matter cosmos, and an infinite eigenvalue corresponding to the unique timelike eigenvector of the energy-momentum tensor in the radiation cosmos. The big bang, therefore, is an intrinsic singularity of the space time. To investigate the singularity one resorts to the embedding of the Friedmann manifold into a higher dimensional Minkowski space. For the matter cosmos such an investigation has already been done (Lauro and Schucking, 1984). However, the matter cosmos is not a suitable model to discuss the very early universe where the radiation dominates. Geometric properties, such as the Riemann tensor, the Guassian curvature and the global behavior of the geodesics of the embedded manifold, are discussed in detail

  20. Can't Count or Won't Count? Embedding Quantitative Methods in Substantive Sociology Curricula: A Quasi-Experiment.

    Science.gov (United States)

    Williams, Malcolm; Sloan, Luke; Cheung, Sin Yi; Sutton, Carole; Stevens, Sebastian; Runham, Libby

    2016-06-01

    This paper reports on a quasi-experiment in which quantitative methods (QM) are embedded within a substantive sociology module. Through measuring student attitudes before and after the intervention alongside control group comparisons, we illustrate the impact that embedding has on the student experience. Our findings are complex and even contradictory. Whilst the experimental group were less likely to be distrustful of statistics and appreciate how QM inform social research, they were also less confident about their statistical abilities, suggesting that through 'doing' quantitative sociology the experimental group are exposed to the intricacies of method and their optimism about their own abilities is challenged. We conclude that embedding QM in a single substantive module is not a 'magic bullet' and that a wider programme of content and assessment diversification across the curriculum is preferential.

  1. Embedded Java security security for mobile devices

    CERN Document Server

    Debbabi, Mourad; Talhi, Chamseddine

    2007-01-01

    Java brings more functionality and versatility to the world of mobile devices, but it also introduces new security threats. This book contains a presentation of embedded Java security and presents the main components of embedded Java. It gives an idea of the platform architecture and is useful for researchers and practitioners.

  2. The MNC as an Externally Embedded Organization

    DEFF Research Database (Denmark)

    Nell, Phillip Christopher; Ambos, Björn; Schlegelmilch, Bodo B.

    2011-01-01

    MNCs have been conceptualized as differentiated networks that, in turn, are embedded in external networks. Previous research has predominantly focused on the embeddedness of established subsidiaries into their local environment, omitting to shed light on the phenomenon of headquarters linkages...... to the local context which creates embeddedness overlap. We develop a model of why MNCs develop overlapping linkages to local subsidiary networks even if the subsidiaries have grown out of the initial start-up phase. Using detailed information on 168 European subsidiaries, we find that MNCs build and maintain...... more overlapping network ties when subsidiaries are high performers, hold important resources, operate in turbulent environments, and are closely connected to multinational actors as opposed to purely domestic firms....

  3. Runtime reconfiguration in networked embedded systems design and testing practices

    CERN Document Server

    Exarchakos, George

    2016-01-01

    This book focuses on the design and testing of large-scale, distributed signal processing systems, with a special emphasis on systems architecture, tooling and best practices. Architecture modeling, model checking, model-based evaluation and model-based design optimization occupy central roles. Target systems with resource constraints on processing, communication or energy supply require non-trivial methodologies to model their non-functional requirements, such as timeliness, robustness, lifetime and “evolution” capacity. Besides the theoretical foundations of the methodology, an engineering process and toolchain are described. Real-world cases illustrate the theory and practice tested by the authors in the course of the European project ARTEMIS DEMANES. The book can be used as a “cookbook” for designers and practitioners working with complex embedded systems like sensor networks for the structural integrity monitoring of steel bridges, and distributed micro-climate control systems for greenhouses and...

  4. Noncommutativity and Duality through the Symplectic Embedding Formalism

    Directory of Open Access Journals (Sweden)

    Everton M.C. Abreu

    2010-07-01

    Full Text Available This work is devoted to review the gauge embedding of either commutative and noncommutative (NC theories using the symplectic formalism framework. To sum up the main features of the method, during the process of embedding, the infinitesimal gauge generators of the gauge embedded theory are easily and directly chosen. Among other advantages, this enables a greater control over the final Lagrangian and brings some light on the so-called ''arbitrariness problem''. This alternative embedding formalism also presents a way to obtain a set of dynamically dual equivalent embedded Lagrangian densities which is obtained after a finite number of steps in the iterative symplectic process, oppositely to the result proposed using the BFFT formalism. On the other hand, we will see precisely that the symplectic embedding formalism can be seen as an alternative and an efficient procedure to the standard introduction of the Moyal product in order to produce in a natural way a NC theory. In order to construct a pedagogical explanation of the method to the nonspecialist we exemplify the formalism showing that the massive NC U(1 theory is embedded in a gauge theory using this alternative systematic path based on the symplectic framework. Further, as other applications of the method, we describe exactly how to obtain a Lagrangian description for the NC version of some systems reproducing well known theories. Naming some of them, we use the procedure in the Proca model, the irrotational fluid model and the noncommutative self-dual model in order to obtain dual equivalent actions for these theories. To illustrate the process of noncommutativity introduction we use the chiral oscillator and the nondegenerate mechanics.

  5. Koszul Information Geometry and Souriau Geometric Temperature/Capacity of Lie Group Thermodynamics

    Directory of Open Access Journals (Sweden)

    Frédéric Barbaresco

    2014-08-01

    Full Text Available The François Massieu 1869 idea to derive some mechanical and thermal properties of physical systems from “Characteristic Functions”, was developed by Gibbs and Duhem in thermodynamics with the concept of potentials, and introduced by Poincaré in probability. This paper deals with generalization of this Characteristic Function concept by Jean-Louis Koszul in Mathematics and by Jean-Marie Souriau in Statistical Physics. The Koszul-Vinberg Characteristic Function (KVCF on convex cones will be presented as cornerstone of “Information Geometry” theory, defining Koszul Entropy as Legendre transform of minus the logarithm of KVCF, and Fisher Information Metrics as hessian of these dual functions, invariant by their automorphisms. In parallel, Souriau has extended the Characteristic Function in Statistical Physics looking for other kinds of invariances through co-adjoint action of a group on its momentum space, defining physical observables like energy, heat and momentum as pure geometrical objects. In covariant Souriau model, Gibbs equilibriums states are indexed by a geometric parameter, the Geometric (Planck Temperature, with values in the Lie algebra of the dynamical Galileo/Poincaré groups, interpreted as a space-time vector, giving to the metric tensor a null Lie derivative. Fisher Information metric appears as the opposite of the derivative of Mean “Moment map” by geometric temperature, equivalent to a Geometric Capacity or Specific Heat. We will synthetize the analogies between both Koszul and Souriau models, and will reduce their definitions to the exclusive Cartan “Inner Product”. Interpreting Legendre transform as Fourier transform in (Min,+ algebra, we conclude with a definition of Entropy given by a relation mixing Fourier/Laplace transforms: Entropy = (minus Fourier(Min,+ o Log o Laplace(+,X.

  6. Protection of critical infrastructure using fiber optic sensors embedded in technical textiles

    Science.gov (United States)

    Krebber, Katerina; Lenke, Philipp; Liehr, Sascha; Noether, Nils; Wendt, Mario; Wosniok, Aleksander

    2010-04-01

    Terrorists and criminals more and more attack and destroy important infrastructures like routes, railways, bridges, tunnels, dikes and dams, important buildings. Therefore, reliable on-line and long-term monitoring systems are required to protect such critical infrastructures. Fiber optic sensors are well-suited for that. They can be installed over many kilometers and are able to measure continuously distributed strain, pressure, temperature and further mechanical and physical quantities. The very tiny optical fibers can be integrated into structures and materials and can provide information about any significant changes or damages of the structures. These so-called smart materials and smart structures are able to monitor itself or its environment. Particularly smart technical textiles with embedded fiber optic sensors have become very attractive because of their high importance for the structural health monitoring of geotechnical and masonry infrastructures. Such textiles are usually used for reinforcement of the structures; the embedded fiber optic sensors provide information about the condition of the structures and detect the presence of any damages and destructions in real time. Thus, critical infrastructures can be preventively protected. The paper will introduce this innovative field and will present the results achieved within several German and European projects.

  7. Spatially Partitioned Embedded Runge--Kutta Methods

    KAUST Repository

    Ketcheson, David I.

    2013-10-30

    We study spatially partitioned embedded Runge--Kutta (SPERK) schemes for partial differential equations (PDEs), in which each of the component schemes is applied over a different part of the spatial domain. Such methods may be convenient for problems in which the smoothness of the solution or the magnitudes of the PDE coefficients vary strongly in space. We focus on embedded partitioned methods as they offer greater efficiency and avoid the order reduction that may occur in nonembedded schemes. We demonstrate that the lack of conservation in partitioned schemes can lead to nonphysical effects and propose conservative additive schemes based on partitioning the fluxes rather than the ordinary differential equations. A variety of SPERK schemes are presented, including an embedded pair suitable for the time evolution of fifth-order weighted nonoscillatory spatial discretizations. Numerical experiments are provided to support the theory.

  8. Spatially Partitioned Embedded Runge--Kutta Methods

    KAUST Repository

    Ketcheson, David I.; MacDonald, Colin B.; Ruuth, Steven J.

    2013-01-01

    We study spatially partitioned embedded Runge--Kutta (SPERK) schemes for partial differential equations (PDEs), in which each of the component schemes is applied over a different part of the spatial domain. Such methods may be convenient for problems in which the smoothness of the solution or the magnitudes of the PDE coefficients vary strongly in space. We focus on embedded partitioned methods as they offer greater efficiency and avoid the order reduction that may occur in nonembedded schemes. We demonstrate that the lack of conservation in partitioned schemes can lead to nonphysical effects and propose conservative additive schemes based on partitioning the fluxes rather than the ordinary differential equations. A variety of SPERK schemes are presented, including an embedded pair suitable for the time evolution of fifth-order weighted nonoscillatory spatial discretizations. Numerical experiments are provided to support the theory.

  9. Patron perception and utilization of an embedded librarian program

    Directory of Open Access Journals (Sweden)

    Lindsay Blake, MLIS, AHIP

    2016-09-01

    Full Text Available Objective: The study measured the perceived value of an academic library’s embedded librarian service model. Setting: The study took place at the health sciences campuses of a research institution. Methods: A web-based survey was distributed that asked respondents a series of questions about their utilization of and satisfaction with embedded librarians and services. Results: Over 58% of respondents reported being aware of their embedded librarians, and 95% of these were satisfied with provided services. Conclusions: The overall satisfaction with services was encouraging, but awareness of the embedded program was low, suggesting an overall need for marketing of services.

  10. Six transformer based asymmetrical embedded Z-source inverters

    DEFF Research Database (Denmark)

    Wei, Mo; Poh Chiang, Loh; Chi, Jin

    2013-01-01

    Embedded/Asymmetrical embedded Z-source inverters were proposed to maintain smooth input current/voltage across the dc source and within the impedance network, remain the shoot-through feature used to boost up the dc-link voltage without adding bulky filter at input side. This paper introduces a ...... a class of transformer based asymmetrical embedded Z-source inverters which keep the smooth input current and voltage while achieving enhanced voltage boost capability. The presented inverters are verified by laboratory prototypes experimentally....

  11. Highly Porous Silicon Embedded in a Ceramic Matrix: A Stable High-Capacity Electrode for Li-Ion Batteries.

    Science.gov (United States)

    Vrankovic, Dragoljub; Graczyk-Zajac, Magdalena; Kalcher, Constanze; Rohrer, Jochen; Becker, Malin; Stabler, Christina; Trykowski, Grzegorz; Albe, Karsten; Riedel, Ralf

    2017-11-28

    We demonstrate a cost-effective synthesis route that provides Si-based anode materials with capacities between 2000 and 3000 mAh·g Si -1 (400 and 600 mAh·g composite -1 ), Coulombic efficiencies above 99.5%, and almost 100% capacity retention over more than 100 cycles. The Si-based composite is prepared from highly porous silicon (obtained by reduction of silica) by encapsulation in an organic carbon and polymer-derived silicon oxycarbide (C/SiOC) matrix. Molecular dynamics simulations show that the highly porous silicon morphology delivers free volume for the accommodation of strain leading to no macroscopic changes during initial Li-Si alloying. In addition, a carbon layer provides an electrical contact, whereas the SiOC matrix significantly diminishes the interface between the electrolyte and the electrode material and thus suppresses the formation of a solid-electrolyte interphase on Si. Electrochemical tests of the micrometer-sized, glass-fiber-derived silicon demonstrate the up-scaling potential of the presented approach.

  12. Strengthening capacity for local evidence to inform local responders to HIV in a remote Solomon Island health service

    Directory of Open Access Journals (Sweden)

    David MacLaren

    2015-04-01

    Full Text Available Background: Documenting specific knowledge and attitudes about HIV in the culturally diverse nation of Solomon Islands is essential to inform locally targeted public health responses. As part of a large capacity-strengthening project at Atoifi Adventist Hospital in East Kwaio, Solomon Islands, researchers, using a ‘learn-by-doing’ process, worked with participants in public health research methods. Methods: Overall, 43 people attended research capacity building workshops in 2011; eight joined the HIV study group. A cross-sectional survey including semi-structured interviews on HIV was conducted by the group. In February 2014, a hospital administrator was interviewed about how the 2011 study informed local HIV responses. Results: Of the 53 survey participants, 64% self-assessed as having little or no HIV knowledge, but 90% knew HIV could be transmitted between men and women during sex. Less than 50% knew HIV could be transmitted between two men having sex, 45% thought HIV could be transmitted by mosquitoes and 55% agreed condoms help protect from HIV. Most participants reported negative attitudes towards people with HIV. Three years later the health administrator reported ad hoc responses to HIV because of low HIV prevalence, increasing noncommunicable diseases, staff turnover and resource shortages. Discussion: This HIV study was used to strengthen research skills in local health professionals and community members in Solomon Islands. It showed that community members require accurate information about HIV transmission and that entrenched stigma is an issue. Although results provided local evidence for local response, ongoing health system challenges and little local HIV transmission meant HIV services remain rudimentary.

  13. Making the Case for Embedded Metadata in Digital Images

    DEFF Research Database (Denmark)

    Smith, Kari R.; Saunders, Sarah; Kejser, U.B.

    2014-01-01

    This paper discusses the standards, methods, use cases, and opportunities for using embedded metadata in digital images. In this paper we explain the past and current work engaged with developing specifications, standards for embedding metadata of different types, and the practicalities of data...... exchange in heritage institutions and the culture sector. Our examples and findings support the case for embedded metadata in digital images and the opportunities for such use more broadly in non-heritage sectors as well. We encourage the adoption of embedded metadata by digital image content creators...... and curators as well as those developing software and hardware that support the creation or re-use of digital images. We conclude that the usability of born digital images as well as physical objects that are digitized can be extended and the files preserved more readily with embedded metadata....

  14. Making the Case for Embedded Metadata in Digital Images

    DEFF Research Database (Denmark)

    Smith, Kari R.; Saunders, Sarah; Kejser, U.B.

    2014-01-01

    exchange in heritage institutions and the culture sector. Our examples and findings support the case for embedded metadata in digital images and the opportunities for such use more broadly in non-heritage sectors as well. We encourage the adoption of embedded metadata by digital image content creators......This paper discusses the standards, methods, use cases, and opportunities for using embedded metadata in digital images. In this paper we explain the past and current work engaged with developing specifications, standards for embedding metadata of different types, and the practicalities of data...... and curators as well as those developing software and hardware that support the creation or re-use of digital images. We conclude that the usability of born digital images as well as physical objects that are digitized can be extended and the files preserved more readily with embedded metadata....

  15. CLSM: COUPLE LAYERED SECURITY MODEL A HIGH-CAPACITY DATA HIDING SCHEME USING WITH STEGANOGRAPHY

    Directory of Open Access Journals (Sweden)

    Cemal Kocak

    2017-03-01

    Full Text Available Cryptography and steganography are the two significant techniques used in secrecy of communications and in safe message transfer. In this study CLSM – Couple Layered Security Model is suggested which has a hybrid structure enhancing information security using features of cryptography and steganography. In CLSM system; the information which has been initially cryptographically encrypted is steganographically embedded in an image at the next step. The information is encrypted by means of a Text Keyword consisting of maximum 16 digits determined by the user in cryptography method. Similarly, the encrypted information is processed, during the embedding stage, using a 16 digit pin (I-PIN which is determined again by the user. The carrier images utilized in the study have been determined as 24 bit/pixel colour. Utilization of images in .jpeg, .tiff, .pnp format has also been provided. The performance of the CLSM method has been evaluated according to the objective quality measurement criteria of PSNR-dB (Peak Signal-to-Noise Ratio and SSIM (Structural Similarity Index. In the study, 12 different sized information between 1000 and 609,129 bits were embedded into images. Between 34.14 and 65.8 dB PSNR values and between 0.989 and 0.999 SSIM values were obtained. CLSM showed better results compared to Pixel Value Differencing (PVD method, Simulated Annealing (SA Algorithm and Mix column transform based on irreducible polynomial mathematics methods.

  16. Operating system concepts for embedded multicores

    OpenAIRE

    Horst, Oliver; Schmidt, Adriaan

    2014-01-01

    Currently we can see an increasing adoption of multi-core platforms in the area of embedded systems. While these new hardware platforms offer the potential to satisfy the ever increasing demand for computational power, they pose considerable challenges with regard to software development. This affects the application software itself, but also the system design and architecture. Here, we address the consequences for operating system architecture in embedded systems. After dis-cussing current a...

  17. Teaching Embedded System Concepts for Technological Literacy

    Science.gov (United States)

    Winzker, M.; Schwandt, A.

    2011-01-01

    A basic understanding of technology is recognized as important knowledge even for students not connected with engineering and computer science. This paper shows that embedded system concepts can be taught in a technological literacy course. An embedded system teaching block that has been used in an electronics module for non-engineers is…

  18. A Foundation for Embedded Languages

    DEFF Research Database (Denmark)

    Rhiger, Morten

    2003-01-01

    Recent work on embedding object languages into Haskell use "phantom types" (i.e., parameterized types whose parameter does not occur on the right-hand side of the type definition) to ensure that the embedded object-language terms are simply typed. But is it a safe assumption that only simply......-typed terms can be represented in Haskell using phantom types? And conversely, can all simply-typed terms be represented in Haskell under the restrictions imposed by phantom types? In this article we investigate the conditions under which these assumptions are true: We show that these questions can...

  19. A Foundation for Embedded Languages

    DEFF Research Database (Denmark)

    Rhiger, Morten

    2002-01-01

    Recent work on embedding object languages into Haskell use "phantom types" (i.e., parameterized types whose parameter does not occur on the right-hand side of the type definition) to ensure that the embedded object-language terms are simply typed. But is it a safe assumption that only simply......-typed terms can be represented in Haskell using phantom types? And conversely, can all simply-typed terms be represented in Haskell under the restrictions imposed by phantom types? In this article we investigate the conditions under which these assumptions are true: We show that these questions can...

  20. Embedded Fragments Registry (EFR)

    Data.gov (United States)

    Department of Veterans Affairs — In 2009, the Department of Defense estimated that approximately 40,000 service members who served in OEF/OIF may have embedded fragment wounds as the result of small...

  1. RESLanjut: The learning media for improve students understanding in embedded systems

    Science.gov (United States)

    Indrianto, Susanti, Meilia Nur Indah; Karina, Djunaidi

    2017-08-01

    The use of network in embedded system can be done with many kinds of network, with the use of mobile phones, bluetooths, modems, ethernet cards, wireless technology and so on. Using network in embedded system could help people to do remote controlling. On previous research, researchers found that many students have the ability to comprehend the basic concept of embedded system. They could also make embedded system tools but without network integration. And for that, a development is needed for the embedded system module. The embedded system practicum module design needs a prototype method in order to achieve the desired goal. The prototype method is often used in the real world. Or even, a prototype method is a part of products that consist of logic expression or external physical interface. The embedded system practicum module is meant to increase student comprehension of embedded system course, and also to encourage students to innovate on technology based tools. It is also meant to help teachers to teach the embedded system concept on the course. The student comprehension is hoped to increase with the use of practicum course.

  2. A Novel Texture-Quantization-Based Reversible Multiple Watermarking Scheme Applied to Health Information System.

    Science.gov (United States)

    Turuk, Mousami; Dhande, Ashwin

    2018-04-01

    The recent innovations in information and communication technologies have appreciably changed the panorama of health information system (HIS). These advances provide new means to process, handle, and share medical images and also augment the medical image security issues in terms of confidentiality, reliability, and integrity. Digital watermarking has emerged as new era that offers acceptable solutions to the security issues in HIS. Texture is a significant feature to detect the embedding sites in an image, which further leads to substantial improvement in the robustness. However, considering the perspective of digital watermarking, this feature has received meager attention in the reported literature. This paper exploits the texture property of an image and presents a novel hybrid texture-quantization-based approach for reversible multiple watermarking. The watermarked image quality has been accessed by peak signal to noise ratio (PSNR), structural similarity measure (SSIM), and universal image quality index (UIQI), and the obtained results are superior to the state-of-the-art methods. The algorithm has been evaluated on a variety of medical imaging modalities (CT, MRA, MRI, US) and robustness has been verified, considering various image processing attacks including JPEG compression. The proposed scheme offers additional security using repetitive embedding of BCH encoded watermarks and ADM encrypted ECG signal. Experimental results achieved a maximum of 22,616 bits hiding capacity with PSNR of 53.64 dB.

  3. Crosstalk-aware virtual network embedding over inter-datacenter optical networks with few-mode fibers

    Science.gov (United States)

    Huang, Haibin; Guo, Bingli; Li, Xin; Yin, Shan; Zhou, Yu; Huang, Shanguo

    2017-12-01

    Virtualization of datacenter (DC) infrastructures enables infrastructure providers (InPs) to provide novel services like virtual networks (VNs). Furthermore, optical networks have been employed to connect the metro-scale geographically distributed DCs. The synergistic virtualization of the DC infrastructures and optical networks enables the efficient VN service over inter-DC optical networks (inter-DCONs). While the capacity of the used standard single-mode fiber (SSMF) is limited by their nonlinear characteristics. Thus, mode-division multiplexing (MDM) technology based on few-mode fibers (FMFs) could be employed to increase the capacity of optical networks. Whereas, modal crosstalk (XT) introduced by optical fibers and components deployed in the MDM optical networks impacts the performance of VN embedding (VNE) over inter-DCONs with FMFs. In this paper, we propose a XT-aware VNE mechanism over inter-DCONs with FMFs. The impact of XT is considered throughout the VNE procedures. The simulation results show that the proposed XT-aware VNE can achieves better performances of blocking probability and spectrum utilization compared to conventional VNE mechanisms.

  4. Embedding the Finite Sampling Process at a Rate

    OpenAIRE

    Shorack, Galen R.

    1991-01-01

    A huge body of if and only if theorems can be obtained based on certain strong embedding theorems for the partial sum process $\\mathbb{S}_n$ and the uniform empirical and quantile processes $\\mathbb{U}_n$ and $\\mathbb{V}_n$. This embedding was accomplished in 1986 by M. Csorgo, S. Csorgo, L. Horvath and D. Mason. Their embedding is beautifully formulated so that many necessary and sufficient type results can be established using it. It is worthwhile to have an accessible proof. Indeed, these ...

  5. Making embedded systems design patterns for great software

    CERN Document Server

    White, Elecia

    2011-01-01

    Interested in developing embedded systems? Since they don't tolerate inefficiency, these systems require a disciplined approach to programming. This easy-to-read guide helps you cultivate a host of good development practices, based on classic software design patterns and new patterns unique to embedded programming. Learn how to build system architecture for processors, not operating systems, and discover specific techniques for dealing with hardware difficulties and manufacturing requirements. Written by an expert who's created embedded systems ranging from urban surveillance and DNA scanner

  6. Reshaping teacher thinking, planning and practice using embedded assessment: Case studies of three middle school science teachers

    Science.gov (United States)

    Jeranyama, Letina Ngwenya

    At the dawn of the 21st century the science education community is seeking ways of improving science education to produce a scientific literate citizenry. They have put forth new goals. Teachers are key to all efforts to improve schools, that without their full participation, any move to reform education nor matter how well intentioned is doomed to failure. The changes in the goals of science education imply that teachers have to change the way they teach science. Some scholars have suggested that one way to help teachers attain the reform goals is by using embedded assessment. Embedded assessment is defined as a cyclical and ongoing process whereby teachers gather data about students' understanding as they teach, they analyze the data formally or informally and use the analysis to plan or adjust teaching immediately, for the next hour, day, topic, unit or year. The next day's activities also include embedded assessment and so the cycle repeats itself. This study investigates how teachers make sense of embedded assessment, how embedded assessment looks in practice, how it influences teachers and their classroom environments and the challenges teachers face as they use embedded assessment. Three middle school science teachers were involved in the study. Data were collected through semi-structured interviews with open-ended questions, participant observations and professional development conversations. Data were analyzed using the qualitative method of constant comparative analysis. The findings indicate that teachers passed through different stages in conceptualizing embedded assessment. This conceptualization influenced the way embedded assessment looked in the classroom. Embedded assessment took many forms and shapes in the teachers' classrooms. Embedded assessment influenced the teachers' perspectives about the curriculum, students, teaching, assessment, planning and reflection in ways that enabled the teachers to be investigators of their students' understanding

  7. Primal and dual approaches to fishing capacity

    DEFF Research Database (Denmark)

    Kerstens, Kristiaan; Vestergaard, Niels

    2013-01-01

    Application of primal non-parametric approaches to estimation of fishing capacity provides useful disaggregated information about fishing firm’s capacities utilizations. A potentially serious issue is that the estimated capacity utilization rates can be relatively low. This may call for reductions...... in the fishing fleet that are political impossible to defend. In this paper two modifications of the traditional approach are explored. First, non-convex technologies are introduced and it is shown how the primal non-parametric approach leads to different capacity utilization rates. Then capacity utilization...... measures using cost functions are specified for both convex and non-convex technologies. It is illustrated how the convexity assumption impacts capacity utilization rates and how this dual approach differs from the primal approach. Second, the effect of utilizing these different convex versus non...

  8. On the capacity of cognitive radio under limited channel state information over fading channels

    KAUST Repository

    Rezki, Zouheir

    2011-06-01

    A spectrum-sharing communication system where the secondary user is aware of the instantaneous channel state information (CSI) of the secondary link, but knows only the statistics and an estimated version of the secondary transmitter-primary receiver (ST-PR) link, is investigated. The optimum power profile and the ergodic capacity of the secondary link are derived for general fading channels (with continuous probability density function) under average and peak transmit-power constraints and with respect to two different interference constraints: an interference outage constraint and a signal-to-interference (SI) outage constraint. When applied to Rayleigh fading channels, our results show, for instance, that the interference constraint is harmful at high-power regime, whereas at low-power regime, it has a marginal impact and no-interference performance may be achieved. © 2011 IEEE.

  9. On the secrecy capacity of the broadcast wiretap channel with imperfect channel state information

    KAUST Repository

    Hyadi, Amal

    2014-12-01

    In this paper, we consider secure broadcasting over fast fading channels. Assuming imperfect main channel state information (CSI) at the transmitter, we first provide an upper and a lower bounds on the ergodic secrecy capacity when a common message is broadcasted to multiple legitimate receivers in the presence of one eavesdropper. For this case, we show that the secrecy rate is limited by the legitimate receiver having, on average, the worst main channel link. Then, we present an expression for the achievable secrecy sum-rate when each legitimate receiver is interested in an independent message. The special cases of high SNR, perfect and no-main CSI are also analyzed. Numerical results are presented to illustrate the obtained results for the case of independent but not necessarily identically distributed Rayleigh fading channels.

  10. Quasi-superactivation for the classical capacity of quantum channels

    Energy Technology Data Exchange (ETDEWEB)

    Gyongyosi, Laszlo, E-mail: gyongyosi@hit.bme.hu [Quantum Technologies Laboratory, Department of Telecommunications, Budapest University of Technology and Economics, 2 Magyar tudosok krt, Budapest, H-1117, Hungary and Information Systems Research Group, Mathematics and Natural Sciences, Hungarian Ac (Hungary); Imre, Sandor [Quantum Technologies Laboratory, Department of Telecommunications, Budapest University of Technology and Economics, 2 Magyar tudosok krt, Budapest, H-1117 (Hungary)

    2014-12-04

    The superactivation effect has its roots in the extreme violation of additivity of the channel capacity and enables to reliably transmit quantum information over zero-capacity quantum channels. In this work we demonstrate a similar effect for the classical capacity of a quantum channel which previously was thought to be impossible.

  11. Is embedding entailed in consumer valuation of food safety characteristics?

    DEFF Research Database (Denmark)

    Mørkbak, Morten Raun; Christensen, Tove; Gyrd-Hansen, Dorte

    2011-01-01

    Consumers' preferences for food safety characteristics are investigated with a particular focus on the existence of an embedding effect. Embedding exists if consumer valuation of food safety is insensitive to scope. We conduct between-attribute external tests for embedding in two choice experiments...

  12. Embedded fiber optic ultrasonic sensors and generators

    Science.gov (United States)

    Dorighi, John F.; Krishnaswamy, Sridhar; Achenbach, Jan D.

    1995-04-01

    Ultrasonic sensors and generators based on fiber-optic systems are described. It is shown that intrinsic fiber optic Fabry-Perot ultrasound sensors that are embedded in a structure can be stabilized by actively tuning the laser frequency. The need for this method of stabilization is demonstrated by detecting piezoelectric transducer-generated ultrasonic pulses in the presence of low frequency dynamic strains that are intentionally induced to cause sensor drift. The actively stabilized embedded fiber optic Fabry-Perot sensor is also shown to have sufficient sensitivity to detect ultrasound that is generated in the interior of a structure by means of a high-power optical fiber that pipes energy from a pulsed laser to an embedded generator of ultrasound.

  13. Eulerian graph embeddings and trails confined to lattice tubes

    International Nuclear Information System (INIS)

    Soteros, C E

    2006-01-01

    Embeddings of graphs in sublattices of the square and simple cubic lattice known as tubes (or prisms) are considered. For such sublattices, two combinatorial bounds are obtained which each relate the number of embeddings of all closed eulerian graphs with k branch points (vertices of degree greater than two) to the number of self-avoiding polygons. From these bounds it is proved that the entropic critical exponent for the number of embeddings of closed eulerian graphs with k branch points is equal to k, and the entropic critical exponent for the number of closed trails with k branch points is equal to k + 1. One of the required combinatorial bounds is obtained via Madras' 1999 lattice cluster pattern theorem, which yields a bound on the number of ways to convert a self-avoiding polygon into a closed eulerian graph embedding with k branch points. The other combinatorial bound is established by constructing a method for sequentially removing branch points from a closed eulerian graph embedding; this yields a bound on the number of ways to convert a closed eulerian graph embedding into a self-avoiding polygon

  14. Towards an Informed Mexican and Mexican-American Citizenry: Bridging the Gap to Increase Human Capacity and Information Dissemination

    Science.gov (United States)

    Ramirez, M. D.; Ramirez, D. M.

    2008-12-01

    The research translation and community outreach goal of The University of Arizona's (UA) Superfund Basic Research Program and U.S.-Mexico Binational Center for Environmental Sciences and Toxicology is to increase human capacity and information dissemination to diverse stakeholders, including federal, state, and local government agencies as well as northern Mexican and border community stakeholders. Due to Arizona's demographic characteristics and the UA's proximity to the U.S. - Mexico border, activities target primarily Mexican and Mexican-American populations. With this in mind, a model has been established that pulls from human capital, community-based participatory research and public participation theories. The theories applied to our target population have resulted in the creation of a successful model that is used in both research translation and community outreach work. The model contains four components: community needs (participation), science translation (information), engagement (outreach), and training (education). Examples of how this model operates for various stakeholders involved in environmental science and health issues will be discussed. A case in point of how this model has been applied effectively is the partnership with promotoras (community health advocates) to do environmental science and health trainings to increase the knowledge base of specific populations disproportionately exposed to contaminants of concern. Additional case studies and methodologies used to develop innovative communicative tools (that takes into consideration cultural idiosyncrasies) for stakeholders at all levels in Arizona, the border, and Mexico will be highlighted, such as: 1) information sheets regarding local environmental issues for communities neighboring contaminated sites, 2) SciTransfer Bulletins targeting professional level stakeholders such as Project Managers, Community Involvement Coordinators and the general public, 3) coordinating technical and

  15. Flexible Architecture for FPGAs in Embedded Systems

    Science.gov (United States)

    Clark, Duane I.; Lim, Chester N.

    2012-01-01

    Commonly, field-programmable gate arrays (FPGAs) being developed in cPCI embedded systems include the bus interface in the FPGA. This complicates the development because the interface is complicated and requires a lot of development time and FPGA resources. In addition, flight qualification requires a substantial amount of time be devoted to just this interface. Another complication of putting the cPCI interface into the FPGA being developed is that configuration information loaded into the device by the cPCI microprocessor is lost when a new bit file is loaded, requiring cumbersome operations to return the system to an operational state. Finally, SRAM-based FPGAs are typically programmed via specialized cables and software, with programming files being loaded either directly into the FPGA, or into PROM devices. This can be cumbersome when doing FPGA development in an embedded environment, and does not have an easy path to flight. Currently, FPGAs used in space applications are usually programmed via multiple space-qualified PROM devices that are physically large and require extra circuitry (typically including a separate one-time programmable FPGA) to enable them to be used for this application. This technology adds a cPCI interface device with a simple, flexible, high-performance backend interface supporting multiple backend FPGAs. It includes a mechanism for programming the FPGAs directly via the microprocessor in the embedded system, eliminating specialized hardware, software, and PROM devices and their associated circuitry. It has a direct path to flight, and no extra hardware and minimal software are required to support reprogramming in flight. The device added is currently a small FPGA, but an advantage of this technology is that the design of the device does not change, regardless of the application in which it is being used. This means that it needs to be qualified for flight only once, and is suitable for one-time programmable devices or an application

  16. Embedding beyond electrostatics-The role of wave function confinement.

    Science.gov (United States)

    Nåbo, Lina J; Olsen, Jógvan Magnus Haugaard; Holmgaard List, Nanna; Solanko, Lukasz M; Wüstner, Daniel; Kongsted, Jacob

    2016-09-14

    We study excited states of cholesterol in solution and show that, in this specific case, solute wave-function confinement is the main effect of the solvent. This is rationalized on the basis of the polarizable density embedding scheme, which in addition to polarizable embedding includes non-electrostatic repulsion that effectively confines the solute wave function to its cavity. We illustrate how the inclusion of non-electrostatic repulsion results in a successful identification of the intense π → π(∗) transition, which was not possible using an embedding method that only includes electrostatics. This underlines the importance of non-electrostatic repulsion in quantum-mechanical embedding-based methods.

  17. Extreme learning machine based optimal embedding location finder for image steganography.

    Directory of Open Access Journals (Sweden)

    Hayfaa Abdulzahra Atee

    Full Text Available In image steganography, determining the optimum location for embedding the secret message precisely with minimum distortion of the host medium remains a challenging issue. Yet, an effective approach for the selection of the best embedding location with least deformation is far from being achieved. To attain this goal, we propose a novel approach for image steganography with high-performance, where extreme learning machine (ELM algorithm is modified to create a supervised mathematical model. This ELM is first trained on a part of an image or any host medium before being tested in the regression mode. This allowed us to choose the optimal location for embedding the message with best values of the predicted evaluation metrics. Contrast, homogeneity, and other texture features are used for training on a new metric. Furthermore, the developed ELM is exploited for counter over-fitting while training. The performance of the proposed steganography approach is evaluated by computing the correlation, structural similarity (SSIM index, fusion matrices, and mean square error (MSE. The modified ELM is found to outperform the existing approaches in terms of imperceptibility. Excellent features of the experimental results demonstrate that the proposed steganographic approach is greatly proficient for preserving the visual information of an image. An improvement in the imperceptibility as much as 28% is achieved compared to the existing state of the art methods.

  18. Working Memory Capacity and Fluid Intelligence: Maintenance and Disengagement.

    Science.gov (United States)

    Shipstead, Zach; Harrison, Tyler L; Engle, Randall W

    2016-11-01

    Working memory capacity and fluid intelligence have been demonstrated to be strongly correlated traits. Typically, high working memory capacity is believed to facilitate reasoning through accurate maintenance of relevant information. In this article, we present a proposal reframing this issue, such that tests of working memory capacity and fluid intelligence are seen as measuring complementary processes that facilitate complex cognition. Respectively, these are the ability to maintain access to critical information and the ability to disengage from or block outdated information. In the realm of problem solving, high working memory capacity allows a person to represent and maintain a problem accurately and stably, so that hypothesis testing can be conducted. However, as hypotheses are disproven or become untenable, disengaging from outdated problem solving attempts becomes important so that new hypotheses can be generated and tested. From this perspective, the strong correlation between working memory capacity and fluid intelligence is due not to one ability having a causal influence on the other but to separate attention-demanding mental functions that can be contrary to one another but are organized around top-down processing goals. © The Author(s) 2016.

  19. Capacity management of nursing staff as a vehicle for organizational improvement

    NARCIS (Netherlands)

    Elkhuizen, Sylvia G.; Bor, Gert; Smeenk, Marjolein; Klazinga, Niek S.; Bakker, Piet J. M.

    2007-01-01

    Background: Capacity management systems create insight into required resources like staff and equipment. For inpatient hospital care, capacity management requires information on beds and nursing staff capacity, on a daily as well as annual basis. This paper presents a comprehensive capacity model

  20. Design Technology for Heterogeneous Embedded Systems

    CERN Document Server

    O'Connor, Ian; Piguet, Christian

    2012-01-01

    Designing technology to address the problem of heterogeneous embedded systems, while remaining compatible with standard “More Moore” flows, i.e. capable of handling simultaneously both silicon complexity and system complexity, represents one of the most important challenges facing the semiconductor industry today. While the micro-electronics industry has built its own specific design methods to focus mainly on the management of complexity through the establishment of abstraction levels, the emergence of device heterogeneity requires new approaches enabling the satisfactory design of physically heterogeneous embedded systems for the widespread deployment of such systems. This book, compiled largely from a set of contributions from participants of past editions of the Winter School on Heterogeneous Embedded Systems Design Technology (FETCH), proposes a broad and holistic overview of design techniques used to tackle the various facets of heterogeneity in terms of technology and opportunities at the physical ...

  1. Dynamic memory management for embedded systems

    CERN Document Server

    Atienza Alonso, David; Poucet, Christophe; Peón-Quirós, Miguel; Bartzas, Alexandros; Catthoor, Francky; Soudris, Dimitrios

    2015-01-01

    This book provides a systematic and unified methodology, including basic principles and reusable processes, for dynamic memory management (DMM) in embedded systems.  The authors describe in detail how to design and optimize the use of dynamic memory in modern, multimedia and network applications, targeting the latest generation of portable embedded systems, such as smartphones. Coverage includes a variety of design and optimization topics in electronic design automation of DMM, from high-level software optimization to microarchitecture-level hardware support. The authors describe the design of multi-layer dynamic data structures for the final memory hierarchy layers of the target portable embedded systems and how to create a low-fragmentation, cost-efficient, dynamic memory management subsystem out of configurable components for the particular memory allocation and de-allocation patterns for each type of application.  The design methodology described in this book is based on propagating constraints among de...

  2. MB3-Miner: efficiently mining eMBedded subTREEs using Tree Model Guided candidate generation

    NARCIS (Netherlands)

    Tan, H.; Dillon, T.; Hadzic, F.; Chang, E.; Feng, L.

    2005-01-01

    Tree mining has many useful applications in areas such as Bioinformatics, XML mining, Web mining, etc. In general, most of the formally represented information in these domains is a tree structured form. In this paper we focus on mining frequent embedded subtrees from databases of rooted labeled

  3. Researching into a MOOC Embedded Flipped Classroom Model for College English Reading and Writing Course

    Science.gov (United States)

    Xinying, Zhang

    2017-01-01

    There is obvious pressure for higher education institutions to undergo transformation now in China. Reflecting this, the computer and information technology give rise to the development of a Massive Open Online Course (MOOC) embedded flipped classroom. Flipped classroom approaches replace the traditional transmissive teaching with engaging…

  4. Distributed embedded smart cameras architectures, design and applications

    CERN Document Server

    Velipasalar, Senem

    2014-01-01

    This publication addresses distributed embedded smart cameras –cameras that perform onboard analysis and collaborate with other cameras. This book provides the material required to better understand the architectural design challenges of embedded smart camera systems, the hardware/software ecosystem, the design approach for, and applications of distributed smart cameras together with the state-of-the-art algorithms. The authors concentrate on the architecture, hardware/software design, realization of smart camera networks from applications to architectures, in particular in the embedded and mobile domains. •                    Examines energy issues related to wireless communication such as decreasing energy consumption to increase battery-life •                    Discusses processing large volumes of video data on an embedded environment in real-time •                    Covers design of realistic applications of distributed and embedded smart...

  5. Verification and Performance Analysis for Embedded Systems

    DEFF Research Database (Denmark)

    Larsen, Kim Guldstrand

    2009-01-01

    This talk provides a thorough tutorial of the UPPAAL tool suite for, modeling, simulation, verification, optimal scheduling, synthesis, testing and performance analysis of embedded and real-time systems.......This talk provides a thorough tutorial of the UPPAAL tool suite for, modeling, simulation, verification, optimal scheduling, synthesis, testing and performance analysis of embedded and real-time systems....

  6. Embedded generation connection incentives for distribution network operators

    Energy Technology Data Exchange (ETDEWEB)

    Williams, P.; Andrews, S.

    2002-07-01

    This is the final report with respect to work commissioned by the Department of Trade and Industry (DTI) as part of the New and Renewable Energy Programme into incentives for distribution network operators (DNOs) for the connection of embedded generation. This report, which incorporates the contents of the interim report submitted in February 2002, considers the implications of changes in the structure and regulation in the UK electricity industry on the successful technical and commercial integrated of embedded generation into distribution networks. The report examines: the obligations of public electricity suppliers (PESs); current DNO practices regarding the connection of embedded generation; the changes introduced by the Utilities Act 2000, including the impact of new obligations placed on DNOs on the connection of embedded generation and the requirements of the new Electricity Distribution Standard Licence conditions; and problems and prospects for DNO incentives.

  7. Scheduling of network access for feedback-based embedded systems

    Science.gov (United States)

    Liberatore, Vincenzo

    2002-07-01

    nd communication capabilities. Examples range from smart dust embedded in building materials to networks of appliances in the home. Embedded devices will be deployed in unprecedented numbers, will enable pervasive distributed computing, and will radically change the way people interact with the surrounding environment [EGH00a]. The paper targets embedded systems and their real-time (RT) communication requirements. RT requirements arise from the

  8. Development of Field Information Monitoring System Based on the Internet of Things

    Science.gov (United States)

    Cai, Ken; Liang, Xiaoying; Wang, Keqiang

    With the rapid development and wide application of electronics, communication and embedded system technologies, the global agriculture is changing from traditional agriculture that is to improve the production relying on the increase of labor, agricultural inputs to the new stage of modern agriculture with low yields, high efficiency, real-time and accuracy. On the other hand the research and development of the Internet of Things, which is an information network to connect objects, with the full capacity to perceive objects, and having the capabilities of reliable transmission and intelligence processing for information, allows us to obtain real-time information of anything. The application of the Internet of Things in field information online monitoring is an effective solution for present wired sensor monitoring system, which has much more disadvantages, such as high cost, the problems of laying lines and so on. In this paper, a novel field information monitoring system based on the Internet of Things is proposed. It can satisfy the requirements of multi-point measurement, mobility, convenience in the field information monitoring process. The whole structure of system is given and the key designs of system design are described in the hardware and software aspect. The studies have expanded current field information measurement methods and strengthen the application of the Internet of Things.

  9. Testbeam Studies on Pick-Up in Sensors with Embedded Pitch Adapters

    CERN Document Server

    Rehnisch, Laura; The ATLAS collaboration

    2017-01-01

    For silicon strip sensors, the tracking information specifications can lead to challenging requirements for wire bonding. A common strategy is to use external pitch adapters to facilitate this step in the production of detector modules. A novel approach previously discussed in [1], is to implement the pitch adapters in the sensor, by embedding a second layer of metal tracks. The use of these embedded pitch adapters (EPAs) decouples the bond pad layout of the sensor from its implant layout by moving the adaption to the sensor production step. This solution, however, can yield the risk of performance losses due to the increase of inter-strip capacitance, or unwanted capacitive coupling between the metal layers (cross-talk) or the silicon bulk and the second metal layer (pick-up). In the prototyping stage of the ATLAS tracker end-cap upgrade, where different bond-pad layouts on sensor and readout chip lead to extremely challenging wire-bonding conditions, sensors with different geometries of EPA implementations ...

  10. Programming Windows® Embedded CE 60 Developer Reference

    CERN Document Server

    Boling, Douglas

    2010-01-01

    Get the popular, practical reference to developing small footprint applications-now updated for the Windows Embedded CE 6.0 kernel. Written by an authority on embedded application development, this book focuses in on core operating concepts and the Win32 API. It delivers extensive code samples and sample projects-helping you build proficiency creating innovative Windows applications for a new generation of devices. Discover how to: Create complex applications designed for the unique requirements of embedded devicesManage virtual memory, heaps, and the stack to minimize your memory footprintC

  11. Embedded Visual System and its Applications on Robots

    CERN Document Server

    Xu, De

    2010-01-01

    Embedded vision systems such as smart cameras have been rapidly developed recently. Vision systems have become smaller and lighter, but their performance has improved. The algorithms in embedded vision systems have their specifications limited by frequency of CPU, memory size, and architecture. The goal of this e-book is to provide a an advanced reference work for engineers, researchers and scholars in the field of robotics, machine vision, and automation and to facilitate the exchange of their ideas, experiences and views on embedded vision system models. The effectiveness for all methods is

  12. Can’t Count or Won’t Count? Embedding Quantitative Methods in Substantive Sociology Curricula: A Quasi-Experiment

    Science.gov (United States)

    Williams, Malcolm; Sloan, Luke; Cheung, Sin Yi; Sutton, Carole; Stevens, Sebastian; Runham, Libby

    2015-01-01

    This paper reports on a quasi-experiment in which quantitative methods (QM) are embedded within a substantive sociology module. Through measuring student attitudes before and after the intervention alongside control group comparisons, we illustrate the impact that embedding has on the student experience. Our findings are complex and even contradictory. Whilst the experimental group were less likely to be distrustful of statistics and appreciate how QM inform social research, they were also less confident about their statistical abilities, suggesting that through ‘doing’ quantitative sociology the experimental group are exposed to the intricacies of method and their optimism about their own abilities is challenged. We conclude that embedding QM in a single substantive module is not a ‘magic bullet’ and that a wider programme of content and assessment diversification across the curriculum is preferential. PMID:27330225

  13. Bearing Fault Diagnosis Based on Statistical Locally Linear Embedding.

    Science.gov (United States)

    Wang, Xiang; Zheng, Yuan; Zhao, Zhenzhou; Wang, Jinping

    2015-07-06

    Fault diagnosis is essentially a kind of pattern recognition. The measured signal samples usually distribute on nonlinear low-dimensional manifolds embedded in the high-dimensional signal space, so how to implement feature extraction, dimensionality reduction and improve recognition performance is a crucial task. In this paper a novel machinery fault diagnosis approach based on a statistical locally linear embedding (S-LLE) algorithm which is an extension of LLE by exploiting the fault class label information is proposed. The fault diagnosis approach first extracts the intrinsic manifold features from the high-dimensional feature vectors which are obtained from vibration signals that feature extraction by time-domain, frequency-domain and empirical mode decomposition (EMD), and then translates the complex mode space into a salient low-dimensional feature space by the manifold learning algorithm S-LLE, which outperforms other feature reduction methods such as PCA, LDA and LLE. Finally in the feature reduction space pattern classification and fault diagnosis by classifier are carried out easily and rapidly. Rolling bearing fault signals are used to validate the proposed fault diagnosis approach. The results indicate that the proposed approach obviously improves the classification performance of fault pattern recognition and outperforms the other traditional approaches.

  14. Public sector information access policies in Europe

    NARCIS (Netherlands)

    Welle Donker, F.M.

    2010-01-01

    In the digital age geo-information has become embedded in our daily lives, such as navigation systems, community platforms, real estate information and weather forecasts. Everybody uses geo-information for their day-to-day decision making. Therefore, access to geo-information is of vital importance

  15. Strength and fatigue life evaluation of composite laminate with embedded sensors

    Science.gov (United States)

    Rathod, Vivek T.; Hiremath, S. R.; Roy Mahapatra, D.

    2014-04-01

    Prognosis regarding durability of composite structures using various Structural Health Monitoring (SHM) techniques is an important and challenging topic of research. Ultrasonic SHM systems with embedded transducers have potential application here due to their instant monitoring capability, compact packaging potential toward unobtrusiveness and noninvasiveness as compared to non-contact ultrasonic and eddy current techniques which require disassembly of the structure. However, embedded sensors pose a risk to the structure by acting as a flaw thereby reducing life. The present paper focuses on the determination of strength and fatigue life of the composite laminate with embedded film sensors like CNT nanocomposite, PVDF thin films and piezoceramic films. First, the techniques of embedding these sensors in composite laminates is described followed by the determination of static strength and fatigue life at coupon level testing in Universal Testing Machine (UTM). Failure mechanisms of the composite laminate with embedded sensors are studied for static and dynamic loading cases. The coupons are monitored for loading and failure using the embedded sensors. A comparison of the performance of these three types of embedded sensors is made to study their suitability in various applications. These three types of embedded sensors cover a wide variety of applications, and prove to be viable in embedded sensor based SHM of composite structures.

  16. The research and application of multi-biometric acquisition embedded system

    Science.gov (United States)

    Deng, Shichao; Liu, Tiegen; Guo, Jingjing; Li, Xiuyan

    2009-11-01

    The identification technology based on multi-biometric can greatly improve the applicability, reliability and antifalsification. This paper presents a multi-biometric system bases on embedded system, which includes: three capture daughter boards are applied to obtain different biometric: one each for fingerprint, iris and vein of the back of hand; FPGA (Field Programmable Gate Array) is designed as coprocessor, which uses to configure three daughter boards on request and provides data path between DSP (digital signal processor) and daughter boards; DSP is the master processor and its functions include: control the biometric information acquisition, extracts feature as required and responsible for compare the results with the local database or data server through network communication. The advantages of this system were it can acquire three different biometric in real time, extracts complexity feature flexibly in different biometrics' raw data according to different purposes and arithmetic and network interface on the core-board will be the solution of big data scale. Because this embedded system has high stability, reliability, flexibility and fit for different data scale, it can satisfy the demand of multi-biometric recognition.

  17. Applications of scenarios in early embedded system design space exploration

    NARCIS (Netherlands)

    van Stralen, P.

    2014-01-01

    One of the challenges during embedded system design is the application driven design. Due to the application driven design, the objectives that are steering the design of an embedded system are mainly based on the needs of the application(s). Examples of embedded system objectives are performance,

  18. Quantum and Private Capacities of Low-Noise Channels

    Science.gov (United States)

    Leditzky, Felix; Leung, Debbie; Smith, Graeme

    2018-04-01

    We determine both the quantum and the private capacities of low-noise quantum channels to leading orders in the channel's distance to the perfect channel. It has been an open problem for more than 20 yr to determine the capacities of some of these low-noise channels such as the depolarizing channel. We also show that both capacities are equal to the single-letter coherent information of the channel, again to leading orders. We thus find that, in the low-noise regime, superadditivity and degenerate codes have a negligible benefit for the quantum capacity, and shielding does not improve the private capacity beyond the quantum capacity, in stark contrast to the situation when noisier channels are considered.

  19. Word embeddings quantify 100 years of gender and ethnic stereotypes.

    Science.gov (United States)

    Garg, Nikhil; Schiebinger, Londa; Jurafsky, Dan; Zou, James

    2018-04-17

    Word embeddings are a powerful machine-learning framework that represents each English word by a vector. The geometric relationship between these vectors captures meaningful semantic relationships between the corresponding words. In this paper, we develop a framework to demonstrate how the temporal dynamics of the embedding helps to quantify changes in stereotypes and attitudes toward women and ethnic minorities in the 20th and 21st centuries in the United States. We integrate word embeddings trained on 100 y of text data with the US Census to show that changes in the embedding track closely with demographic and occupation shifts over time. The embedding captures societal shifts-e.g., the women's movement in the 1960s and Asian immigration into the United States-and also illuminates how specific adjectives and occupations became more closely associated with certain populations over time. Our framework for temporal analysis of word embedding opens up a fruitful intersection between machine learning and quantitative social science.

  20. Lung function and exercise capacity in young adults born prematurely

    NARCIS (Netherlands)

    Vrijlandt, EJLE; Gerritsen, J; Boezen, HM; Grevink, RG; Duiverman, EJ

    2006-01-01

    Rationale: Limited information is available about the long-term outcome of lung function and exercise capacity in young adults born prematurely. Objective: To determine long-term effects of prematurity on lung function (volumes, diffusing capacity) and exercise capacity in expreterms compared with

  1. An embedded checklist in the Anesthesia Information Management System improves pre-anaesthetic induction setup: a randomised controlled trial in a simulation setting.

    Science.gov (United States)

    Wetmore, Douglas; Goldberg, Andrew; Gandhi, Nishant; Spivack, John; McCormick, Patrick; DeMaria, Samuel

    2016-10-01

    Anaesthesiologists work in a high stress, high consequence environment in which missed steps in preparation may lead to medical errors and potential patient harm. The pre-anaesthetic induction period has been identified as a time in which medical errors can occur. The Anesthesia Patient Safety Foundation has developed a Pre-Anesthetic Induction Patient Safety (PIPS) checklist. We conducted this study to test the effectiveness of this checklist, when embedded in our institutional Anesthesia Information Management System (AIMS), on resident performance in a simulated environment. Using a randomised, controlled, observer-blinded design, we compared performance of anaesthesiology residents in a simulated operating room under production pressure using a checklist in completing a thorough pre-anaesthetic induction evaluation and setup with that of residents with no checklist. The checklist was embedded in the simulated operating room's electronic medical record. Data for 38 anaesthesiology residents shows a statistically significant difference in performance in pre-anaesthetic setup and evaluation as scored by blinded raters (maximum score 22 points), with the checklist group performing better by 7.8 points (p<0.01). The effects of gender and year of residency on total score were not significant. Simulation duration (time to anaesthetic agent administration) was increased significantly by the use of the checklist. Required use of a pre-induction checklist improves anaesthesiology resident performance in a simulated environment. The PIPS checklist as an integrated part of a departmental AIMS warrant further investigation as a quality measure. Published by the BMJ Publishing Group Limited. For permission to use (where not already granted under a licence) please go to http://www.bmj.com/company/products-services/rights-and-licensing/

  2. Hawking into Unruh mapping for embeddings of hyperbolic type

    International Nuclear Information System (INIS)

    Paston, S A

    2015-01-01

    We study the conditions of the existence of Hawking into Unruh mapping for hyperbolic (Fronsdal-type) metric embeddings into the Minkowski space, for which timelines are hyperbolas. Many examples are known for global embeddings into the Minkowskian spacetime (GEMS), with such mapping for physically interesting metrics with some symmetry. However, examples of embeddings, both smooth and hyperbolic, for which there is no mapping, were also given. In the present work we prove that Hawking into Unruh mapping takes place for a hyperbolic embedding of an arbitrary metric with a time-like Killing vector and a Killing horizon if the embedding of such type exists and smoothly covers the horizon. At the same time, we do not assume any symmetry (spherical, for example), except the time translational invariance, which corresponds to the existence of a time-like Killing vector. We show that the known examples of the absence of mapping do not satisfy the formulated conditions of its existence. (paper)

  3. Communicating embedded systems software and design

    CERN Document Server

    Jard, Claude

    2013-01-01

    The increased complexity of embedded systems coupled with quick design cycles to accommodate faster time-to-market requires increased system design productivity that involves both model-based design and tool-supported methodologies. Formal methods are mathematically-based techniques and provide a clean framework in which to express requirements and models of the systems, taking into account discrete, stochastic and continuous (timed or hybrid) parameters with increasingly efficient tools. This book deals with these formal methods applied to communicating embedded systems by presenting the

  4. Frozen density embedding with non-integer subsystems' particle numbers.

    Science.gov (United States)

    Fabiano, Eduardo; Laricchia, Savio; Della Sala, Fabio

    2014-03-21

    We extend the frozen density embedding theory to non-integer subsystems' particles numbers. Different features of this formulation are discussed, with special concern for approximate embedding calculations. In particular, we highlight the relation between the non-integer particle-number partition scheme and the resulting embedding errors. Finally, we provide a discussion of the implications of the present theory for the derivative discontinuity issue and the calculation of chemical reactivity descriptors.

  5. Research and application of embedded real-time operating system

    Science.gov (United States)

    Zhang, Bo

    2013-03-01

    In this paper, based on the analysis of existing embedded real-time operating system, the architecture of an operating system is designed and implemented. The experimental results show that the design fully complies with the requirements of embedded real-time operating system, can achieve the purposes of reducing the complexity of embedded software design and improving the maintainability, reliability, flexibility. Therefore, this design program has high practical value.

  6. Embedding an institution-wide capacity building opportunity around transition pedagogy: First Year Teaching and Learning Network Coordinators

    Directory of Open Access Journals (Sweden)

    Jennifer Clark

    2015-03-01

    Full Text Available A First Year Teaching and Learning Network was established in a regional university with a strong focus on distance education for a very diverse student cohort.  The purpose of the Network, which consisted of a Coordinator in each of nine schools, was to support staff teaching students transitioning into tertiary education. The paper explores the theoretical bases of the structure, its current method of operation, its impact so far, and future plans. The development of the Network illustrates how a university can consciously embed opportunities for staff to take ownership of transition pedagogy and thus encourage widespread capacity building amongst their peers. The experiences of the Network in its first two years provide a case study of how institutional support for the Scholarship of Teaching and Learning, in particular scholarship around capacity building, can be used as a mechanism to promote both staff and student engagement with transition pedagogy resulting in a shift from a second generation approach towards a third generation approach to transition.

  7. Embedded adhesive connection for laminated glass plates

    DEFF Research Database (Denmark)

    Hansen, Jens Zangenberg; Poulsen, S.H.; Bagger, A.

    2012-01-01

    The structural behavior of a new connection design, the embedded adhesive connection, used for laminated glass plates is investigated. The connection consists of an aluminum plate encapsulated in-between two adjacent triple layered laminated glass plates. Fastening between glass and aluminum...... usage in a design situation. The embedded connection shows promising potential as a future fastening system for load-carrying laminated glass plates....

  8. Design of embedded control system for high-power tetrode modulator

    International Nuclear Information System (INIS)

    Tu Rui; Yao Lieying; Xuan Weimin

    2010-01-01

    The design of embedded control system for the high-power tetrode modulator and its test results are given. This control system is a closed-loop feedback system based on the DSP and embedded into the high-voltage modulator. A new modified method of VF fiber transmission is used in the embedded control system. The new method improves the speed of the transmission of feedback system. The results of the experiment demonstrate that the embedded feedback control system greatly increases the response speed of the whole system and improves the performance of the high-power tetrode on the HL-2A tokamak. This embedded feedback control system greatly simplifies the complexity of the original centralized control system. The operation of the control system is reliable. (authors)

  9. Seismic response analysis of BWR buildings with embedded foundation

    International Nuclear Information System (INIS)

    Fukuzawa, R.; Chiba, O.; Tohdo, M.

    1985-01-01

    An investigation on the effect of various types of foundations embedded into soil deposit to the responses of BWR buildings is made. The frequency characteristics of massless rigid foundations such as impedance functions and input motion are first obtained, depending on the embedment depth, contact condition of side wall to soil and the thickness of surface layer in a two-layered soil. From the results it is found that the embedment depth and the thickness of surface layer have a distinct effect to the responses contributed by the impedance functions and the response values characterized by the input motions are obviously influenced by the embedment depth and the contact length of side wall to soil deposit. (orig.)

  10. The Meaning of Mood – Embedded Clauses in Spanish as a Case in Point

    DEFF Research Database (Denmark)

    Jensen, Helle Dam

    2011-01-01

    to be the result of an interpretive process. This article explains how mental space theory can be used in an analysis of mood in embedded clauses in Spanish. It starts from the assumption that the meaning of mood is constructed by interlocutors in an interpretive process on the basis of information from the modal...

  11. Capacity of Fading Channels in the Low Power Regime

    KAUST Repository

    Benkhelifa, Fatma

    2013-01-01

    The low power regime has attracted various researchers in the information theory and communication communities to understand the performance limits of wireless systems. Indeed, the energy consumption is becoming one of the major limiting factors in wireless systems. As such, energy-efficient wireless systems are of major importance to the next generation wireless systems designers. The capacity is a metric that measures the performance limit of a wireless system. The study of the ergodic capacity of some fading channels in the low power regime is the main subject of this thesis. In our study, we consider that the receiver has always a full knowledge of the channel state information. However, we assume that the transmitter has possibly imperfect knowledge of the channel state information, i.e. he knows either perfectly the channel or only an estimated version of the channel. Both radio frequency and free space optical communication channel models are considered. The main contribution of this work is the explicit characterization of how the capacity scales as function of the signal-to-noise ratio in the low power regime. This allows us to characterize the gain due to the perfect knowledge compared to no knowledge of the channel state information at the transmitter. In particular, we show that the gain increases logarithmically for radio frequency communication. However, the gain increases as log2(Pavg) or log4(Pavg) for free-space optical communication, where Pavg is the average power constraint imposed to the input. Furthermore, we characterize the capacity of cascaded fading channels and we applied the result to Rayleigh-product fading channel and to a free-space optical link over gamma-gamma atmospheric turbulence in the presence of pointing errors. Finally, we study the capacity of Nakagami-m fading channel under quality of service constraints, namely the effective capacity. We have shown that the effective capacity converges to Shannon capacity in the very low

  12. An analysis of electric utility embedded power supply costs

    International Nuclear Information System (INIS)

    Kahal, M.; Brown, D.

    1998-01-01

    There is little doubt that for the vast majority of electric utilities the embedded costs of power supply exceed market prices, giving rise to the stranded cost problem. Beyond that simple generalization, there are a number of crucial questions, which this study attempts to answer. What are the regional patterns of embedded cost differences? To what extent is the cost problem attributable to nuclear power? How does the cost of purchased power compare to the cost of utility self-generation? What is the breakdown of utility embedded generation costs between operating costs - which are potentially avoidable--and ownership costs, which by definition are ''sunk'' and therefore not avoidable? How will embedded generation costs and market prices compare over time? These are the crucial questions for states as they address retail-restructuring proposal. This study presents an analysis of generation costs, which addresses these key questions. A computerized costing model was developed and applied using FERC Form 1 data for 1995. The model analyzed embedded power supply costs (i.e.; self-generation plus purchased power) for two groups of investor-owned utilities, 49 non-nuclear vs. 63 nuclear. These two subsamples represent substantially the entire US investor-owned electric utility industry. For each utility, embedded cost is estimated both at busbar and at meter

  13. PicPrint: Embedding pictures in additive manufacturing

    DEFF Research Database (Denmark)

    Nielsen, Jannik Boll; Eiríksson, Eyþór Rúnar; Lyngby, Rasmus Ahrenkiel

    2017-01-01

    Here  we  present  PicPrint,  a  method  and  tool  for  producing  an  additively  manufactured  lithophane,  enabling  transferring  and embedding  2D  information  into  additively  manufactured  3D  objects.  The  method  takes  an  input  image  and  converts  it  to  a......, after which  the mesh is  ready  for either  direct  print  on an additive manufacturing system, or transfer to other geometries via Boolean mesh operations. ...

  14. When does the Hawking into Unruh mapping for global embeddings work?

    International Nuclear Information System (INIS)

    Paston, S.A.

    2014-01-01

    We discuss for which smooth global embeddings of a metric into a Minkowskian spacetime the Hawking into Unruh mapping takes place. There is a series of examples of global embeddings into the Minkowskian spacetime (GEMS) with such mapping for physically interesting metrics. These examples use Fronsdal-type embeddings for which timelines are hyperbolas. In the present work we show that for some new embeddings (non Fronsdal-type) of the Schwarzschild and Reissner-Nordström metrics there is no mapping. We give also the examples of hyperbolic and non hyperbolic type embeddings for the de Sitter metric for which there is no mapping. For the Minkowski metric where there is no Hawking radiation we consider a non trivial embedding with hyperbolic timelines, hence in the ambient space the Unruh effect takes place, and it follows that there is no mapping too. The considered examples show that the meaning of the Hawking into Unruh mapping for global embeddings remains still insufficiently clear and requires further investigations.

  15. Automatic generation of co-embeddings from relational data with adaptive shaping.

    Science.gov (United States)

    Mu, Tingting; Goulermas, John Yannis

    2013-10-01

    In this paper, we study the co-embedding problem of how to map different types of patterns into one common low-dimensional space, given only the associations (relation values) between samples. We conduct a generic analysis to discover the commonalities between existing co-embedding algorithms and indirectly related approaches and investigate possible factors controlling the shapes and distributions of the co-embeddings. The primary contribution of this work is a novel method for computing co-embeddings, termed the automatic co-embedding with adaptive shaping (ACAS) algorithm, based on an efficient transformation of the co-embedding problem. Its advantages include flexible model adaptation to the given data, an economical set of model variables leading to a parametric co-embedding formulation, and a robust model fitting criterion for model optimization based on a quantization procedure. The secondary contribution of this work is the introduction of a set of generic schemes for the qualitative analysis and quantitative assessment of the output of co-embedding algorithms, using existing labeled benchmark datasets. Experiments with synthetic and real-world datasets show that the proposed algorithm is very competitive compared to existing ones.

  16. Better business case for embedded energy

    International Nuclear Information System (INIS)

    Wallace, Paula

    2014-01-01

    The first customer-led rule change to reform the National Energy Market has been successful, making it easier for clean energy to connect to the national electricity grid. The rule change was adopted by the Australian Energy Market Commission (AEMC) recently and will come into effect from October 1. Led by ClimateWorks Australia, the Property Council of Australia and Seed Advisory, these reforms will make it cheaper and faster to connect co/trigeneration plants and renewable energy to the electricity grid. Some see the reforms unleashing a wave of embedded generation projects on commercial buildings and precincts, seeking energy savings and higher sustainability ratings. However, the benefits that can be assumed at this stage are, greater information from electricity network operators to avoid delays, and known fees and charges so that financial feasibility can be calculated up front.

  17. Embedding Color Watermarks in Color Images

    Directory of Open Access Journals (Sweden)

    Wu Tung-Lin

    2003-01-01

    Full Text Available Robust watermarking with oblivious detection is essential to practical copyright protection of digital images. Effective exploitation of the characteristics of human visual perception to color stimuli helps to develop the watermarking scheme that fills the requirement. In this paper, an oblivious watermarking scheme that embeds color watermarks in color images is proposed. Through color gamut analysis and quantizer design, color watermarks are embedded by modifying quantization indices of color pixels without resulting in perceivable distortion. Only a small amount of information including the specification of color gamut, quantizer stepsize, and color tables is required to extract the watermark. Experimental results show that the proposed watermarking scheme is computationally simple and quite robust in face of various attacks such as cropping, low-pass filtering, white-noise addition, scaling, and JPEG compression with high compression ratios.

  18. Exact density functional and wave function embedding schemes based on orbital localization

    International Nuclear Information System (INIS)

    Hégely, Bence; Nagy, Péter R.; Kállay, Mihály; Ferenczy, György G.

    2016-01-01

    Exact schemes for the embedding of density functional theory (DFT) and wave function theory (WFT) methods into lower-level DFT or WFT approaches are introduced utilizing orbital localization. First, a simple modification of the projector-based embedding scheme of Manby and co-workers [J. Chem. Phys. 140, 18A507 (2014)] is proposed. We also use localized orbitals to partition the system, but instead of augmenting the Fock operator with a somewhat arbitrary level-shift projector we solve the Huzinaga-equation, which strictly enforces the Pauli exclusion principle. Second, the embedding of WFT methods in local correlation approaches is studied. Since the latter methods split up the system into local domains, very simple embedding theories can be defined if the domains of the active subsystem and the environment are treated at a different level. The considered embedding schemes are benchmarked for reaction energies and compared to quantum mechanics (QM)/molecular mechanics (MM) and vacuum embedding. We conclude that for DFT-in-DFT embedding, the Huzinaga-equation-based scheme is more efficient than the other approaches, but QM/MM or even simple vacuum embedding is still competitive in particular cases. Concerning the embedding of wave function methods, the clear winner is the embedding of WFT into low-level local correlation approaches, and WFT-in-DFT embedding can only be more advantageous if a non-hybrid density functional is employed.

  19. Exact density functional and wave function embedding schemes based on orbital localization

    Science.gov (United States)

    Hégely, Bence; Nagy, Péter R.; Ferenczy, György G.; Kállay, Mihály

    2016-08-01

    Exact schemes for the embedding of density functional theory (DFT) and wave function theory (WFT) methods into lower-level DFT or WFT approaches are introduced utilizing orbital localization. First, a simple modification of the projector-based embedding scheme of Manby and co-workers [J. Chem. Phys. 140, 18A507 (2014)] is proposed. We also use localized orbitals to partition the system, but instead of augmenting the Fock operator with a somewhat arbitrary level-shift projector we solve the Huzinaga-equation, which strictly enforces the Pauli exclusion principle. Second, the embedding of WFT methods in local correlation approaches is studied. Since the latter methods split up the system into local domains, very simple embedding theories can be defined if the domains of the active subsystem and the environment are treated at a different level. The considered embedding schemes are benchmarked for reaction energies and compared to quantum mechanics (QM)/molecular mechanics (MM) and vacuum embedding. We conclude that for DFT-in-DFT embedding, the Huzinaga-equation-based scheme is more efficient than the other approaches, but QM/MM or even simple vacuum embedding is still competitive in particular cases. Concerning the embedding of wave function methods, the clear winner is the embedding of WFT into low-level local correlation approaches, and WFT-in-DFT embedding can only be more advantageous if a non-hybrid density functional is employed.

  20. Exact density functional and wave function embedding schemes based on orbital localization

    Energy Technology Data Exchange (ETDEWEB)

    Hégely, Bence; Nagy, Péter R.; Kállay, Mihály, E-mail: kallay@mail.bme.hu [MTA-BME Lendület Quantum Chemistry Research Group, Department of Physical Chemistry and Materials Science, Budapest University of Technology and Economics, P.O. Box 91, H-1521 Budapest (Hungary); Ferenczy, György G. [Medicinal Chemistry Research Group, Research Centre for Natural Sciences, Hungarian Academy of Sciences, Magyar tudósok körútja 2, H-1117 Budapest (Hungary); Department of Biophysics and Radiation Biology, Semmelweis University, Tűzoltó u. 37-47, H-1094 Budapest (Hungary)

    2016-08-14

    Exact schemes for the embedding of density functional theory (DFT) and wave function theory (WFT) methods into lower-level DFT or WFT approaches are introduced utilizing orbital localization. First, a simple modification of the projector-based embedding scheme of Manby and co-workers [J. Chem. Phys. 140, 18A507 (2014)] is proposed. We also use localized orbitals to partition the system, but instead of augmenting the Fock operator with a somewhat arbitrary level-shift projector we solve the Huzinaga-equation, which strictly enforces the Pauli exclusion principle. Second, the embedding of WFT methods in local correlation approaches is studied. Since the latter methods split up the system into local domains, very simple embedding theories can be defined if the domains of the active subsystem and the environment are treated at a different level. The considered embedding schemes are benchmarked for reaction energies and compared to quantum mechanics (QM)/molecular mechanics (MM) and vacuum embedding. We conclude that for DFT-in-DFT embedding, the Huzinaga-equation-based scheme is more efficient than the other approaches, but QM/MM or even simple vacuum embedding is still competitive in particular cases. Concerning the embedding of wave function methods, the clear winner is the embedding of WFT into low-level local correlation approaches, and WFT-in-DFT embedding can only be more advantageous if a non-hybrid density functional is employed.

  1. Downlink Multicell Processing with Limited-Backhaul Capacity

    Directory of Open Access Journals (Sweden)

    O. Simeone

    2009-01-01

    Full Text Available Multicell processing in the form of joint encoding for the downlink of a cellular system is studied under the assumption that the base stations (BSs are connected to a central processor (CP via finitecapacity links (finite-capacity backhaul. To obtain analytical insight into the impact of finite-capacity backhaul on the downlink throughput, the investigation focuses on a simple linear cellular system (as for a highway or a long avenue based on theWyner model. Several transmission schemes are proposed that require varying degrees of knowledge regarding the system codebooks at the BSs. Achievable rates are derived in closed-form and compared with an upper bound. Performance is also evaluated in asymptotic regimes of interest (high backhaul capacity and extreme signal-to-noise ratio, SNR and further corroborated by numerical results. The major finding of this work is that even in the presence of oblivious BSs (that is, BSs with no information about the codebooks multicell processing is able to provide ideal performance with relatively small backhaul capacities, unless the application of interest requires high data rate (i.e., high SNR and the backhaul capacity is not allowed to increase with the SNR. In these latter cases, some form of codebook information at the BSs becomes necessary.

  2. Composable Virtual Platforms for Mixed-Criticality Embedded Systems

    NARCIS (Netherlands)

    Beyranvand Nejad, A.

    2014-01-01

    Recent trends show a steady increase towards concurrently executing more and more applications on a single embedded system. Multi-Processor System-on-Chip (MPSoC) architectures are proposed to allow complex design of embedded systems. This is achieved by integrating as many processing resources as

  3. Composable virtual platforms for mixed-criticality embedded systems

    NARCIS (Netherlands)

    Nejad, A.B.

    2014-01-01

    Recent trends show a steady increase towards concurrently executing more and more applications on a single embedded system. Multi-Processor System-on-Chip (MPSoC) architectures are proposed to allow complex design of embedded systems. This is achieved by integrating as many processing resources as

  4. Multiple M2-branes and the embedding tensor

    NARCIS (Netherlands)

    Bergshoeff, Eric A.; de Roo, Mees; Hohm, Olaf

    2008-01-01

    We show that the Bagger-Lambert theory of multiple M2-branes fits into the general construction of maximally supersymmetric gauge theories using the embedding tensor technique. We apply the embedding tensor technique in order to systematically obtain the consistent gaugings of N = 8 superconformal

  5. Using Software Architectures for Designing Distributed Embedded Systems

    DEFF Research Database (Denmark)

    Christensen, Henrik Bærbak

    In this paper, we outline an on-going project of designing distributed embedded systems for closed-loop process control. The project is a joint effort between software architecture researchers and developers from two companies that produce commercial embedded process control systems. The project...... has a strong emphasis on software architectural issues and terminology in order to envision, design and analyze design alternatives. We present two results. First, we outline how focusing on software architecture, architectural issues and qualities are beneficial in designing distributed, embedded......, systems. Second, we present two different architectures for closed-loop process control and discuss benefits and reliabilities....

  6. Smart device definition and application on embedded system: performance and optimi-zation on a RGBD sensor

    Directory of Open Access Journals (Sweden)

    Jose-Luis JIMÉNEZ-GARCÍA

    2014-10-01

    Full Text Available Embedded control systems usually are characterized by its limitations in terms of computational power and memory. Although this systems must deal with perpection and actuation signal adaptation and calculate control actions ensuring its reliability and providing a certain degree of fault tolerance. The allocation of these tasks between some different embedded nodes conforming a distributed control system allows to solve many of these issues. For that reason is proposed the application of smart devices aims to perform the data processing tasks related with the perception and actuation and offer a simple interface to be configured by other nodes in order to share processed information and raise QoS based alarms. In this work is introduced the procedure of implementing a smart device as a sensor as an embedded node in a distributed control system. In order to analyze its benefits an application based on a RGBD sensor implemented as an smart device is proposed.

  7. Promoting evaluation capacity building in a complex adaptive system.

    Science.gov (United States)

    Lawrenz, Frances; Kollmann, Elizabeth Kunz; King, Jean A; Bequette, Marjorie; Pattison, Scott; Nelson, Amy Grack; Cohn, Sarah; Cardiel, Christopher L B; Iacovelli, Stephanie; Eliou, Gayra Ostgaard; Goss, Juli; Causey, Lauren; Sinkey, Anne; Beyer, Marta; Francisco, Melanie

    2018-04-10

    This study provides results from an NSF funded, four year, case study about evaluation capacity building in a complex adaptive system, the Nanoscale Informal Science Education Network (NISE Net). The results of the Complex Adaptive Systems as a Model for Network Evaluations (CASNET) project indicate that complex adaptive system concepts help to explain evaluation capacity building in a network. The NISE Network was found to be a complex learning system that was supportive of evaluation capacity building through feedback loops that provided for information sharing and interaction. Participants in the system had different levels of and sources of evaluation knowledge. To be successful at building capacity, the system needed to have a balance between both centralized and decentralized control, coherence, redundancy, and diversity. Embeddedness of individuals within the system also provided support and moved the capacity of the system forward. Finally, success depended on attention being paid to the control of resources. Implications of these findings are discussed. Copyright © 2018 Elsevier Ltd. All rights reserved.

  8. The art of programming embedded systems

    CERN Document Server

    Ganssle, Jack

    1992-01-01

    Embedded systems are products such as microwave ovens, cars, and toys that rely on an internal microprocessor. This book is oriented toward the design engineer or programmer who writes the computer code for such a system. There are a number of problems specific to the embedded systems designer, and this book addresses them and offers practical solutions.Key Features* Offers cookbook routines, algorithms, and design techniques* Includes tips for handling debugging management and testing* Explores the philosophy of tightly coupling software and hardware in programming and dev

  9. Modern system architectures in embedded systems

    International Nuclear Information System (INIS)

    Korhonen, T.

    2012-01-01

    Several new technologies are making their way also in embedded systems. In addition to the FPGA technology which has become commonplace, multi-core CPUs and I/O virtualization (the implementation of the tasks of a software hyper-visor in hardware to improve the efficiency) are being introduced to the embedded systems. In this paper we review the trends and discuss how to take advantage of these features in control systems. Some potential application examples like parallelization, data streaming, high-speed data acquisition and virtualization are discussed

  10. Effects of non-uniform embedments on earthquake responses of nuclear reactor building

    International Nuclear Information System (INIS)

    Koyanagi, Y.; Okamoto, S.; Yoshida, K.; Inove, H.

    1989-01-01

    The nuclear reactor buildings have the portion embedded in soil. In the seismic design of such structures, it is essential to consider the effects of the embedment on the earthquake response. Most studies on these effects, however, assume the uniform embedment, i.e. the depth of the embedment is constant, which is convenient for the design and analysis. The behavior of the earthquake response considering the three-dimensional aspects of non-uniform embedment has not been made clear yet. In this paper, the authors evaluate the effects of the non-uniform embedment in an inclined ground surface on the earthquake response of a nuclear reactor building as illustrated. A typical PWR type reactor building is chosen as an analysis structure model. Four different types of embedment are set up for the comparison study. The three-dimensional analysis is carried out considering the geometry of embedment

  11. Quantum thetas on noncommutative T4 from embeddings into lattice

    International Nuclear Information System (INIS)

    Chang-Young, Ee; Kim, Hoil

    2007-01-01

    In this paper, we investigate the theta vector and quantum theta function over noncommutative T 4 from the embedding of RxZ 2 . Manin has constructed the quantum theta functions from the lattice embedding into vector space (x finite group). We extend Manin's construction of the quantum theta function to the embedding of vector space x lattice case. We find that the holomorphic theta vector exists only over the vector space part of the embedding, and over the lattice part we can only impose the condition for the Schwartz function. The quantum theta function built on this partial theta vector satisfies the requirement of the quantum theta function. However, two subsequent quantum translations from the embedding into the lattice part are nonadditive, contrary to the additivity of those from the vector space part

  12. The least channel capacity for chaos synchronization.

    Science.gov (United States)

    Wang, Mogei; Wang, Xingyuan; Liu, Zhenzhen; Zhang, Huaguang

    2011-03-01

    Recently researchers have found that a channel with capacity exceeding the Kolmogorov-Sinai entropy of the drive system (h(KS)) is theoretically necessary and sufficient to sustain the unidirectional synchronization to arbitrarily high precision. In this study, we use symbolic dynamics and the automaton reset sequence to distinguish the information that is required in identifying the current drive word and obtaining the synchronization. Then, we show that the least channel capacity that is sufficient to transmit the distinguished information and attain the synchronization of arbitrarily high precision is h(KS). Numerical simulations provide support for our conclusions.

  13. Static Schedulers for Embedded Real-Time Systems

    Science.gov (United States)

    1989-12-01

    Because of the need for having efficient scheduling algorithms in large scale real time systems , software engineers put a lot of effort on developing...provide static schedulers for he Embedded Real Time Systems with single processor using Ada programming language. The independent nonpreemptable...support the Computer Aided Rapid Prototyping for Embedded Real Time Systems so that we determine whether the system, as designed, meets the required

  14. Dynamics of social contagions with limited contact capacity.

    Science.gov (United States)

    Wang, Wei; Shu, Panpan; Zhu, Yu-Xiao; Tang, Ming; Zhang, Yi-Cheng

    2015-10-01

    Individuals are always limited by some inelastic resources, such as time and energy, which restrict them to dedicate to social interaction and limit their contact capacities. Contact capacity plays an important role in dynamics of social contagions, which so far has eluded theoretical analysis. In this paper, we first propose a non-Markovian model to understand the effects of contact capacity on social contagions, in which each adopted individual can only contact and transmit the information to a finite number of neighbors. We then develop a heterogeneous edge-based compartmental theory for this model, and a remarkable agreement with simulations is obtained. Through theory and simulations, we find that enlarging the contact capacity makes the network more fragile to behavior spreading. Interestingly, we find that both the continuous and discontinuous dependence of the final adoption size on the information transmission probability can arise. There is a crossover phenomenon between the two types of dependence. More specifically, the crossover phenomenon can be induced by enlarging the contact capacity only when the degree exponent is above a critical degree exponent, while the final behavior adoption size always grows continuously for any contact capacity when degree exponent is below the critical degree exponent.

  15. Java for Cost Effective Embedded Real-Time Software

    DEFF Research Database (Denmark)

    Korsholm, Stephan Erbs

    2012-01-01

    This thesis presents the analysis, design and implementation of the Hardware near Virtual Machine (HVM) - a Java virtual machine for embedded devices. The HVM supports the execution of Java programs on low-end embedded hard- ware environments with as little as a few kB of RAM and 32 kB of ROM....... The HVM is based on a Java-to-C translation mechanism and it produces selfcontained, strict ANSI-C code that has been specially crafted to allow it to be embedded into existing C based build and execution environments; environ- ments which may be based on non standard C compilers and libraries. The HVM...... does not require a POSIX-like OS, nor does it require a C runtime library to be present for the target. The main distinguishing feature of the HVM is to support the stepwise addition of Java into an existing C based build and execution environment for low-end embedded systems. This will allow...

  16. Java for Cost Effective Embedded Real-Time Software

    DEFF Research Database (Denmark)

    Korsholm, Stephan

    This thesis presents the analysis, design and implementation of the Hardware near Virtual Machine (HVM) - a Java virtual machine for embedded devices. The HVM supports the execution of Java programs on low-end embedded hard- ware environments with as little as a few kB of RAM and 32 kB of ROM....... The HVM is based on a Java-to-C translation mechanism and it produces self- contained, strict ANSI-C code that has been specially crafted to allow it to be embedded into existing C based build and execution environments; environ- ments which may be based on non standard C compilers and libraries. The HVM...... does not require a POSIX-like OS, nor does it require a C runtime library to be present for the target. The main distinguishing feature of the HVM is to support the stepwise addition of Java into an existing C based build and execution environment for low-end embedded systems. This will allow...

  17. Working memory is not fixed-capacity: More active storage capacity for real-world objects than for simple stimuli.

    Science.gov (United States)

    Brady, Timothy F; Störmer, Viola S; Alvarez, George A

    2016-07-05

    Visual working memory is the cognitive system that holds visual information active to make it resistant to interference from new perceptual input. Information about simple stimuli-colors and orientations-is encoded into working memory rapidly: In under 100 ms, working memory ‟fills up," revealing a stark capacity limit. However, for real-world objects, the same behavioral limits do not hold: With increasing encoding time, people store more real-world objects and do so with more detail. This boost in performance for real-world objects is generally assumed to reflect the use of a separate episodic long-term memory system, rather than working memory. Here we show that this behavioral increase in capacity with real-world objects is not solely due to the use of separate episodic long-term memory systems. In particular, we show that this increase is a result of active storage in working memory, as shown by directly measuring neural activity during the delay period of a working memory task using EEG. These data challenge fixed-capacity working memory models and demonstrate that working memory and its capacity limitations are dependent upon our existing knowledge.

  18. OPERATIONAL PERFORMANCES DEMONSTRATION OF POLYMER-CERAMIC EMBEDDED CAPACITORS FOR MMIC APPLICATIONS

    OpenAIRE

    Bord-Majek , Isabelle; Kertesz , Philippe; Mazeau , Julie; Caban-Chastas , Daniel; Levrier , Bruno; Bechou , Laurent; Ousten , Yves

    2011-01-01

    International audience; Embedded passives are becoming increasingly important for the manufacture of highly integrated electronic boards and packages. The need for embedded passives emerges from the growing consumer demand for product miniaturization thus requiring smaller components and space efficient packaging. This can be realized by replacing discrete components that demands a higher volume than embedded passives. Embedded passives have already been investigated in the last few years. Ho...

  19. Computers as components principles of embedded computing system design

    CERN Document Server

    Wolf, Marilyn

    2012-01-01

    Computers as Components: Principles of Embedded Computing System Design, 3e, presents essential knowledge on embedded systems technology and techniques. Updated for today's embedded systems design methods, this edition features new examples including digital signal processing, multimedia, and cyber-physical systems. Author Marilyn Wolf covers the latest processors from Texas Instruments, ARM, and Microchip Technology plus software, operating systems, networks, consumer devices, and more. Like the previous editions, this textbook: Uses real processors to demonstrate both technology and tec

  20. Network information provision to potential generators: Appendices

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    2001-07-01

    This Code of Practice (CoP) has been prepared to outline the standard of information that Distribution Network Operators (DNOs) should be required to produce in relation to the provision of network maps, schematic diagrams and specific network data. Network information from DNOs may be required by generators (and other customers) in order to assess the potential opportunities available for the connection of new generation plant. Seven Year Statements are published annually by the Transmission Licensees operating in Great Britain, i.e. The National Grid Company, Scottish Power and Scottish Hydro Electric, and contain all the network information relating to each transmission system, e.g. Generation Capacities, System Parameters and Plant Fault Levels. A similar arrangement for DNOs has been outlined in the Electricity Distribution Licence published by Ofgem. Under Condition 25 of the licence, 'The Long Term Development Statement', distribution licence holders are required to make available historic and planned network data. By providing sufficient network information, competition in generation will be improved. At the time of writing, any party interested in assessing distribution network information needs to make contact with the appropriate DNO, identifying the correct department and person. Written applications are then sent to that person, describing the type of network information that is required. Information required from embedded generators by DNOs is specified in detail in both of The Distribution Codes of England and Wales, and Scotland. However, there are no guidelines or details of network information to be provided by DNOs. This Code of Practise is designed to balance this situation and help DNOs, prospective generators and other applicants for information to achieve satisfaction by clarifying expectations. (Author)